Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Technologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementPhysical Security

5 Minutes With

Overcoming challenges in a changing security industry

By Rachelle Blair-Frasier, Editor in Chief
5 Minutes With logo-Riley

Image via Riley

August 16, 2023

The state of the physical security industry is changing. In this installment of 5 Minutes With, we talk to Steve Riley, Global Security Technology Lead at IBM Corporate Security. He shares his insights on how IBM is overcoming some of the common challenges faced by physical security professionals and discusses where the company is focusing its security investments.

Security: What is your title and background?

Riley: Hello, I'm Steve Riley, residing in the United Kingdom. With more than 27 years of experience in the security industry, I currently hold the position of Global Security Technology Lead at IBM. In this role, I am responsible for VMS, Analytics, Edge technology, and related applications. 

My journey in security began after leaving the British Army, where I transitioned into engineering and project management roles with integrators such as Tyco and Siemens. I also gained valuable experience in the highly regulated and process-driven financial sector as a Global Technical Project Manager for Barclays Bank. Joining IBM marked a pivotal point in my career, as I now face exciting challenges that come with working on a global scale.

My daily work involves collaborating with teams worldwide, defining technology standards, driving innovation and remediation and establishing a common method of working across different geographical locations. By delivering collaborative physical security solutions, I ensure the protection of our technology, sites and personnel.

Currently, my focus lies in a transformative program involving the global transition of VMS systems and Global Command and Control systems to the cloud and across IBM's Security Operation Centers. This initiative aims to keep us at the forefront of innovation and technology, delivering substantial benefits once fully implemented.

I find my work both challenging and rewarding, and I am driven by the opportunity to make a significant impact in the realm of security technology.

Security: What are some important changes you’ve seen within the industry?

Riley: There's clearly still an element of reluctance from many to move to the cloud. Some have maybe dipped their toes in it and trialed a small proportion of their deployment in the cloud. But going full cloud is still being seen as a challenge and a risk. We’re facing these same challenges and risks at IBM, but we still want to move in the direction of the cloud.

Cybersecurity is also a top requirement. We all need to maximize the value of the cybersecurity features within our physical security products and IoT devices and adhere to cybersecurity best practices to protect the communication between those systems and devices.

Then, there are the challenges of product shortages over the last couple of years. Right now, it’s all about catching up with the projects that were scheduled to be delivered or potentially delayed. This requires more foresight and planning and building a roadmap to recovery.

Security: What differences have you noticed within your job since integrating specialized roles?

Riley: We’ve recently integrated more specialized IT expertise into our physical security department. And this has been quite essential for us to move towards a more global hybrid-cloud environment.

The key skills that we brought in are cloud SMEs. Our own internal IT teams have also been incorporated into our technology teams or physical security technology teams. They've played a pivotal role in how we architecturally deliver our solutions globally. That includes building resilient networks and ensuring we capitalize on all the cutting-edge features within edge technology, operating systems, applications and hardware.

These skills are increasingly in demand within IBM. We first started with a few SMEs within the video surveillance and access control functions. But we’re now bringing in cloud and data specialists. As we upgrade globally, we also want to enhance how we manage our portfolio of products, so we’re keen on finding more resources to oversee asset management and future upgrades.

Security: IBM is a cloud-first company. What is the primary driver for this strategy?

Riley: Moving to the cloud means we no longer need to send technicians on-site to maintain on-premises systems and hardware. We can significantly reduce maintenance and enhance efficiencies. We can also access many analytical tools, some fueled by deep learning and artificial intelligence. These can not only simplify our security operations but also provide valuable business insights. With this, we have an opportunity to shift our current operating model from a cost center to a revenue-generating function. And that strengthens our cloud ethos within the organization.

But I think there will always be an element of hybrid because right now, we’re not aligned with a fully cloud-based solution. That’s why our ultimate goal is to become cloud ready.

Right now, we’re managing the transition from an on-premises solution to a hybrid-cloud solution across our locations. We have a mixture of small, medium, and large sites, and each one comes with various network requirements and unique challenges. So how we move to the hybrid-cloud model is a challenge based on the number of locations we have, as well as the number of systems we have at each location.

We also have some analog systems still out there that require a physical device on-premises for IP conversion. We’d like to replace analog equipment with new IoT devices in these locations, negating the need for any on-premises solutions at all. But we’re working with annual budgets so that influences how quickly we can move to cloud solutions as well.

There will always be some challenges around moving a deployment into a cloud-based environment. But working with Genetec, we know that technology is changing, and as it evolves, it’ll be easier to transition to the cloud.

Security: OPEX budgets look like they're increasing. Where are you focusing investments?

Riley: A core strategic direction for us this year is the creation of a Genetec cloud environment. 

Right now, we’re not necessarily transitioning each site from on-premises to cloud environments, but our goal is to set the foundation, build out the environment, and then make them available for our operational teams.

By delivering these key requirements, we’ll have everything in place to begin piloting, testing and delivering these architecturally designed systems. Then, from late 2023 into 2024-2025, we’ll be able to move our on-premises systems into this cloud environment.

Another key area we would like to explore is the automation of system access control (AoA). We’d like to give our users access to tools that help automate the provisioning of access control privileges to minimize human intervention and simplify the end-to-end activity of accessing our systems.

Security: How is your team keeping up with the rising threat of cyberattacks?

Riley: Cybersecurity is a big risk for everyone, not just IBM. Since we are such a large organization with a global footprint, we are especially susceptible to attacks and risks.

So, we are constantly reviewing our landscape and doing due diligence on understanding any potential risks associated with the products that we deploy on our network. We manage much of that by defining products that we deploy to an approved type and standard, and by working closely with IBM network implementation teams and applying stringent controls to our network.

Many of our sites are also independent of one another, but we have strong policies and processes that depict the movement of data across our networks.

We’re also investing heavily in the hardening of our technology and understanding the best practices to apply based on recommendations by Genetec and industry-leading partners to mitigate any potential risk of a cyberattack. Also, we’re handling continuous verification across our devices and constantly performing vulnerability scans and tests on all our products, enabling us to identify and remediate issues if required.

Lastly, we also ensure our security installers are fully versed in our data protection standards, so all expectations are clear.

Security: Are there any other interesting trends you see coming in the physical security industry?

Riley: Unification helps us effectively manage all our systems through one view. So, we’re starting a pilot project in the United States, and potentially Switzerland, to unify our existing video systems with the Synergis access control system.

I think more generally across our industry, we’re going to see enterprises having to manage, maintain and control their systems by providing strong governance of more of their estate from a central perspective. So, if we can replace a thick client with a thin client and still get the same, if not more, functionality, that’s a strong way forward because it reduces the amount of management and support required.

At what pace will the industry move in that direction? That’s to be seen. For our team, we will move to web-based clients where possible, but that’s heavily dependent on the level of functionality available to us within the web client.

KEYWORDS: access control best practices cloud-based access control IT management SME security VMS VMS solutions

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • U.S. government security

    Public and secure: Accessibility challenges in government security

    See More
  • Security's Women in Security 2024

    Security's Women in Security 2024

    See More
  • men working in factory

    Balancing efficiency with security in manufacturing

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!