Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Security Evolution

By Kevin Coleman
July 23, 2017

What are the top five drivers of current approaches and strategies for security?

In my research, they are:

  1. The increased value and amount of an organization’s intellectual property (IP) (digital & physical) as well as the increased number of attempts to steal the IP.
  2. Increased open source cyber intelligence about potential physical and cyber threats posed by individuals with ties to that specific organization.
  3. Obsolete/inadequate physical and digital perimeter protection capabilities.
  4. The failure to provide up-to-date continuous physical and cybersecurity education for employees, contractors (temp staff), vendors, suppliers, and third-party data (physical file and digital backups) handlers.
  5. Not aligning your physical and digital security measures with current threats, acceptable levels of risk and the business goals and objectives.

In a follow-up conversation, the question “What is driving CSOs and CISOs to fall victim to these five shortcomings?” Many enterprise security professionals use compliance with current regulation as the primary measure for evaluating their strategies and plans. Many of those regulations are the product of passed legislation by multiple levels of government in countries around the world. The process used to develop, introduce, pass and implement regulations varies greatly by country and regulatory authority around the world. Yet there is one thing that seems to be consistent – the time it takes for all of this to take place.

Consider the physical and digital threats that were at the top of our minds 18 to 24 months ago. Only a small percentage can get all this done in that condensed period of time. While no actual data exists, based on what I have experienced I believe the average would have to be between three to four years.

Now consider the hot topics of today.

  1. Integration of physical and digital security into the development process for new products and programs – from the very beginning.
  2. The dramatic growth in the magnitude of physical and digital data of organizations of virtually every size and in every industry.
  3. The change from a general security threat model to one that is specific to the industry and role of the organization.

Industrial espionage has been around for many years, and the introduction of technology has moved much of the sensitive information about new products and services under development to an estimated 70% digital and 30% physical configuration  Now enter 3D printers, with the product prototypes that are being produced on them. Some of the new systems take digital drawings (blueprints) and specifications and convert it to a 3D printer file and that produces the prototype. The holy grail in industrial espionage was to get a real-world (physical) prototype and the specifications in paper files or digital format. Now all you really need is the 3D printer file. If you have that you can produce the product or reverse/decompose the printer file and create the drawings and specifications.

It shouldn’t be very long until some type of inline connector for the 3D printer will be produced that once installed collects that information. Good old insider threat... The time has come for a new approach to fully integrated physical and digital security, and perhaps that means  one executive/head for security that fully integrates physical and digital security.

 

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing