Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalCybersecurity News

The Future of Security is Converged

By Will Wise
insider-enews
November 20, 2019

Businesses commonly divide their security teams into two silos: physical and cyber/IT, with industrial organizations even dividing their teams across three: physical, operational (OT) and cyber/IT. However, as threats evolve and as bad actors become more intelligent, and with the goal of being proactive vs. reactive - the need for a robust, comprehensive converged security strategy is paramount.

Converged security efforts require attention to both technology integration and interoperability, as well as organizational readiness to improve people’s and teams' collaboration. ISC Security Events’ research shows that for convergence projects, they most often involve an equal role for physical security pros, operations, cyber/IT and executive/corporate management. The collaborative team must create a set of practices, policies, and a workflow that covers all assets, while also being mutually dependent on one another to succeed.  

A case in point is the  cybersecurity incident that impacted the US power grid earlier this year. Hackers caused the firewalls to reboot for nearly 10 hours, but thankfully the event only impacted the network perimeter, causing no disruptions to the electric power supply. Although the incident was not as dangerous as it could have been re physical damage, it highlights the importance of a converged security approach for preventative maintenance.

Organizational Alignment

A converged security structure is the stimulus that brings existing teams together, while also challenging oneself to expand on talent and training needs. In most organizations, there are employees dedicated to managing the physical operations of the space like doors, video cameras, alarms and infrastructure assets like HVAC control systems. However, due to evolutions in the use of IoT in the workplace- knowing that many of these operational and physical assets are connected to the internet- there is a need for the IT team to get involved in order to manage and control any issues that may arise. Having IT involved will help aid with approporiate data analysis, cloud management, and storage solutions. Another important, yet commonly overlooked practice is the IT team’s importance for sophisticated password management and cyber-hardening and testing of assets across the physical-IT-and operations realms.

In a converged structure, the expertise of the IT, physical and operational teams align harmoniously to rectify any security issues. All team members, while having subject matter expertise, all play a role to maintain cross-functional awareness and to enable a culture of group problem solving. For example, if a security problem with your smart security camera extends from the physical camera into the corporate network, a traditional organizational    structure would operate in a linear and slow-to-react manner, amplifying risk substantially. In a converged security structure, not only is there the opportunity to be predictive to avoid risk, but also to ensure fast response, leveraging expertise across the team.  

Mobile Access Control

Mobile access control is another fast-growing trend and best practice use case for converged security processes. The integration of authenticated mobile devices and smarter credentials into the workplace, along with a system of secure communications, will ultimately create a better system for all involved.

Video Surveillance

A central converged security method is using video surveillance. The marriage of critical infrastructure and cyber and physical surveillance with the intelligence of AI not only enhances the surveillance and response time for protecting your buildings and the surrounding area, but the ability to analyze and use the footage and data collected in preventative ways.

This, with the inclusion of technology like facial recognition and biometrics included in this area of security, offers real-time viewing and therefore real-time action and reaction in the case of a security issue. It is not easy to duplicate your unique “facial signature”, so using this technology, the camera would be able to quickly detect those that are unrecognizable, thus minimizing the risk of a bad actor being able to bypass your organization’s security efforts. Using video surveillance in tandem with these latest technologies will allow real-time reactions if a security concern should arise.

Converged Security is Here Now and the Standard for the Future

Combining these integrated aspects of security creates the opportunity for numerous advancements in your business structure, stimulating the path to complete digital transformation, as well as better processes for evaluating and implementing new technologies. To get started, paying equal care to the technology and organizational aspects along with buy in from executive leadership, will chart the course for stronger security and safety for your organization and community.   

 

KEYWORDS: convergence cyberscurity physical security security convergence

Share This Story

Will wise
Will Wise oversees the flagship ISC East and West shows, CNP Expo and Cardnotpresent.com. In his role, Will’s expertise encompasses a range of topic areas, from Physical and Cybersecurity, IoT, AI, Drones and Robots, to Fraud and Payments. Wise is an IT industry veteran with more than two decades of security industry experience in enterprise IT, IoT, cloud computing, electronics and more. Prior to Reed Exhibitions, Wise spent 10 years at UBM, where he both served as an Associate Publisher of the Software Development Media Group and headed up the sales and electronic events team, working on shows like Interop, London Technology Week, Cloud Connect, and more. Other key security roles include Managing Director at Penton for the IoT Institute and IoT Emerge event, as well publishing and advertising roles at IDG Communications.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing