Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalCybersecurity News

The Future of Security is Converged

By Will Wise
insider-enews
November 20, 2019

Businesses commonly divide their security teams into two silos: physical and cyber/IT, with industrial organizations even dividing their teams across three: physical, operational (OT) and cyber/IT. However, as threats evolve and as bad actors become more intelligent, and with the goal of being proactive vs. reactive - the need for a robust, comprehensive converged security strategy is paramount.

Converged security efforts require attention to both technology integration and interoperability, as well as organizational readiness to improve people’s and teams' collaboration. ISC Security Events’ research shows that for convergence projects, they most often involve an equal role for physical security pros, operations, cyber/IT and executive/corporate management. The collaborative team must create a set of practices, policies, and a workflow that covers all assets, while also being mutually dependent on one another to succeed.  

A case in point is the  cybersecurity incident that impacted the US power grid earlier this year. Hackers caused the firewalls to reboot for nearly 10 hours, but thankfully the event only impacted the network perimeter, causing no disruptions to the electric power supply. Although the incident was not as dangerous as it could have been re physical damage, it highlights the importance of a converged security approach for preventative maintenance.

Organizational Alignment

A converged security structure is the stimulus that brings existing teams together, while also challenging oneself to expand on talent and training needs. In most organizations, there are employees dedicated to managing the physical operations of the space like doors, video cameras, alarms and infrastructure assets like HVAC control systems. However, due to evolutions in the use of IoT in the workplace- knowing that many of these operational and physical assets are connected to the internet- there is a need for the IT team to get involved in order to manage and control any issues that may arise. Having IT involved will help aid with approporiate data analysis, cloud management, and storage solutions. Another important, yet commonly overlooked practice is the IT team’s importance for sophisticated password management and cyber-hardening and testing of assets across the physical-IT-and operations realms.

In a converged structure, the expertise of the IT, physical and operational teams align harmoniously to rectify any security issues. All team members, while having subject matter expertise, all play a role to maintain cross-functional awareness and to enable a culture of group problem solving. For example, if a security problem with your smart security camera extends from the physical camera into the corporate network, a traditional organizational    structure would operate in a linear and slow-to-react manner, amplifying risk substantially. In a converged security structure, not only is there the opportunity to be predictive to avoid risk, but also to ensure fast response, leveraging expertise across the team.  

Mobile Access Control

Mobile access control is another fast-growing trend and best practice use case for converged security processes. The integration of authenticated mobile devices and smarter credentials into the workplace, along with a system of secure communications, will ultimately create a better system for all involved.

Video Surveillance

A central converged security method is using video surveillance. The marriage of critical infrastructure and cyber and physical surveillance with the intelligence of AI not only enhances the surveillance and response time for protecting your buildings and the surrounding area, but the ability to analyze and use the footage and data collected in preventative ways.

This, with the inclusion of technology like facial recognition and biometrics included in this area of security, offers real-time viewing and therefore real-time action and reaction in the case of a security issue. It is not easy to duplicate your unique “facial signature”, so using this technology, the camera would be able to quickly detect those that are unrecognizable, thus minimizing the risk of a bad actor being able to bypass your organization’s security efforts. Using video surveillance in tandem with these latest technologies will allow real-time reactions if a security concern should arise.

Converged Security is Here Now and the Standard for the Future

Combining these integrated aspects of security creates the opportunity for numerous advancements in your business structure, stimulating the path to complete digital transformation, as well as better processes for evaluating and implementing new technologies. To get started, paying equal care to the technology and organizational aspects along with buy in from executive leadership, will chart the course for stronger security and safety for your organization and community.   

 

KEYWORDS: convergence cyberscurity physical security security convergence

Share This Story

Will wise
Will Wise oversees the flagship ISC East and West shows, CNP Expo and Cardnotpresent.com. In his role, Will’s expertise encompasses a range of topic areas, from Physical and Cybersecurity, IoT, AI, Drones and Robots, to Fraud and Payments. Wise is an IT industry veteran with more than two decades of security industry experience in enterprise IT, IoT, cloud computing, electronics and more. Prior to Reed Exhibitions, Wise spent 10 years at UBM, where he both served as an Associate Publisher of the Software Development Media Group and headed up the sales and electronic events team, working on shows like Interop, London Technology Week, Cloud Connect, and more. Other key security roles include Managing Director at Penton for the IoT Institute and IoT Emerge event, as well publishing and advertising roles at IDG Communications.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!