Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Physical Security

10/28/2020
10:00 AM
Peter George
Peter George
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Physical Security Has a Lot of Catching Up to Do

The transformation we need: merging the network operations center with the physical security operations center.

I joined the physical security space from the cybersecurity and networking world. Coming from that background, it has been fascinating to see how far behind the physical security world is when compared with those two sectors. It often feels like the land that time forgot.

But I have no regrets. Why? Because I have seen this movie before, and I like how it ends. Let me explain.

In 2005 — what now feels like the early days of cybersecurity — Palo Alto Networks showed up with a fundamentally different approach that shook up the landscape. At the time, customers were buying a new black box for every application and function. The boxes didn't talk to each other to coordinate in any particular way. Managing them all was a nightmare, and it also created vulnerabilities that attackers could exploit.

Related Content:

Why We Need to Pay Attention to Attacks on the Smart-Built Environment

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

In a time when firewalls were all about ports and protocols, Palo Alto could see applications. It assigned application priorities in the firewall itself. The company's integrated platform pulled multiple functions into a single environment. It was faster, easier to manage, and more secure. Customers loved it.

When I look at the physical security world today, I see a similar situation to the fractured firewalls and networking environment of the mid-2000s of cybersecurity. When we arrive at a concert or sporting event, we endure a security queue of indefinite duration. After that, we dump the contents of our packets — I mean pockets — into a bucket. If we have a bag with us, we surrender it for deep packet inspection. Then we walk through an ancient analog metal detector that can't tell the difference between a gun and a prosthetic knee. If we're unlucky, we are routed off for an invasive pat down. After the security gauntlet, we queue up to have our tickets validated, and fight our way to our seats. We endure this nonsense for each event, even if we own season tickets that have been in the family since the Roosevelt administration. It's madness.

In the physical security world, many systems are analog and don't get smarter over time. In cybersecurity, everything is digital by default and often enhanced by modern machine learning. In physical security, every sensor — be it a weapons detector, video surveillance system, ticket processing station, or people counter — is a discrete black box that doesn't talk to other systems. Even worse, the boxes line up serially in a congested space, so each new system incrementally degrades the guest experience. In cybersecurity, integrated systems parallelize and auto-scale as needed to keep things moving. In physical security, there are almost no analytics, no objective risk-scoring methodologies, and the default solution to nearly every problem is "hire more people" or "train the people to do more and remember more."

The pandemic has brought all of these deficiencies in the physical security world to a boiling point. Actually, more like a boiling point in a pressure cooker. Guests and employees simply will not tolerate crowded lines and physical contact anymore. And now facilities need to screen for weapons as well as elevated temperature, mask compliance, and social distancing compliance. As these facilities navigate their reopenings, they are finding that "add more boxes and people" is a nonstarter.

I firmly believe that the future of physical security is touchless screening by integrated artificial intelligence-powered platforms that can look for multiple threats using multiple sensors in a single pass. It will mirror today's modern cybersecurity platforms: intelligent, connected, precise, and adaptive. It will be invasive for intruders while being barely noticed by valued visitors.

Just imagine how cool it would be if the same system that is scanning for threats could also process tickets, guide visitors to their seats, and give season ticket holders and other trusted visitors the premium experience they deserve. Would that require working across our artificial organizational boundaries? Yes! Would it require us to reimagine business processes and design them with the visitor experience in mind? Again, emphatically, yes! That's what digital transformation is all about.

The physical security world has a lot of catching up to do in this digital transformation. But when physical security is transformed, it will finally be possible to fully merge the network operations center (NOC) with the physical security operations center (SOC). We'll know were getting there when the NOC and the SOC are in the same room and the occupants have total situational awareness of all threats, whether they manifest themselves as bits or atoms, or both. The situational awareness of the people in the combined SNOC might even include key visitor experience metrics. They'll think about both risks and opportunities, both threats and key business results.

I look forward to that day. Let's get on with it.

Peter George has a decades-long track record in leading cybersecurity companies and building disruptive technology startups into market leaders. He joined Evolv Technology in February 2019 as chief commercial officer and was promoted to chief executive officer (CEO) in ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jszczygiel208
100%
0%
jszczygiel208,
User Rank: Apprentice
11/17/2020 | 2:50:38 PM
The digital transformation of Physical Security starts with Cloud & IOT adoption
Peter is quite right to point out the silos in typical physical security solutions along with the absolute need to merge SOC and NOC operations for the protection of the entire enterprise.  In addition, many physical building security operations use outdated and vulnerable technologies based on "if it isn't broken, don't fix it" philosophy.  However many physical security solutions contain broken technology and processes even if they operate from a functional perspective.  IOT and cloud are forcing physical security technologies to up their game and catch up to cybersecurity counterparts.  We need to reach a place where situational awareness and user experience are managed together in Peter's "SNOC" in ways that optimize the ideal business outcomes we all would like to achieve.
Visit the Web's Most Authoritative Resource on Physical Security

To get the latest news and analysis on threats, vulnerabilities, and best practices for enterprise physical security, please visit IFSEC Global. IFSEC Global offers expert insight on critical issues and challenges in physical security, and hosts one of the world's most widely-attended conferences for physical security professionals.

Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23727
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in the Antiy Zhijia Terminal Defense System 5.0.2.10121559 and an attacker can cause a computer crash (BSOD).
CVE-2020-28175
PUBLISHED: 2020-12-03
There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privileges
CVE-2020-13524
PUBLISHED: 2020-12-03
An out-of-bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 uses SPECS data from binary USD files. A specially crafted malformed file can trigger an out-of-bounds memory access and modification which results in memory corruption. To trigger this vulnerability, the victim n...
CVE-2020-13525
PUBLISHED: 2020-12-03
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-23726
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in Wise Care 365 5.5.4, attackers can cause computer crash (BSOD).