Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Physical Security

10/28/2020
10:00 AM
Peter George
Peter George
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Physical Security Has a Lot of Catching Up to Do

The transformation we need: merging the network operations center with the physical security operations center.

I joined the physical security space from the cybersecurity and networking world. Coming from that background, it has been fascinating to see how far behind the physical security world is when compared with those two sectors. It often feels like the land that time forgot.

But I have no regrets. Why? Because I have seen this movie before, and I like how it ends. Let me explain.

In 2005 — what now feels like the early days of cybersecurity — Palo Alto Networks showed up with a fundamentally different approach that shook up the landscape. At the time, customers were buying a new black box for every application and function. The boxes didn't talk to each other to coordinate in any particular way. Managing them all was a nightmare, and it also created vulnerabilities that attackers could exploit.

Related Content:

Why We Need to Pay Attention to Attacks on the Smart-Built Environment

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

In a time when firewalls were all about ports and protocols, Palo Alto could see applications. It assigned application priorities in the firewall itself. The company's integrated platform pulled multiple functions into a single environment. It was faster, easier to manage, and more secure. Customers loved it.

When I look at the physical security world today, I see a similar situation to the fractured firewalls and networking environment of the mid-2000s of cybersecurity. When we arrive at a concert or sporting event, we endure a security queue of indefinite duration. After that, we dump the contents of our packets — I mean pockets — into a bucket. If we have a bag with us, we surrender it for deep packet inspection. Then we walk through an ancient analog metal detector that can't tell the difference between a gun and a prosthetic knee. If we're unlucky, we are routed off for an invasive pat down. After the security gauntlet, we queue up to have our tickets validated, and fight our way to our seats. We endure this nonsense for each event, even if we own season tickets that have been in the family since the Roosevelt administration. It's madness.

In the physical security world, many systems are analog and don't get smarter over time. In cybersecurity, everything is digital by default and often enhanced by modern machine learning. In physical security, every sensor — be it a weapons detector, video surveillance system, ticket processing station, or people counter — is a discrete black box that doesn't talk to other systems. Even worse, the boxes line up serially in a congested space, so each new system incrementally degrades the guest experience. In cybersecurity, integrated systems parallelize and auto-scale as needed to keep things moving. In physical security, there are almost no analytics, no objective risk-scoring methodologies, and the default solution to nearly every problem is "hire more people" or "train the people to do more and remember more."

The pandemic has brought all of these deficiencies in the physical security world to a boiling point. Actually, more like a boiling point in a pressure cooker. Guests and employees simply will not tolerate crowded lines and physical contact anymore. And now facilities need to screen for weapons as well as elevated temperature, mask compliance, and social distancing compliance. As these facilities navigate their reopenings, they are finding that "add more boxes and people" is a nonstarter.

I firmly believe that the future of physical security is touchless screening by integrated artificial intelligence-powered platforms that can look for multiple threats using multiple sensors in a single pass. It will mirror today's modern cybersecurity platforms: intelligent, connected, precise, and adaptive. It will be invasive for intruders while being barely noticed by valued visitors.

Just imagine how cool it would be if the same system that is scanning for threats could also process tickets, guide visitors to their seats, and give season ticket holders and other trusted visitors the premium experience they deserve. Would that require working across our artificial organizational boundaries? Yes! Would it require us to reimagine business processes and design them with the visitor experience in mind? Again, emphatically, yes! That's what digital transformation is all about.

The physical security world has a lot of catching up to do in this digital transformation. But when physical security is transformed, it will finally be possible to fully merge the network operations center (NOC) with the physical security operations center (SOC). We'll know were getting there when the NOC and the SOC are in the same room and the occupants have total situational awareness of all threats, whether they manifest themselves as bits or atoms, or both. The situational awareness of the people in the combined SNOC might even include key visitor experience metrics. They'll think about both risks and opportunities, both threats and key business results.

I look forward to that day. Let's get on with it.

Peter George has a decades-long track record in leading cybersecurity companies and building disruptive technology startups into market leaders. He joined Evolv Technology in February 2019 as chief commercial officer and was promoted to chief executive officer (CEO) in ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jszczygiel208
100%
0%
jszczygiel208,
User Rank: Apprentice
11/17/2020 | 2:50:38 PM
The digital transformation of Physical Security starts with Cloud & IOT adoption
Peter is quite right to point out the silos in typical physical security solutions along with the absolute need to merge SOC and NOC operations for the protection of the entire enterprise.  In addition, many physical building security operations use outdated and vulnerable technologies based on "if it isn't broken, don't fix it" philosophy.  However many physical security solutions contain broken technology and processes even if they operate from a functional perspective.  IOT and cloud are forcing physical security technologies to up their game and catch up to cybersecurity counterparts.  We need to reach a place where situational awareness and user experience are managed together in Peter's "SNOC" in ways that optimize the ideal business outcomes we all would like to achieve.
Visit the Web's Most Authoritative Resource on Physical Security

To get the latest news and analysis on threats, vulnerabilities, and best practices for enterprise physical security, please visit IFSEC Global. IFSEC Global offers expert insight on critical issues and challenges in physical security, and hosts one of the world's most widely-attended conferences for physical security professionals.

Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...