The Threats You Don’t Know About

In an environment of near-constant technological innovation, keeping up with security threats is essential. Part of the challenge, explains Pierre Bourgeix, a security industry consultant with expertise in IT, cyber- and physical security, is that a useful response must take into account the entire security landscape. “You have the physical security people who are still thinking active shooter, and you have the IT guys who are looking at breaches in terms of cyber from the external areas,” Bourgeix says. “But it’s really a convergence of all three areas—IT, operational technology (OT), physical security, and even IOT—all devices in disparate fields.” The International Security Conference East (ISC) will help attendees understand the range of threats and their interplay and offer ways to guard against them.


Linked Targets

Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions, underscores the complex nature of the security landscape. “Cyber security used to be confined to protecting traditional computer systems, and that is still a huge issue,” Wise says. “But now all kinds of physical assets are connected to the internet, so there is a huge threat of cyberattacks on things like our energy grid, air conditioning systems and more.” This impact on perimeter security is a major concern. With the connectivity of most physical assets to the internet, access points have multiplied. “Access could be through the doors to their building, through the HVAC systems,” Wise says. Access to buildings presents, like cyberattacks, a complex front. Beyond just internet-assisted physical attacks, both active shooter and vehicle attacks are sources of concern for security professionals and others and have become even more of a concern with the rise of drone usage. “The weaponization of drones is a real threat,” Wise notes.

Exhibitor Interactions

Expanding the Scope of Protection

Given the rising complexity of security threats, it’s essential that companies broaden their mindset regarding their security needs. Having the right security systems in place is key. But to support the systems and hardware, changes in organizational infrastructure and corporate governance are also necessary. “Executive leaders have to take an active role,” Wise says. “They can’t just rely on the IT department or a third-party company.” Bourgeix notes that moving forward, companies need to communicate internally on security issues, and manufacturers need to work with them to help. “When you implement a solution, you have to really understand the business process,” Bourgeix says. “And manufacturers have to speak from a consultant approach, not just selling their tool but showing businesses how to use and integrate it.”

Bringing it all together is key—coordinating the people, departments and systems you rely on to keep you safe. “That means making sure you have the right team of security professionals,” Wise says, “and also making sure there is communication from different departments at a company.” Working together and keeping an eye out for the unseen threats, can help you keep whatever it is you’re protecting secure.

Staying one step ahead of the threats can be a challenge. Register for ISC East to learn the most up-to-date information and see the most advanced products and services on the market.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.