SlideShare a Scribd company logo
Looking into the Future of Security
Welcome to the first in a series of articles themed ‘Looking to the Future’ where I explore the
challenges and opportunities that emerging technologies are driving across various industries. As
always, my goal is to share my ideas, knowledge and experience to receive feedback and to
continuously learn and improve from you.
This article, co-authored with industry expert Scott Taylor COO of Southern Cross Group, explores
the various aspects of security from a cyber and physical perspective. Thank you Scott and let’s
begin.
Throughout all my years in the industry I cannot remember a time when the world has been more
aware of the need for security both online and off. The world and its risk landscape are changing
rapidly, and high-tech security is at the forefront of innovation.
Most of the debate about ‘protecting your business’ revolves around online security, and rightfully
so. In the last two years, 45% of Australian companies have been attacked by cyber criminals. For
small and medium-sized businesses (SMBs), the impact of such attacks goes beyond the immediate
and more tangible items such as financial loss and disruption to daily operations. There’s also the
loss of reputation and customer trust to factor in.
Often, the problem stems from ignorance and a false sense of security – pardon the pun. According
to a NSW Small Business Commissioner study, 50% of the SMBs in Australia believe that their limited
online footprint protects them from cybercrime and do not realise they could be a possible target.
Some of the biggest cyber security threats facing Australian SMBs are phishing, ransomware, social
media hacking, disgruntled employees, and unsecured printers and multifunction devices (MFDs).
The Australian government takes these threats very seriously and is adopting measures to secure
businesses online. One such measure is incorporating the Australian Cyber Security Centre (ACSC)
into the Australian Signals Directorate (ASD). Part of the government's national security reform
package to provide better cyber security support and services, the initiative provides SMBs with the
Stay Smart Online Small Business Guide to allow them to put in place some basic online security
practices.
By implementing the security measures in this guide, Australian businesses can increase their online
security and minimise the threat of cyber-attacks. But, is cybercrime the only security concern for
businesses in Australia? Not quite! Physical security is an equally, if not a more, concerning problem.
Facility Security: What Facility Managers and Security Professionals
Need to Consider
There are a variety of building security risks giving headaches to facility managers and security
professionals everywhere. The biggest problem for security professionals does not lie in the physical
security threat itself; rather it lies in how they think about and manage security. Those in charge of
facility security would know how hard it is to justify funding for security measures—until a security
breach happens. Even then, you need to have a rock-solid reason for the funding. Security is one of
the only industries globally where performance is ranked by how often things “don’t happen”.
When a facility is breached, the first question that executives would generally ask is ‘Why did it
happen and what do you need to prevent it from happening again?’ Right here is the opportunity for
facility managers, security professionals and others in charge of facility security to make most of a
security breach and obtain the resources they need to help prevent security breaches in the future.
But, they need to be prepared with a solid answer. If they’re not, then the opportunity will be lost.
Your intuitive abilities are not enough to come up with a solid answer instead you need to research.
You need to research the biggest security concerns for facilities and then find appropriate solutions
for them. So, what are the biggest security concerns for facilities? Think personal safety and asset
protection, security patrolling, and loss of inventory.
While the list is not exhaustive, researching these security concerns and the most appropriate or
innovative solutions for them could provide the answer you need to justify the budget for the
resources needed to prevent security breaches in the future. Following is insight into these security
concerns and the innovative solutions for them.
Personal Safety and Asset Protection
Physical security is about protecting important data, confidential information, networks, software,
equipment, facilities, company’s assets, and personnel. One of the biggest concerns for any business
is protecting its employees and assets. Personal safety and asset protection is not just something for
the ‘bad times’ either, rather it is a fundamental right of your assets and people.
Your assets and people need and deserve to be protected. People here refer to your staff, guests,
and visitors. Identifying and prioritising the security vulnerabilities and developing plans to eliminate
or mitigate based on your organisational risk appetite is critical. Leveraging technology across the
facility and in the operational structure can provide you with what is needed to deal with
emergencies and take preventative measures before the worst occurs.
The concept of “smart buildings” could come in handy at a time like this. The market for smart
building is expected to grow considerably in the next years. Considering that more and more
organisations are optimising all aspects of their facilities with sensors and digital controllers for
HVAC, electricity, surveillance systems and even parking spaces, it is easy to see why.
As the security demands for facilities get increasingly complex, there is an opportunity to rethink the
approach to how security in buildings is managed. The next era of facility security is enabled by three
technologies: Internet of Things (IoT), virtualisation, and analytics and they are the driving force
behind smart buildings.
IoT is of particular importance here as it makes it easier and cheaper to connect all the security
devices and systems within a facility, giving people greater control over facility security. This helps to
track assets to combat theft and optimise usage, secure job-sites simply and cost-effectively, send
security alerts via the internet, and provide back-up alarm systems.
Security Patrol
Today, building security is different from what it was twenty, ten, or even five years ago. A
combination of security measures need to be considered to make sites adequately safe and secure.
Security patrol is part of it. Patrolling is needed to enhance personnel safety and deter crime and
basically extend the security sphere of influence. The purpose of security patrols should always be to
promote safe workplace environment, deter vandalism, theft and trespassers and provide rapid
response to emergency situations.
Technology can help achieve this. In the U.S, drones and autonomous surveillance robots are being
used for this purpose. Avitas Systems—a subsidiary of GE, has started to use robots and drones to
keep an eye on industrial facilities. This security system relies on a deep-learning technology
developed by NVIDIA.
In deep learning, neural networks are fed a massive amount of data, which is image-based data. This
data will be used by a robot to construct models or patterns. The major benefit of using these
surveillance robots is that they can stay focused constantly. Additionally, they are a lot better than
humans at identifying defects. They also have abilities that security guards do not such as identifying
gas leaks, changes in temperature and other important elements. But, most important of all, the
robots can save facilities from the hundreds and thousands of dollars that they spend on manual
inspections every year.
Loss of Inventory
Technology plays a vital role in inventory loss management as it can enable a sustainable strategy for
loss reduction. In a facility, inventory loss might be due to fraud, internal shrink, shoplifting or
organised crime. Regardless of the cause, inventory loss in a facility can be minimised or better
eliminated with futuristic emerging technology.
This technology includes Radio Frequency Identification (RFID) chips embedded in the packaging or
product tags of the inventory, VST (magnetic) tags that prevent theft of merchandise by setting off
an alarm if they are not properly deactivated, drones that capture footage, inventory software that
tracks inventory and identifies any merchandise that is unaccounted for, and biometric surveillance
systems that proactively prevent crime.
Final World
Without abandoning old modes of thinking, facility managers and security professionals cannot
overcome the challenges facing them. They need to rethink their strategy to come up with effective
solutions to the security threats facing the facility. Today, these solutions include technology that
can adjust to the level of the known or potential threat. Smart buildings, IoT, drones, robotics, and
deep learning systems are just a few examples of this technology. If you’re interested to learn more
about securities and facilities management services in Australia visit Southern Cross Group.
About the Author
Martin Sheridan begun his career in
technical development and solution
architecture, more recently he has
developed his professional practice to
include development of both commercial
and technical strategy, leadership of
substantial teams and delivery of
major cultural change programs. He
played diverse roles, including design,
development and deployment of
innovative software solutions with an eye
to longer-term technological and
commercial strategies to improve SDLC,
time-to-market, time-to-value, efficiency
and client satisfaction.
Source - https://scgroup.global/blog/looking-into-the-future-of-security/

More Related Content

PPTX
What i learned at issa international summit 2019
PDF
SBIC Enterprise Information Security Strategic Technologies
 
PDF
Ibm cognitive security_white_paper_04_2016
PDF
Cognitive Security Case Study
PDF
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PDF
The 5 most trusted cyber security companies to watch.
PDF
ICISS Newsletter Sept 14
PDF
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
What i learned at issa international summit 2019
SBIC Enterprise Information Security Strategic Technologies
 
Ibm cognitive security_white_paper_04_2016
Cognitive Security Case Study
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
The 5 most trusted cyber security companies to watch.
ICISS Newsletter Sept 14
ISACA SLOVENIA CHAPTER October 2016 - Lubiana

What's hot (19)

PDF
Kista watson summit final public version
PDF
Delve Labs - Upcoming Security Challenges for the Internet of Things
PDF
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
PDF
The 10 most trusted companies in enterprise security for dec 2017
PDF
The Security Challenge: What's Next?
PDF
Getting ahead of compromise
PDF
DFlabs corporate profile 01-2013
PDF
Secure by design building id based security
PPT
Dr K Subramanian
PPTX
The Charter of Trust
PPT
Security solutions for a smarter planet
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PDF
Information Security Shake-Up
 
PPTX
Information security governance
PPT
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
PPTX
Overview of Artificial Intelligence in Cybersecurity
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
CS Sakerhetsdagen 2015 IBM Feb 19
Kista watson summit final public version
Delve Labs - Upcoming Security Challenges for the Internet of Things
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
The 10 most trusted companies in enterprise security for dec 2017
The Security Challenge: What's Next?
Getting ahead of compromise
DFlabs corporate profile 01-2013
Secure by design building id based security
Dr K Subramanian
The Charter of Trust
Security solutions for a smarter planet
Key Challenges Facing IT/OT: Hear From The Experts
Information Security Shake-Up
 
Information security governance
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Overview of Artificial Intelligence in Cybersecurity
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
CS Sakerhetsdagen 2015 IBM Feb 19
Ad

Similar to Looking into the future of security (20)

PDF
The Role of Technology in Modern Security Services Trends and Innovations.pdf
PPTX
Cybersecurity – a critical business issue
PDF
Ten Security Essentials for CIOs
PPTX
What is cyber security
PPTX
Cyber threat Intelligence Dubai - Ahad.pptx
PDF
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
PDF
I-Week April 2004 - Claudia Warwar
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
DOC
Take back your security infrastructure
PDF
Sonia randhawa speaks on cybersecurity and innovation
PDF
The Role Of Data Analytics In Cybersecurity
PDF
Top Cyber News Magazine Daniel Ehrenreich
PDF
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
PDF
Darktrace_WhitePaper_EnterpriseImmuneSystem
PDF
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
PDF
Top Industries Looking for Cyber Security Experts.pdf
PDF
Symantec cyber-resilience
PPTX
Security Transformation
PDF
Tech Talent Meetup Hacking Security Event Recap
The Role of Technology in Modern Security Services Trends and Innovations.pdf
Cybersecurity – a critical business issue
Ten Security Essentials for CIOs
What is cyber security
Cyber threat Intelligence Dubai - Ahad.pptx
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
I-Week April 2004 - Claudia Warwar
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Take back your security infrastructure
Sonia randhawa speaks on cybersecurity and innovation
The Role Of Data Analytics In Cybersecurity
Top Cyber News Magazine Daniel Ehrenreich
2021. Top Cyber News MAGAZINE Daniel Ehrenreich October 2021
Darktrace_WhitePaper_EnterpriseImmuneSystem
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Top Industries Looking for Cyber Security Experts.pdf
Symantec cyber-resilience
Security Transformation
Tech Talent Meetup Hacking Security Event Recap
Ad

Recently uploaded (20)

PDF
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
PDF
Budora Case Study: Building Trust in Canada’s Online Cannabis Market
PPT
chap9.New Product Development product lifecycle.ppt
PDF
Decision trees for high uncertainty decisions
PDF
Why Has Vertical Farming Recently Become More Economical.pdf
PPT
Chap8. Product & Service Strategy and branding
PDF
Driving Innovation & Growth, Scalable Startup IT Services That Deliver Result...
PPTX
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
PDF
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
PDF
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
PDF
Business Risk Assessment and Due Diligence Report: Zacharia Ali and Associate...
PPTX
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
PPTX
ENTREPRENEURSHIP..PPT.pptx..1234567891011
PPTX
The Evolution of Search- Behaviour.pptx
PPTX
_From Idea to Revenue How First-Time Founders Are Monetizing Faster in 2025.pptx
PDF
Chapter 3 - Business environment - Final.pdf
PDF
Chapter 1 - Introduction to management.pdf
PPTX
Process-and-Ethics-in-Research-1.potatoi
PPTX
Daily stand up meeting on the various business
PDF
Pollitrace pitch deck- Ai powered multiple species
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
Budora Case Study: Building Trust in Canada’s Online Cannabis Market
chap9.New Product Development product lifecycle.ppt
Decision trees for high uncertainty decisions
Why Has Vertical Farming Recently Become More Economical.pdf
Chap8. Product & Service Strategy and branding
Driving Innovation & Growth, Scalable Startup IT Services That Deliver Result...
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
Business Risk Assessment and Due Diligence Report: Zacharia Ali and Associate...
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
ENTREPRENEURSHIP..PPT.pptx..1234567891011
The Evolution of Search- Behaviour.pptx
_From Idea to Revenue How First-Time Founders Are Monetizing Faster in 2025.pptx
Chapter 3 - Business environment - Final.pdf
Chapter 1 - Introduction to management.pdf
Process-and-Ethics-in-Research-1.potatoi
Daily stand up meeting on the various business
Pollitrace pitch deck- Ai powered multiple species

Looking into the future of security

  • 1. Looking into the Future of Security Welcome to the first in a series of articles themed ‘Looking to the Future’ where I explore the challenges and opportunities that emerging technologies are driving across various industries. As always, my goal is to share my ideas, knowledge and experience to receive feedback and to continuously learn and improve from you. This article, co-authored with industry expert Scott Taylor COO of Southern Cross Group, explores the various aspects of security from a cyber and physical perspective. Thank you Scott and let’s begin. Throughout all my years in the industry I cannot remember a time when the world has been more aware of the need for security both online and off. The world and its risk landscape are changing rapidly, and high-tech security is at the forefront of innovation. Most of the debate about ‘protecting your business’ revolves around online security, and rightfully so. In the last two years, 45% of Australian companies have been attacked by cyber criminals. For small and medium-sized businesses (SMBs), the impact of such attacks goes beyond the immediate and more tangible items such as financial loss and disruption to daily operations. There’s also the loss of reputation and customer trust to factor in. Often, the problem stems from ignorance and a false sense of security – pardon the pun. According to a NSW Small Business Commissioner study, 50% of the SMBs in Australia believe that their limited online footprint protects them from cybercrime and do not realise they could be a possible target. Some of the biggest cyber security threats facing Australian SMBs are phishing, ransomware, social media hacking, disgruntled employees, and unsecured printers and multifunction devices (MFDs). The Australian government takes these threats very seriously and is adopting measures to secure businesses online. One such measure is incorporating the Australian Cyber Security Centre (ACSC) into the Australian Signals Directorate (ASD). Part of the government's national security reform package to provide better cyber security support and services, the initiative provides SMBs with the
  • 2. Stay Smart Online Small Business Guide to allow them to put in place some basic online security practices. By implementing the security measures in this guide, Australian businesses can increase their online security and minimise the threat of cyber-attacks. But, is cybercrime the only security concern for businesses in Australia? Not quite! Physical security is an equally, if not a more, concerning problem. Facility Security: What Facility Managers and Security Professionals Need to Consider There are a variety of building security risks giving headaches to facility managers and security professionals everywhere. The biggest problem for security professionals does not lie in the physical security threat itself; rather it lies in how they think about and manage security. Those in charge of facility security would know how hard it is to justify funding for security measures—until a security breach happens. Even then, you need to have a rock-solid reason for the funding. Security is one of the only industries globally where performance is ranked by how often things “don’t happen”. When a facility is breached, the first question that executives would generally ask is ‘Why did it happen and what do you need to prevent it from happening again?’ Right here is the opportunity for facility managers, security professionals and others in charge of facility security to make most of a security breach and obtain the resources they need to help prevent security breaches in the future. But, they need to be prepared with a solid answer. If they’re not, then the opportunity will be lost. Your intuitive abilities are not enough to come up with a solid answer instead you need to research. You need to research the biggest security concerns for facilities and then find appropriate solutions for them. So, what are the biggest security concerns for facilities? Think personal safety and asset protection, security patrolling, and loss of inventory. While the list is not exhaustive, researching these security concerns and the most appropriate or innovative solutions for them could provide the answer you need to justify the budget for the resources needed to prevent security breaches in the future. Following is insight into these security concerns and the innovative solutions for them. Personal Safety and Asset Protection Physical security is about protecting important data, confidential information, networks, software, equipment, facilities, company’s assets, and personnel. One of the biggest concerns for any business is protecting its employees and assets. Personal safety and asset protection is not just something for the ‘bad times’ either, rather it is a fundamental right of your assets and people. Your assets and people need and deserve to be protected. People here refer to your staff, guests, and visitors. Identifying and prioritising the security vulnerabilities and developing plans to eliminate or mitigate based on your organisational risk appetite is critical. Leveraging technology across the facility and in the operational structure can provide you with what is needed to deal with emergencies and take preventative measures before the worst occurs. The concept of “smart buildings” could come in handy at a time like this. The market for smart building is expected to grow considerably in the next years. Considering that more and more organisations are optimising all aspects of their facilities with sensors and digital controllers for HVAC, electricity, surveillance systems and even parking spaces, it is easy to see why.
  • 3. As the security demands for facilities get increasingly complex, there is an opportunity to rethink the approach to how security in buildings is managed. The next era of facility security is enabled by three technologies: Internet of Things (IoT), virtualisation, and analytics and they are the driving force behind smart buildings. IoT is of particular importance here as it makes it easier and cheaper to connect all the security devices and systems within a facility, giving people greater control over facility security. This helps to track assets to combat theft and optimise usage, secure job-sites simply and cost-effectively, send security alerts via the internet, and provide back-up alarm systems. Security Patrol Today, building security is different from what it was twenty, ten, or even five years ago. A combination of security measures need to be considered to make sites adequately safe and secure. Security patrol is part of it. Patrolling is needed to enhance personnel safety and deter crime and basically extend the security sphere of influence. The purpose of security patrols should always be to promote safe workplace environment, deter vandalism, theft and trespassers and provide rapid response to emergency situations. Technology can help achieve this. In the U.S, drones and autonomous surveillance robots are being used for this purpose. Avitas Systems—a subsidiary of GE, has started to use robots and drones to keep an eye on industrial facilities. This security system relies on a deep-learning technology developed by NVIDIA. In deep learning, neural networks are fed a massive amount of data, which is image-based data. This data will be used by a robot to construct models or patterns. The major benefit of using these surveillance robots is that they can stay focused constantly. Additionally, they are a lot better than humans at identifying defects. They also have abilities that security guards do not such as identifying gas leaks, changes in temperature and other important elements. But, most important of all, the robots can save facilities from the hundreds and thousands of dollars that they spend on manual inspections every year. Loss of Inventory Technology plays a vital role in inventory loss management as it can enable a sustainable strategy for loss reduction. In a facility, inventory loss might be due to fraud, internal shrink, shoplifting or organised crime. Regardless of the cause, inventory loss in a facility can be minimised or better eliminated with futuristic emerging technology. This technology includes Radio Frequency Identification (RFID) chips embedded in the packaging or product tags of the inventory, VST (magnetic) tags that prevent theft of merchandise by setting off an alarm if they are not properly deactivated, drones that capture footage, inventory software that tracks inventory and identifies any merchandise that is unaccounted for, and biometric surveillance systems that proactively prevent crime. Final World Without abandoning old modes of thinking, facility managers and security professionals cannot overcome the challenges facing them. They need to rethink their strategy to come up with effective solutions to the security threats facing the facility. Today, these solutions include technology that can adjust to the level of the known or potential threat. Smart buildings, IoT, drones, robotics, and deep learning systems are just a few examples of this technology. If you’re interested to learn more about securities and facilities management services in Australia visit Southern Cross Group.
  • 4. About the Author Martin Sheridan begun his career in technical development and solution architecture, more recently he has developed his professional practice to include development of both commercial and technical strategy, leadership of substantial teams and delivery of major cultural change programs. He played diverse roles, including design, development and deployment of innovative software solutions with an eye to longer-term technological and commercial strategies to improve SDLC, time-to-market, time-to-value, efficiency and client satisfaction. Source - https://scgroup.global/blog/looking-into-the-future-of-security/