Page 8 - Security Today, May 2017
P. 8

INDUSTRY FOCUS With Ralph C. Jensen, Editor-in-Chief
WI alking the Walk
f you attended ISC West last month, you already know the tradeshow was a smashing success. I suppose there are a few that weren’t completely satisfied, but I think overall, this year’s Las Vegas
event experienced a well-received outcome. I loaded my schedule as full as possible and still didn’t have enough time to take it all in.
There were several takeaways from the show floor that we’re going to see a lot more of in 2017, and beyond. For starters, cyber- security is now more than an up and com- ing concern. Everyone has this as a top of mind concern because once the network is safe, the security equipment will work at its optimum ability. I think we’re going to see camera manufacturers taking another hard look at how to secure the network. They’ve been talking about it, but now it’s time to walk the walk.
Physical and logical security depend on each other, so it is surprising to find that a number of companies still treat them sepa- rately, from both a device management and government agencies perspective. Until re- cently, this was justified because the technol- ogy to integrate physical and logical security was not available. Regarding security, most organizations have at least three buying and control centers. The first two are primar- ily concerned with IP theft, malware and viruses. NetOps handles network security, while InfoSec manages data at rest and data in transit security. The third is physical secu- rity, which includes surveillance and access control. In most organizations, the guard at the gates is a separate operations center.
Cybersecurity, meanwhile, depends greatly on physical security. Attackers who can gain physical access to a computer can almost always take advantage of that access to further their efforts. Merely getting access to a physical terminal where a memory de- vice can be plugged in is usually sufficient. Any device present that is connected to the network must be protected to ensure that it cannot be turned into a tool to be used in an attack.
• Increased potential for theft.
• Lack of IT management and applica- tion of best practices applied to physi- cal security devices, or a lack of best practices applied consistently across
departments or organizations.
• Lack of physical monitoring of logical security devices that can detect tam- pering; that is, unauthorized access to
a logical security device console.
Like all effective security, cyber security is about the depth of your defense. It’s about appropriately protecting your IP camera net- work at every level—from the products you choose and the partners you work with to the requirements they, and you, set.
Your first layer of defense is choosing network video products with built-in protec- tion: We make sure you can apply the secu- rity controls you need to mitigate the threats you face. Because there’s no one-size-fits-all solution to cyber crime, your second layer of defense is a good understanding of the threats you face, their potential costs and how to protect yourself.
Begin with best practices, timely response and transparency. Any end user should ap- ply cybersecurity best practices in the design, development and testing of our products to minimize the risk of flaws that could be exploited in an attack. When critical vulner- abilities are discovered they should be fixed promptly and issue security advisories.
Your best cyber offense is a great cyber
The lack of integration between physi-
cal and cybersecurity creates some following challenges.
• No single system to identify a person’s defense.
8
identity because each functional secu- rity department controls its own iden- tity database.
Products | Technology | Solutions
www.securitytoday.com
Volume 21, No. 5
EDITORIAL STAFF
Editor-in-Chief/Associate Publisher Senior Editor
E-news Editor
Content Editor
ART STAFF
Art Director
PRODUCTION STAFF
Production Coordinator
EDITORIAL ADVISORY BOARD
Ralph C. Jensen Lindsay Page Brent Dirks Sydny Shepard
Dale Chinn Teresa Antonio
Thomas Carnevale, president/CEO, Sentry 360 William Crews, President/CEO,
Security & Resilience Consulting, LLC, Houston Rob Hile, Securadyne Systems, Pensacola, Florida Chris Lanier, LRG Inc., Jasper, Texas
Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston
SALES
Randy Easton Brian Rendine Sam Baird Peter Kao
904-261-5584
972-687-6761 +44 1883 715 697 +886-2-2949-6412
INFRASTRUCTURE SOLUTIONS GROUP
President & Group Publisher Group Circulation Director Group Marketing Director Group Website Manager Group Webinar Administrator Group Social Media Editor
Chief Executive Officer Chief Operating Officer Chief Financial Officer Chief Technology Officer
Executive Vice President Executive Chairman
REACHING THE STAFF
Kevin O’Grady Margaret Perry Susan May Scott Newhouse Tammy Renne Matt Holden
Rajeev Kapur Henry Allain Craig Rucker Erik A. Lindgren
Michael J. Valenti Jeffrey S. Klein
Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.securitytoday.com.
E-mail: To e-mail any member of the staff, please use the following form: FirstinitialLastname@1105media.com
Dallas Office (weekdays, 8:30 a.m. – 5:30 p.m. CT) Telephone (972) 687-6700; Fax (972) 687-6799 14901 Quorum Dr., Suite 425, Dallas, TX 75254 Corporate Office (weekdays, 8:30 a.m. – 5:30 p.m. PT) Telephone (818) 814-5200; Fax (818) 734-1522
9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311
XX17 | SECURITY TODAY
r.classen/Shutterstock.com











































   6   7   8   9   10