SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Are We Talking Enough About Cybersecurity?

Are We Talking Enough About Cybersecurity?
11 Jul 2017
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Cybersecurity discussions have increased, addressing IP-connected device vulnerability concerns.
  • Physical security industry newly embraces cybersecurity, improving awareness and knowledge.
  • Continued dialogue is essential for addressing cybersecurity awareness gaps and prevention strategies.

Editor Introduction

For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)


Card image cap
Bill Bozeman PSA Security Network

We are probably still not talking enough about cybersecurity. What makes it so challenging is that cybersecurity is a constantly moving target. Integrators and manufacturers might feel like they have it all figured out, and then the next cyber-breach presents itself and opens new issues. Cybersecurity requires everyone in the security industry to be playing offense and defense at the same time, every single day. It needs to just become part of the standard conversation when we are talking about physical security because they are so intertwined. I don’t think we are there yet. I still hear from security professionals who deny that cybersecurity is now part of our industry’s DNA. Until we can overcome that misconception, we cannot talk about it enough.

Card image cap
John Bartolac Axis Communications

The industry talking about cybersecurity is an improvement over the past years when the topic wasn’t openly discussed. As the cyber landscape is evolving, discussing cyber preparedness has become top of mind for many organizations. Organizations’ (cyber) success and efficiency depend on the reliability of the networks which are the backbone of all functionality and operations. Organizations also need to protect their data and intellectual property. Talking about cybersecurity allows us to be good stewards in raising awareness about measures and policies to ensure that systems and data are better protected. It also allows us to be more diligent about smarter devices we can add to the network. The advent of smarter devices provides organizations with a world of opportunity to improve their operations and overall customer experience. So, we shouldn’t paralyze ourselves by avoiding the discussion.

Card image cap
Per Björkdahl ONVIF

No, we are not talking enough about cybersecurity! The constant demand for lower and lower prices on advanced products will bring us lower and lower quality products with less and less robust software. These low-cost security devices that sacrifice robust software for price are made that much more vulnerable to attack and takeover by malware and other cyber-attacks. A buyer may think he/she is getting a “great deal” from a supplier, but it’s wise to question your integrator and/or supplier on why, if it’s the case, the cost is so low and to determine the source of your supplier’s hardware and software. Dare to question your supplier!

Card image cap
Reinier Tuinzing Milestone Systems

In today’s age of hackers and general “bad people,” the physical security market needs to address the needs of cybersecurity. To the physical security industry this is a little bit of a new concept. Those customers and integrators who are solely physical security-focused will need to adopt some of the learnings from the IT industry, which has been addressing cybersecurity needs for years. Right now, there is a lot of “chatter” about cybersecurity, but little information. Cybersecurity means many things to many people. The industry needs to be educated on the implementation of cybersecurity, and there are several levels of implementation depending on the type of business: a grocery store will not need the same level of cybersecurity as an airport.

Card image cap
Jim Nannini Johnson Controls, Inc.

In this day and age, cybersecurity can’t be discussed enough. Every day we hear about attacks on financial, customer and product data, consequently cybersecurity will continue to be the forefront of building and enterprise strategic plans. As access to building data and operational systems increases, so do the challenges associated with securing the smart building environment. This is a shared responsibility, requiring focus and commitment from the systems integrator, manufacturer, and customer, and requires consistent, open communication. This is critically important as cybersecurity is often mistakenly considered an issue related to software, when in actuality, many cybersecurity issues arise from improper systems installation. Developing an ecosystem with trusted partners who are focused on cybersecurity for building wide systems integration can make all the difference. 

Card image cap
Corey Tyriver Security 101

It’s an all-too-common event: Hackers breaking into critical systems at hospitals, universities and corporations and putting patient healthcare, sensitive personal data and trade secrets at risk. Admittedly, cybersecurity is a field most in the physical security industry try to avoid. Yet, we can help our customers prevent these potentially devastating attacks. As integrators, we install a variety of network-connected devices – such as surveillance cameras and card readers – each having its own IP address. This is the path hackers use to get onto a network. We urge our customers to immediately change the simple default factory passwords on new equipment. By creating strong passwords and changing them frequently, we can make our equipment much more difficult to hack. In some cases, we may even recommend adding a second identity verification method such as a biometric (iris, fingerprint or facial scan). We can’t talk – or plan – enough about stopping hackers.

Card image cap
Mitchell Kane Vanderbilt Industries

In my opinion, you can't talk about the possibility of a data breach enough within the enterprise organizations we serve today with security-related products. At their core, these products should be safe to use while deploying the best possible technology to keep personal data safe and secure. With the rise in cloud technology and increased connectivity of devices, encrypting communications between devices is paramount – and it starts with manufacturers. Especially when legacy, new and different technologies are used together; a single insecure system or poor deployment can make the entire system vulnerable. This is where a strong relationship with IT professionals throughout the process of a security system upgrade can be invaluable. Keeping up with remote and instant access to security solutions must be weighed with the ability to keep data safe and secure from threats.

Card image cap
Kevin Wine Verint Systems

Cybersecurity is one of the primary challenges facing organizations in today’s environment. Recent results from the Security Executive Council’s Security Barometer Polls found that survey respondents reported cybercrime is the top risk facing their organizations. With that in mind, I believe there needs to be more conversation about how to mitigate these risks in a collaborative manner across the enterprise. Over the course of the past year, we’ve discussed the convergence of physical, IT, and cybersecurity within organizations – possibly even more than we’ve discussed how technology is converging. There are significant benefits to this level of collaboration; it is crystal clear that this approach benefits the greater purpose of security as well as overall strategies for continued success. An ongoing dialog between IT, cyber security, and physical security teams is necessary to help gain a greater knowledge of how to best mitigate today’s most prevalent threats.

Card image cap
John Davies TDSi

We aren’t talking enough about cybersecurity! Many people are still blasé about making their private information public online. More vigilance is needed to tackle issues such as identity theft, grooming and stalking. Equally, some businesses/corporations also leave themselves open to security issues by failing to frequently patch their systems, as demonstrated by the infamous WannaCry ransomware. Even the most recent large-scale cyber-attack could have been prevented with fully updated systems, and it is frustrating that these issues could have been avoided! With IoT, the threat can only become more severe. Without the right security built into each network component, there is always a “back door” for malware. Even with security in place, some people still fail to update passwords and keep this protection watertight. Technology is changing and evolving faster than the habits of users, so we need to ensure everyone is aware of the need for vigilance.

Card image cap
Brandon Reich Pivot3, Inc.

I don’t think we can ever talk “enough” about the importance of cybersecurity. As cyber threats continue to increase and evolve in sophistication, the industry must stay proactive in its approach to mitigating these risks. Video surveillance can be considered the first real IoT application and, in fact, connected cameras are ubiquitous. Since we have already seen the impact of unsecured IoT devices (the Mirai Botnet attack), we don’t know the extent of additional vulnerabilities. Therefore, manufacturers, integrators and end users all must take precautions on any new products installations. At the same time, we also need to be aware of the significant installed base of IP-based technologies, which includes cameras and also NVRs, IP-connected access control devices, intrusion detection systems and more. Unforeseen vulnerabilities could lead to more damaging attacks, such as accessing or tampering with private video, controlling door locks and access control systems, disabling alarm systems, and more.

Card image cap
Steve Birkmeier Arteco Vision Systems (Arteco, Inc.)

Cybersecurity is at the forefront of both our professional and personal lives and, therefore, I don’t think we are talking about it enough. The reality is that as we continue to move toward IoT in all aspects of our lives, we continue to uncover new cyber vulnerabilities. As security professionals, we are entrusted by our customers to provide secure products and guidelines to safeguard these products from potential hacking and at the very least understand these vulnerabilities. In many ways this understanding comes from partnerships throughout the industry and combining the knowledge base across multiple platforms. By working together to provide a solution-based system that is rigid against cyber-attacks, we improve overall protection. This will only increase in importance going forward.


Editor Summary

Granted we are talking a lot about cybersecurity, but our Expert Panelists agree it’s still not enough (and may never be enough!). Cybersecurity is one of those problems that will never go away. More than that, it is constantly changing and reemerging in new forms to forever thwart our best struggles to prevent, protect, and/or address. There will be plenty to talk about for the foreseeable future, and no possibility of every saying enough. So, let the discussions continue.

  • Related links
  • ACT Access control systems & kits
  • Axis Communications Intruder detectors
  • Axis Communications Intruder alarm communicators
  • Axis Communications Analog Transmission
  • Axis Communications Video Surveillance software
  • Johnson Controls Limited Access control systems & kits
  • Milestone Video Surveillance software
  • Pivot3 Video Surveillance software
  • TDSi Surveillance cameras
  • TDSi Intruder detectors
  • TDSi Video Surveillance software
  • TDSi Access control systems & kits
  • Verint Analog Transmission
  • Verint Video Surveillance software
  • ACT Electronic lock systems
  • Axis Communications Video servers (IP transmission)
  • Axis Communications IP cameras
  • Pivot3 Video servers (IP transmission)
  • TDSi Video servers (IP transmission)
  • TDSi IP cameras
  • TDSi Electronic lock systems
  • Verint Video servers (IP transmission)
  • Verint IP cameras
  • Axis Communications Network Video Recorders (NVRs)
  • Milestone Network Video Recorders (NVRs)
  • TDSi Network Video Recorders (NVRs)
  • Verint Network Video Recorders (NVRs)
  • Related categories
  • Surveillance cameras
  • Analog Transmission
  • Video Surveillance software
  • Access control systems & kits
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • Intruder alarm communicators
  • IP cameras
  • Video servers (IP transmission)
  • Electronic lock systems
  • Network Video Recorders (NVRs)
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Boost cybersecurity awareness with proactive discussions, expert insights, and comprehensive risk assessments to safeguard critical assets.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec