SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Data Mining For Insider Threats: Another Convergence Of Physical And Cyber Security

William Plante
William Plante
Contact company
Contact Aronson Security Group (ASG)
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Insider threats concern companies, increasing focus on integrating cyber and physical security.
  • SIEM systems enhance threat detection, utilizing data from access controls and surveillance.
  • Real-time security integration enables swift responses, crucial for combating insider threats.
Related Links
  • Pokemon Go: A Lesson In Physical And Cyber Convergence For The Security Market?
Considering the speed of damage that insider threat can create, it is vital that the incident response be decisive, pre-determined, and unified to be effective
Insider threat is primarily focused on malicious threats to the company either by, or to, information technology assets

For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety of surveys across the IT security industry. Companies are becoming increasingly worried about insider threats.

From the cyber security perspective, insider threat is primarily focused on malicious threats to the company either by, or to, information technology assets. Whether it is fraud, intellectual property theft, or even cyber system sabotage, the cyber security professional considers it an insider threat if the incident involves IT assets and internal resources.

Development Of Cyber Security Tools

Cyber security tools to predictably identify trends and identify malicious activity in real time, are increasingly under development and becoming a mainstay for the cyber security toolkit. Whether the culprit is malicious, exploited, or just plain negligent, both cyber and corporate security have a responsibility to detect and prevent the threat. As a result, you are seeing the development of enterprise risk programs combining physical and cyber security teams to implement a cohesive insider threat program. A natural outcome of this is the emerging interfacing of physical and cyber systems at various levels to provide both predicative and real-time intelligence of insider threat activity.

Security Information And Event Management System (SIEM)

One of the most obvious system interfaces is the extraction of access control data and its incorporation into a Security Information and Event Management System (SIEM, pronounced “sim”) such as Splunk, AlienVault, and ArcSight to name a few. SIEM’s are used by the Cybersecurity teams to provide a total picture of the cybersecurity landscape. Specifically, most SIEM’s use data collection “agents” across a variety of InfoSec sub-systems such as anti-virus, firewalls, intrusion detection systems as well as applications, which is then correlated and anomalies flagged for action. Both normal activities and deviations can then be driven to an operator console.

One of the most obvious system
interfaces is the extraction of access
control data and its incorporation into
a Security Information and Event
Management System (SIEM)

To the enterprise the advantage is obvious; it now has the ability to have a wide view of the current normal and aberrant network, application and data behavior to begin the predictive analysis of insider threats. However, an IT systems-only view is in fact limited as critical pieces of information are missing from the analysis and extraordinary efforts need to be made to obtain information. Currently, this situation extends to most physical security systems.

SIEM Scenario

Let’s pretend that a SIEM operator begins to receive alerts that a computer located in Toronto, Ontario begins to attempt access to a number of directories that it does not have privileges to. The attempts continue for a couple of minutes and that activity triggers an alert to the SIEM. The SIEM operator can quickly determine from the access control log that the ID of the person is Bob Smith.  However, that does not really mean that Bob Smith is attempting the breach. The SIEM operator may need to call the Global Security Operations Center and request an access report for the room the attack is being mounted from. If Bob Smith’s card was used to get into the room, and his ID was used to logon to the computer, then chances are its Bob Smith. The last piece of confirming evidence would be a video snippet from the camera monitoring the door to match the access granted with the photo on file and then to the video snippet. Cyber Security can then shutdown the computer and Corporate Security can physically stop the threat.

Best practices, tool development, and unified governance all play a part, and data mining for insider threat will certainly become standard
Rising concerns around insider threats make the integration of real-time security information even more compelling

Need For Process Automation

The above scenario assumes that the GSOC can make the request an immediate action priority. But what if it can’t because of another higher priority event occupying the GSOC? The answer is to automate the process with an interface between the two systems.

“Data mining on an archive is relatively simple” said Mike Hamilton, CEO of Critical Informatics at the ISC West Conference in 2016. “Arguably the more beneficial function is the real-time correlation of physical security data with a SIEM.”

The notion that an InfoSec SOC can hook into a live PhySec database, be it access control, intrusion detection, or video isn’t new. Indeed, the idea of it has been bandied about for a decade. However, with the recent advances in SIEM’s, InfoSec SOC’s, and the movement within the enterprise of a unified enterprise security governance, combined with rising concerns around insider threats, makes the integration of real-time security information even more compelling.

Imagine the same scenario mentioned previously, but now when the SIEM operator receives the alert they also get real-time access control and video snippets attached to the incident. Imagine further that the SIEM operator can use automated incident response processes to initiate an immediate joint corporate / information security, HR, Legal and employee manager response? Because of the speed of damage that insider threat can create it is vital that the incident response be decisive, pre-determined, and unified to be effective.

Because of the speed of
damage that insider threat
can create it is vital that
the incident response be
decisive, pre-determined,
and unified

Data-mining for Insider Threat isn’t limited to real-time incidents of course. There is value for the enterprise when Insider Threat pattern analysis is done that includes a physical security database extraction. Indeed, deep pattern analysis would be executed against an archive since real-time databases could have performance issues against an intensive query.

So, what are the issues that face an enterprise when it is considering insider threats? There are several:

1.Enterprise Governance

All the data access governance issues that apply to enterprise data (e.g. privacy concerns, legal requirements for preservation, cross-functional incident management) apply. An enterprise would be ill-advised to undertake a SIEM/Physical Security Insider Threat integration without the governance framework well thought out and planned.

2.Technical Issues

Integrations require the manufacturers Application Program Interface (API) to be available, and the application versions to be current. Each type of database integration would need a script written through the API’s and each would need to be maintained, including application version upgrades. So, a management plan would need to be in place for the script maintenance. Hardware and application standards would also need to be in place.

3.Enterprise Growth

As the enterprise grows the SIEM would need to extend into the new network locations. Extensions may be relatively simple, for example the company has purchased new office locations and is extending the network. However, mergers and acquisitions (M&A) add a complexity to the program. The M&A may acquire assets that do not conform to a corporate standard. Writing new hooks to standalone databases would be a nightmare.

For an enterprise considering using a SIEM or other dedicated application for Insider Threat the issues are complex, but not insurmountable. Further, the threat represented by an insider threat activity in today’s business environment requires tools that provide the timeliest information to initiate an appropriate response. Best practices, tool development, and unified governance all play a part, and data mining for insider threat will certainly become standard.

Save

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Identity management
  • Door access control
  • Security software
  • Cyber security
  • Data Security
  • Video surveillance
  • Related links
  • Articles by William Plante
  • Related categories
  • Access control systems & kits
  • Access control software
  • Intruder detectors
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Discover how data mining mitigates insider threats, enhancing physical and cyber security convergence to protect critical assets effectively.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec