
The Key to Fighting today's Security War


Jamie Smith, CIO, University of Phoenix
As the old adage goes, “War never changes.” While that may be true, war does evolve and those who do not evolve with it become extinct.
This is especially true in the war for enterprise security. Organizations of all shapes and sizes, across all industries, are fighting a constant security war–both physically and digitally. This war is not new and the end user has not changed, but the way in which the war is fought has.
Today’s security threat landscape has evolved and criminals’ tactics along with it. Every security asset now falls under both the physical and information security teams. Internet of Things, connected devices, and smartphones are now terms in both teams’ vocabularies. Fleets have become rolling data centers, critical systems on wheels. Protecting these assets is the responsibility of both groups.
More than just tangible assets have changed. Today’s employees are essentially sensors. Security teams understand where they are and what they are doing and can protect them, but now they also must consider the cyber vulnerabilities they present. Through corporate laptops and phones, employees now have microphones, cameras and other things to protect on that endpoint.
Despite working toward the same shared goals and objectives, physical and information security teams often work in separate locations and may not completely understand the other’s world
Physical and information security have become so intertwined that it can be difficult to tell them apart, yet collaboration and collocation remain a key hurdle for organizations. This is where security teams fall behind in fighting today’s war.
For years–even today–many organizations employ separate physical and information security teams. Despite working toward the same shared goals and objectives, physical and information security teams often work in separate locations and may not completely understand the other’s world.
CIOs and CISOs have to understand that users are getting phished every day and that cyber threats are becoming more sophisticated. This includes understanding behavior and the convergence of behavior and being able to tie that all together in one place. Reaching this goal can be accomplished through collocation of teams.
A great metaphor of the need to converge today’s physical and information security teams is the failure of the Maginot Line. After the First World War, France built a massive and intricate series of bunkers to form an impenetrable border. At the onset of the next military conflict, this seemed like a plausible and effective defensive solution, because the last war contained a very slow-moving threat. However, in World War II, the enemy just drove around it or flew over it. Clearly, France was fighting the last war.
Similar to how France’s defensive border fortification became a liability as war tactics evolved, the archaic idea of separate physical and information security teams leaves enterprises vulnerable. Simply put, information security isn’t about defending the perimeter anymore. It’s understanding that the war on security has transitioned from a slow-moving threat to a dynamic, fast-moving environment.
Because of the external threat environment, organizations have no choice but to combine physical and information security team and cross-train them to understand each other’s responsibilities. It’s much more important for employees on both sides to speak the same language and work together.
This whole notion of having separate dashboards and reporting tools and these bespoke physical security systems really does not make sense anymore in today’s world. As much as possible, security leaders must physically collocate the teams and ensure that they are cross-trained. We know there are not enough security professionals today. Therefore, in order to protect enterprises, security teams have to be built by combining the knowledge and skill sets of both groups.
The physical security teams have to be much savvier on what it means to live on a network, know how to cooperate with that and put telemetry in there that doesn’t cause issues. Similarly, InfoSec should learn what it means to do closed support. By doing this, employees can become T-shaped resources that are broader than their one deep area of expertise. This shared knowledge allows for better communication and more effective security solutions.
Culture is also an important factor in successfully collaborating and collocating teams. Teams have to want to collaborate. Culturally, they should understand, with empathy, each other’s worlds and backgrounds. The cultural hurdle can be difficult to overcome, although, once people are located in a shared space and focus at the same thing, they can overcome a lot of the initial obstacles and turbulence.
Whether ready for it or not, security organizations today are charting a path in creating collaborative, collocated teams. It doesn’t really exist, but it is going to exist soon. It is vital that leaders respond and build that well-rounded professional. At the end of the day, being just in one of those two camps is not enough based on where the threat environment is.
We cannot keep physical and information security separate anymore. Companies must make sure they are not fighting the last war.
ON THE DECK

Featured Vendors
Ask School Data (ASD): AI-Powered Virtual Data Coaching Solution that Provides Real-Time Student Data to Teachers
Liaison International: Streamlining the Enrollment Process with Institution-Wide Data and Responsive, Cross-Media Marketing
Education Networks of America (ENA): Turnkey Infrastructure Solutions Designed for K-12 Schools and Libraries
Verificient Technologies: Fostering Credibility for Online Education with Proctorless Remote Monitor
Huron Consulting Group: Helping Colleges and Universities better align Operations to achieve strateg
Cumulus Global: Helps Business, Schools, And Local Governments Achieve Their Goals By Leveraging The
LearningMate Solutions Inc.: Global Leader In Providing Content And Technology Services For The Educ
Globaloria: Invent. Build. Share: Advancing Computing Innovation And Digital Citizenship Skills Star
Cyanna Educational Services: Consultative Service For Top-Quality Schooling And Higher Education Sys
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
How "Cloud Compulsion" Impacts Legal Preservation and eDiscovery...
Championing the Health of the Individual
How Marco's Pizza Leaned on Technology to Succeed amid the Pandemic...
Digital Tack
Step In, Step Up, Or Step Off!
The Art of Digitalization
