20 Trends In Leveraging Technology For Cyber And Physical Security

Written by: Expert Panel® Forbes Councils Member, Forbes Technology Council

When people think of technology and security, it’s likely cybersecurity that comes to mind. And leveraging tech tools to better detect and defend against cyber breaches is certainly a top priority for companies of all stripes.

But emerging technologies such as artificial intelligence and the Internet of Things are also playing a growing role in the physical security of people, property and premises. Indeed, in some cases, technology’s ability to provide physical protection can, in turn, lead to enhanced cybersecurity. Below, 20 members of Forbes Technology Council share ways organizations are (or could be) better protecting not only their data, but also their team members and essential physical assets.

1. Gathering Environmental Data

The integration of cyber and physical security is a growing trend. Using sensors, cameras and monitoring equipment provides valuable data that can be analyzed in real time and stored for investigative purposes. This paves the way for developing a unified security response program that’s equipped to handle disruptions in both the cyber and physical domains. - Tim Liu, Hillstone Networks

2. Automating Threat Detection

AI can enhance cybersecurity by automating threat detection. It can analyze vast datasets rapidly, identifying anomalies that suggest a security breach. This is effective because AI systems can detect complex patterns that humans might miss and can do so 24/7, reducing response time to threats. - Stephen O’Doherty, Gibraltar Solutions

3. Extrapolating Relationships Between Data And Events

AI can be very effective in identifying and extrapolating relationships between data and events that are not obvious to analysts. As an example, AI is being trained to identify when an indicator of compromise is an I.P. address that belongs to a compromised camera. Furthermore, AI can be used for predictive analysis to determine the likelihood of a subsequent physical breach at or near the compromised location. - Israel Martinez, Axon Global Services ©

4. Analyzing Surveillance Camera Footage

Video analytics from surveillance cameras is an excellent application of integrated AI and physical security. For example, suspicious loitering or someone dropping bags are behaviors easily picked up by AI analytics. Overall, perhaps the most obvious area for the further evolution of AI in cybersecurity is in security information and event management solutions. AI can improve visibility and reduce reaction time. - Carlo Tortora Brayda, Tortora Brayda Institute

5. Implementing Post-Quantum Cryptography

Physical cyber systems operate for decades, and they must implement quantum-safe encryption to have any security in the quantum era. Retrofitting later is expensive and complex and, if these systems have been connected to the internet, often happens too late. Post-quantum cryptography is essential for vulnerable critical infrastructure and provides durability against many threats, which ultimately saves money. - Denis Mandich, Qrypt

6. Minimizing Manual And Hazardous Tasks

AI and the Industrial Internet of Things are powerful tools that can enhance physical safety by minimizing manual, time-consuming tasks—for example, through predictive and automated maintenance and remote control in hazardous environments. By leveraging these tools for dangerous duties, companies are bridging the cyber-physical security gap and creating safer work environments. - Almog Apirion, Cyolo

7. Updating Protection And Monitoring Of Facilities

By collecting and analyzing data about usage or traffic flow within their facilities, enterprises can proactively apply additional protection and monitoring to their environment to ward off intruders. AI tools can help organizations quickly spot trends and anomalies in their data and physical surveillance to ensure appropriate protections are applied. - Russ Kennedy, Nasuni

8. Ensuring Effective Identity Verification

Most emerging technologies do not contemplate their impact on cyber and/or physical security. Organizations need to be able to verify the identity of an individual. For example, when you use biometrics on your phone, it doesn’t make your device more or less secure; it simply proves you are the person with access. It’s only with an effective identity verification process that you can manage the risk to your organization. - Chris Briggs, Mitek Systems

9. Confidential Computing

Confidential computing is an emerging technology that allows companies to enrich their existing processes by reviewing expansive and information-rich datasets securely. It holds promise for innovation in secure data sharing. Organizations should explore it as they mature for more effective decision making. - Adam Lieberman, Finastra

10. Analyzing And Correlating Log Events

Cybersecurity and physical security log events could be analyzed and correlated much faster with AI. Such correlation can help organizations with anomaly detection, identity validation, geospatial analysis and more. It could also help with step-up authentication when a discrepancy is noticed. - Sajan Gautam, Arvest Bank

11. Sending Safety Alerts

Machine learning and AI have a great potential to enhance cybersecurity, physical security, and health and safety by quickly collating huge amounts of data from multiple sources and, when needed, alerting users about incidents and issues. For example, in the case of a health and/or safety issue, alerts could be sent to edge devices to notify at-risk people or stop machinery. However, these approaches need to have appropriate ethical, privacy and security guardrails in place. - Gladwin Mendez, Simplyai

12. Verifying Authorized Credit Card Usage

AI can note the presence of a person at a particular physical location (for example, when an employee swipes their ID at a company location) and disallow logging into the account of or using a credit card owned by that person outside of that location during that time. Further, if a login or usage attempt is made, the user or owner can be notified so they can take appropriate action. - Bhushan Parikh, Get Digital Velocity, LLC

13. Screening Biometrics For Access To Facilities

IoT devices and AI-driven analytics can capture biometric data to verify identities. With appropriate consent and privacy, organizations can leverage these tools to enhance the physical security of their facilities by matching voiceprints or faceprints to the biometric data of authorized personnel. They can also use these tools with customer data to provide additional screening for account access. - Merav Yuravlivker, Data Society

14. Enabling Real-Time Threat Response

AI assists in the convergence of cyber and physical security. By analyzing digital, logical and physical security datasets, threat and risk analysts can provide a holistic approach to security. The use of AI allows for physical and digital workflows to be automated and real-time action to be taken in the event that AI models detect a threat. - Derek Martinez, Konica Minolta

15. Securing Network and System Hardware

AI cameras placed in IT closets and server rooms offer an extra security layer by detecting and alerting teams about unauthorized access. When combined with physical access controls, AI facial recognition technology ensures that only authorized personnel can access network and system hardware. - Mia Millette, Skyline Technology Solutions

16. Reducing ‘Security By Obscurity’

There is often exceptional complexity in network and physical security. What connects where? Who has access to what, and when? Who should be notified? Who can make that decision? You get the point! AI could potentially reduce “security by obscurity” to a single pane of glass and immediate responses, all made possible by autonomous monitoring, alerting and programmatic remediation actions. - Robert Martin, Oil City Iron Works, Inc.

17. Using Digital Twins To Provide A Comprehensive, Dynamic View Of Physical Assets

Leveraging digital twins of physical assets allows for real-time synchronization and monitoring, predictive threat analysis, and incident response planning. This strategy is effective because it provides a comprehensive and dynamic representation of physical assets, enabling preemptive security measures and seamless mitigation efforts across digital and physical domains. - Amitkumar Shrivastava, Fujitsu

18. Verifying Asset Ownership Through NFTs

Nonfungible tokens are the first technology that allows users to verify incontrovertible and immutable ownership of digital assets, enhancing the security of those assets and the associated items stored outside of blockchains via decentralized oracles. Supply chains, financial firms and advertisers can leverage NFT technology to track items, dollars or engagement without the need for a third party. - Jordan Yallen, MetaTope

19. Identifying Anomalies In User Behavior, Network Traffic And Physical Access

AI-powered behavioral analysis uses IoT sensors to monitor physical and digital environments. This strategy identifies anomalies or unusual patterns in user behavior, network traffic and physical access. AI can then trigger alerts or responses based on the detected anomalies, enhancing security by proactively addressing potential threats. - Cristian Randieri, Intellisystem Technologies

20. Securing Both Individual Devices And Networks

A cybersecurity mesh strategy based on the IoT has a great success rate when it comes to securing both separate devices and overall networks. By building firewalls and other protection tools around each individual device, security perimeters unite to create greater protection for the whole network. - Yuriy Berdnikov, Perpetio

Check out my website