Convergence of Cyber & Physical security
Ransomware and online attacks can lead to deadly real-world consequences. Cyber harms inflicted by bad people have turned out to be very serious, because it is difficult to identify and they are not visible. Cyber criminals increasingly attack in ways that cause far more hurtful and visible consequences.
Cyber security and physical security are often treated as two separate sectors. You can see these silos in the way many companies are structured: there is often a Chief Security Officer (CSO) and a Chief Information Security Officer (CISO), or cyber security is treated as a subset of physical security, with the head of information security reporting to the head of security.
However, with cyber-attacks becoming increasingly common, and costing companies an average of $4.24 million per data breach, it’s important that cybersecurity and physical security merge into one department. Online threats are varied and they don’t discriminate organizations from individuals when looking for a target.
Today, the Cyber threats are part of every boardroom discussion. Cyberattacks can cause electrical blackouts, failure of military equipment, and breaches of national security secrets. They can result in the theft of valuable, sensitive data like medical records. They can disrupt phone and computer networks or paralyze systems, making data unavailable. It’s not an exaggeration to say that cyber threats may affect the functioning of life.
There is a need for the convergence of cybersecurity and traditional physical security. It has never been simple, mostly because the skill sets necessary for each discipline are so different. CISOs tend to come from the IT side of the organization while CSOs are often either from the security side, former law enforcement, or former military. It can be hard to find a leader with both the technical skills and the physical security mindset needed to bring the two together.
It seems this problem is going to further aggravate and everyone needs to safeguard their own infra with proper back-up plan and they have to decide the protocol on how much content is to be made public and how much to keep private.
We are witnessing Cyberwarfare, where certain Governments around the world are involved in cyberattacks, with many national governments acknowledging or suspected of designing and executing attacks against other countries as part of ongoing political, economic and social disputes.
TeamViewer partners with Hyundai Motor to hasten digital innovation in Automotive Smart Factory
TeamViewer announced a partnership with global mobility solutions provider Hyundai Motor C...
Tally Solutions to help MSMEs adopt e-invoicing
As the deadline for e-invoicing adoption is nearing for GST registered businesses, &nbs...
Autodesk paves the way to power digital transformation in the Cloud
Autodesk has kicked off Autodesk University (AU) 2022, the company’s annual design c...
DSCI’s National CoE and IIT Bombay host Cybersecurity R&D Roadshow 2022
National Cybersecurity Centre of Excellence (NCoE), a joint initiative of Data Security Co...
New draft of Data Protection Bill is being worked on to augment efficient usage knowing it would be used by the industry: Additional Secretary, Meity
Speaking at the CII International Technology Summit 2022 “Technology 4.0 Adoption, A...