SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Coming in 2017: More holistic security… and more lone wolf attacks

Coming in 2017: More holistic security… and more lone wolf attacks
Thomas J. Langer
Thomas J. Langer
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Lone wolf and soft target attacks driven by self-radicalisation, social media, extremism, mental illness.
  • Combined physical-cyberattacks threaten critical infrastructure; collaboration needed between public-private sectors.
  • Holistic security requires leaders in Enterprise Security Risk Management (ESRM), cybersecurity, and fraud prevention.
Related Links
  • Avoiding the cybersecurity risks of cloud-based security solutions
  • Cybersecurity increasingly demanded our attention in 2016
  • March Networks tackles cybersecurity, inventory tracking and HDR cameras

There will likely continue to be high numbers of lone wolf and soft target attacks in the year ahead. The drivers behind these tragedies are a confluence of self-radicalisation, social media, violent extremism, and mental illness. They will require our skills as security professionals — observation, investigation, interviewing, due diligence — like never before.

 

Looming in the background of these physical attacks is the prospect of combined physical and cyberattacks that could disable network control systems and target critical infrastructure, leading to cascading effects that could result in the crippling of sectors of society. This past year, the FBI and Department of Homeland Security began warning of cyberattack threats on the U.S. power grid. These threats require strong relationships with our public-sector counterparts and public-private partnership groups, like InfraGard, to broadly disseminate information and best practices.

Recent member research by ASIS International shows that few organisations have truly converged security departments that can holistically deal with cyber, physical, personnel, and information risks.

Internet of Things risks

And speaking of cyber-threats, we are dealing with an ever-evolving and increasingly complicated threat landscape. Not least among the targets is the Internet of Things (IoT).

It is projected that by the year 2020, more than 50 million objects will have discrete IP addresses, including cars, airplanes, pacemakers, control systems manufacturing process control components, access control—and yes, even your refrigerator letting you know you need more milk.

The IoT opens an organisation up to incredible risk, which was illustrated this past October with the Mirai DDoS attack that took down Twitter and other mainstream websites. Its attack vectors were largely unsecured IP cameras and DVRs, two entrenched residents of the IoT. We need to raise awareness on product security and educate stakeholders about vulnerabilities (from default logins and password settings to embedded backdoors sending information via unencrypted channels).

Holistic security management

One area of security that often gets overlooked is management. Long gone are the days of the reactive "corporate cop" using a command-and-control management structure.

Today's emerging security leader is a holistic risk manager, dealing not only with security, but investigations, loss prevention, fraud, cybersecurity, safety, and other issues.

He or she must be steeped in Enterprise Security Risk Management (ESRM) — which has become a global strategic priority at ASIS. Security leaders must also become business strategists, trusted advisors/collaborators with the C suite, contributors to the bottom line, talent acquisition experts, and empathetic leaders.

Security leaders must become business strategists, trusted advisors/collaborators with the C suite, and contributors to the bottom line
Security managers must lead a widely-dispersed staff encompassing many cultures, backgrounds, and geographies

According to Professor Mario Moussa of the Wharton School of Business, the workplace of the future will be "flatter, looser, wider, and faster." This means that hierarchies will matter less, flexible schedules will predominate, and remote work will become commonplace. Yet, staff will need to be more collaborative and team-oriented.

Over the longer term, security managers must lead a widely-dispersed staff encompassing many cultures, backgrounds, and geographies. Facilitating communication will be critical, especially with the proliferation of millennials who will make up 50 percent of the workforce by 2020.

And, although women currently make up only a small minority of security executives, their day is coming. Multiple studies show that companies see a bigger rise in revenue under female leadership than under male leadership. They are shown to be more transformative, collaborative, and empathetic than their male counterparts.

Over the longer term, security managers must lead a widely-dispersed staff encompassing many cultures, backgrounds,
and geographies

2017 changes at ASIS International

This past year saw tremendous change at ASIS International. We welcomed a new CEO, Peter J. O’Neil, who has brought fresh energy, wisdom, passion, and leadership to the association. We’ve undertaken a top-to-bottom review of our operations and have a number of exciting new initiatives in store.

This year, we are launching a revitalised member-focused strategic plan that will move the Society in a more transparent and inclusive direction. We are exploring expanded membership categories, increasing our online learning, revamping our website, and strengthening partnerships with groups like ISSA and InfraGard to ensure our members maintain access to best practices throughout the security spectrum. We know people across the globe are entering our profession, and we want to be able to serve their educational and professional development needs, while forming local communities of support to make them stronger and more successful.

In 2016, our flagship event, the Annual Seminar and Exhibits, hosted the first U.S. Outstanding Security Performance Awards, as well as the launch of Security Week, which provided an opportunity for us to give back to the event’s host community.  We experienced a 10 percent increase in registrations and are looking to build on this momentum in Dallas at ASIS 2017. ASIS plans to make a significant investment in reshaping this event to provide attendee and exhibitor partners with more value than any other security-oriented event in the United States. We will convene an enhanced programme, including new learning formats, networking events, and show floor features.

See the full coverage of 2016/2017 Review and Forecast articles here

 

Save

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Public sector security
  • Security management
  • Network monitoring
  • IP Surveillance
  • IP security solutions
  • Cyber security
  • Internet of Things (IoT)
  • Digital Video Recorders
  • Related links
  • Articles by Thomas J. Langer
  • 2016 security trends
  • Related categories
  • Access control software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec