SlideShare a Scribd company logo
The weakest link in today’s physical security
… and no, it’s not people
Bart Vansevenant
Co-founder Ticto (now part of RightCrowd)
▪ Physical security is achieved by building hard perimeters.
▪ People cannot be trusted. Humans are the weakest link.
▪ Technical security controls are what we need. The more the better.
The (implicit) assumptions we have been making
▪ 300k access cards still working but people no longer with company.
▪ More access levels than employees.
▪ Physical penetration test at Belgian bank.
A few anecdotes …
Our unconditional trust in technology
creates a false sense of security
So where do we go from here?
▪ 1995 – 2010: focus on building strong perimeter between the ‘bad’ Internet and the ‘trusted’ internal
network – the golden era of the ‘firewall’
▪ Realization that sole focus on perimeter protection did not solve the problems ;
▪ Shift towards more holistic and risk-based approach
▪ Still securing the network perimeter
▪ Also securing the internal network (databases, applications, end points)
The cyber security analogy
Introducing the next layer of security …
Perimeter Control
Access Control
Point in time decision
grant / deny
Physical barriers
protecting the facility
Presence Control
Continuous validation that
everyone on site is right
▪ Use of active digital security credentials as opposed to current passive tags
▪ Smartphone app
▪ Security wearables
▪ Know for sure who that person is (strong authentication) and whether that
person is allowed to be there (authorization)
▪ Know where each person is inside of a building (by zone)
▪ Allows for myriad of applications also beyond physical security
▪ Safety, logical security, social, convenience, health, building automation
Presence Control
Example of security wearable
Restoring the balance
People
Technology
Process
Engaging people in
security
Automating access
rules and workflows
▪ Physical security is achieved by building hard perimeters.
New presence control solutions allow a combination of a 'hard outer perimeter' and less expensive
and more flexible 'soft internal zones'.
▪ People cannot be trusted. Humans are the weakest link.
Engage your people to spot potential security incidents.
▪ Technical security controls are what we need. The more the better.
Ensure optimal use of existing controls by automating the rules and workflows that enforce your
security policies.
Conclusion
Q & A
Thank you !

More Related Content

What's hot

Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
Major Hayden
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
Out of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsOut of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day Threats
Peter Wood
 
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
Carpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to ThereCarpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to There
National Information Standards Organization (NISO)
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Infonaligy
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
Asim Jahan
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
IT Network marcus evans
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security
John Yessis
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
Trustwave
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
Luca Moroni ✔✔
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of nortonspkiely
 

What's hot (16)

Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Out of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day ThreatsOut of the Blue: Responding to New Zero-Day Threats
Out of the Blue: Responding to New Zero-Day Threats
 
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Carpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to ThereCarpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to There
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 

Similar to The weakest link in today’s physical security … and no, it’s not people

PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
Major K. Subramaniam Kmaravehlu
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
Southern Cross Group Services
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
Computerworld Philippines
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
oomagoolies
 
Cybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdfCybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdf
georgeterekhov
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
Marc Vael
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433Terry Gilsenan
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
Dana Gardner
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
Legal Services National Technology Assistance Project (LSNTAP)
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
Pankaj Rane
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
captsbtyagi
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
Manan Gadhiya
 
Sollensys Employee Benefits
Sollensys Employee BenefitsSollensys Employee Benefits
Sollensys Employee Benefits
DeepPatel273775
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
NRBsanv
 
Next Generation Cyber Security
Next Generation Cyber SecurityNext Generation Cyber Security
Next Generation Cyber Security
Ian McGregor
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire
 

Similar to The weakest link in today’s physical security … and no, it’s not people (20)

PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
Cybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdfCybersecurity_&_Physical_Security_Final_Paper_.pdf
Cybersecurity_&_Physical_Security_Final_Paper_.pdf
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
Report on Network Security And Privacy
Report on Network Security And PrivacyReport on Network Security And Privacy
Report on Network Security And Privacy
 
Sollensys Employee Benefits
Sollensys Employee BenefitsSollensys Employee Benefits
Sollensys Employee Benefits
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Next Generation Cyber Security
Next Generation Cyber SecurityNext Generation Cyber Security
Next Generation Cyber Security
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 

More from Doreen Loeber

The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)
Doreen Loeber
 
Burnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionalsBurnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionals
Doreen Loeber
 
The New APP Certification
The New APP CertificationThe New APP Certification
The New APP Certification
Doreen Loeber
 
How to Secure an Open Campus
How to Secure an Open CampusHow to Secure an Open Campus
How to Secure an Open Campus
Doreen Loeber
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
Doreen Loeber
 
True or False in the Age of Fake News
True or False in the Age of Fake NewsTrue or False in the Age of Fake News
True or False in the Age of Fake News
Doreen Loeber
 
Sharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing EconomySharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing Economy
Doreen Loeber
 
Video Surveillance in Marine Environments
Video Surveillance in Marine EnvironmentsVideo Surveillance in Marine Environments
Video Surveillance in Marine Environments
Doreen Loeber
 
How Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPRHow Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPR
Doreen Loeber
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
Doreen Loeber
 
Vendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great RelationshipsVendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great Relationships
Doreen Loeber
 
The competitive advantage of holding a professional certification
The competitive advantage of holding a professional certificationThe competitive advantage of holding a professional certification
The competitive advantage of holding a professional certification
Doreen Loeber
 
Career Development Workshop
Career Development WorkshopCareer Development Workshop
Career Development Workshop
Doreen Loeber
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills Cocktail
Doreen Loeber
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationals
Doreen Loeber
 
Artificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk ManagementArtificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk Management
Doreen Loeber
 
Your building is talking. Are you listening?
Your building is talking. Are you listening?Your building is talking. Are you listening?
Your building is talking. Are you listening?
Doreen Loeber
 
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Doreen Loeber
 
Data-driven crime prevention using AI
Data-driven crime prevention using AIData-driven crime prevention using AI
Data-driven crime prevention using AI
Doreen Loeber
 
Case Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter BuildingsCase Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter Buildings
Doreen Loeber
 

More from Doreen Loeber (20)

The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)
 
Burnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionalsBurnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionals
 
The New APP Certification
The New APP CertificationThe New APP Certification
The New APP Certification
 
How to Secure an Open Campus
How to Secure an Open CampusHow to Secure an Open Campus
How to Secure an Open Campus
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
True or False in the Age of Fake News
True or False in the Age of Fake NewsTrue or False in the Age of Fake News
True or False in the Age of Fake News
 
Sharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing EconomySharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing Economy
 
Video Surveillance in Marine Environments
Video Surveillance in Marine EnvironmentsVideo Surveillance in Marine Environments
Video Surveillance in Marine Environments
 
How Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPRHow Access Control is impacted by cloud, mobile and GDPR
How Access Control is impacted by cloud, mobile and GDPR
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
 
Vendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great RelationshipsVendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great Relationships
 
The competitive advantage of holding a professional certification
The competitive advantage of holding a professional certificationThe competitive advantage of holding a professional certification
The competitive advantage of holding a professional certification
 
Career Development Workshop
Career Development WorkshopCareer Development Workshop
Career Development Workshop
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills Cocktail
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationals
 
Artificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk ManagementArtificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk Management
 
Your building is talking. Are you listening?
Your building is talking. Are you listening?Your building is talking. Are you listening?
Your building is talking. Are you listening?
 
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...
 
Data-driven crime prevention using AI
Data-driven crime prevention using AIData-driven crime prevention using AI
Data-driven crime prevention using AI
 
Case Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter BuildingsCase Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter Buildings
 

Recently uploaded

Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 

Recently uploaded (20)

Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 

The weakest link in today’s physical security … and no, it’s not people

  • 1.
  • 2. The weakest link in today’s physical security … and no, it’s not people Bart Vansevenant Co-founder Ticto (now part of RightCrowd)
  • 3. ▪ Physical security is achieved by building hard perimeters. ▪ People cannot be trusted. Humans are the weakest link. ▪ Technical security controls are what we need. The more the better. The (implicit) assumptions we have been making
  • 4. ▪ 300k access cards still working but people no longer with company. ▪ More access levels than employees. ▪ Physical penetration test at Belgian bank. A few anecdotes … Our unconditional trust in technology creates a false sense of security
  • 5. So where do we go from here?
  • 6. ▪ 1995 – 2010: focus on building strong perimeter between the ‘bad’ Internet and the ‘trusted’ internal network – the golden era of the ‘firewall’ ▪ Realization that sole focus on perimeter protection did not solve the problems ; ▪ Shift towards more holistic and risk-based approach ▪ Still securing the network perimeter ▪ Also securing the internal network (databases, applications, end points) The cyber security analogy
  • 7. Introducing the next layer of security … Perimeter Control Access Control Point in time decision grant / deny Physical barriers protecting the facility Presence Control Continuous validation that everyone on site is right
  • 8. ▪ Use of active digital security credentials as opposed to current passive tags ▪ Smartphone app ▪ Security wearables ▪ Know for sure who that person is (strong authentication) and whether that person is allowed to be there (authorization) ▪ Know where each person is inside of a building (by zone) ▪ Allows for myriad of applications also beyond physical security ▪ Safety, logical security, social, convenience, health, building automation Presence Control Example of security wearable
  • 9. Restoring the balance People Technology Process Engaging people in security Automating access rules and workflows
  • 10. ▪ Physical security is achieved by building hard perimeters. New presence control solutions allow a combination of a 'hard outer perimeter' and less expensive and more flexible 'soft internal zones'. ▪ People cannot be trusted. Humans are the weakest link. Engage your people to spot potential security incidents. ▪ Technical security controls are what we need. The more the better. Ensure optimal use of existing controls by automating the rules and workflows that enforce your security policies. Conclusion
  • 11. Q & A