Lessons Learned from the Front Lines of Security Convergence

There are several growing challenges to security convergence.

Nonstop Evolution of Computing and Networking

Exponential technology advancement results in a changing landscape that quickly grows beyond the new protective measures we keep putting in place. People tend to think linearly, while computerized technologies advance exponentially. That makes it hard to keep up, especially given the limited resources applied to security at every step of any product and system lifecycle.

Cyber-Physical Systems Blur the Line

When cyber-physical systems can be hacked (think land, sea or space vehicles, traffic control systems, robotic assisted surgeries, automated medication delivery, food manufacturing lines), then great physical harm can be accomplished by the click of a single key or icon. The consequences of failed cyber security controls can be physically catastrophic at a scale that could not be accomplished using purely physical means.

Multi-Dimensional Attack Surfaces

The widespread connectivity between cyber vulnerable systems presents a multi-dimensional attack surface with an exponentially growing insider risk component.

Finance Challenges

A concerning trend is to approve or disapprove cybersecurity risk treatment measures out of context and based on budgets and faulty reasoning rather than on key risk factors – especially for physical security system infrastructure.

Getting a Handle on Things

Fortunately, no security practitioners have to solve the entirety of this picture, and there are many good lessons to be learned from people who are doing a good job of security for the infrastructure for which they are responsible. This session is about key security convergence lessons learned in environments more challenging technically and organizationally than most.


Learning Objectives:

  1. How to enable security investment decision-makers to make confidently make informed decisions accounting both business fiscal objectives and risk mitigation priorities.
  2. How to identify key security sponsor candidates and effectively garner their support for policies, programs and initiatives.
  3. How to apply the key reference materials, including downloadable tools, that will help them accomplish their objectives.

Our Speakers

Ray Bernard

President and Principal Consultant

Ray Bernard Consultive Security

Session Date/Time:
2022-09-30 16:00:00
Platinum 1-2
Share With Friends: