Cybersecurity is Constantly Assessing Risk. Physical Security Should Do the Same

Cybersecurity is Constantly Assessing Risk. Physical Security Should Do the Same

How often does your organization assess your physical risk? Annually? Every six months??

Now, how often do you assess your cyber risk? Probably on an ongoing basis, right??

Cybersecurity experts recommend that risk be formally assessed on at least an annual basis, but due to the fast-evolving tactics used by cyber criminals and the high financial stakes, organizations should monitor cyber risk much more often, ideally continually.?

What if I told you physical security should do the same??

Cybersecurity and risk

The average cost of a data breach in 2023 is $4.45 million . The longer a breach goes undetected, the more it will cost, so companies are particularly invested in detecting suspicious activity quickly. More than half of companies surveyed by IBM are planning to increase their cybersecurity spending this year as the result of a breach.?

The financial and reputational repercussions of a data breach or attack, as well as data privacy regulations like GDPR mean that many of the teams assessing cybersecurity are constantly scanning for new threats and trying to understand the probability of risks. Many of the cybersecurity tools in the tech stack are specifically developed to assess risk, often in real time or on a continuous basis.

Why aren’t we doing the same thing with physical risk?

Physical risk is just as serious as cyber risk

I’ve heard people say that physical risk is not as serious as cyber risk, but there are plenty of physical risk scenarios on par with the threat of a cyber attack. The prototype of a product you’re developing might be stolen and sold to a competitor. Your CEO might be kidnapped. An active shooter might enter your building.?

All of these scenarios come with significant physical, financial, and reputational risk, and can have a huge impact on your company. Also, just as cyber risk evolves, so does physical risk. Certain trends are worth monitoring, as are the changing tools, tactics, and procedures (TTP) of the criminals most likely to target your business.

Why doesn’t the physical security industry analyze risk the way the cybersecurity industry does??

Most physical security experts don’t truly understand risk. They’ve spent their entire careers focused on physical security, but not on risk analysis. There is a huge difference between security and risk.?

  • Physical security focuses on the response to a threat. As the precursor to policing, security has always been reactive. Security officers were employed to respond to threats and protect assets. While risk was assumed, it was never analyzed. This began to change in the 1990s when active shooters started to ramp up, but most physical security experts have not been trained in risk management. In fact, the term “enterprise security risk management” was only coined in the late 2010s.
  • Risk is concerned with proactively identifying and preventing threats. This means foreseeable threats are analyzed to determine which are most likely. Cybersecurity experts need to understand risk. Unlike physical security experts, cybersecurity professionals can’t see their attacker approaching. For this reason, they analyze foreseeable risk to understand what is most likely.

How often should you assess physical risk??

If you can reasonably imagine something happening, it’s foreseeable. If it’s likely to happen, it’s probable. If you’re ignoring something that can happen because it hasn’t happened at your site before, you’re opening yourself up to risk.

We should take a page from the cybersecurity playbook, and be proactive about risk analysis, and that means evaluating your site’s risk every day. Daily risk assessments may sound like a tall order if you’re used to annual risk assessments, but it’s not — if you’re using digital solutions, your officers can assess risk on their rounds. They’re already on patrol, and can easily use a tablet to assess physical risk by using a checklist and taking photos of potential risks.

How to do daily risk assessments

Circadian Risk’s platform makes it easy to do daily risk assessments. Our mobile app generates automatic reports from the data you capture during your inspection. There’s virtually no writing to do, and you can cut your report time by 80% .

It’s the only solution that lets you:

  • Create effective, comprehensive reports in record time
  • Tag every vulnerability, risk, and compliance issue on the premises
  • Track and assign improvements with a detailed corrective action plan
  • Analyze risk over time

Circadian Risk can help you keep your clients safe—and more affordably than any other method. Find out more about our solution .




Martin Flodr

bezpe?nostny a technicky ?pecialista

1 年

The issue of risks in the security sectors (safety, security, cyber) is more complex. It makes a difference if an information asset is primarily exposed to cyber risks, or a physical asset is primarily exposed to physical risks (of course, combined assets are subject to combined risks). In the case of cyber risks, it is mainly about the platform at the SW level, which can be effectively supported diagnostically by SW tools. In the case of physical risks, the scope is considerably wider (criminal, technical, environmental, socio-societal, system-procedural). This is already a risk analysis with limited support of SW tools and, of course, time-consuming and specific professional competence. This is also why risks in this sector are mainly analyzed only at the level of reaction (e.g. during a security intervention) or passive prevention (security audits), which are logically not on a regular, short-term basis. Of course, sophisticated SW support can make this process significantly more efficient, which would be beneficial for the security sector.

Woodley B. Preucil, CFA

Senior Managing Director

1 年

Daniel Young Thank you for sharing your expertise, great post.

Jim McConnell

Chief Security Officer | Chief Information Security Officer | Physical Security | Cyber Security | Metrics | Executive Protection | M&A | Supply Chain | Fraud | I help mature your converged security program by 1% today

1 年

Daniel Young - great post, being in security for 30 years and all the history of security I have studied, I started in a converged security program and find/found countless organizations that were always converged. So far from rare as some people of taught. Obviously there are pros and cons of converged and non-converged security (governance). My first book obviously is very converged focused and my next book will embrace the value of a converged model on an additional topic.

Mark B.

Senior Manager, Physical Security EMEA

1 年

The similarities between the two are numerous and we will see a convergence of physical and information security in future programs. A successful program is constantly updating organizational risk exposure as incident data is made available so the Exec Board gets a better understanding of business continuity and operational resilience. Great article, thanks for sharing.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了