Cybersecurity is Constantly Assessing Risk. Physical Security Should Do the Same
Daniel Young
Prof Risk | Founder & Chief Innovation Officer @ Circadian Risk Inc. | Speaker | Security, Threat, Vulnerability, & Risk Expert and SaaS | ASIS Member, CSO Risk Council Member | LGBTQ+ Sponsor | Entrepreneur | Pet Lover
How often does your organization assess your physical risk? Annually? Every six months??
Now, how often do you assess your cyber risk? Probably on an ongoing basis, right??
Cybersecurity experts recommend that risk be formally assessed on at least an annual basis, but due to the fast-evolving tactics used by cyber criminals and the high financial stakes, organizations should monitor cyber risk much more often, ideally continually.?
What if I told you physical security should do the same??
Cybersecurity and risk
The average cost of a data breach in 2023 is $4.45 million . The longer a breach goes undetected, the more it will cost, so companies are particularly invested in detecting suspicious activity quickly. More than half of companies surveyed by IBM are planning to increase their cybersecurity spending this year as the result of a breach.?
The financial and reputational repercussions of a data breach or attack, as well as data privacy regulations like GDPR mean that many of the teams assessing cybersecurity are constantly scanning for new threats and trying to understand the probability of risks. Many of the cybersecurity tools in the tech stack are specifically developed to assess risk, often in real time or on a continuous basis.
Why aren’t we doing the same thing with physical risk?
Physical risk is just as serious as cyber risk
I’ve heard people say that physical risk is not as serious as cyber risk, but there are plenty of physical risk scenarios on par with the threat of a cyber attack. The prototype of a product you’re developing might be stolen and sold to a competitor. Your CEO might be kidnapped. An active shooter might enter your building.?
All of these scenarios come with significant physical, financial, and reputational risk, and can have a huge impact on your company. Also, just as cyber risk evolves, so does physical risk. Certain trends are worth monitoring, as are the changing tools, tactics, and procedures (TTP) of the criminals most likely to target your business.
Why doesn’t the physical security industry analyze risk the way the cybersecurity industry does??
Most physical security experts don’t truly understand risk. They’ve spent their entire careers focused on physical security, but not on risk analysis. There is a huge difference between security and risk.?
领英推荐
How often should you assess physical risk??
If you can reasonably imagine something happening, it’s foreseeable. If it’s likely to happen, it’s probable. If you’re ignoring something that can happen because it hasn’t happened at your site before, you’re opening yourself up to risk.
We should take a page from the cybersecurity playbook, and be proactive about risk analysis, and that means evaluating your site’s risk every day. Daily risk assessments may sound like a tall order if you’re used to annual risk assessments, but it’s not — if you’re using digital solutions, your officers can assess risk on their rounds. They’re already on patrol, and can easily use a tablet to assess physical risk by using a checklist and taking photos of potential risks.
How to do daily risk assessments
Circadian Risk’s platform makes it easy to do daily risk assessments. Our mobile app generates automatic reports from the data you capture during your inspection. There’s virtually no writing to do, and you can cut your report time by 80% .
It’s the only solution that lets you:
Circadian Risk can help you keep your clients safe—and more affordably than any other method. Find out more about our solution .
bezpe?nostny a technicky ?pecialista
1 年The issue of risks in the security sectors (safety, security, cyber) is more complex. It makes a difference if an information asset is primarily exposed to cyber risks, or a physical asset is primarily exposed to physical risks (of course, combined assets are subject to combined risks). In the case of cyber risks, it is mainly about the platform at the SW level, which can be effectively supported diagnostically by SW tools. In the case of physical risks, the scope is considerably wider (criminal, technical, environmental, socio-societal, system-procedural). This is already a risk analysis with limited support of SW tools and, of course, time-consuming and specific professional competence. This is also why risks in this sector are mainly analyzed only at the level of reaction (e.g. during a security intervention) or passive prevention (security audits), which are logically not on a regular, short-term basis. Of course, sophisticated SW support can make this process significantly more efficient, which would be beneficial for the security sector.
Senior Managing Director
1 年Daniel Young Thank you for sharing your expertise, great post.
Chief Security Officer | Chief Information Security Officer | Physical Security | Cyber Security | Metrics | Executive Protection | M&A | Supply Chain | Fraud | I help mature your converged security program by 1% today
1 年Daniel Young - great post, being in security for 30 years and all the history of security I have studied, I started in a converged security program and find/found countless organizations that were always converged. So far from rare as some people of taught. Obviously there are pros and cons of converged and non-converged security (governance). My first book obviously is very converged focused and my next book will embrace the value of a converged model on an additional topic.
Senior Manager, Physical Security EMEA
1 年The similarities between the two are numerous and we will see a convergence of physical and information security in future programs. A successful program is constantly updating organizational risk exposure as incident data is made available so the Exec Board gets a better understanding of business continuity and operational resilience. Great article, thanks for sharing.