Security convergence
   HOME

TheInfoList



OR:

Security convergence refers to the convergence of two historically distinct security functions –
physical security Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physica ...
and
information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
– within enterprises; both are integral parts of a coherent risk management program. Security convergence is motivated by the recognition that corporate assets are increasingly information-based. In the past, physical assets demanded the bulk of protection efforts, whereas information assets are demanding increasing attention. Although generally used in relation to cyber-physical convergence, security convergence can also refer to the convergence of security with related risk and resilience disciplines, including
business continuity planning Business continuity may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and business continuity planning (or business continuity a ...
and
emergency management Emergency management or disaster management is the managerial function charged with creating the framework within which communities reduce vulnerability to hazards and cope with disasters. Emergency management, despite its name, does not actuall ...
. Security convergence is often referred to as 'converged security'.


Definitions

According to the United States
Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security (DHS) that is responsible for strengthening cybersecurity and infrastructure protection across all levels of government, ...
, security convergence is the "formal collaboration between previously disjointed security functions." Survey participants in a
ASIS Foundation
study ''The State of Security Convergence in the United States, Europe, and India'' define security convergence as "getting security/risk management functions to work together seamlessly, closing the gaps and vulnerabilities that exist in the space between functions." In his book ''Security Convergence: Managing Enterprise Security Risk'', Dave Tyson defines security convergence as "the integration of the cumulative security resources of an organization in order to deliver enterprise-wide benefits through enhanced risk mitigation, increased operational effectiveness and efficiency, and cost savings."


Background

The concept of security convergence has gained currency within the context of the
Fourth Industrial Revolution The Fourth Industrial Revolution, 4IR, or Industry 4.0, conceptualizes rapid change to technology, industries, and societal patterns and processes in the 21st century due to increasing interconnectivity and smart automation. The term has bee ...
, which, according to founder and Executive Chairman of the
World Economic Forum The World Economic Forum (WEF) is an international non-governmental and lobbying organisation based in Cologny, canton of Geneva, Switzerland. It was founded on 24 January 1971 by German engineer and economist Klaus Schwab. The foundation, ...
(WEF)
Klaus Schwab Klaus Martin Schwab (; born 30 March 1938) is a German engineer, economist and founder of the World Economic Forum (WEF). He has acted as the WEF's chairman since founding the organisation in 1971. Life Schwab was born to Eugen Wilhelm Schw ...
, "is characterised by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres." Key results of this fusion include developments in
cyber-physical system A cyber-physical system (CPS) or intelligent system is a computer system in which a mechanism is controlled or monitored by computer-based algorithms. In cyber-physical systems, physical and software components are deeply intertwined, able to oper ...
s (CPS) and the growth of the
Internet of Things The Internet of things (IoT) describes physical objects (or groups of such objects) with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other comm ...
(ioT), which have seen a proliferation in the number and types of internet connected physical objects. In 2017,
Gartner Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients ...
predicted that there would be 20 billion internet-connected things by 2020. Security convergence was endorsed as early as 2007 by three leading international organizations for security professionals –
ASIS International ASIS International, headquartered in Alexandria, Virginia Alexandria is an independent city (United States), independent city in the northern region of the Commonwealth (U.S. state), Commonwealth of Virginia, United States. It lies on the we ...
,
ISACA ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only.
and ISSA – which together co-founded the Alliance for Enterprise Security Risk Management to, in part, promote the concept.


Types of convergence


Cyber-physical convergence


Risk convergence

In the context of the Internet of Things, cyber threats more readily translate into physical consequences, and physical security breaches can also extend an organisation's cyber threat surface. According to the United States
Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security (DHS) that is responsible for strengthening cybersecurity and infrastructure protection across all levels of government, ...
, "The adoption and integration of Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices has led to an increasingly interconnected mesh of cyber-physical systems (CPS), which expands the attack surface and blurs the once clear functions of cybersecurity and physical security." According to the WEF ''Global Risks Report 2020'', "Operational technologies are at increased risk because cyberattacks could cause more traditional, kinetic impacts as technology is being extended into the physical world, creating a cyber-physical system". According to the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the Federal government of the United States, U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the I ...
, "The consequences of unintentional faults or malicious attacks n cyber-physical systemscould have severe impact on human lives and the environment." Notable examples of attacks on internet connected facilities include the 2010
Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing su ...
attack on Iran's
Natanz Natanz ( fa, نطنز, also romanized as Naţanz) is a city and capital of Natanz County, Isfahan Province, Iran. At the 2006 census, its population was 12,060, in 3,411 families. It is located south-east of Kashan. Its bracing climate and lo ...
nuclear facilities and the
December 2015 Ukraine power grid cyberattack On December 23, 2015, the power grid in two western oblasts of Ukraine was hacked, which resulted in power outages for roughly 230,000 consumers in Ukraine for 1-6 hours. The attack took place during the ongoing Russo-Ukrainian War (2014-present) ...
. “Today’s threats are a result of hybrid and blended attacks utilizing
Information Technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology system (I ...
(IT),
physical infrastructure Infrastructure is the set of facilities and systems that serve a country, city, or other area, and encompasses the services and facilities necessary for its economy, households and firms to function. Infrastructure is composed of public and priv ...
, and
Operational Technology Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events''.'' The term has become established to demonstrate the techno ...
(OT) as the enemy avenue of approach," notes former CISA Assistant Director for Infrastructure Security Brian Harrell. "Highlighting this future threat landscape will ensure better situational awareness and a more rapid response.”


Organisational convergence

Traditionally distinct, or 'siloed', approaches to physical security and cyber security are viewed by proponents of security convergence as unable to adequately protect an organisation from attacks involving both cyber and physical (cyber-physical) dimensions. The organisational aspect of security convergence focuses on the extent to which an organisation's internal structure is capable of adequately addressing converged security risks. According to the
Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security (DHS) that is responsible for strengthening cybersecurity and infrastructure protection across all levels of government, ...
, "physical security and cybersecurity divisions are often still treated as separate entities. When security leaders operate in these siloes, they lack a holistic view of security threats targeting their enterprise. As a result, attacks are more likely to occur". "Many of the conventional physical and information security risks are viewed in isolation," states a
PricewaterhouseCoopers PricewaterhouseCoopers is an international professional services brand of firms, operating as partnerships under the PwC brand. It is the second-largest professional services network in the world and is considered one of the Big Four accounting ...
document ''Convergence of Security Risks''. "These risks may converge or overlap at specific points during the risk lifecycle, and as such, could become a blind spot to the organisation or individuals responsible for risk management." In a survey of more than 1,000 senior physical security, cybersecurity, disaster management, and business continuity professionals, th
ASIS Foundation
study ''The State of Security Convergence in the United States, Europe, and India'' found that despite “years of predictions about the inevitability of security convergence, just 24 percent of respondents have converged their physical and cybersecurity functions.” The survey also found that 96 percent of organisations that had converged two or more security functions reported positive results from convergence, with 72 percent reporting that convergence strengthened their overall security. Overall, 78 percent of those surveyed believed that convergence would strengthen their overall security function. Citing the work of
Jay Wright Forrester Jay Wright Forrester (July 14, 1918 – November 16, 2016) was a pioneering American computer engineer and systems scientist. He is credited with being one of the inventors of magnetic core memory, the predominant form of random-access computer ...
on
systems thinking Systems thinking is a way of making sense of the complexity of the world by looking at it in terms of wholes and relationships rather than by splitting it down into its parts. It has been used as a way of exploring and developing effective actio ...
, Optic Security Group CEO Jason Cherrington argues that a
system of systems System of systems is a collection of task-oriented or dedicated systems that pool their resources and capabilities together to create a new, more complex system which offers more functionality and performance than simply the sum of the constituent s ...
approach provides a useful lens to understanding how security sub-groups within an organisation contribute to an organisation's overall security goals. "In an ideal SoS world, organisations would see their security as a collection of task-oriented or dedicated systems that pool their resources and capabilities together as part of an overall system offering more functionality and performance than the sum of its parts. Importantly, oversight of the overall system would ensure that any gaps between its component systems are identified and failures avoided."


Solutions convergence (unified security)

The increasing prevalence of hybridised cyber-physical security threats has driven the parallel emergence of a range of converged security solutions that cover both cyber and physical domains. According to Jason Cherrington, "in contemporary security threats we’re seeing a convergence of physical and digital vectors; and that protection against these hybridised threats requires a hybridised approach." According to the United States
Cybersecurity and Infrastructure Security Agency The Cybersecurity and Infrastructure Security Agency (CISA) is an agency of the United States Department of Homeland Security (DHS) that is responsible for strengthening cybersecurity and infrastructure protection across all levels of government, ...
: "Organizations with converged cybersecurity and physical security functions are more resilient and better prepared to identify, prevent, mitigate, and respond to threats. Convergence also encourages information sharing and developing unified security policies across security divisions."


Bibliography

* Anderson, K.,
Convergence: A Holistic Approach to Risk Management
, Network Security, Elsevier, Ltd., Volume 2007, Issue 5, May 2007. * Anderson, K.,
IT Security Professionals Must Evolve for Changing Market
, SC Magazine, October 12, 2006.


References

{{reflist


External links


Alliance for Enterprise Security Risk Management
Security Data security Physical security