Can there be better automated incident response for physical security? Credit: Pexels The recent tragic events in Las Vegas, Lakeland, Manchester – and most recently at the YouTube campus—have put the issue of gun-related violence and the response to these incidents in the headlines. But there are other physical dangers as well. In late March, some 64 people—many of them children—perished in a fire in a Russian mall.The prevalence of such disasters—and the possibility of dual physical and cyberattacks—has prompted some firms and investors to propose tech-based solutions for physical security. The need for such solutions is widespread. A recent survey from GrandView Research predicted that the global physical security market would grow from about $134 billion today to $290.7 billion by 2025 – an annual compound growth rate of 9.2 percent. The impetus is the perception that there are growing threats across the globe and new tech-based solutions to mitigate them.Some point to a parallel—15 to 20 years ago, cybersecurity was made up of scores of disparate solutions with no single interface to consolidate them all, and incident response was exclusively in the hands of “manual” services firms. Looking to the physical security industry, it would appear that there would be an attractive opportunity for someone to be the IBM/Resilient Systems or Phantom Cyber for this emerging category.How it worksThe idea of using technology to respond to and manage physical world or “offline” events wasn’t feasible until a few years ago, when sensors, cameras, and electronic door locks, among other technologies, became widely available and connected to IP networks using open APIs. The development of more mass market machine learning algorithms and systems has also made the opportunity for more automated physical incidents response a reality. New systems being developed today can employ such technologies to sense potentially disastrous events and take steps to limit their impact or stop them altogether. For instance, a camera could pick up an intruder with a gun and lock all the doors and cut the lights, so the assailant is left befuddled and trapped before the police arrive.In addition, there are scores of solutions on the market ranging from millimeter-wave imaging sensors to detect bombs or firearms, surveillance drones and robotic security guards. But what is needed is a comprehensive solution that tracks all activity within an area on a single dashboard, allowing these disparate systems to interact and be managed more automatically, with less human intervention, when an event occurs. In a physical security crisis, the time delay caused by humans needing to manually pull up the appropriate sensor or camera data, make an accurate decision, and then launch the appropriate response can mean the difference between safety or a major crisis. Of course, such solutions need to be accurate to work correctly. An AI-based physical security system needs to be able to differentiate a cleaning person holding a broom from an intruder with a shotgun, even if they look somewhat similar in low lighting.MIM and links to cybersecurityWhile cybersecurity and physical security have been separate realms, perhaps they shouldn’t be. Some companies have realized that cyber and physical attacks both fall under the heading of MIM—Major Incident Management—and are pooling both teams.It’s easy to see how a truly nefarious group of criminals could use simultaneous cyber and physical attacks to overwhelm an organization. And of course, a physical intruder could invade the perimeter to carry out a cyberattack as well. For instance, an intruder who gains entrance merely has to plug in a USB device that fools the system into thinking it’s a keyboard or storage system.For businesses with large physical facilities – whether manufacturing plants or utilities – physical security is often a failure point. Common security methods like badges and security entrances are relatively easy to foil. Technologies like biometrics and facial recognition can provide another layer of security that is less vulnerable to human error. To truly secure a business environment then, you need what some have dubbed a “cyber-physical nexus” that addresses both physical and cyber threats.Part of the solutionAI-based MIM security will become a key part of the infrastructure deployed in any facility that attracts large numbers of people – from large enterprise offices, to university campuses, to stadiums, auditoriums and large entertainment complexes. While it would be a mistake to assume that a tech-based solution will solve all the problems related to violence, fires and natural disasters and other physical world issues, technology is one piece of the puzzle that can help limit the potential damage. Now that we have the tools available to keep us all safer, we should figure out how to use them effectively. Related content opinion 2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more As 2019 draws to a close, it is time to reflect on what’s happened in cybersecurity over the past twelve months – and in some cases, what didn’t happen this year. By Rick Grinnell Dec 09, 2019 5 mins Data Breach Phishing Malware opinion Combatting extreme weather and power outages, a growing need for AI The past month saw an unprecedented leap in natural disasters across the U.S. In an effort to prevent the spread of wildfires in California, power was shut down for days as a proactive and preventative measure. With climate change, comes a new disrup By Rick Grinnell Nov 07, 2019 5 mins Artificial Intelligence Security opinion Different conferences, common theme: How to best manage the disparate security solutions we’re using We need to unite the different islands of security solutions in both the physical and cyber worlds to provide the best level of protection. By Rick Grinnell Sep 24, 2019 5 mins Security opinion Sharks and phishers are circling, looking to snag a bite Security professionals need to work together to come up with effective threat strategies, better training and intelligence alert systems in effort to keep phishing attacks at a minimum. By Rick Grinnell Aug 06, 2019 5 mins Phishing Hacking Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe