FOUNDER STORIES: New Collection of Founder Stories from Super73  Read More

TEAM NEWS: Tomy Han Ranked #24 on the Insider 71 rising-star VCs who shook up the industry in 2022  Read More

ANALYSIS: Rule of 40 Index, now live with time series data: Explore

VOLITION VIEWPOINTS: Five Ways to Build a Sustainable Execution Strategy (Hint: Be A Thermostat, Not A Thermometer)  Read More

Volition Capital Announces Closing of Fund V with $675M in Capital Commitments: Volition Capital Announces Closing of Volition Capital Fund V, L.P. with $675M in Capital Commitments  Read More

MARKET ANALYSIS: Rule of 40 Index: Year in Review  Read More

Cybersecurity

2 MIN READ

ISC West 2023 Preview

What I Am Looking For at ISC West 2023:

When it comes to companies’ security strategies of tomorrow, one key component is becoming more and more clear: physical security and cyber security processes are converging.

From a physical security perspective, the modern world has presented increased demand for solutions to previously less relevant threats. These more complex threats have led to cyber solutions as a compliment to physical security become increasingly common. However, as technology has continued to advance, it is becoming clear that a proper security protocol does not only have cyber solutions as a compliment to physical security, but rather as a core component – hence, the convergence.

Specifically, a Gartner Physical Security survey shared that 41% of enterprises aim to converge aspects of their cyber and physical security processes by 2025 – a sharp increase from the 10% figure in 2020.

One area that exemplifies the convergence of these components of security well is the converging solutions needed around identity management. How hard is it to envision a world where employees will want to use smartphones and smartwatches instead of key cards? How many already are?

There will also be solutions necessary that come along with managing a workforce that uses both legacy and tech empowered solutions. And finally, think about the centralized cyber infrastructure that will need to be deployed to track, predict, and respond to not only identity management solutions but security solutions company wide.  

Not only will companies need to be focused on creating these solutions, but also the successful ones will need to have the impacts of these changes on their customers in mind. Let’s just say that learning and following new security standards are not employees’ favorite thing to do. Ensuring that the rollout of new processes is seamless, troubleshooted beforehand, and are customer first will be critical. 

Volition

Sinjon Goldberg

Analyst

Sinjon Goldberg

Analyst

ALL ARTICLES
BACK TO TOP

Consent(Required)

Consent(Required)

Consent(Required)

Consent(Required)