Physical Security

 

 

https://sm.asisonline.org/Pages/Security’s-Digital-Shift.aspxSecurity’s Digital ShiftGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652019-04-01T04:00:00Z<p>​Physical security is long overdue for a digital transformation, according to a recent <a href="https://www.asisonline.org/globalassets/internal/future-of-physical-security.pdf">white paper</a> authored by experts from Microsoft and Accenture. </p><p>The white paper reports on a survey of 200 senior physical security leaders across multiple industries on digital transformation. It was written by Michael Foynes, a center of innovation global lead at Microsoft, and Mercedes Fuller, managing director, Accenture Strategy.</p><p>The paper argues that the global digital revolution, which has transformed the world, has also inadvertently created new threats. For example, the rise in popularity of social media has unintentionally provided new ways to orchestrate breaches and attacks. This reality, combined with the escalation of catastrophic climate events, means that many security teams are facing more challenges than ever.</p><p>“Combating these threats requires intelligent applications that can rapidly sift through overwhelming amounts of data that cannot be processed at the human level,” the authors write. “Recent developments in artificial intelligence and signals processing can help security catch up.”</p><p>“As tools become more sophisticated and readily available, security organizations must adopt new practices and capabilities,” the authors continue. “Failure to transform will increase the likelihood of becoming a target.”</p><p>However, while many security executives see the value of enhancing physical security with digital tools, progress in that field has been uneven at best. “We found that although security leaders see the opportunity to enhance risk management with digital capabilities, the industry is at various levels of maturity, and at worst is a decade behind,” the authors write. </p><p>The two leading challenges facing physical security operations today, according to survey respondents, were reactive threat management and intuition-led decision-making based on subjectivity. “These challenges—operating reactively and improving decision-making—make it difficult to be proactive. This puts your people, brand, and reputation at risk,” the authors write. </p><p>Microsoft Global Security has several initiatives underway to digitally transform its physical security, according to the paper. Under the code name Project Falcon, the initiatives are aimed at creating an intelligent platform that leverages data and insights to reimagine the employee experience and the delivery of security services. The company expects the initiatives to result in cost savings over the next 10 years, according to the report. IT also expects digital transformation to strengthen its global risk management, elevate employee and customer experiences, and unify groups within Microsoft.</p>

 

 

https://sm.asisonline.org/Pages/An-Amenity-of-Necessity.aspx2019-02-01T05:00:00ZAn Amenity of Necessity
https://sm.asisonline.org/Pages/FLASHBACK-April-1965-Vol-9-No-2.aspx2019-01-01T05:00:00ZFlashback
https://sm.asisonline.org/Pages/Smarter-Structures,-Safer-Spaces.aspx2018-10-01T04:00:00ZSmarter Structures, Safer Spaces

 

 

https://sm.asisonline.org/Pages/Book-Review-Retail-Risk.aspx2018-12-01T05:00:00ZBook Review: Retail Risk
https://sm.asisonline.org/Pages/Access-With-A-Twist.aspx2018-12-01T05:00:00ZAccess With A Twist
https://sm.asisonline.org/Pages/The-Fraudster-Down-the-Hall.aspx2018-08-01T04:00:00ZThe Fraudster Down the Hall

 

 

https://sm.asisonline.org/Pages/Security’s-Digital-Shift.aspx2019-04-01T04:00:00ZSecurity’s Digital Shift
https://sm.asisonline.org/Pages/What-is-Open.aspx2019-03-01T05:00:00ZWhat is Open?
https://sm.asisonline.org/Pages/An-Amenity-of-Necessity.aspx2019-02-01T05:00:00ZAn Amenity of Necessity

 

 

https://sm.asisonline.org/Pages/Security’s-Digital-Shift.aspx2019-04-01T04:00:00ZSecurity’s Digital Shift
https://sm.asisonline.org/Pages/An-Amenity-of-Necessity.aspx2019-02-01T05:00:00ZAn Amenity of Necessity
https://sm.asisonline.org/Pages/Seek-Joy.aspx2019-01-01T05:00:00ZSeek Joy

 

 

https://sm.asisonline.org/Pages/The-Future-of-Office-Security.aspx2019-03-01T05:00:00ZThe Future of Office Security
https://sm.asisonline.org/Pages/Smart-City-Embraces-STANLEY-Service-Solution.aspx2019-03-01T05:00:00ZSmart City Embraces STANLEY Service Solution
https://sm.asisonline.org/Pages/How-To-Investigate-MeToo.aspx2019-01-01T05:00:00ZHow to Investigate #MeToo

 

 

https://sm.asisonline.org/Pages/Federal-Misconduct.aspx2018-11-01T04:00:00ZFederal Misconduct
https://sm.asisonline.org/Pages/Career-in-Security-Pathways.aspx2018-11-01T04:00:00ZCareer Pathways in Security
https://sm.asisonline.org/Pages/Building-a-Hostility-Free-Work-Place.aspx2018-11-01T04:00:00ZBuilding a Hostility-Free Workplace

 

 

https://sm.asisonline.org/Pages/The-Future-of-Office-Security.aspx2019-03-01T05:00:00ZThe Future of Office Security
https://sm.asisonline.org/Pages/Resourceful-Relationships-.aspx2019-01-01T05:00:00ZResourceful Relationships
https://sm.asisonline.org/Pages/Building the Control Room of Tomorrow.aspx2018-12-01T05:00:00ZBuilding the Control Room of Tomorrow

 

 

https://sm.asisonline.org/Pages/March-2019-Letters-to-the-Editor.aspx2019-03-01T05:00:00ZMarch 2019 Letters to the Editor
https://sm.asisonline.org/Pages/Book-Review-Serial-Killers-and-The-Aftermath.aspx2019-02-01T05:00:00ZBook Review: Serial Killers and The Aftermath
https://sm.asisonline.org/Pages/The-Intoxication-Issue.aspx2019-02-01T05:00:00ZThe Intoxication Issue

 

 

https://sm.asisonline.org/Pages/Shooing-off-Copper-Crime-Waves.aspx2018-11-01T04:00:00ZShooing off Copper Crime Waves
https://sm.asisonline.org/Pages/Editors-Note---Supply-and-Demand.aspx2018-11-01T04:00:00ZSupply and Demand
https://sm.asisonline.org/Pages/Disastrously-Unprepared.aspx2018-11-01T04:00:00ZDisastrously Unprepared