The Flat and The Furious

Print Friendly, PDF & Email

We live in an increasingly cyber-activated world. Electronic physical security systems are increasingly subject to attack and compromise – it just doesn’t make the news. In this session, cyber-physical experts (physical security, cybersecurity, cyber insurance and technology) explain where cyber-physical threats and countermeasures are going and how you can and must cover your assets now. Get your questions answered in this session!

The Flat and the Furious
Date: Wednesday, September 11th
Time: 2:15 PM to 3:15 PM Central Daylight Time (CDT) Chicago
Education credits: Up to 2 CPE Credits
Download Calendar File: The Flat and The Furious GSX Panel Session
GSX Website Links: Register for GSX Now or Add to Your GSX Show Planner

Panel Theme

Global cyber-physical gamers can seriously kick your assets and disappear into thin air! Thomas Friedman’s best-selling book – The World is Flat – doesn’t mention cyber-risk or the Internet of Things. Yet today our super-flattened physical world is cyber-activated with over 23 billion cyber-physical touchpoints. Being furious in the cyber world has levels of energy, violence of a scale and speed that you don’t want coming at your physical world assets. Don’t have your security cameras hijacked and weaponized for cyber-attacks, or your factory machinery or cars going wild. Cyber-physical experts (security, insurance and technology) explain where cyber-physical threats and countermeasures are going and how you can and must cover your assets now.

This is a highly interactive session open to lots of audience Q&A with the panelists.

Expert Insights

Our electronic physical security systems are not now built from IT hardware and software, but go beyond typical IT systems because they interact with physical devices and systems in our buildings. They are attractive targets because they open physical doors, connect to building information and control systems, and typically have poor cybersecurity protection. Five cyber security and risk management leaders were selected to provide answers about the state of our cyber-physical security systems, the risks they pose, and what can be done about it.

Ray Bernard – Moderator

Ray Bernard is a leading security consultant who has provided pivotal insight in security for more than 30 years. He has led many noteworthy security efforts for international airports, sports stadiums, water and energy utilities, manufacturing plants, schools and universities, and high-rise office facilities. Ray has an IT security background that includes cybersecurity for cyber and physical systems. He has written over 250 articles and columns for various security and IT magazines, pens a column on the convergence of physical security and IT for Security Technology Executive magazine and also writes for Security Business magazine. He writes the highly-regarded article series “Real Words or Buzzwords?” for SecurityInfoWatch.com. Ray is the author of the book Security Technology Convergence Insights, published by Elsevier, and is a contributing author to the Encyclopedia of Security Management, Second Edition. He is an active member of the ASIS Physical Security and IT Security Councils.

Terry Gold

Terry is the founder of D6 Research, a vendor-neutral research and advisory firm specializing in cyber security across the physical and digital domains. He’s spent the last 10 years integrating cybersecurity methods into physical security. At D6 Research, he’s been dedicated to research that challenges common industry practices leading to improved outcomes where he’s developed the industry’s first in-depth threat model and next-generation controls that are in used across some of the largest corporations. Terry is frequently published in media, D6 Research reports, presents at various conferences such as DEFCON where he “trains the hackers”, and serves on a variety of security boards.

D6 and Securicon have published the first of a three-paper series that provides a vendor-neutral viewpoint as to the state of cyber security resilience within the physical security industry, its practices, range of attacks and recommended best practices: Part 1: Industry Fundamentals: Current State, Defects, Gaps and Journey

Christopher Schouten

Christopher Schouten is Sr. Director – IoT Product Marketing for the Kudelski Group (SIX:KUD.S), a global leader in many sectors including cyber security and digital television. He has worked for 18 years for companies whose mission is to protect devices, data and high-value business models. He joined Kudelski Group in 2013, and prior to that he held various marketing and operational management roles in pay-TV security and mobile and fixed telecommunications in the U.S. and Europe. Christopher is an honors graduate of the University of Iowa, having studied Mass Communications and Linguistics. Christopher speaks five languages and is a passionate early adopter of IoT and smart home technologies.

Rick Withers

Rick Withers is an information systems security specialist, and works on the leading edge of cyber security practice. He is the Consulting Practice Lead and Senior Security Consultant at Triad Consulting & System Design Group. Rick has over 30 years of experience in the field of security. Certifications include CPP, CMAS, CISM and CHS-III; with Master’s Degrees in Security Management and Computer Information Systems Management. Withers is a retired 20-year Counterintelligence Officer with a solid hands-on background in Technical Surveillance Countermeasures and an extensive tactical and strategic background in counterterrorism, force protection, project management and security master planning for national security and critical infrastructure protection. He is also an active member and former chairman of the ASIS IT Security Council and is the ITSC Liaison to the newly-formed Security Applied Sciences Council (SASC). Rick is also a member of ISACA and ISSA, as well as a number of anti-terrorism and other security professional associations.

The ASIS IT Security Council has also published a list of IT security controls that apply to controls systems as well as electronic physical security systems: ITSC-Top-6-R2.pdf

Grace Crickette Taylor

Grace Crickette, ARM, CGEIT, CCEP-I, CCSA, SHRM-SCP, SPHR is Vice Chancellor for Administrative Affairs, Chief Business and Ethics Officer at UW-Whitewater. She is an accomplished Administrator and Financial Executive, Chief Risk Officer and Chief Compliance Officer, with an exceptional success record at the world’s #1 and #2 ranked Public Universities and Health Systems. In 2011: Grace was chosen in 2011 as one of Business Insurance’s Women to Watch and by Business Insurance magazine for their 2011 Risk Management Honor Roll; Treasury and Risk magazine named Grace as one of the “100 Most Influential People in Finance” and received the West & North America Awards and the Information Security Executive (ISE) of the Decade Award in 2012. In 2017, PHI Protection Network (PPN) recognized her for her dedication to protecting health information awarding her the PHI Hero’s Award. Grace is an alum of the University of Redlands and Harvard Business School.