Security Systems News

DEC 2018

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link: https://ssn.epubxp.com/i/1054985

Contents of this Issue

Navigation

Page 9 of 30

NEWS By Spencer Ives YARMOUTH, Maine—The Security Industry Association recently released a benchmarking study that outlined potential cyber risks and the emerging technologies that could help protect systems. Security Systems News' read- ers shared some of their opinions on end user attitudes and rising threats that were outlined in the report. Sixty percent of poll respondents said that they are seeing end users budgeting more for cyber risks and cybersecurity. Ten percent said that they are seeing a small increase, while 30 percent said that end users are not yet budgeting. When it comes to risks, 80 percent predict that attacks through partners, customers and vendors will be a main concern in the future. An additional 20 percent are keeping their eyes on the supply chain. "With more and more IOT items people are paving more ways into their network. Some of the biggest concerns are when vendors have ways into a client system but the client has SSN News Poll: Where are we with cyber protections? no control over how the vendor manages their net- work; software; etc.," one respondent wrote. B e h a v i o r a l a n a l y t - ics stand to help reduce cyber risks in the future, according to half of all respondents. Thirty per- cent pointed to smart grid technologies, while the remaining 20 percent said that deception technolo- gies are most likely to help. "The industry is suffer- ing a skills gap and one wherein those experts we need are ill-informed about how IT must take a lead role in defining key objectives. Also, we are not looking into the future to see how assumptions can be made (e.g. identity management)," one reader said. SSN Are you seeing end users budgeting for more cybersecurity? What do you see as the biggest rising cyberthreat? Which technology do you think would most help? News Poll based on answers provided by respondents in October and November. What's your title and role at the company? I'm the president and principal of M2H Protection, a small security and technology consulting firm located in Frederick, Md. I manage the day-to-day security and technol- ogy consulting activities. M2H is a service dis- abled veteran owned small business and our business is mainly focused on working with architects and engineers on new construction and renovations. While our core business is in the mid-Atlantic, our customers take us all over the globe. What kinds of systems do you design/ specify and what services does the company provide? In terms of technical security, our back- ground stems from government and military security applications, which are broad and deep in terms of security. Every day we design and specify access control, video manage- ment, intercommunications, interior intru- sion detection, and electrified door hardware. Often, we also design and specify perimeter intrusion detection systems, programmable logic controls, physical security management systems, cyber controls and command and control centers. Since my technical background started as an integrator, we are also involved in devel- oping special systems such as notification systems and developing new telecommuni- cations infrastructure. So, we like to think we cover a broad and deep area of design and specification in security consulting. While our firm specializes in technical security, we commonly start our projects with some type of assessment. The assessment will be much more broad than technical security focusing on the general security environment (CPTED, planned operations and those threats and hazards, etc.), which often helps us hone-in the customer and project needs. Often these needs spread to other team members to help solve (blast, ballistics, force entry protection, CPTED, etc.). That element of our services is perhaps different, where we look at the secu- rity needs as a multi-disciplinary problem vs. simply technology. Lastly, at certain times we are asked by cus- tomers to write publications and standards, perform audits, and develop master plans for their organization. How did you get started in security and designing/specifying? I started my security career in the U.S. Army as an MP. When coming back from a deployment, I was given an opportunity to go to a specialized school. My choices were traffic investigations or physical security. My mentor, a sergeant major, strongly encouraged me to pursue physical security. I attended the course and learned a considerable amount, everything from proactive physical security vs. police work, how conventional physical security is based on the 4 D's, and CPTED; how to conduct risk assessments, differ- ences between codes, regulations, standards, Mark M. Hankewycz, CPP Principal, Security & Technology, M2H Protection Frederick, Md. Specifically Speaking Sp E aki N g see page 5 UP YOUR GAME WITH WIRELESS UP YOUR GAME WITH WIRELESS Understand how Inovonics wireless allows you to offer your customers more. It's time to up your game and sell more, learn how: it just works www.inovonics.com/UpYourGame SECURITY SYSTEMS NEWS D ECEM b ER 2018 www.securitysystemsnews.com NEWS 3

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - DEC 2018