Will We Be Talking About Data-Driven Security In Five Years?
This was one of the questions posed to Security Leaders at a recent ASIS hosted Global Security Exchange (GSX) panel I chaired. And rightfully so, it was perhaps better answered by another question – Why aren’t you using your security data now? You have it available to you!
The security leaders concurred (and I agree) there are two reasons why employing data-driven security has been difficult:
We know that physical security data is messy, hence security operations teams end up using a lot of manual processes and stay reactive in their decision-making. There are different physical security standards, hardware, software, and vendors in play. Physical security data comes in a variety of formats unique per system/vendor such as that from Access control systems, or from CCTV/ Video analytics, or from intrusion detection, or from incident response with no commonalities. Security teams are constantly seeking better ways to make sense of their data as having the right data has become a mission-critical challenge.
To add context, all panelists and audience members agreed that most of us (and even our aging parents) have switched from paper maps to real-time “data-driven” map apps so we get to our travel destinations on-time. Paper maps are a good backup but are no longer our primary choice.
What Is Data-Driven Security and Why Do I Need It?
We live in an age of data, it's changed how we commute, how doctors treat diseases, how we predict and respond to natural disasters, and how your company figures out what customers want. People and organizations are constantly looking for ways to make better decisions with data – so we are proactive, operate more efficiently, and are profitable. Every CSO, CISO wants true data-driven decision-making to enhance their organization’s security posture and reduce costs. Physical security should be no different.
Heading into 2023, Enterprises continue to see disruptions (from Cyber attacks and ransomware) and evolving threats (from active shooter and theft and sabotage) because security teams can’t make the most of their data. Without the ability to find important insights in real-time, physical security teams have largely remained reactive in their responses, rather than data-driven and proactive. The only way to mitigate these growing threats is to take a data-driven security approach.
Recommended by LinkedIn
Data-driven is an arrangement where physical security data is used to make informed decisions about the security (and business) practices in a company. It provides an action plan in the face of a security event and an action plan to safeguard the company's people and assets. When data insights start enhancing security's day-to-day decision-making, it becomes a data-driven security approach.
What Does Data-Driven Security Automation Look Like?
Vector Flow is the physical security industry’s first data-driven automation platform. Vector Flow is dedicated to using machine learning and automation to deliver improved operational efficiencies across the entire physical security operations. Our advanced platform essentially converts physical security data from multiple sources into intelligent insights - that help reduce operational costs and deliver automation for security organizations.
Using data-driven insights, physical security teams leverage our out-of-box playbooks to automate physical security processes such as automating on/off-boarding with physical access recommendations, automating physical access compliance audits with audit recommendations, finding and addressing hidden insider threats, smart mustering, building occupancy usage and forecasting, eliminating false/nuisance alarms at SOCs, etc.
How Do I Get Started?
Data-driven security is a journey – taken in 3 simple stages that build on top of your intuition and experience. You can now learn from the experience of your predecessors and avoid the pitfalls. You benefit from the example of those companies that have already pushed forward with success.
To learn more about these 3 stages, contact us or visit our blog. Here I discuss in length how data-driven automation is transformed physical security and the 3 steps you can take to get started on your own data-driven automation journey.