Security Technology Executive

SEP-OCT 2018

Issue link:

Contents of this Issue


Page 26 of 59

www. • September/October 2018 • SECURIT Y TECHNOLOGY E XECUTIVE 27 Network (CWIN), which links the DHS National Opera- tion Center (NOC) to NOCs at other federal agencies and at telecommunications companies. Evolving Threats This section highlights a single, significant threat that is truly "over the horizon" but is shaping up as a major hurdle to the integrity of all critical infrastruc- ture (and other) computer-based sectors. Quantum computers and computing is becoming a reality, promising new achievements in computer science, data analysis, artificial intelligence, and machine learning. It also promises to create a new front of vulnerabilities in the very infrastructures it promises to better, principally by making existing encryption strategies and mechanisms much more vulnerable to penetration; without encryption, there will be no privacy and without privacy, there will be no security. Therein lays the future threat. Specifically, the new, super-fast, computers will be able to break through the encryption of security cer- tificates, enabling cybercriminals to perform sophis- ticated Man in the Middle (MITM) attacks, making Certificate Authorities and their service obsolete. One possible remedy to this upcoming vulnerability is to go the way of the Bitcoin and integrate decen- tralization into Public Key Infrastructures. Another looming critical infrastructure threat worth mentioning is the constant presence of the threat of foreign interference with America's elec- toral infrastructure, and it's very democratic institu- tions; it is important to remember how vulnerable such systems are and what a huge effort is required to protect them. Threats – both physical and cyber – against criti- cal infrastructure in the United States and else- where are forecasted to increase over the coming years. It is the responsibility of government and private industry to remain ever cognizant of the responsibility they shoulder and therefore remain ever vigilant in their efforts to forestall current and upcoming threats. Security managers must learn to monitor simultaneously both physical and cyber threats understand the interface between them and constantly innovate for maximum resilience. The cost of failure is just too high. Request information: ow safe is your School? Know with Napco, solutions for all campuses & budgets Napco • Alarm Lock • Continental Access • Marks USA Contact us for Free Security Evaluation 800.645.9445 or download our School Safety Whitepaper & S.A.V.I. Self Diagnostic Tool at See us at GSX/ASIS Las Vegas, Napco Booth 1543 LO C K I N G A CC E S S A L A R M S V I D E O About the author: Johnathan Tal is the CEO of TA L Global, a leading Risk Management, Securit y Consulting and Investigative A gency ser v ing clients all over the world. The San Francisco-based company is based in Silicon Valley with a large client base and a vast net work of resources for the High-Tech, Hospitalit y, Manufact uring and Financial industries. Tal is also a Board Member at Qylur Intelligent Systems.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - SEP-OCT 2018