Adam Bannister

Editor, IFSEC Global

Author Bio ▼

Adam Bannister is editor of IFSEC Global. A former managing editor at Dynamis Online Media Group, he has been at the helm of the UK's leading fire and security publication since 2014.
May 10, 2019

Sign up to free email newsletters


‘Secure by default’ in the age of converged security

TrackTik Influencer Series

WATCH: Near real-time risk management is upon us, says James Willison

Security risk management and convergence expert James Willison (BA MA MSyI), recently fielded questions from Mark Folmer (CPP MSyl), VP for the security industry at TrackTik, during ASIS Europe 2019.

Part of the TrackTik Influencer Series, the conversation touches on:

  • The aspiration for achieving near real time risk management, as driven by NIST (National Institute of Standards and Technology)
  • Monitoring cyber attacks on physical devices
  • How the internet of things is compelling cybersecurity experts to seek the help of facilities staff and physical security professionals
  • The role of human operators in this emerging landscape
  • And more besides…

Willison believes today’s high-risk, myriad-threat security environment demands a converged security solution that consolidates monitoring of both physical and cybersecurity events within one, unified platform. He is taking part in a forthcoming webinar, hosted by IFSEC Global, that will discuss how this can be achieved.

Achieving near real-time risk management with a converged security centre will take place 14 May, 2.30pm. Speakers will also include Steven Kenny, industry liaison for architecture & engineering at Axis Communications; Roberto Mandanas, VP Strategic Marketing and Alliances, Vidsys; and Sarb Sembhi CISM, CISO, Virtually Informed Ltd.

The concept will also be tackled live at IFSEC 2019’s Converged Security Centre, powered by Vidsys, with partners including Micro Focus, Axis Communications and Salam Technology.



Free Download: Cybersecurity and physical security systems: how to implement best practices

If you are involved in the operation or maintenance of physical security systems, this resource from Vanderbilt will help you choose the right equipment for staying diligent. It provides a five step process for strengthening the resilience of those systems against cyber-attack, as well as explaining what cyber-attacks mean in an interconnected world.

Discover the five step process now by clicking here.

Related Topics

Leave a Reply

Notify of

Sign up to free email newsletters