From Bollards to Bytes: Why Security Firms Need to Adopt a Cyber-First Approach
How can the security industry effectively navigate the shift from traditional physical security measures to adopting a cyber-first approach in its sales and integration strategies? The transition from physical to digital security solutions was a major theme at the International Security Conference & Exposition West 2024 held earlier this month.
On a recent episode of MarketScale’s roundtable show Experts Talk, Dan Gundry, the host of NOC Your SOCs Off and Senior Director of Control Room Sales, Americas at Barco, shed light on the transformative challenges facing the industry. He further highlighted the cyber-first approach that the industry needed to adopt.
“They need to understand the conversation has shifted from a speeds and feeds conversation to… a cybersecurity conversation first and foremost. Selling a platform, selling software is very different than selling bollards and fences and cameras and card readers,” Gundry said.
Article written by MarketScale.
Recent Posts
The security industry can harness technological tools to optimize workflows and to help further enhance operational efficiency. Much of that can come via retooling, and educating, the labor force to enhance operations within security and control centers. In an episode of MarketScale’s premier roundtable discussion show, Experts Talk, previewing major trends for ISC West […]
In this episode of “NOC Your SOCs Off,” host Dan Gundry explores the crucial topic of duty of care for control room operators with guests Tanya Lee and Megan Koehler of Evans Consoles. The discussion focuses on enhancing the operator experience and the responsibilities of industry professionals towards these vital yet often overlooked workers. […]
On NOC Your SOCs Off, host Dan Gundry and Barco’s Product Security Officer, Timo Kosig, discuss the evolution of product security in control room environments, emphasizing the critical distinction between corporate and product security. Highlighting the potential widespread impact of a security breach in control rooms overseeing critical infrastructure, they explore the limitations of […]