The Mandate to Bridge the Gap between Physical Security and IT

Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray has been a keynote speaker at The Great Conversation in Security. As well, Ray recently wrote an article entitled "How to Become an IT Expert" in SD&I. 

In the article, Ray provides insights into 5 key trends that will impact the integrator business model. One of them is the consummerization and simplification of implementation. At the same time he says: "For most integrators, the next few years will be a challenging time of transition for IT and managed services provision capabilities, and also for integrator business models."

ASG_CyberPhy.png

Phil Aronson, the CEO of Aronson Security Group, was asked to weigh in on Ray's outlook:

"‘IT skills’ is probably an incorrect term. What we need are solution architects, program and technology business consultants, and a bench-marking capability to ensure we help the end-user with a scorecard for evaluating the technology use case.”

His point: the new sensor-driven world and its corresponding DIY mentality, will actually create more complexity. The amount of data being generated must be collected and harmonized so that it is intelligible and actionable. 

Enjoy Ray's article and the corresponding comments from industry leaders. This will be one of many topics covered at The Great Conversation in Security in March 2018. 

How to Become an IT Expert

IT trends, technology-enabled business trends and an evolving cyber threat landscape have created a time of transition for the electronic physical security industry. As technology keeps advancing and businesses look for added value from all technology systems – including electronic physical security – how can integrators establish an appropriate level of IT capability?

In the 1990s and 2000s, the requirements for integrator IT capabilities revolved around servers, workstations, databases, LANs and corporate enterprise networking – the underlying security system technologies. The focus was primarily on infrastructure cabling requirements, product deployment expertise and follow-up service. Today, on the other hand, organizations focus less on IT infrastructure and more on applications to drive business value.

Read more at Security InfoWatch