EconPapers    
Economics at your fingertips  
 

Multi-vector threats and the argument for greater convergence

Ron Chandler, Brent Hambly, Jason Holcomb, George Ressopoulos and Matthew Wharton
Additional contact information
Matthew Wharton: Strategic Accounts, Guidepost Solutions, LLC, USA

Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 1, 80-91

Abstract: Due to technological innovations and priorities to manage risk at the enterprise level, convergence is occurring between physical and information security functions, responsibilities and missions. In order to adapt to this evolving security environment and protect the organisation from multi-vector threats, information technology (IT), operational technology (OT), and physical security groups must develop trust, enhance communications and information sharing, and engage in cross-domain adaption. As the convergence occurs, organisations are experiencing more multi-vector threats from diverse actors. One area with a high potential for convergence is the security operations centre (SOC). If done properly, the combined joint security operations centre (JSOC) is the most effective way to manage security risks. This paper will address how organisations can best integrate these disparate functions, situations where this cohesion is most effective, and best practices to increase the effectiveness of this integration.

Keywords: convergence; cybersecurity; joint security operations centre (JSOC); operational technology (OT); physical security; security operations centre (SOC) (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/3440/download/ (application/pdf)
https://hstalks.com/article/3440/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:1:p:80-91

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2017:v:1:i:1:p:80-91