{"id":48935,"date":"2016-04-12T16:56:13","date_gmt":"2016-04-12T23:56:13","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=48935"},"modified":"2025-05-28T23:35:32","modified_gmt":"2025-05-29T06:35:32","slug":"convergence-future-cyber-security","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/","title":{"rendered":"Convergence and the Future of Cyber Security"},"content":{"rendered":"<p><iframe loading=\"lazy\" title=\"CSE 2016 Future of Cyber Security by Matthew Rosenquist\" src=\"https:\/\/www.slideshare.net\/slideshow\/embed_code\/key\/kBeHcWgxU9Kob7\" width=\"427\" height=\"356\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen> <\/iframe> <\/p>\n<div style=\"margin-bottom:5px\"> <strong> <a href=\"https:\/\/www.slideshare.net\/slideshow\/cse-2016-future-of-cyber-security-by-matthew-rosenquist\/60832206\" title=\"CSE 2016 Future of Cyber Security by Matthew Rosenquist\" target=\"_blank\">CSE 2016 Future of Cyber Security by Matthew Rosenquist<\/a> <\/strong> from <strong><a href=\"https:\/\/www.slideshare.net\/MatthewRosenquist\" target=\"_blank\">Matthew Rosenquist<\/a><\/strong> <\/div>\n<p>The security industry is changing. Technology innovation is eroding the distance between the roles and responsibilities of traditionally independent physical and cyber security teams. Modern physical security tools now rely heavily on networks, clouds, firmware, and software\u2014which puts them at risk of cyber exploitation. Computing devices, no matter how well managed, are largely vulnerable to physical attacks. The biggest convergence between these two worlds comes from the rapid growth and adoption of the Internet of Things, which extends access, control, and people-safety issues to users and businesses. Transportation, critical infrastructure, health care, and other industries currently rely on strong physical controls. More and more, they will also require the same benefits from cybersecurity to achieve the common goals of protecting people\u2019s safety, property, and business assets. In the highly connected world of the near future, attacks against both physical and cyber targets will originate from far across the digital domain. Convergence is coming.<\/p>\n<p>At this year\u2019s 2016 <a href=\"http:\/\/www.iscwest.com\/Show-Info\/\">ISC West<\/a> conference, one of the largest security conferences with more than\u00a01,000 exhibitors and brands, the organizers took an aggressive step that\u00a0showed their insights to the future. The <a href=\"http:\/\/www.connectedsecurityexpo.com\/\">Connected Security Expo<\/a>, a subconference with separate tracks, began its inaugural year, bringing together for the first time both physical and cyber security professionals at ISC West. I was honored to deliver one of the two keynotes to a combined audience of security leaders who recognize the inevitable intersection of security.<\/p>\n<p>Organizations must address the combined physical and cyber threats that\u00a0they will face. Leaders require insights into the complex future of cyber security, both the challenging risks and equally lucrative opportunities, which will emerge as cyber threats maneuver over time. In my presentation I discussed how cyber security is similar to its physical counterpart, as a difficult and serious endeavor, and strives to find a balance in managing the security of computing capabilities to protect the technology that\u00a0connects and enriches the lives of everyone.<\/p>\n<h2>The 2016 &#8220;Future of Cyber Security&#8221;<\/h2>\n<p>The 2016 &#8220;Future of Cyber Security&#8221; presentation showcased the cause-and-effect relationships, provided perspectives of the forthcoming challenges the industry is likely to face, and how aligned security can be better prepared to manage it.<\/p>\n<p>A number of other notable speakers, including Mike Howard, CSO for Microsoft, shared insights with the audience. Herb Kelsey, Chief Architect at <a href=\"https:\/\/guardtime.com\/\">Guardtime<\/a>, and Nate Kube, Founder and CTO of Wurldtech, a GE Company, also presented a keynote: \u201cReducing the Time to Detect Tamper\u2013Physical Security\u2019s Mission Against Cyber Threats.\u201d They discussed the benefits and risks of the connected world, from power stations to light bulbs and everything in between. The unintended consequences will include bad actors using technology against, instead of for us. The speakers partnered to showcase the future trends and technologies in securing the promise of the Internet of Things.<\/p>\n<p>I look forward to next year&#8217;s Connected Security Expo as the audience ranks will continue to grow. Speaker topics, threats, and the synthesis of technology will be even stronger. I expect other conferences to start down the same path, in an attempt to catch up with ISC West. It makes sense because\u00a0the convergence between physical and cyber security will continue to gain momentum.<\/p>\n<p>&nbsp;<\/p>\n<p>Interested in more?\u00a0 Follow me on\u00a0<a href=\"https:\/\/twitter.com\/Matt_Rosenquist\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\">LinkedIn<\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSE 2016 Future of Cyber Security by Matthew Rosenquist from Matthew Rosenquist The security industry is changing. Technology innovation is&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,4131],"coauthors":[4136],"class_list":["post-48935","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Convergence and the Future of Cyber Security | McAfee Blog<\/title>\n<meta name=\"description\" content=\"http:\/\/www.slideshare.net\/MatthewRosenquist\/cse-2016-future-of-cyber-security-by-matthew-rosenquist The security industry is changing. Technology\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Convergence and the Future of Cyber Security | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"http:\/\/www.slideshare.net\/MatthewRosenquist\/cse-2016-future-of-cyber-security-by-matthew-rosenquist The security industry is changing. Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-12T23:56:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T06:35:32+00:00\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Convergence and the Future of Cyber Security\",\"datePublished\":\"2016-04-12T23:56:13+00:00\",\"dateModified\":\"2025-05-29T06:35:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/\"},\"wordCount\":567,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"cybersecurity\",\"Internet of Things\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/\",\"name\":\"Convergence and the Future of Cyber Security | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-04-12T23:56:13+00:00\",\"dateModified\":\"2025-05-29T06:35:32+00:00\",\"description\":\"http:\/\/www.slideshare.net\/MatthewRosenquist\/cse-2016-future-of-cyber-security-by-matthew-rosenquist The security industry is changing. Technology\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Convergence and the Future of Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Convergence and the Future of Cyber Security | McAfee Blog","description":"http:\/\/www.slideshare.net\/MatthewRosenquist\/cse-2016-future-of-cyber-security-by-matthew-rosenquist The security industry is changing. Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Convergence and the Future of Cyber Security | McAfee Blog","og_description":"http:\/\/www.slideshare.net\/MatthewRosenquist\/cse-2016-future-of-cyber-security-by-matthew-rosenquist The security industry is changing. Technology","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-04-12T23:56:13+00:00","article_modified_time":"2025-05-29T06:35:32+00:00","author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Convergence and the Future of Cyber Security","datePublished":"2016-04-12T23:56:13+00:00","dateModified":"2025-05-29T06:35:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/"},"wordCount":567,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["cybersecurity","Internet of Things"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/","name":"Convergence and the Future of Cyber Security | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-04-12T23:56:13+00:00","dateModified":"2025-05-29T06:35:32+00:00","description":"http:\/\/www.slideshare.net\/MatthewRosenquist\/cse-2016-future-of-cyber-security-by-matthew-rosenquist The security industry is changing. Technology","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/convergence-future-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Convergence and the Future of Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=48935"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48935\/revisions"}],"predecessor-version":[{"id":214683,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48935\/revisions\/214683"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=48935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=48935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=48935"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=48935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}