www.dataminr.com Open in urlscan Pro
104.18.9.133  Public Scan

Submitted URL: https://go.dataminr.com/e3t/Ctc/2L+113/cPC-f04/VWdJys65h51KN1G_Hv0_B13SW8mS6hr5dPhr9N6tf6Wg5m_5PW50kH_H6lZ3lxVjvbJk77vh6...
Effective URL: https://www.dataminr.com/resources/insight/what-is-cyber-physical-security-convergence/?utm_campaign=Cyber-Converged-Nurt...
Submission: On May 07 via api from IE — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.dataminr.com/

<form method="get" action="https://www.dataminr.com/">
  <input data-rlvlive="true" data-rlvparentel="#rlvlive" data-rlvconfig="default" type="text" name="s" placeholder="Search" value="" autocomplete="off" aria-owns="relevanssi_live_search_results_6639ea1023cec" aria-autocomplete="both">
  <button type="submit">
    <svg width="19" height="20" viewBox="0 0 19 20" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g clip-path="url(#clip0_891_54756)">
        <path
          d="M13.2103 12.9252L18.3445 18.0583C18.4457 18.1631 18.5017 18.3034 18.5005 18.4491C18.4992 18.5948 18.4408 18.7342 18.3377 18.8372C18.2347 18.9403 18.0953 18.9987 17.9496 19C17.8039 19.0012 17.6636 18.9452 17.5588 18.844L12.4246 13.7098C11.0062 14.925 9.17223 15.5437 7.30757 15.4359C5.4429 15.3281 3.69245 14.5023 2.42354 13.1317C1.15463 11.7611 0.465881 9.95236 0.501828 8.08493C0.537774 6.2175 1.29562 4.43657 2.61634 3.11585C3.93706 1.79513 5.71799 1.03729 7.58542 1.00134C9.45285 0.965393 11.2616 1.65414 12.6322 2.92305C14.0028 4.19197 14.8286 5.94241 14.9364 7.80708C15.0442 9.67174 14.4255 11.5057 13.2103 12.9241V12.9252ZM7.72454 14.3366C9.3457 14.3366 10.9005 13.6926 12.0468 12.5463C13.1931 11.4 13.8371 9.84521 13.8371 8.22405C13.8371 6.60289 13.1931 5.04813 12.0468 3.9018C10.9005 2.75547 9.3457 2.11147 7.72454 2.11147C6.10338 2.11147 4.54862 2.75547 3.40229 3.9018C2.25596 5.04813 1.61196 6.60289 1.61196 8.22405C1.61196 9.84521 2.25596 11.4 3.40229 12.5463C4.54862 13.6926 6.10338 14.3366 7.72454 14.3366Z"
          fill="white"></path>
      </g>
      <defs>
        <clipPath id="clip0_891_54756">
          <rect width="19" height="19" fill="white" transform="translate(0.000488281 0.5)"></rect>
        </clipPath>
      </defs>
    </svg> </button>
  <div id="rlvlive">
    <div aria-expanded="false" aria-live="polite" class="relevanssi-live-search-results" id="relevanssi_live_search_results_6639ea1023cec" role="listbox" tabindex="0" style="left: 799.359px; top: 131.5px; width: 468px;">
      <div class="live-ajax-messages">
        <div id="relevanssi-live-ajax-search-spinner"></div>
      </div>
      <div class="ajax-results"></div>
    </div>
  </div>
</form>

Text Content

Search
Quick links
 * Dataminr Pulse
 * First Alert
 * Resources
 * Support

 * Products
    * Dataminr Pulse
      
      Enables businesses to plan for and respond to multidimensional risks—from
      physical and cyber to operational and geopolitical—that impact their
      people, critical assets and operations.
   
    * First Alert
      
      Alerts first responders to breaking events, enabling the fastest real-time
      response.
   
    * Dataminr for News
      
      Helps journalists in over 1,500 newsrooms to break news on the stories
      that matter most to their audiences.
   
   Video
   
   
   DATAMINR LAUNCHES REGENAI
   
   The first Generative AI that automatically regenerates in real-time as events
   unfold
   
   Learn more
 * AI Platform
 * Partners
   Partners
   
   Dataminr partners can leverage our groundbreaking real-time AI platform to
   expand the breadth of their product offerings, enter new industry verticals,
   market segments and geographies and accelerate business results.
   
    * Platform
      
      Leverage Dataminr's market-leading AI platform—which processes billions of
      public data units daily to deliver real-time alerts on high-impact events
      and emerging risks—to deliver enhanced value for your customers across a
      broad array of use cases.
   
    * Channel
      
      Harness the power of real-time information discovery to unlock new market
      opportunities—for you and your customers.
   
   Insight
   
   
   3 KEY PILLARS OF BUSINESS RESILIENCE
   
   Organizational, technological and operational resilience are key pillars to
   building overall business resilience, says survey of global senior business
   leaders.
   
   Learn more
 * Resources
    * Resource center
    * Blog
    * Events
   
   Resource by topic
    * Business Resilience
    * Cybersecurity
    * Security Operations
    * Public Sector
   
   Resource by type
    * On-demand Webinars
    * Case Studies
    * Insights
    * Ebooks
   
   Video
   
   
   AI IN ACTION: A CONVERSATION WITH AMTRAK
   
   Learn more
 * Company
    * About us
      
      Dataminr’s AI platform delivers the earliest warnings on high impact
      events and critical information far in advance of other sources.
   
    * Social good
      
      Humanitarian organizations and nonprofits can know first, act faster and
      better serve the world's most vulnerable.
   
    * Customers
    * DEI
    * Leadership
    * Press
    * Contact us
   
   Press
   
   
   DATAMINR UNVEILS REGENAI, THE FIRST GENERATIVE AI THAT AUTOMATICALLY
   REGENERATES IN REAL TIME
   
   ReGenAI transforms rapidly unfolding multidimensional events into dynamically
   updating event briefs.
   
   Learn more
 * Careers
   Careers
   
   Join our team—and help organizations harness the power of real-time
   information.
   
    * Sales
      
      Accelerate our next phase of growth.
   
    * Engineering
      
      Build world-class products with real-world impacts.
   
    * View All Roles
      
      Join our team and help organizations leverage AI-powered real-time
      information to mitigate risk
   
   Announcement
   
   
   DEI IMPACT REPORT: DIVERSITY, EQUITY AND INCLUSION AT DATAMINR
   
   Dataminr’s inaugural DEI Impact Report, which showcases the work we’ve done
   and continue to do to create a more diverse, equitable and inclusive
   workplace.
   
   Learn more

Support Login
Request a demo
Home Resources What Is Cyber-Physical Security Convergence?


WHAT IS CYBER-PHYSICAL SECURITY CONVERGENCE?

Dataminr explains cyber-physical security convergence, why cyber-physical risks
are increasing and how governments, industry and organizations are responding.

 * Cyber-physical security convergence explained
 * The cyber-physical risk spectrum
 * The evolution of converged security
 * Global response to converged risks
 * Prepare for and protect against cyber-physical risks

Cybersecurity

Cyber-physical security convergence is not a new concept but it is increasingly
gaining attention from security leaders—in both the private and public sectors.
Here, we explore what converged security entails and how to achieve and
strengthen cyber-physical resilience.

--------------------------------------------------------------------------------


CYBER-PHYSICAL SECURITY CONVERGENCE EXPLAINED

In February, a cyber attack forced a network of Florida healthcare organizations
to divert several of its emergency patients to other facilities and cancel many
of its non-emergency surgeries. This attack, the latest in a number of cyber
crimes aimed at U.S. healthcare providers in the past few years, is an example
of the rapidly increasing cyber-physical risks that organizations—both in the
public and private sector—are facing today.

According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA),
these risks are defined as those that have ramifications in both the digital and
physical domains. While the threat can emanate from either domain,
cyber-physical risks often begin with a cyber threat vector, such as a
ransomware attack, and then spill over into the physical world. 

When threats in the digital and physical domains converge, the consequences are
often real and significant as evidenced by the attack on the Florida healthcare
system. 

Other times, cyber-physical risks lead to major business disruption. For
example, when global software company Kaseya was hit with a ransomware attack in
2021, more than a thousand of its clients and its clients’ customers were
affected, including Sweden’s largest grocery chain. It had to shut down 800 of
its stores as a result. 

--------------------------------------------------------------------------------


CYBER-PHYSICAL SECURITY CONVERGENCE VS. SECURITY CONVERGENCE

Although related, there is a distinct difference between cyber-physical security
convergence and security convergence.

 * Cyber-physical security convergence: The increasingly blurred line between
   risks in the cyber and physical domains, whereby a risk that originates in
   one domain has a significant impact on the other.
 * Security convergence: When an organization’s cyber and physical security
   operations are combined into a single, unified function.

--------------------------------------------------------------------------------


THE CYBER-PHYSICAL RISK SPECTRUM

As cyber-physical risks have rapidly evolved in type, impact and scope, Dataminr
recommends organizations view them on a threat spectrum. 

On one end of the spectrum are kinetic events that have an impact on the cyber
infrastructure of organizations and industries. This includes physical threats
to information technology (IT) and operational technology (OT) infrastructure,
network and power outages, natural disasters and more. These events are not
inherently cyber-related but can have significant impact on cyber
infrastructure. 

On the opposite end are cyber events that impact the physical world, such as
cyber attacks against critical infrastructure that have varied
ramifications—ranging from inconveniences for consumers to supply chain
disruptions and third-party and vendor risk. Consider the serious ripple effects
of a ransomware attack against a manufacturing plant. For example, as
semiconductors (or chips) are vital to the operation of cars and consumer
electronics, a cyber attack against a semiconductor manufacturer is likely to
significantly disrupt the automotive and consumer electronics industries. 

In the middle of the cyber-physical risk spectrum lies geopolitical risk, with
the most notable and recent example being Russia’s invasion of Ukraine, which
has sparked ongoing cyberwarfare. 

As the conflict persists, the world has witnessed a spike in attention paid by
Russian threat actors—not only to Ukrainian assets but also industries and
countries believed to be sympathetic to Ukraine. For example, pro-Russia hacking
group Killnet has been a persistent threat in this area, especially against the
U.S. aviation industry in retaliation against the U.S.’s involvement in the war.
This includes an attack on U.S. aviation defense contractors and a DDoS attack
against more than two dozen U.S. airports.


THE EVOLUTION OF CONVERGED SECURITY

The increase in cyber-physical risks is due to both the prevalence
of IoT and OT devices, as well as the advancement of the tactics and procedures
employed by threat actors. Our society, governments and businesses across all
industries rely on these devices and the cloud much more than they did five or
10 years ago. This has created a significantly larger attack surface with new
and expanding vulnerabilities and risks that have real world consequences.

“The attack surface has rapidly expanded because our world is now flush with
cyber-physical systems that connect the digital and physical domains,” said Nate
Green, Product Marketing Director at Dataminr.  

And the stakes are high. According to the U.S. White House, cyber-physical
systems (CPS) are complex and fragile and “can easily break down or suffer from
cyber-attacks…events or attacks in one part of one system can have ripple
effects leading to banking outages, oil pipeline failures, ground-stops of whole
fleets of aircraft, and disruption of medical facilities with devastating
outcomes.” 

The pace and level of this dependence are only accelerating, making the attack
surface that threat actors can manipulate and exploit ever-growing. Take for
instance ransomware attacks. They surged by 87% in 2022 from the year before,
with energy, manufacturing and financial services as the most commonly targeted
industries by politically and/or geopolitically motivated threat actors.

As such, organizations in these industries tend to be much more forward-thinking
and innovative in how they manage cyber-physical risks to ensure business
resilience and prevent financial, operational and reputational damages. 

However, it’s important to remember that cyber-physical risks are not limited to
CPS. As mentioned earlier, physical events can greatly impact digital
infrastructure. For example, record temperatures in the U.K. and U.S. in 2022
caused a number of Google and Oracle data centers to suffer from outages. As
severe weather occurs more frequently, data centers and other critical
infrastructure become more vulnerable. Add to that the rise in cyber crimes and
ongoing geopolitical tensions, and cyber-physical risks become much more
prevalent. 


GLOBAL RESPONSE TO CONVERGED RISKS

Recognizing the surge in cyber-physical risks and the urgent need to have a more
holistic, innovative approach to respond to those threats, a number of
regulators and governments have developed new regulations and initiatives. The
U.S. has responded by creating a working group dedicated to strengthening
cyber-physical resilience with the goal of finding new approaches to the
problem; experts from academia, and the public private sectors will be
consulted.

The European Union is following suit. In December 2022, the European Commission
issued the new NIS2 Directive, which seeks to boost cyber and physical
resilience of EU critical entities and networks by expanding the sectors and
types of entities falling under its scope. These include digital infrastructure
such as public electronic communications networks and services, as well as
physical infrastructure like manufacturing of critical products, and postal and
courier services.

More businesses are also realizing the impacts of cyber-physical threats and how
they can ultimately affect operational and business resilience. In response,
they have taken steps to ensure tighter alignment between their cyber and
physical security teams, which allows for a more holistic view of CPS and
risks. 

Some companies have done this by creating a formal security operations center
(SOC) that merges cyber and physical security teams into a single, unified
function. Others forgo combining the teams and instead focus on ensuring
effective collaboration and communication between the two, including following
best practices like sharing incident response playbooks and conducting tabletop
exercises together. 

According to the U.S. Cybersecurity and Infrastructure Agency (CISA), those that
do establish a formal means for the two security functions to work together will
be more resilient against and better prepared to identify, prevent, mitigate and
respond to cyber-physical threats.

Learn More: Why Businesses Need Converged Security Now More Than Ever


PREPARE FOR AND PROTECT AGAINST CYBER-PHYSICAL RISKS

Staying up to date on new and emerging risks is a constant challenge for any
organization, especially if the business relies on third-party vendors—such as
suppliers, manufacturers, distributors and more. Each third-party partner is a
potential attack vector. 

If a vendor has a vulnerable attack surface, it could be used to gain access to
the various organizations for which it provides services. Those organizations
are then more at risk to cyber threats such as a data breach. The more vendors a
company uses, the larger its attack surface and the more potential
vulnerabilities it can have.

To gain the earliest and clearest line of sight into such cyber-physical
threats, security operations on both the cyber and physical sides of the house
should ensure they have access to real-time alerting tools and technology.
Organizations, particularly those that have established modes of collaboration
among all security teams, are then able to quickly respond to and effectively
mitigate threats no matter the origin or type of impact. 

“It is unreliable to rely on your vendors and suppliers to inform you of a
disruptive event in a timely manner, especially if they’re the ones under
attack. Having real-time, actionable data on emerging threats to your business
and partners allows for contingency planning and faster, more proactive
responses to incidents—by hours or sometimes days,” says Green.

There are two key ways organizations better protect themselves against
cyber-physical risks:

Invest in the right tools and technology

Real-time alerting solutions are key to detecting and responding to threats as
soon as possible. Dataminr Pulse, for example, provides intelligence on
cyber-physical risks as they happen. 

For example, in the case of the aforementioned cyber attack on the U.S. aviation
industry, Pulse alerted its customers of hackers’ intent to target the airports’
network infrastructure eight hours ahead of media coverage. This allowed
customers to accelerate their response timelines. 

Businesses also need tools that enable them to assess their attack surface
(e.g., network infrastructure), practice cyber hygiene and develop robust
response playbooks. 

Acquire industry insights

This is vital. Security teams should communicate with their industry peers to
learn how they are managing cyber-physical risks. This includes asking: How are
phishing campaigns and/or ransomware groups targeting your organization? What
vulnerabilities are consistent across your industry, whether that be an
industrial control system (ICS), a customer relationship management (CRM)
platform or a specific piece of software that’s ubiquitous in your sector? 

The convergence of cyber and physical risks is not a new concept and it will
only become more prevalent due to the proliferation of OT and IoT devices.
Organizations should also keep in mind that cyber-physical risks exist in a
threat spectrum and the attack surface is ever-growing. Businesses that
understand this and take swift action to strengthen their resilience against
converged risks will be in a much better position to respond to and recover from
a threat when—not if—it occurs.  

Learn how organizations like yours use Dataminr Pulse for Cyber Risk to
strengthen resilience against cyber-physical risks.

May 19, 2023
 * 
 * 
 * 
 * 
 * 

 * Cybersecurity
 * Corporate Security
 * Cyber Risk
 * Insight

 * 
 * 
 * 
 * 
 * 


RELATED RESOURCES

Case Study


HOW THE ASSOCIATED PRESS USES DATAMINR TO PROTECT JOURNALISTS IN CONFLICT ZONES

The Associated Press (AP) uses Dataminr to gain situational awareness and assess
risk patterns in conflict or high-risk zones, allowing it to better anticipate
and plan for threats that can compromise its journalists’ safety.

Read more
eBook


DATAMINR GUIDE TO CYBER-PHYSICAL SECURITY CONVERGENCE

Dive into this comprehensive guide to cyber-physical security convergence with
definitions of cyber-physical risks, trends and tips for risk mitigation.

Download now
Insight


INNOVATE OR STAGNATE: WHY CSOS MUST EMBRACE AN INNOVATION MINDSET

Chief security officers are managing unprecedented levels of
disruption—requiring them to not just adapt, but innovate, if they are to
effectively safeguard their organization and strengthen resilience.

Read more
ALL RESOURCES

Dataminr is one of New York's top private technology companies, with employees
across six global offices.

Be the next success story
Request a demo
AI Platform

Harness the power of AI

Dataminr Pulse

For Businesses

First Alert

For Public Sector Organizations

Dataminr for News

For Newsroom

 * Company
   * Partners
   * Social Good
   * Customers
   * DEI
   * Leadership
   * Careers
   * Press
   * Contact Us

 * Resources
   * Business Resilience
   * Cybersecurity
   * Security Operations
   * Public Sector

Follow Us
 * 
 * 
 * 

@ 2024 Dataminr. All rights reserved
Do Not Sell My Privacy Information
 * Privacy policy
 * Terms of use
 * Trust
 * Modern Slavery Act Statement





OUR USE OF COOKIES

We use cookies and similar technologies for functionality,
retargeting/advertising, performance, performance/analytics, and to operate the
website. By accepting cookies you agree to our use of cookies. For more
information, review our cookie settings and our Privacy and Cookie Policy
Cookies Settings Reject Cookies (except necessary) Accept Cookies



COOKIE PREFERENCES

This preference center applies to this website. When you visit this website,
information may be stored on or retrieved from your browser, mostly in the form
of or through cookies (e.g., first party and third-party cookies) and similar
technologies (e.g., local storage, web beacons, etc.) (collectively “cookies”).
This information might be about you, your preferences, and/or your device.

The cookies may include those deployed by third parties providing services to
us. These third parties may use these cookies and the information collected in
connection therewith (including information collected on and off of our
websites), for providing services to us and also to improve, enhance, and
deliver their services to all of their customers. Click on the different
category headings below to find out more a the cookies.

We respect your right to privacy; therefore, we provide you with the ability to
choose what cookies to allow. You can toggle "on" (blue color) to allow cookies
and toggle "off" (gray color) to block cookies. Blocking cookies may impact your
experience on this website. A preference cookie will be set to record your
preferences and if you clear your cookies this will delete your preferences for
this website, and you will need to re-enter your preferences the next time you
access it. This preference center only affects cookies deployed or set through
this website.

Privacy and Cookie Policy
Allow All Cookies


MANAGE CONSENT PREFERENCES

NECESSARY COOKIES

Always Active

These cookies are necessary for websites to function and cannot be switched off
through Dataminr's cookie preference center. They are usually only set in
response to actions made by you which amount to a request for services, such as
setting your privacy preferences, logging in, or filling in forms.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies allow the website to remember information about you (e.g., a
username or ID) and the choices you make (e.g., your language preference, or the
area or region you are in) and provide enhanced, more personalized features or
content to you. These cookies can also be used to remember changes you have made
to text size, fonts, and other customizable parts of web pages. They may also be
used to provide Services you have asked for, such as watching a video or
commenting on a blog. If you do not allow these cookies or if you toggle these
cookies off, then some or all of these services or features may not function
properly. These cookies cannot track your browsing activity on other websites.

Cookies Details‎

PERFORMANCE/ANALYTICAL COOKIES

Performance/Analytical Cookies

Analytical cookies help us improve our website by collecting and reporting
information on its usage such as which pages visitors view and how visitors move
around the site.

Cookies Details‎

RETARGETING/ADVERTISING COOKIES

Retargeting/Advertising Cookies

These cookies track browsing habits (on and off of our websites and digital
properties) and are used to deliver targeted (interest-based) advertising. They
are also used to limit the number of times you see an ad and to measure the
effectiveness of advertising campaigns. They remember that you have visited a
website and this information may be shared with other organizations, such as
advertisers and Dataminr's advertising partners, who might use it with
information about how you use other websites, including identifying shared
interests and behaviors across groups of users who visit our (and other)
websites. In connection with these types of cookies, your activity may be
tracked or monitored using identifiers (e.g., a cookie ID, other unique
identification numbers). These types of cookies will typically stay on your
computer until they are deleted or until they expire (if applicable).

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎
Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject Cookies (except necessary) Confirm My Choices