SJUK’s Conference Chair on the future of cyber-physical security

January 26, 2026
SJUK’s Conference Chair on the future of cyber-physical security

One of only 300 Security Specialists in the world to be awarded the highest accolade of Chartered Security Professional (CSyP).

Rick was admitted to the register in recognition of his strategic and operational capability in Protective (Physical and Personnel) security risk management.

He has an MSc in Security Management from Loughborough University.

Cyber-defence

In today’s rapidly evolving threat landscape, security disciplines can no longer operate in isolation.

Whether the focus is cyber-defence, AI-driven analytics, technical systems such as VSS or access control or physical protective security, effective risk mitigation now depends on collaboration across all domains.

Understanding how these disciplines converge is essential if organisations are to maintain a comprehensive and resilient security posture.

This is particularly evident in protective security and insider-threat management.

As a protective security consultant working with Principals (CEOs), I see first-hand how physical intrusion and cyber compromise increasingly intersect.

A determined adversary no longer needs to breach a network remotely when they can access an office, plug a device into an exposed port or exploit lax visitor-management processes.

Likewise, a cyber vulnerability can undermine even the most robust physical security programme by enabling access to building systems or credential databases.

A cohesive approach to cybersecurity and physical security

For too long, organisations have treated cybersecurity, physical security and technical security as separate domains with separate conversations.

But threats do not respect these boundaries. A cohesive approach requires shared understanding: Cyber teams must recognise that malware is often introduced via physical vectors, while physical security teams must recognise that their environments can be exploited to achieve digital compromise.

AI specialists, meanwhile, need context from both sides to design models that detect anomalies across digital and physical behaviours.

As AI becomes more deeply embedded in security operations, this collaborative mindset becomes even more important.

Reinforcing the importance of professional judgement

Technology strategist Sol Rashidi offers a clear warning: “Our roles always evolve with new technologies… but the goal was always to outsource critical tasks, not critical thinking.”

Her reminder is timely. AI is a force multiplier, but it cannot replace the professional judgement that comes from diverse teams sharing insights.

She adds: “Even if something does qualify to be solved by artificial intelligence … it still doesn’t mean you should use AI, because your infrastructure and your talent matter.”

AI must be applied thoughtfully and that requires inputs from across cyber, physical, insider-threat and technical disciplines.

Security leaders can take several practical steps to strengthen collaboration:

  1. Create cross-discipline forums: Regular sessions between cyber, physical, insider-threat and AI teams foster mutual understanding and build a shared threat narrative
  2. Map end-to-end attack surfaces: Include badge-access logs, USB ports, network data flows, camera systems and visitor procedures in a single threat model. Most attacks span more than one domain
  3. Align metrics and accountability: Joint indicators- such as correlations between physical access anomalies and digital activity – reinforce shared responsibility
  4. Develop an integrated security culture: Staff must understand that tailgating at a doorway can be as serious as opening a malicious attachment. Training should reflect the blended nature of modern threats
  5. Enable the business: Security is not about building higher walls; it is about safeguarding growth through informed, coordinated action

As AI accelerates change and adversaries become more agile, collaboration is no longer optional – it is the foundation of effective security.

The boundaries between cyber, physical and technical security are dissolving. To protect organisations in this new environment, we must move forward together.

Read Next

Security Journal UK

Subscribe Now

Subscribe
Apply
£99.99 for each year
No payment items has been selected yet