Tag: cyber physical security

  • Conference Whispers: ISC West 2026

    Conference Whispers: ISC West 2026

    Las Vegas, NV March 23 – March 27

    Published: March 29, 2026                                      ID: TBW2164

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    As Discussed on Computer Talk Radio.

    ABSTRACT

    ISC West 2026 brought the physical cyber security community to Las Vegas and the Venetian Expo for a week of live demonstrations, field conversations, and on‑floor video. Coverage spans frictionless screening, threat detection, control infrastructure, and emerging AI and identity capabilities, reflecting how vendors are approaching scale, connectivity, and modernization across real‑world security environments globally.

    Cautions

    • Friendly reminder: this research provides examples of what was shared with us at the event, not an evaluation, validation, or recommendation of the given technology.
    • Just because a technology can do something in general doesn’t mean it will work in your environment. It is critical to validate a technology including its false positive and error rates.

    Frictionless Security

    One of our first stops was technology everyone at the show wished TSA Adopted yesterday! Xtract One Technologies enables screening without stopping and unpacking one’s bags! The technology provides an image of the person with the threat in their bag, identifies the threat and its location within the bag without slowing down pedestrian traffic through the screening gate.

    Physical security systems have a variety of access systems from badge readers to keys. The problem with keys is key management. Introducing InVue’s OneKEY, an adaptable smart key and related system. If you think the best part is only having one key, versus the notorious janitor key ring you are in for a treat! This smart key can communicate via IR to unlock devices and provide wireless energy transfer to lock mechanisms. Furthermore, every action is tracked, logged and fully auditable.

    Common to all physical security systems, is equipment that is plugged in and subject to power surge damage. DITEK was in expo hall with their exciting modular surge protection solution. The time saving feature of being able to simply replace a module after end of life versus the entire surge protector is sure to be popular. Hot Swapping modules are easier to change than a printer cartridge. Friendly reminder that licensed electrical contractors are generally required to service 120 volts and up.

    Threat Detection & Response

    Identification of objects with surveillance videos is another tough challenge that was taken on by Everon. Their combination hardware, software, and processes solution is focused on deterring unwanted activity in its protected space.

    Physical Cyber Security solutions often involve communications from the field where it can be noisy. Whether the noise comes from the chaos of the emergency or is inherit in the location such as security at an F1 race, it doesn’t matter. The human voice communication must still be possible! Roanwell Corporation also shared their adjustable noise suppression solution leveraged by security personnel, first responders, fire fighters, and war fighters like.

    These threat detection and response systems also cannot function in isolation. They must stay connected Teal.io’s eSIM solution provides the ultimate in reliable mission-critical connectivity. Their global technology ensures devices always connect to the best available network. The best part? Their solution frictionlessly provides connectivity so surveillance and robotics solutions can effectively stay in communication. 

    At the other end of the spectrum, some organizations require surveillance systems that are deliberately disconnected. RGB Spectrum provides air‑gapped security for surveillance environments designed to operate on isolated networks—or no network at all. By leveraging unidirectional HDMI sharing, RGB Spectrum demonstrated an approach intended to prevent external access paths, positioning the system, by their design, as resistant to remote compromise.

    Control Centers & Infrastructure

    Scaling is their middle name at Matrix ComSec. Matrix ComSec manufactures surveillance cameras and access control hardware with a system capacity of 4 to 96 channels. To provide further context, a single gadget can support up to 255 doors.

    Focusing on the control center and providing a unified pane of glass for clients, Hartman Controls welcomed all with their booth right outside Expo Hall’s Main Entrance. Established in 1998, Hartman’s engineering-first approach provides hardware flexibility offering traditional and edge-style enclosures. The solution can be deployed on premise, the cloud and is easy to migrate in either direction should your architecture and requirements change.

    Maintain the theme of cloud or on-premise availability, Keri Systems shared their Open Platform for access solutions. In addition, Keri’s flexibility enables it to support up to 12-13 different hardware platforms. Furthermore, the product is built to explicitly support multiple vertical markets.

    One difficulty in purchasing security equipment is many of the manufacturers started in one sector such as fire. Then after success they expanded by creating another isolated division for go to market. Napco took a different approach. Napco is an integrated security manufacturer providing a single ecosystems spanning fire alarms, access control, security systems, and locks.

    Many organizations regardless of their size may not be large buyers when it comes to physical security equipment. In these circumstances it is common for organizations to leverage buyers’ groups. PSA is a buyers group for this space with terms up to 120-day terms for its clients.

    AI, Identity, and Security Modernization

    IQSIGHT, formerly Bosch Video, operates across hardware, video management, and analytics with capabilities that now include generative AI. Their specialty? Providing the WHY behind what you are seeing through, what they like to call, careful, thoughtful, deployment of generative AI. Today, context is everything.

    Moving beyond video capture and on to surveillance intelligence, March Networks was excited to share their new brand resulting from their merger with Vivotek under the Delta Group. By layering advanced business intelligence directly onto their video surveillance systems, they are enabling organizations to transform raw visual data into actionable insights that drive operational improvements and increase profitability.

    Many organizations already have the security equipment, the cameras, and video installed. Today the challenge is getting AI for all this physical security equipment without replacing it all! Stepping up to the plate is omniQ, ready to bring AI to physical security equipment at your organization.

    Safetrust is known for being major supporters of open IoT-based ecosystems. Manufacturing advanced sensors and equipment Safetrust also produces the software to access the sensors. Their key disrupters are cloud-based firmware updates, federated identities, and an interesting neural adapter panel. This panel eliminates the need for expensive hardware panels and related copper wiring. Specifically, the neural adapter panel functions by leveraging a combination of PoE (power over ethernet), panel emulation, and direct software connection. One final exciting feature, Safetrust is incorporating Dilithium and Kyber into their technology, providing post Quantum readiness.  

    Physical Cyber Security is often a fragmented, world of antiquated hardware being asked to provide sophisticated access control. The difficulty often can be simply connecting to the device to get its data into a system to enable any type of analytics or intelligence. Braxos understands this and brought their solution to ISC West with over 200 connectors. Their connectors span elevator systems, parking management, vending machines and intercoms.

    Conference Vibe

    After over 50 videos and two dozen fact checks, our coverage of ISC West 2026 closes. Registration was quite efficient IFF you printed your badge at home and went to the correct line; otherwise it may have been a flashback to your TSA experience to get to Vegas. Overall, it was a very engaged atmosphere where attendees could literally feel the momentum of the crowd. Everyone’s meetings seems to go as planned with the expected mixture of vendors. Enjoy the walkabout to and through expo hall. Venetians standard eateries were open throughout the convention including the various Bistros and the Café Presse locations.

    We always try to bring you fresh perspective to our coverage of an event over prior coverage as well as new vendors but you will recognize many brands in the walkabout. For additional coverage in  physical cyber security, cybersecurity and identity and access management enjoy our prior coverage of ISC West, Identiverse, and Black Hat USA 2025.

    Unfortunately, the connectivity at the event was too challenging to be able to live stream. This also caused an interruption to upload  videos in the hall versus from expo hall.

    We conducted research for five additional forthcoming Whisper Reports for our clients. The playlists are unlisted but available with the video version to be distributed via YouTube Whisper Club upper tier membership area on our YouTube Channel.

    Readers and viewers wishing to experience the entire event are encouraged to view the Conference Whispers: ISC West 2026 Playlist in its entirety. The playlist will be sited in the end screen, description, and as a pinned comment of the video edition. Be sure to monitor future broadcasts editions’ of Computer Talk Radio for the forthcoming coverage of ISC West 2026.

    Finally, the video edition will conclude with gratitude towards those that contributed and a montage of responses to Bonus Question, “What’s the best part about attending ISC West live in Las Vegas?”.

    Next Year’s Conference  

    The ISC West 2027 will once again return to Las Vegas and will be held at the Venetian Expo on March 31 through April 2, 2027.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2026 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, Whisper Club, Whispers, The Answer is always in the Whispers, Vegas Convention Library, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Conference Whispers: G2E 2025

    Conference Whispers: G2E 2025

    Conference Whispers: G2E 2025

    Las Vegas, NV October 6- October 9

    Published to clients: October 10, 2025                    ID: TBW2105

    Published to readers: October 11, 2025 am                      

    Published to Email Whispers: October 11, 2025

    Public with video edition: October 12, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    “Global Gaming Expo (G2E) 2025 brought nearly 25,000 attendees to Las Vegas for a high-energy showcase of gaming innovation, regulatory tech, and casino infrastructure. TBW Advisors captured over 75 minutes of video across 81 segments, including two livestreams and a full expo hall walkthrough. Our coverage focused on the technologies shaping the future of gaming—from multilingual communication and fraud prevention to cash automation and iGaming compliance. This edition includes four unlisted Whisper Report playlists and concludes with a video montage answering: “What’s the best part about attending G2E live in Vegas?”

    The Conference

    • Nearly 25,000 attendees gathered at the Sand’s Convention Center in Las Vegas. Every aspect of gaming was included while we focused on the technology.
    • Technologies seen include anti-fraud, anti-money laundering (AML), language translation, casino management, player engagement, data center and server technology, cybersecurity, cyber + Physical security, identity, access management

    Cautions

    • Friendly reminder: this research provides examples of what was shared with us at the event, not an evaluation, validation, or recommendation of the given technology.

    Conference Vibe

    After 15,000 steps, 81 videos, and over 75 minutes of video including 2 livestreams and over 20 fact checks, our coverage of Global Gaming Expo better known as G2E 2025 closes. Registration moved quickly as the nearly 25,000 attendees waited for expo hall to open! While we did not get clearance in writing to record any sessions or keynotes, we were able to get permission to capture Expo Hall. In fact, our favorite quote of the event described expo hall as having ‘some incredibly impressive booths’. See for yourself as you enjoy our walkabout. The usual Venetian eateries were available including the café, the food marketplace and the bistro!

    We once again live streamed from on site. On Tuesday requesting those attending to find me to answer Questions 1-3, and Wednesday to let you know about upcoming events we have scheduled and to introduce all to TBW Advisors LLC, and requesting assistance. Specifically, I requested assistance on your favorite videos for my segment on the October 10th broadcast edition of Computer Talk Radio.

    While at G2E 2025, we conducted research for three additional forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.

    1. Whisper Report: What’s the next gaming tech that will change how we play?
    2. Whisper Report: What’s one casino innovation you wish existed today?
    3. Whisper Report: What’s the biggest risk in iGaming no one’s talking about? And a bonus report,
    4. Whisper Report: What’s the best part about attending G2E live in Vegas?

    Readers and viewers wishing to experience the entire event are encouraged to view the Conference Whispers: G2E 2025 Playlist in its entirety. The playlist will be sited in the end screen, description, and as a pinned comment of the video edition.

    The video edition will conclude with a montage of responses to Question 4 — “What’s the best part about attending G2E live in Vegas?” — capturing the energy and moments that made the event unforgettable.

    Exhibits

    Our favorite quote of the event was, “there are some impressive booths in Expo Hall”. From designers showing how your high roller room should really look to chairs for patrons, uniforms for staff, lawyers and accountants specializing in the Gaming ecosystem —  everyone was there. At TBW Advisors LLC we of course focused on the technology that tells the story. Commencing with agilysis, they have a solution that can run the entire resort including scheduling and handling advanced amenity types from golfing to spas. Prefer to focus on gaming data organization? CCT is ready to jump in and partner. They organization all your data from casino operations; from the cage through revenue audit.

    If you want to make sure everyone working at the resort can communicate reliable across any language barrier, Relay should be on your evaluation list. Relay offers a software cloud-based solutions that enables capabilities not normally available in traditional telecommunication solutions. If you would like to clean up the air in the casino, QleanAir’s smoke free cabin demonstrated their technologies capabilities.

    Physical Casinos mean physical payments. Those physical payments may mean your client may have to get up to go to the ATM or counter if their players card runs out. Pavillion Payments would like you to know – this inconvenience is no longer required. Introducing Apple Pay at the machine by Pavillion Payments. If your challenge is in counting the cash that comes into the casino, JCM has a solution including multiple Six-Axis Robots – enjoy the demo! If you would prefer to leverage the same cash counting technology the Federal Reserve in the US leverages, then Giesecke + Devrient were in expo hall ready to show you their highly trusted solution.

    Physical Casinos not only must count but secure the cash, chips, and machines. Regulations require very strict key and asset management. Fortunately, companies such as Traka were in expo hall to share their solution which not only manages keys but ensures compliance. Those seeking additional information on physical cyber security are directed to our ISC West Coverage. Druvstar provides cybersecurity and data security for your gaming needs solution created by actual former CIOs and CTOs in the gaming industry. Those seeking additional information on cybersecurity are directed toward our coverage of Black Hat. Speaking of data, Seon leverages over 909 first party data sources to help you stop fraud. Clients may recall when we first covered Seon during our coverage of Fintech Meetup 2024.

    iGaming regulations frequently require one to keep the data in country to be compliant. If your expansion plans are hindered by finding data centers in remote locations, Continent 8 Technologies should be on your radar. Trying to maintain compliance in all those exotic iGaming locations? eCOGRA operates anywhere in the world iGaming is allowed – over 50 territories. If however, you are seeking durable, rugged hardware that can be custom created to your needs, Radeus labs was in expo hall looking to meet you. For anyone seeking to understand the ‘why’ behind a player’s actions, fullstory has a solution for you. But if maintaining a player’s engagement during play within the app and you don’t want to build out a new team. Perhaps you are seeking player engagement out of the box? Plotline has an intelligent tool ready for you to leverage. Seeking a platform to build and entire game? Want that game to be equally available for iGaming as it is on land for Casinos? Perhaps with the same exact play as well? Then incisor brought the exact development platform you have been seeking to G2E this year!

    Next Year’s Conference  

    Global Gaming Expo 2026 will once again return to Las Vegas and will be held at Sands’ Convention center at the Venetian on September 28 through October 1, 2026. G2E also shared that G2E 2027 will be held September 27 September 30 with G2E 2028 being held October 9-12.

    Related playlists and Publication

    Conference Whispers: Black Hat USA 2025

    Conference Whispers: Identiverse 2025

    Conference Whispers: ISC West 2025

    Conference Whispers: Fintech Meetup 2025

    Conference Whispers: Infocom

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    TBW Advisors Logo

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 

    Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 

    Published to clients: May 20, 2025                                               ID: 2073

    Published to Readers: May 21, 2025

    Email Whispers: June 13, 2025  

    Video Edition: June 13, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    As cyber and physical security continue to merge, proactive, multi-layered strategies are essential to safeguard critical assets in interconnected environments. Secure data practices, including encryption for data in transit and at rest, during compute, and ensure compliance with high security standards. Architectural resilience is crucial, integrating cybersecurity from the outset rather than retrofitting outdated systems. Correlating physical and cyber events provides valuable context. Finaly, digitizing workflows streamlines response efficiency, minimizing the window of vulnerability during attacks.

    Target Audience Titles:

    • Chief Technology Officer, Chief Security Officer
    • Chief Information and Security Officer, VP of Cybersecurity
    • Director Cyber Physical Security, Security Analyst
    • Cybersecurity Engineer, Incident Response Analyst

    Key Takeaways

    • Data must be encrypted at rest, in transit, and during execution.
    • Cyber Physical security requires a securely designed architecture from the start.
    • Cyber and physical threats must be correlated.
    • Only a digitized workflow can respond with the required speed to cyber physical threats.

    Secure data

    As with all security, cyber physical security must also be concerned with, “ data security and encryption … that’s data in the device, data in transit, data in rest at the servers, and so all of those things we have the highest level standards and we also meet more advanced requirements, “ Bioconnect’s Edsel Shreve. The solution should be flexible enough to enable any data protection requirements that come into play. Edsel Shreve went on to further explain, “for example you need to do certificate rotation for things like TLS encryption So we can do those things not every customer wants them but those are the things that we’ve actually got in our system for the folks that have those higher level requirements so it really is the combination of how do we make sure that they’re cyber secure sitting on the network and then how do we make sure that they’re  physically and the data is secure on the on the readers and devices themselves.” In addition, TBW Advisors LLC recommends confidential computing architectures for protection and privacy during computations. For additional information see Industry Whispers: Public is Private – Confidential Computing in the Cloud.

    Secure Architecture

    Taking a 1968 mustang and updating it to 2025 safety standards would be quite the challenge and likely land up with an ugly beast that is neither safe nor resembling of a mustang. Cyber physical security is no different than safety. It must be thought of and integrated from the very beginning. As LVT’s Steve Lindsey explained, “it starts with architecture if we can rethink our architectures and we can start building for cyber security in mind.” The challenge of physical cyber security is that, “for the longest time in the physical security space we’ve been using on premise systems and as we’ve lifted and shifted those into the cloud ..  what complicates that is as we’re deploying these systems it’ not just cloud to end User, it’s Cloud to IoT (Internet of Things) device which is going through usually public cellular or satellite infrastructure itself and there’s other things that need to be done to address that” Steve Lindsey.


    Correlate Physical Cyber Events

    The real power of cyber physical security is the two areas working together to correlate events. Through correlation, context and a greater understanding is realized. An example shared by Advancis’ Paul Shanks demonstrates this best. “Someone loses their badge and falls out of their pocket and they’re logged into the network from home and their badge is used at the building. Those two  events by themselves are benign but we take that together and create a an alert for the operator to look into whether is it a Cyber attack or is it a physical attack.”

    Digitize Workflow

    As early as 2019 TBW Advisors LLC has been advising clients to automate security responses when possible for the simple fact you must. Ransomware attacks were already taking place within a 35-minute window. In 2025 the cyber physical attack vector also calls for automation or a digitized workflow at the very least. As Advancis’ Paul Shanks communicated, “we can take that and make that workflow digitized so that all they have to do is read click and go. Simple as that.”

    Related playlists

    1. Industry Whispers: Public is Private – Confidential Computing in the Cloud | TBW ADVISO RS
    2. Conference Whispers: Black Hat USA 2019
    3. Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 
    4. Conference Whispers: ISC West 2025
    TBW Advisors LLC logo

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.