Cyber-physical security, like healthcare tech, must carefully manage PII. Experts highlight privacy-preserving biometrics, user-controlled consent, and anonymous face matching. Regulatory compliance, such as GDPR, drives standardization and innovation. As laws vary by region, adaptable and consistent global system architectures are essential for scalable, secure, and compliant operations.
As cyber and physical security continue to merge, proactive, multi-layered strategies are essential to safeguard critical assets in interconnected environments. Secure data practices, including encryption for data in transit and at rest, during compute, and ensure compliance with high security standards. Architectural resilience is crucial, integrating cybersecurity from the outset rather than retrofitting outdated systems. Correlating physical and cyber events provides valuable context. Finaly, digitizing workflows streamlines response efficiency, minimizing the window of vulnerability during attacks.
Target Audience Titles:
Chief Technology Officer, Chief Security Officer
Chief Information and Security Officer, VP of Cybersecurity
Director Cyber Physical Security, Security Analyst
Cybersecurity Engineer, Incident Response Analyst
Key Takeaways
Data must be encrypted at rest, in transit, and during execution.
Cyber Physical security requires a securely designed architecture from the start.
Cyber and physical threats must be correlated.
Only a digitized workflow can respond with the required speed to cyber physical threats.
As with all security, cyber physical security must also be concerned with, “ data security and encryption … that’s data in the device, data in transit, data in rest at the servers, and so all of those things we have the highest level standards and we also meet more advanced requirements, “ Bioconnect’s Edsel Shreve. The solution should be flexible enough to enable any data protection requirements that come into play. Edsel Shreve went on to further explain, “for example you need to do certificate rotation for things like TLS encryption So we can do those things not every customer wants them but those are the things that we’ve actually got in our system for the folks that have those higher level requirements so it really is the combination of how do we make sure that they’re cyber secure sitting on the network and then how do we make sure that they’re physically and the data is secure on the on the readers and devices themselves.” In addition, TBW Advisors LLC recommends confidential computing architectures for protection and privacy during computations. For additional information see Industry Whispers: Public is Private – Confidential Computing in the Cloud.
Taking a 1968 mustang and updating it to 2025 safety standards would be quite the challenge and likely land up with an ugly beast that is neither safe nor resembling of a mustang. Cyber physical security is no different than safety. It must be thought of and integrated from the very beginning. As LVT’s Steve Lindsey explained, “it starts with architecture if we can rethink our architectures and we can start building for cyber security in mind.” The challenge of physical cyber security is that, “for the longest time in the physical security space we’ve been using on premise systems and as we’ve lifted and shifted those into the cloud .. what complicates that is as we’re deploying these systems it’ not just cloud to end User, it’s Cloud to IoT (Internet of Things) device which is going through usually public cellular or satellite infrastructure itself and there’s other things that need to be done to address that” Steve Lindsey.
The real power of cyber physical security is the two areas working together to correlate events. Through correlation, context and a greater understanding is realized. An example shared by Advancis’ Paul Shanks demonstrates this best. “Someone loses their badge and falls out of their pocket and they’re logged into the network from home and their badge is used at the building. Those two events by themselves are benign but we take that together and create a an alert for the operator to look into whether is it a Cyber attack or is it a physical attack.”
As early as 2019 TBW Advisors LLC has been advising clients to automate security responses when possible for the simple fact you must. Ransomware attacks were already taking place within a 35-minute window. In 2025 the cyber physical attack vector also calls for automation or a digitized workflow at the very least. As Advancis’ Paul Shanks communicated, “we can take that and make that workflow digitized so that all they have to do is read click and go. Simple as that.”
Publicly Published with video edition: July 28. 2025 2pm.
Analyst(s): Dr. Doreen Galli
Photojournalist(s): Dr. Doreen Galli
Abstract:
After capturing almost 50 videos, over 150 minutes of content and countless shorts forthcoming, our coverage of ISC West 2025 closes. Attendees gathered for ISC West 2025 held in Las Vegas March 31-April 4. The event featured innovations in video surveillance, driver-assisted systems, palm vein identity solutions, edge AI, and gunshot detection. Exhibits included AI vision, camera intelligence, and layered security solutions. TBW Advisors was able to capture exclusive content from the live sessions as well as full details on top products at exclusive Press Briefings.
Cautions
ISC West offers the option to print your badge at home. It is important to note that you not only need your badge holder and lanyard on site, but you still must wait in the registration line. Specifically, you must present and verify your ID to get a sticker on your badge for it to be useful. IF you only snag the badge holder, you will land up back at the long registration lines.
Our coverage of ISC West 2025 includes over 38 videos and over 150 minutes of video content spanning session summaries, product overviews, and answers to three urgent questions. There will be countless shorts forthcoming so save the entire Conference Whispers: ISC West 2025 playlists by clicking on the book mark symbol. Registration was quite interesting for the x attendees as one could print the badge at home but still required face to face registration to get the validation sticker. Held at Venetian, the customary Venetian Café Presse was open as well as the Venetian Food Marketplaces within expo hall if you got hungry. The event seemed to exceptionally crowded as you can feel as all waited for expo* hall to open and was loud enough to trigger a 100db warning on my watch. Upon clearing security, endless exhibits featuring massive amounts of vision AI, AI video analysis, IoT sensor data, and complex security identity solutions bridging the physical and cyber worlds.
While at ISC West, we conducted research for three forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.
We are excited to share that we have two exclusive pieces of content where the presenters gave a special overview just for TBW Advisors LLC, our clients, and subscribers. First, we have the session by Intel RealSense. This session focused on the combination the long history in vision and the long history of AI together to successfully create the current generation of facial recognition for the purpose of useful Identity and Access Management via the biometric field of one’s face. Keep in mind, data representing one’s face is PII or personally identifiable information. While not healthcare, the protection of PII requires the same care as all PII data as discussed during our coverage of Conference Whispers: HIMSS 25.
The second session summary we were also treated to includes a look at when cyber and physical security combine. Operations and IT coordinating to achieve a business function is quite common. As anyone who has been a corporate CIO in an organization with physical buildings knows, security is security. Physical security must interface with IT systems to understand who is permitted to do what. Historically, if physical security fails, IT systems are always at a higher risk due to information being left around or the increased attack surfaces made available via the ability to physically access a network terminal or a server itself depending on the organization. In 2025, the rush to get data from everything connected to survive the pandemic or to rush ahead with AI solutions has increased possible attack surfaces. The confluence of these scenarios together has made the Cyber Physical Security practice space blossom so expect to hear and see a lot more in this space for the foreseeable future.
Whenever given the chance, we try to bring unique content and details about the companies at the conferences to you. At ISC West we were able to attend a special, press only event held by Taiwan Excellence better known as Taitra. Taitra’s mission is to help spread the word around the world about innovations coming out of Taiwan by featuring some of their companies. The editor in Chief for Security Today Magazine, Ralph Jensen also spoke at this event to kick it off. We were able to capture the full 10-minute presentations for each of the 6 technologies featured!
The first technology featured is Cyberlink. Cyberlink provides extensive video surveillance capabilities including the ability to successfully track people. In the event of a violent attack or a lost child, finding the desired human being from all the surveillance video available can be quite timely without the right technology. Cyberlink’s people tracking works even if the face is not visible on the video through posture, clothing, or body movement signature.
Advanced driver-assisted systems (ADAS) are popular in automobiles but for larger vehicles it is still newer due to the complexity and size of semi-trucks. EverFocus gave the press an in-depth overview of their current solution including the company’s success in obtaining many Taiwan and global certifications enabling deployment.
The third technology presented at the event was Himax with their palm vein identity solution. As this contactless solution works even if a surgeon has scrubbed for surgery and put on their two pairs of surgical gloves, this technology could have easily been featured at HIMSS25 or Identiverse. Himax is not only known for their palm vein identity solution but also for their ultralow power AI processor that runs their solution and is available on the market as WiseEye.
The fourth and fifth companies presenting both featured edge solutions. Kneron featured a general-purpose secure full stack edge AI solution that support AI services at the edge for a large variety of use cases. One example is combing standard RGB video with thermal camera information for a cohesive image to properly identity living beings or animals in the camera’s view. Likewise, Vivotek specializes in IP Surveillance solutions including network cameras, network video recorders (NVRs) and related software solutions and accessories.
The product mix set at ISC West is interesting as it spans AI vision, Camera Intelligence, surveillance, and identity. Let’s start with the best in show new product two-time award winner, Vaidio. Vaidio provides an AI vision platform leveraging their deep AI expertise. Their belief is you should be able to point a camera at anything and make it safer. Safr is a vision AI solution focuses on facial recognition and liveness verification for live video including watchlist alarms. We also had an extensive booth tour by Intel RealSense. As you can see, their solution is quite easy to integrate for developers. Enrolment is quite simple. Their chip/software solution is integrated into many of the products on the floor. They also provided a live demonstration of their solution in action. If you are famous or a high NetWorth individual and you are not comfortable with your personal identity or other information floating around the web, 360 Privacy was there with their solution.
Advancis is 30-year-old company that provides a one-stop identity solution that focuses on integrating as many hardware devises as possible. It currently can integrate with over 550 hardware devices on which it can capture and verify credentials. They add support for approximately 30 devices each year. Also playing in the Physical Identity and Access Management (PIAM) space is RightCrowd. RightCrowd specializes in complex scenarios for organizations with many employees, many visitors across many locations. For those seeking a PIAM solution leveraging facial recognition or fingerprints, Bioconnect might be on your radar. Bioconnect integrates with the top 8 IAM platforms in the market. For a layered security approach, dormakaba provided TBW Advisors LLC with an exclusive booth tour walking through their offering and various layers. If any of the biometric or other identity information needs to be put on a secure card with any of the contact and contactless embedded technology, Dascom was on site. Their printer can securely hold up to 200 finished product cards until a batch is completed and retrieved.
Diving more into the physical security aspects, LVT provides a mobile security unit that is rapidly deployable. LVT’s low power solution leverages cellular connectivity and high scalability for future proofing its deployment. Underneath the surface, LVT leverage the latest in agentic AI capabilities within its solution to provide these advanced capabilities. Another agentic AI solution that
stops threats without human intervention based on video surveillance, Spot.ai might be on your radar. As an Agentic AI solution, Spot.ai not only detects an issue but can automatically handle the threat in 90% of the cases. Specifically, the solution will automatically be able to execute things like intimidating announcements, spotlights on, and following the potential threat as well as turn on sirens. The solution notifies a humans if the automation determents fail.
Finally, if safety and security means identification of a gun shot and its source, Databuoy was on hand. With technology funded by DARPA, their solution is just as effective in your closest metropolitan area as it is in a urban combat.
ISC West 2026 conference will once again be held at the Venetian in Las Vegas, Nevada. The dates are yet to be announced for 2026.
*When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.
Analyst(s) and Photojournalist: Doreen Galli, PhD MBA
ABSTRACT
After 400 minutes of filming, 30 videos, countless shorts and over 30 factchecks, our coverage of this years’ Smart Retail Tech Expo 2024 closes. Smart Retail Tech Expo is part of 5 conferences held at once at the same time and place: White Label, Retail, Supply Chain and Logistics Expo, Smart Retail Tech, Ecommerce Packaging and Labelling and Com Business Live. It was held in Las Vegas from May 8 to May 9 at the South Lower Hall of the Las Vegas Convention Center (LVCC). The event featured 5 theaters with each featuring 4-5 talks each day for a total of 47 keynote sessions. With discussion on distribution and logistics and vendors for every step of the journey, one could launch a new business with the contacts from this event alone.
After 2 days of filming some 400 minutes of content, 30 videos with endless shorts coming and over 30 factchecks, our coverage of this years’ Smart Retail Tech Expo closes. The event is five events held at once all together. White Label, Retail, Supply chain and Logistics Expo, Smart Retail Tech, E-Commerce Packaging and Labelling and Com Business Live. With row after row of exhibits*, the event was made whole by the balanced combination of talks and exhibits. Even better, there was 15 minutes in between the talks so one could catch the exhibits. Furthermore, all theaters schedules were once again aligned in the event you wanted to switch theaters as well.
The short two-day event packs a punch with 5 keynote theatres each featuring 4 or 5 talks a day for a whopping 47 sessions. The first day was supposed to be capped off by a presentation Presidential candidate Robert Kennedy but it was cancelled purportedly due to security concerns. We captured 30 videos that will result in a lot of great shorts so be sure to save the entire playlist of videos for Conference Whispers: Smart Retail Tech Expo. We were able to capture the walkabout of the entire conference right at the conference’s grand opening. If you are wondering what was to eat at the show, we have you covered with video of the food lines and menus.
The keynotes at this smaller event were quite impressive and featured talks from Google, AWS, Home Depot, Lenova, and ASCM (Association of Supply Chain Management) to name a few. Douglas Kent of ASCM (Association of Supply Chain Management) shared top supply chain trends during his keynote. Jesus Sanchez from Google show the many ways in which you can put Google AI to work for you for your retail solution. It is all about optimizing marketing expenses. He also shared the interesting statistic that 15% of all searches are unique. Amazon’s Justin Honaman shared the many ways AWS Gen AI is being leveraged for innovation in retail and CPG. Phil Pench of DHL ecommerce shared an interesting talk with the list of options for the end of the supply chain particularly for those importing goods.
Home Depot’s Paul Ganz shared the ripple effect of failing a customer. He reminded all that you only get one chance to take care of your customer. That once the customer bought the product, you are handling their item – not yours and it should be treated as such. Chewy’s Debarati Das gave a detailed talk highlighting the complexities of inventory management in the context of the corporate goals and customer satisfaction requirements. There were many people waiting to speak with this speaker following the talk. Kevin Lawton of @thenewwarehouse examined the question of doing fulfillment from the retail location versus a warehouse. Admittedly, this talk reminded me of a patent I was awarded as an IBM Engineer on this exact topic in the heart of the dot com era.
While many of the exhibits focused on the White Label portion of the show were captured in the walkabout, there was no technology for us to cover. Nonetheless, we discovered quite a bit of tech to capture. If you need to make a professional video to sell your wares or any other services in getting your product to market, newegg was on display with media, sellingpilot, and marketplace. If you are not sure about the size of the object you are selling, vMeasure was on site. vMeasure leverages cameras, sensors and scales with some great AI /ML models to provide the size of the object.
If one is selling something in a store, are instead display, Retail Media Management was there to share their digital signs and smart retail tags. One only needs to change the price online, and all price tags will automatically update. They are reported to have a 5-year battery life. Admittedly, we know days of batteries in such electronics is limited as glass can now capture energy from thin air as seen in our coverage at CES. Another digital sign company, Hongzhou had a smart menu kiosk on exhibit. This kiosk not only takes the order and payment but coordinates the order to the kitchen staff. Limited staff but want to open a pizza joint? Pzza has an automated solution to make commercial pizzas that only requires one employee to run the shop. This exhibit gave us flashbacks to the automatic stir fry tech we saw at CES, Techmagic. If you would like to bring home the bacon instead of serving it, Bacon Tech was on site with their staffing and employee management mobile application. If your retail business involves CBD, Argyle Payments was on hand to help you with your banking needs.
To secure a retail space, many require video surveillance. LVT remote surveillance with their solar panel powered solution complete with simple intelligence was on the floor. This intelligence is leverages to identify objects in the video and notify as appropriate. Is your business is looking for warehouse space AND will create 10 jobs or more? Global Site Location Industries collaborates with municipalities around the country. This collaboration allows Global Site Location Industries to offer their assistance for free.
If you warehouse scanners or other mobile technology is missing or you need an extra, ASR Tech was on site and can fix anything. If simply cannot find your products in your warehouse or want to monitor them through the supply chain, Lyngsoe Systems passive RFID has a solution for you. RFID has come a long way with stickers at just .05 each. We also heard about Cirro Fulfillment’s Smart robots as they were to enhance the supply chain. SRSI shared their automated storage and retrieval technology available in all 50 states. In fact, SRSI handles all technology available within the 4 walls of the warehouse. Goods was on display to remind you to focus on your business with their integrated solution handling inventory management, order management, and warehouse management.
As a conference about logistics, there were many logistics companies! Fellowship logistics shared that they can reach 99% of the US in 2 days and 75% in 1 day. Meanwhile, ExFreight was sharing that they provide 100% online capabilities for their entire service logistics offering to 175 countries. C&C logistics serves all continental US and Mexico and can move anything from a single pallet to an entire warehouse.
There were vendors on display with technology for every aspect of your retail business. Shopline intelligent offered a unified commerce platform. There was also a solution called iVision to automate customer loyalty. Admittedly, both solutions intelligence is not yet fully realized compared to many of the technologies analyzed at the Adobe Summit or even Fintech Meetup.
Smart Retail Tech Expo comes to Las Vegas every year. The next Smart Retail Tech Expo will occur April 16 and 17th, 2025, in Las Vegas, NV at the Las Vegas Convention Center.
*When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.