Trust as the new threat vector for cybersecurity

Victoria Rees
Share this content
Proactive planning and consistent advancements will enable security teams to stay ahead of evolving risks, argues Kasia Hanson, CEO and Founder, KFactor Global Security Advisory.
Article Chapters
ToggleAI in cybersecurity
At ISC West in 2024, an audience gathered to hear about security for AI on the Bridge.
AI was permeating every aspect of our lives and Large Language Models (LLMs) was the topic of discussion around the world.
We gathered a panel of cybersecurity experts to explore the threat and opportunity of AI, with an emphasis on the significant vulnerabilities of technology and how to secure it.
During that talk, Chief Trust Officer of Hidden Layer, an AI security company proclaimed, โtrust is the new threat vectorโ, and this statement has never been truer than ever before.
According to Checkpoint Softwareโs 2025 Security Report, there has been a 44% increase in cyber-attacks amid a maturing cyber-threat ecosystem.
This is a staggering number and one that the physical security industry cannot ignore.
AI leverage
As we race into 2025, AI has brought new challenges and possibilities.
AI is an opportunity for bad actors to leverage more complex cyber-attacks, including AI-enhanced malware and increased attacks on edge devices and Industrial Control Systems (ICS).
Edge device exploitation has increased with more than 200,000 devices controlled by advanced botnets, operated by state-sponsored actors.
5G and edge security risks have emerged as new focal points for cybersecurity efforts particularly in the Internet of Things (IoT) and ICS, the Checkpoint Software 2025 Security Report says.
Originally a tactic used by nation-state actors for covert infiltration, the strategy of targeting edge devices has now been co-opted by financially motivated attackers leveraging off-the-shelf toolkits.
This approach has enabled breaches of high-value targets while remaining undetected for extended periods.
The persistent targeting of edge devices highlights a critical security gap.
Publicly exposed network devices will remain at considerable risk without prompt patching, comprehensive monitoring and robust detection systems, the report highlights.
The physical aspect
Advancing the cybersecurity of physical security devices in 2025 is essential.
AI-driven attacks, increases in ransomware beyond encryption-based attacks, exploitation of edge devices and significant growth of deepfakes using voice and video grew from 500,000 in 2023 to 8,000,000 in 2024, highlighting the need for comprehensive security strategies that incorporate both physical and cybersecurity measures.
Is it time for a zero-trust approach in physical security?
Zero trust is a comprehensive security strategy that operates on the principle of “never trust, always verify”.
It assumes no entity โ user, device, application or network โ is inherently trustworthy, regardless of location or previous authentication status.
Cybersecurity threats are complex, costly and hazardous.
The frequency of attacks is rising, as is the utilization of physical devices to instigate cyber-incidents.
By targeting both physical and cyber domains, attackers can amplify the damage.
Therefore, it is essential to adopt comprehensive security strategies that integrate monitoring, AI-enhanced tools and predictive analytics for threat identification.
According to Matthew Rosenquist, CISO at Mercury Risk, in his Top 10 Cybersecurity Predictions for 2025: โ2025 will present a complex mix of challenges and opportunities.
Emerging threats from nation-state actors, AI-driven cyber-attacks and a burgeoning market for software vulnerabilities will redefine how organizations can perceive and manage risk.
Attackers will benefit from new advantages.
Critical infrastructure, financial systems and supply chains will face elevated threats, compelling businesses to adopt proactive strategies to mitigate risks.
As cyber-crime grows in sophistication and scale, the need for agile and innovative defenses will become paramount.โ
An essential element of security modernization is the development of a flexible and innovative program that enhances security effectiveness while managing risk.
By integrating cyber and physical security teams, organizations can improve efficiency by minimizing task duplication and enabling the team to focus on other critical responsibilities.
The pathway to success
Despite the challenging landscape, physical security teams have significant opportunities to contribute to comprehensive security strategies.
By developing integrated programs, practitioners can align security efforts with business objectives, enhance service growth through new innovative offerings, strengthen the role of security within the organizational culture, foster cooperation between physical and cybersecurity departments, improve overall security posture and effectiveness, and ensure efficient incident response with well-defined roles and responsibilities.
Security convergence will remain a focal area in the coming years, as technology, business impact and risk converge in processes, policies and collaboration.
From an integrator’s perspective, it is crucial to ensure teams are upskilled in the physical-cybersecurity environment to maintain continuous value to customers.
Threats such as deep fakes will continue to proliferate, making the protection of video surveillance and access control data a key security capability where cyber and physical security intersect.
Gary Hoffner, Vice President of Security Integrator PSLA, recently shared his perspective on the role of the security integrator: โIntegrators install more devices on their customersโ networks than any other provider.
“There will soon be a reckoning between the integrator that has an established cybersecurity culture, and processes that include hardening every apparatus they provide versus the integrator that continues to rely on the customer to protect the apparatus they provide.
“This culture shift demands that the integrators protect their company data and their customer data in the same way by employing the necessary cybersecurity controls in their own environment.
“The practitioner has the accountability to weigh the integratorโs cyber-culture as heavily as the apparatus features and cost and cannot risk creating greater exposure to cyber-crime by picking the wrong integrator.โ
Understanding the risks we face with trust as the new threat vector, the technology available for defense and the role of physical security teams is paramount.
Continuous education, strategic planning and ongoing improvements will ensure physical security teams remain agile and ahead of emerging threats in our converging worlds.
For more information about KFactor Global, visit the Velasea Technology Showcase (Room: Marco Polo 705 Level 1) at ISC West 2025.
About KFactor Global
KFactor Global is a boutique consulting firm that focuses on security modernization.
It assists security manufacturers, integrators and practitioners in developing strategies that integrate advanced technology aligned with business outcomes.
KFactor Global services include security technology strategy, ecosystem orchestration, risk management, go-to-market strategy, AI and IoT integration, solution mapping-matchmaking and AI training.
As a woman-owned business, it promotes inclusion and diversity in the security industry.
About the author
Kasia Hanson is a dynamic security leader with over two decades of experience in Silicon Valley, specializing in technology and security modernization across physical and cybersecurity, IoT, OT and advancing AI.
As CEO and Founder of KFactor Global Security Advisory, she advises organizations on security modernization, advanced technology and business impact.
During her tenure at Intel, she led global security ecosystem development, shaping technology and go-to-market initiatives.
Her industry impact is recognized through multiple awards, including being a three-time SIA Women in Security Forum Power 100 honoree.
Hanson actively advances industry standards and diversity through leadership roles in professional organizations, focusing on security convergence, risk management and technological innovation that bridges physical and digital security domains.
This article was originally published in the special ISC West 2025 March edition of Security Journal Americas. To read your FREE digital edition,ย click here.