Innovation and Technology
ISC West Strives To Redefine The Future Of Converged Security

The Rise of Converged Threats
From ransomware campaigns that shut down building access systems, to IoT vulnerabilities that bridge physical and digital entry points, organizations are dealing with the reality that treating physical and cyber security as separate disciplines leaves dangerous gaps. That’s a core theme threading through ISC West 2025’s expanded educational tracks, keynote lineups, and panel sessions.
Identity as the New Security Perimeter
A major theme emerging from ISC West is the redefinition of "perimeter." In a world where physical and digital access points are increasingly interwoven, identity becomes the critical link. Gill believes the convergence of physical and cybersecurity is being driven by the need to secure identity, context, and intent—not just assets.
Cultural Hurdles and Strategic Shifts
But while the technology is advancing rapidly, many organizations still struggle with cultural inertia.
ISC West: The Industry’s New Convergence Hub
To support this vision, ISC West has expanded its cybersecurity and connected IoT pavilion, introduced a cyber hub sponsored by ZeroFox, and integrated RSA-curated educational tracks. Shaughnessy told me the SIA New Products and Solutions Showcase will highlight over 100 debut technologies—many blurring the line between physical and cyber applications.
Conclusion
As the attack surface grows more complex, ISC West is rising to meet the moment by reshaping how the industry thinks about defense. Threats don’t respect borders, so security can’t either. The future is converged—and it’s already underway.
FAQs
Q: What is the convergence of physical and cyber security?
A: The convergence of physical and cyber security refers to the merging of the two previously separate worlds of physical security (managing gates, guards, and surveillance systems) and cybersecurity (handling firewalls, malware, and identity threats).
Q: Why is convergence important?
A: Convergence is important because it allows organizations to address the increasingly interconnected threats that were previously handled separately.
Q: What are some key takeaways from ISC West 2025?
A: Some key takeaways from ISC West 2025 include the need for a unified approach to security, the importance of identity in securing access points, and the need for AI and machine learning to optimize security strategies.
Innovation and Technology
Breach Readiness for Business Continuity

Introduction to Breach Readiness
Cybersecurity strategy has undergone a fundamental shift—from aspiring to build impenetrable defenses to accepting that breaches are inevitable. In today’s environment, the defining question is no longer if you’ll be breached, but when—and whether your business can keep running when it happens.
Rethinking the Security Mandate
The traditional security model—fortify the perimeter, stop the intrusion—no longer holds. Perimeters have dissolved with the rise of cloud adoption, remote work, and interconnected systems. Attackers no longer need to “break in” when they can just log in with stolen credentials.
Breach readiness reflects a new security mandate: contain threats swiftly, prevent their spread, and sustain critical operations even during an active attack. It’s about designing security not just to protect the business, but to preserve the business when protection fails.
As Sunil Muralidhar, VP of marketing and partnerships at ColorTokens put it on a recent episode of the TechSpective Podcast, “The goal of a business at the end of the day is to make money… Now cybersecurity, the role of the CISO, for example, is to align with that goal—what do you need to do as a cybersecurity function to ensure business continues despite a breach.”
Containment Is the New Perimeter
Once attackers gain access, they typically aim for lateral movement—hopping from system to system, performing reconnaissance, escalating privileges, and seeking out high-value assets. The longer they go undetected, the greater the damage.
Breach readiness prioritizes limiting the blast radius. The objective isn’t to eliminate every threat, but to prevent one compromised user or device from becoming a launchpad for widespread damage. That requires designing internal controls with the assumption that compromise is already underway.
This shift in mindset parallels other domains. Submarines are divided into sealed compartments because flooding is expected, not unthinkable. Hospitals protect critical systems like EMRs or imaging equipment over endpoints with lower operational impact. The same logic must now be applied to digital infrastructure.
Zero Trust and the Business Continuity Equation
Zero trust has reemerged as a foundational approach to enabling breach readiness, especially as digital environments grow more fragmented and complex. But zero trust isn’t a product or single action—it’s a strategy built on the assumption of compromise.
Muralidhar explained, “Breach readiness basically means continuing your digital operations… in an adverse environment. And in order to do that, the cyber leader needs to have visibility, understand the business, and know which applications and systems matter most.”
That means shifting from blanket security policies to risk-based prioritization. In sectors like healthcare, for instance, securing Epic or Cerner servers may matter more for continuity than a nurse’s workstation. In manufacturing, keeping OT systems online may take precedence over administrative tools.
This kind of risk-informed approach is essential for maintaining operations while under attack.
Cyber Resilience: A Strategic Differentiator
Breach readiness is a strategic differentiator for companies today. It supports brand trust, regulatory compliance, and operational uptime. More importantly, it enables organizations to absorb shocks without catastrophic failure.
Cyber resilience and breach readiness are increasingly linked in boardroom discussions. Gartner predicts that by 2026, 70% of CEOs will mandate a culture of organizational resilience to survive coinciding threats from cyberattacks, severe weather, and geopolitical unrest.
Forward-thinking CISOs are already aligning with that vision—translating risk into business terms, prioritizing continuity, and advocating for architectural investments that ensure the enterprise can take a hit and keep running.
The Breach-Ready Future
The question isn’t whether attackers will target your business—it’s how far they’ll get and how fast you can shut them down. Breach readiness is about controlling the clock and the blast radius.
It’s a commitment to designing systems, policies, and controls that assume compromise—yet protect operations, data, and customers even under pressure.
That’s not defeatist thinking. It’s reality-based resilience. And in today’s high-stakes cyber environment, it’s the only strategy that guarantees the business survives to fight another day.
Conclusion
In conclusion, breach readiness is a critical component of any organization’s cybersecurity strategy. By acknowledging that breaches are inevitable and taking proactive steps to contain and mitigate them, businesses can minimize the impact of an attack and ensure continuity of operations. This requires a shift in mindset, from focusing solely on prevention to prioritizing resilience and breach readiness.
FAQs
- Q: What is breach readiness?
- A: Breach readiness refers to the proactive discipline of preparing for compromise without letting it compromise continuity. It involves designing security measures to contain threats swiftly, prevent their spread, and sustain critical operations even during an active attack.
- Q: Why is the traditional security model no longer effective?
- A: The traditional security model is no longer effective because perimeters have dissolved with the rise of cloud adoption, remote work, and interconnected systems, making it easier for attackers to gain access without needing to "break in."
- Q: What is the role of zero trust in breach readiness?
- A: Zero trust is a foundational approach to enabling breach readiness, built on the assumption of compromise. It involves shifting from blanket security policies to risk-based prioritization, understanding which applications and systems matter most to the business.
- Q: How does breach readiness support business continuity?
- A: Breach readiness supports business continuity by prioritizing the protection of critical operations and data, ensuring that the business can continue to function even during an active attack. This is achieved through risk-informed approaches, such as securing high-value assets and systems that are crucial for operational continuity.
Innovation and Technology
Innovating for Impact: How Social Enterprises are Leveraging Tech for Good

Technology for social change is revolutionizing the way we address global challenges, and social enterprises are at the forefront of this movement. By harnessing the power of technology, these organizations are creating innovative solutions to some of the world’s most pressing problems. From healthcare and education to environmental sustainability and economic development, social enterprises are leveraging tech to drive positive impact and improve lives.
The Rise of Social Enterprises
Social enterprises are businesses that prioritize social and environmental impact alongside financial returns. These organizations are driven by a mission to create positive change and address specific social or environmental challenges. With the rise of social entrepreneurship, we are seeing a new generation of leaders who are using business as a force for good. They are leveraging technology to scale their impact, reach new audiences, and create sustainable solutions to complex problems.
Key Characteristics of Social Enterprises
Social enterprises are characterized by their commitment to social and environmental impact, innovative approaches to problem-solving, and sustainable business models. They often use technology to amplify their impact, whether through digital platforms, mobile apps, or data analytics. By leveraging technology, social enterprises can reach more people, reduce costs, and improve the effectiveness of their programs.
The Role of Technology in Social Impact
Technology is a key enabler of social impact, providing social enterprises with the tools and platforms they need to scale their work and reach new audiences. From mobile health apps to online education platforms, technology is being used to address some of the world’s most pressing challenges. Social enterprises are leveraging technology to collect data, analyze trends, and develop targeted solutions to specific social and environmental problems.
Examples of Tech for Social Good
There are many examples of social enterprises using technology to drive social impact. For instance, mobile health apps are being used to diagnose and treat diseases in remote communities, while online platforms are providing access to education and job training for marginalized groups. Additionally, data analytics is being used to track climate change, identify areas of high conservation value, and develop targeted conservation strategies.
Impact of Social Enterprises on Society
Social enterprises are having a profound impact on society, from improving health and education outcomes to promoting environmental sustainability and economic development. By leveraging technology, these organizations are able to reach more people, reduce costs, and improve the effectiveness of their programs. Social enterprises are also creating new opportunities for employment, entrepreneurship, and social mobility, particularly in marginalized communities.
Measuring Social Impact
Measuring social impact is critical to understanding the effectiveness of social enterprises and identifying areas for improvement. Social enterprises use a range of metrics to measure their impact, from outcome-based metrics such as health outcomes or educational attainment, to process-based metrics such as website traffic or social media engagement. By tracking their impact, social enterprises can refine their strategies, optimize their programs, and scale their impact over time.
Challenges and Opportunities
While social enterprises are making a significant impact, they also face a range of challenges, from funding and scalability to regulation and talent acquisition. However, these challenges also present opportunities for innovation and growth, as social enterprises leverage technology to overcome obstacles and achieve their goals. By embracing digital technologies, social enterprises can reduce costs, improve efficiency, and increase their impact.
Future of Social Enterprises
The future of social enterprises is exciting and uncertain, as these organizations continue to innovate and evolve in response to changing social and environmental challenges. As technology continues to advance, we can expect to see even more innovative solutions to social and environmental problems, from artificial intelligence and blockchain to the Internet of Things and virtual reality. By leveraging these technologies, social enterprises will be able to drive even greater impact and create a more sustainable, equitable, and just world.
Conclusion
In conclusion, social enterprises are leveraging technology to drive social impact and improve lives. From healthcare and education to environmental sustainability and economic development, these organizations are creating innovative solutions to some of the world’s most pressing challenges. By harnessing the power of technology, social enterprises are able to scale their impact, reach new audiences, and create sustainable solutions to complex problems. As the social enterprise sector continues to grow and evolve, we can expect to see even more innovative solutions to social and environmental challenges, and a brighter future for all.
Frequently Asked Questions
What is a social enterprise?
A social enterprise is a business that prioritizes social and environmental impact alongside financial returns. These organizations are driven by a mission to create positive change and address specific social or environmental challenges.
How do social enterprises use technology?
Social enterprises use technology to amplify their impact, whether through digital platforms, mobile apps, or data analytics. By leveraging technology, social enterprises can reach more people, reduce costs, and improve the effectiveness of their programs.
What are some examples of social enterprises using technology for social good?
There are many examples of social enterprises using technology to drive social impact, from mobile health apps to online education platforms. Additionally, data analytics is being used to track climate change, identify areas of high conservation value, and develop targeted conservation strategies.
How can I get involved in the social enterprise sector?
There are many ways to get involved in the social enterprise sector, from volunteering or interning with a social enterprise to starting your own social enterprise. You can also support social enterprises by donating to their causes or purchasing their products and services.
What is the future of social enterprises?
The future of social enterprises is exciting and uncertain, as these organizations continue to innovate and evolve in response to changing social and environmental challenges. As technology continues to advance, we can expect to see even more innovative solutions to social and environmental problems, and a brighter future for all.
Innovation and Technology
Survey Says 67% Of Jobs Use AI, But Do Leaders Understand Its Limits?

Introduction to AI in the Workplace
In a survey of 1,000 knowledge workers, 67% of respondents said that their companies use AI, with 56% of companies encouraging AI usage. Owl Labs created the survey, and they found that Gen Z employees are more likely to report being “heavily reliant” on AI, with 70% of the youngest generation leaning in on the tech for a multitude of tasks. That lines up with the observations of OpenAI CEO, Sam Altman, who recently shared that Gen Z workers view ChatGPT as a “life adviser". Embracing technology is a good idea, but is Gen Z squeezing LLMs too tightly? What do these current and future workforce leaders need to know, about what AI can (and can’t) do?
Tell Me How You Use ChatGPT and I’ll Guess Your Age
“Older people,” Altman told an audience at Sequoia Capital’s AI Ascent Event, “use ChatGPT as a Google replacement. People in college use it as an operating system.” Tech Crunch reports that younger adults have fairly complex prompts memorized, which also means saved in the notes on their phone, and they rapidly and frequently pepper the program with problems and queries. Altman goes on to say that, "they [Gen Z and Gen Alpha] don’t really make life decisions without asking ChatGPT what they should do. It has the full context on every person in their life and what they’ve talked about."
AI expert Amanda Caswell, a writer for Tom’s Guide, says, “Personally, I’ve used ChatGPT to tackle everything from project summaries to panic attacks, and have found it to be a great sounding board when facing tough choices. While it’s no substitute for human guidance or a therapist, ChatGPT can be a great assistant in a pinch.”
The Upside and Downside of Using AI
There’s definitely an upside to having a second opinion on various aspects of your life and work – especially when that perspective has access to trillions of data points, the works of Freud, Jung, and James, as well as most of recorded history. But there are risks that can come with using AI, and leaning in too heavily on the platform. Experts say that it’s essential to be careful how much you share with AI – and how you use the tool at work. The rewards are many, but so are the risks – and using LLMs wisely is good counsel for every generation.
What to Watch Out For With AI: Experts Weigh In
“AI has no world model,” according to process scientist, Sam Drauschak. Questions that require real-world context can be a challenge for ChatGPT and other AI platforms. “When you ask it to read this picture of a clock, it’s strictly pattern prediction.”
Louis Rosenberg, Stanford professor, inventor, AI scientist and author of Our Next Reality, says that sometimes AI is dyslexic. And, as someone who is dyslexic, Rosenberg’s perspective gives an interesting read on why AI struggles to tell time. “When I recall things in my mind (objects, environments, images, or text), I don’t visualize them from a fixed first-person perspective. I think about them from all directions at once, more as a vague cloud of perspectives than a single, grounded orientation,” he explains – articulating the AI point of view. That’s how large language models see things – and it often means that vector orientations (such as “clockwise”) are elusive to AI platforms. “When you ask AI to interpret a tissue sample," he says, using an application from healthcare that is becoming more and more common, “accuracy is not impacted by orientation.”
But innovative problem-solving and creative thinking is. While AI can generate novel combinations for text and produce creative works in art and music, its capacity for truly original thought and breakthrough innovation remains limited. But the speed of the platform can be astonishing. So, should we treat AI like just another voice in the room, or the voice of God? “Think about it more like an intern,” Drauschak advises.
“AI doesn’t do anything new. It can synthesize things from lots of different domains. And the labor of synthesizing things can seem to generate insight. Like a brilliant intern – with the ability to process billions of data points at once – it’s going to come up with good ideas and contribute. But it’s a really good idea to check on the work,” he explains. While you may not be asking AI to read a clock, perspective always matters – especially when it comes to work product, context and point of view.
Room for Error with AI
AI doesn’t possess emotions or empathy, Draushak explains. “It doesn’t have a conversation where it acknowledges any sort of room for error or humility or, you know, ‘I only feel 80% about this’". Drauschak likens it to the consultant’s mantra: “I may be incorrect, but I’m never unsure of myself.” Hallucinations and facts are presented with the same level of confidence.
AI has no world model, so anything that requires real-time context creates progressive levels of failure, according to Drauschak. Long-term planning can be a challenge as well, as AI platforms have limited memory. To be fair, certain programs and prompts can provide reference and context – a context which comes to human beings naturally, as a result of being in the real world.
And reading the room is a challenge for AI. “AI is the future,” Dylan Matthews shares in Vox. “It’ just can’t predict it.” Science Daily echoes that sentiment, in a post that proclaims that humans are better at predicting social interactions than AI. "AI for a self-driving car, for example, would need to recognize the intentions, goals, and actions of human drivers and pedestrians. You would want it to know which way a pedestrian is about to start walking, or whether two people are in conversation versus about to cross the street," said lead author Leyla Isik, an assistant professor of cognitive science at Johns Hopkins University who did an extensive study into the limitations of current LLMs. "Any time you want an AI to interact with humans, you want it to be able to recognize what people are doing. I think this sheds light on the fact that these systems can’t right now." Cathy Garcia, a colleague and contributor to the Johns Hopkins study, says, "Real life isn’t static. We need AI to understand the story that is unfolding in a scene. Understanding the relationships, context, and dynamics of social interactions is the next step, and this research suggests there might be a blind spot in AI model development."
Leading with AI: Understanding Its Limits to Access Its Capabilities
For leaders and aspiring leaders, the message is one of balance. While the capabilities of AI have opened up seemingly limitless possibility, those possibilities actually do have limits. The real question, across every generation in the workforce, is: what do you want to outsource to AI? Tools can accelerate results when used correctly. But turning to AI for every direction in your life seems unwise. Indeed, research already shows a decline in cognitive skills from over-reliance on LLMs. Convenience, speed, ease: these are the advantages of AI. But understanding how best to use an AI platform like ChatGPT is crucial for leaders today.
In side by side tournaments run by Metaculus, human beings have beaten AI at forecasting for the last three quarters running. But that gap is narrowing. Think of how prediction matters in your business: for lawyers, negotiating a settlement requires instincts around agreement based on real-time contexts – and intuition. Producers at Netflix predict what shows will hit. Intuition, innovation, direction: these uniquely human characteristics still matter in decision-making – even when 67% of workers are using ChatGPT and its cousins. AI can help with the predictive journey, but it’s not the whole trip – at least, not yet.
Conclusion
The use of AI in the workplace is on the rise, with 67% of companies using AI and 56% encouraging its use. While AI can be a powerful tool, it’s essential to understand its limitations and use it wisely. Gen Z employees are more likely to rely heavily on AI, but it’s crucial for all generations to be aware of the potential risks and benefits. By understanding what AI can and can’t do, leaders and aspiring leaders can make informed decisions about how to use AI to accelerate results and improve productivity.
FAQs
Q: What percentage of companies use AI?
A: 67% of companies use AI, according to a survey by Owl Labs.
Q: What is the main difference in how older and younger generations use ChatGPT?
A: Older people use ChatGPT as a Google replacement, while younger adults use it as an operating system.
Q: What are some limitations of AI?
A: AI has no world model, limited memory, and struggles with real-time context, innovative problem-solving, and creative thinking.
Q: Can AI predict social interactions?
A: No, humans are better at predicting social interactions than AI, according to research by Johns Hopkins University.
Q: What is the importance of understanding AI’s limitations?
A: Understanding AI’s limitations is crucial for leaders and aspiring leaders to make informed decisions about how to use AI to accelerate results and improve productivity, and to avoid over-reliance on AI.
-
Career Advice5 months ago
Interview with Dr. Kristy K. Taylor, WORxK Global News Magazine Founder
-
Diversity and Inclusion (DEIA)5 months ago
Sarah Herrlinger Talks AirPods Pro Hearing Aid
-
Career Advice5 months ago
NetWork Your Way to Success: Top Tips for Maximizing Your Professional Network
-
Changemaker Interviews4 months ago
Unlocking Human Potential: Kim Groshek’s Journey to Transforming Leadership and Stress Resilience
-
Diversity and Inclusion (DEIA)5 months ago
The Power of Belonging: Why Feeling Accepted Matters in the Workplace
-
Global Trends and Politics5 months ago
Health-care stocks fall after Warren PBM bill, Brian Thompson shooting
-
Global Trends and Politics5 months ago
Unionization Goes Mainstream: How the Changing Workforce is Driving Demand for Collective Bargaining
-
Training and Development5 months ago
Level Up: How Upskilling Can Help You Stay Ahead of the Curve in a Rapidly Changing Industry