Contents

The Next Generation of Security Across Physical, Cyber, and Critical Infrastructure

October 27, 2025

We are entering an era where digital, physical, and civic systems are increasingly interdependent — and increasingly exposed. From cyber breaches targeting hospitals and city grids to physical attacks on substations and connected industrial systems, the threat surface has expanded across every layer of our modern economy.

The world is heading towards accelerated compute for all critical workloads, both digitally and physically. This increases the attack surface area that governments (federal, state, local), corporates, and workers have to be vigilant against. Advances in AI, edge compute, and sensor interoperability now make it possible to build real-time situational awareness across domains that were once separate.

The next generation of security will not distinguish between cyber and physical worlds — it will unify them under one intelligent control plane that understands context, predicts risk, and drives automated remediation.

The geopolitical, environmental, and economic stakes have never been higher. Public and private organizations alike are realizing that siloed security investments — a patchwork of point solutions — are insufficient. We believe this moment will produce foundational companies that protect the systems underpinning modern life — from hospitals to airports, from data centers to city grids. The convergence of cyber, physical, and infrastructure security is not just a category evolution; it’s a generational platform opportunity.

1. Digital Cybersecurity: Adaptive, Autonomous, and Context-Aware

The modern enterprise perimeter is dissolving. Hybrid work, cloud-native environments, and connected devices have turned identity, not the firewall, into the true security boundary. Yet even the most advanced EDR, IAM, and SIEM systems still rely on manual intervention and static playbooks.

We believe in the rise of self-healing security — adaptive systems that detect anomalies across users, data, and endpoints and auto-remediate in real time. Opportunities include:

  • Autonomous threat detection and response: Across IOT, cloud, device endpoint, and SaaS environments.
  • Security workflow OS for MSPs: Embedding backup, disaster recovery, and compliance automation (SOC2, GDPR, HIPAA) into a unified MSP-led platform.
  • Zero-trust identity networks: Across SMBs and mid-market enterprises that combine IAM, MDM, and policy-based enforcement without enterprise-level complexity or cost.
  • Cybersecurity phishing simulations: Empowering employees to drive increased preparations for breaches and real-time deterrence

2. Physical Security: From Monitoring to Predictive Intelligence

Physical security is now a data problem. Cameras, sensors, drones, and IoT devices continuously generate streams of visual and spatial data — but insights remain fragmented.

We’re excited about physical-world observability platforms that unify video analytics, environmental monitoring, and real-world anomaly detection through AI-driven inference.

Opportunities include:

  • Transportation infrastructure: from ports and highways to rail and air — using multimodal sensors to reduce delays and prevent accidents.
  • Real-time risk detection platforms: Integrating optical, acoustic, and geospatial inputs for environments such as airports, cities, and campuses.
  • AI-enabled building and facilities security: predicting unsafe behaviors, mechanical failures, or unauthorized access before incidents occur.
  • Emergency response orchestration layers that connect law enforcement, EMS, and municipal systems through shared situational awareness.

3. Critical Infrastructure: Securing the Physical-Digital Backbone

Our power grids, manufacturing plants, and water systems are increasingly controlled by networked OT and SCADA systems — many of which were never designed with security in mind. As cyber-physical convergence accelerates, the ability to detect, localize, and neutralize risks across these environments is existential.

We’re looking for founders building:

  • Unified OT/IT security platforms: bridging industrial control systems with enterprise threat intelligence.
  • AI-driven anomaly detection for critical systems: combining network traffic analysis with sensor-based fault prediction.
  • Resilience software for utilities and public infrastructure: enabling redundancy, compliance reporting, and automated incident response.

CMMC Readiness: The Cybersecurity Maturity Model Certification (CMMC) framework represents a next-generation standard for safeguarding digital and operational assets across the defense and critical infrastructure ecosystem. As supply chains become increasingly interconnected, contractors and operators handling Controlled Unclassified Information (CUI) must demonstrate verifiable compliance with NIST-aligned security controls. Emerging platforms are helping organizations accelerate readiness—from automated gap assessments and continuous monitoring tools to AI-driven compliance orchestration that simplifies certification workflows and reporting. The CMMC framework not only hardens the defense industrial base but sets a benchmark for cybersecurity maturity across adjacent regulated sectors, including energy, utilities, and advanced manufacturing.