Home
News
Tech Grid
Data & Analytics
Data Processing Data Management Analytics Data Infrastructure Data Integration & ETL Data Governance & Quality Business Intelligence DataOps Data Lakes & Warehouses Data Quality Data Engineering Big Data
Enterprise Tech
Digital Transformation Enterprise Solutions Collaboration & Communication Low-Code/No-Code Automation IT Compliance & Governance Innovation Enterprise AI Data Management HR
Cybersecurity
Risk & Compliance Data Security Identity & Access Management Application Security Threat Detection & Incident Response Threat Intelligence AI Cloud Security Network Security Endpoint Security Edge AI
AI
Ethical AI Agentic AI Enterprise AI AI Assistants Innovation Generative AI Computer Vision Deep Learning Machine Learning Robotics & Automation LLMs Document Intelligence Business Intelligence Low-Code/No-Code Edge AI Automation NLP AI Cloud
Cloud
Cloud AI Cloud Migration Cloud Security Cloud Native Hybrid & Multicloud Cloud Architecture Edge Computing
IT & Networking
IT Automation Network Monitoring & Management IT Support & Service Management IT Infrastructure & Ops IT Compliance & Governance Hardware & Devices Virtualization End-User Computing Storage & Backup
Human Resource Technology Agentic AI Robotics & Automation Innovation Enterprise AI AI Assistants Enterprise Solutions Generative AI Regulatory & Compliance Network Security Collaboration & Communication Business Intelligence Leadership Artificial Intelligence Cloud
Finance
Insurance Investment Banking Financial Services Security Payments & Wallets Decentralized Finance Blockchain Cryptocurrency
HR
Talent Acquisition Workforce Management AI HCM HR Cloud Learning & Development Payroll & Benefits HR Analytics HR Automation Employee Experience Employee Wellness Remote Work Cybersecurity
Marketing
AI Customer Engagement Advertising Email Marketing CRM Customer Experience Data Management Sales Content Management Marketing Automation Digital Marketing Supply Chain Management Communications Business Intelligence Digital Experience SEO/SEM Digital Transformation Marketing Cloud Content Marketing E-commerce
Consumer Tech
Smart Home Technology Home Appliances Consumer Health AI
Interviews
Anecdotes
Think Stack
Press Releases
Articles
  • Home
  • /
  • Interviews
  • /
  • Richard Hills Explains How Visitor Management 2.0 is Revamping GRC

Richard Hills Explains How Visitor Management 2.0 is Revamping GRC

  • November 20, 2025
  • Risk & Compliance
TipNew
Richard Hills Explains How Visitor Management 2.0 is Revamping GRC

If your company does business in a tightly regulated industry and if it regularly handles sensitive data, then a sizable chunk of your organizational bandwidth likely is devoted to governance, risk, and compliance (GRC).

As mission-critical as GRC is for many organizations, however, relatively few excel in these three areas, McKinsey found in its 2025 Global GRC Benchmarking Survey. “For most companies, GRC is a work in progress,” it concludes in the report, which is based on a survey of 200 high-level business decision-makers.

One of the keys to improving GRC? Technology. That’s the conclusion from McKinsey.

That’s also the message from Richard Hills, Vice President at Sign In Solutions, who explains how embracing a more intelligent, data-driven approach to visitor management — an approach he calls Visitor Management 2.0 — can strengthen an organization’s GRC profile and yield a range of business benefits.


Why has GRC become such a high priority for so many organizations?

A convergence of factors, I think, is driving the heavy focus on GRC. Firstly, the rapid development and deployment of artificial intelligence is transforming the operations of many organizations, introducing new categories of risk that simply did not exist before. Partially in response to this, we see an influx of new standards and regulations on a range of fronts, from data privacy to cybersecurity, resulting in many new issues related to governance, risk, and compliance. And of course, regardless of the business you’re in — government contracting, healthcare, banking & finance, education, manufacturing, life sciences, high-tech — your customers want to be assured your organization is protecting their personal information, that it’s using technologies like AI responsibly, and that it is meeting all its legal and regulatory responsibilities.

 

What role can visitor management play in governance, risk, and compliance?

There’s a misconception that visitor management is just about gatekeeping — managing the people coming in and out of the front door on any given day. In reality, it’s much more than that. A visitor management system should give you the means to apply and monitor uniform compliance requirements across multiple sites, even in multiple countries, with the ability to tailor compliance to the unique requirements of a specific site. It should provide intelligent, automation-supported analysis and threat detection throughout the entire visitor lifecycle, from first contact with your organization to after they depart. It should protect sensitive organizational, employee, and visitor data. And it should support governance and auditability with clear, transparent, and verifiable data and processes. What I’m talking about, essentially, is the concept of Visitor Management 2.0.

 

What exactly is Visitor Management 2.0, and why is it relevant to GRC?

Basic visitor management approaches stop at routine check-ins and transactional verification. Visitor Management 2.0 represents a big leap forward. It enables an organization to manage how people enter and move through its facilities by combining compliance requirements, risk workflows, and intelligent access controls within a single platform. It gives them the means to centralize and apply policies across sites, and to tailor access based on each visitor’s profile and intent. Authentication, real-time verification, data insights, and audit-ready record-keeping are unified within a single environment and not scattered between systems. This eliminates gaps, human error, and blind spots, while also addressing the escalating risk related to hybrid physical-cyber threats. And it serves as an all-important single source of truth for verifying compliance with safety, legal, and industry regulations, and for simplifying and speeding audit preparation. All this is essential to strengthening GRC.

 

What puts the “intelligence” in Visitor Management 2.0? What kind of AI-driven visitor management tools and capabilities are available to help organizations with their GRC programs?

Within visitor management, the applications for generative AI, agentic AI, automation, and other intelligent capabilities are multiplying at a dizzying pace. Firstly, for managing risks, AI can prescreen visitors before they arrive against different compliance watchlists to generate automated alerts if there's a red flag. It can search for relevant risk profiles and notify the right people to seek approval before access to a facility is granted. It can spot unusual behavior patterns, whether that's a change to the sites someone visits, visiting at unusual times, or visiting sites outside of the scope of their work. And finally, AI can help gather, verify, and format data, either in reports, charts, or summaries, for audits and internal monitoring. All this bodes well for GRC-minded organizations.

 

Talk more about the “hybrid” physical-cyber threat you mentioned and why businesses should take measures to address it.

The term “hybrid” describes a threat that can move from the physical domain to the cyber domain or vice versa. An example would be hackers accessing an internet of things (IoT)-connected HVAC system to disable other systems and compromise the physical security and safety of a facility and those inside it. Or it's a bad actor using social engineering against security guards, or identifying disgruntled employees from LinkedIn posts, in order to gain physical access to a building. The reality is, bad actors are constantly testing for vulnerabilities in both the physical and cyber domains, and they’re skilled at exploiting the weaknesses they find in one domain to launch an attack in the other.

 

Sure, one-off incidents like this can happen. But how big a risk do hybrid threats really pose to organizations?

It’s a risk that organizations cannot afford to overlook. Just ask hotel and casino operator MGM, or the Multnomah County, Ore., Health Department. Each of them was recently a victim of hybrid attacks. Also, keep in mind that hybrid threats are evolving faster than ever with AI. Social engineering, blackmail, and phishing can now be executed at scale by AI agents against all your employees, and it is only the weakest link that needs to break for your security to be compromised. And within businesses, agentic AI creates new internal surfaces that have to be defended from cyberattack.

 

How can a modern visitor management system help organizations and their security teams manage the risk associated with these hybrid attacks?

Let’s return to the example of a bad actor using social engineering against your security guard to gain access to a facility. In older, unintegrated visitor management systems, the sign-in process might be pen and paper and only enforced by an individual security guard, who could wave someone through. A security team might need to rely on the honesty of the staff on the ground. Completely integrated visitor management systems require that the visitor identify themselves with ID, that the visit be approved by multiple people external to the site, and that the doors to the facility be physically unlocked only when these checks have passed. This means you no longer rely on individual weak links in the chain to maintain security.

 

One issue we’d think organizations have to keep in mind is putting so much emphasis on security and compliance that it compromises the visitor experience. How do you strike a balance there?

While security and compliance are always top priority, they don’t have to come at the expense of the visitor experience. Quite the opposite, in fact. A Visitor Management 2.0 approach offers the best of both worlds: elevated security and compliance for the organization and a streamlined, concierge-type experience for the visitor. Touchless mobile check-in, advanced ID verification, and streamlined entry tailored to visitor type help speed access while ensuring only compliant visitors gain entry — without friction. The system can also deliver personalized services and high-end touches like the ability to book a parking space, room, or desk in advance, so the visitor feels expected, respected, and welcome. This builds trust in the company, reinforces a progressive brand image, and strengthens relationships, business opportunities, and talent attraction. The reality is that cumbersome, bureaucratic security is most likely to be circumvented by the people involved, and is therefore actually weak. The choice between effective security and superior visitor experience is a false dichotomy.

 

Say a person is charged with beefing up our organization’s visitor management as part of a broader GRC program. Where do they start?

As a starting point, if your organization uses multiple siloed systems for visitor management and compliance, I’d recommend shifting to an integrated environment where those systems operate together seamlessly. Look for a system with capabilities that address your company’s specific GRC priorities and weaknesses. Also, look for one that satisfies the unique requirements of your industry related to data privacy, cybersecurity, and the like. And, be sure the system comes from a vendor who understands the nuances of your business and your industry, and who takes security and compliance seriously. Ultimately, both the system and the vendor can be important assets in the effort to strengthen your GRC posture.

Visitor Management
GRC
Risk Management
Compliance Tech
A Iin Security
  • Share

Richard Hills is the Vice President of Advanced Technologies at Sign In Solutions, and heads innovation projects and AI across the business, particularly in how AI can be applied to real problems in visitor management.

Sign In Solutions is the global standard for visitor management. With more than 22,000 customers across 100 countries — including Fortune 500 companies in technology, healthcare, manufacturing, and communications — the unified platform delivers rigorous security and a welcoming experience side by side.

Visit www.signinsolutions.com to learn more.