Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Razberi Chief Product Officer to Address TEC 2019 on Cybersecurity for Surveillance Systems

0

Tom Galvin Will Present Ways to Protect Security Systems, Cameras, and Other IoT Devices from Cyber Threats

One unsecured camera or IoT device: That’s all it takes to expose an organization’s corporate network to a cyber risk. Next week during TEC 2019 in Denver, Razberi Technologies Chief Product Officer Tom Galvin will show systems integrators how to guard the entire surveillance ecosystem against both physical and cyber risks.

@RazberiTechIP Chief Product Officer & founder Tom Galvin to present a session at TEC 2019 on “From Camera to Core: Securing Surveillance and IoT Systems from Cyber Threats” #PSATEC @PSASecurity #cybersecurity

Session Title: From Camera to Core: Securing Surveillance and IoT Systems from Cyber Threats

Read More: How to Ensure AI Doesn’t Make Your Customers Hate You

Date/Time: Tuesday, March 12, 9:15 a.m. MDT

Topic: Systems integrators are increasingly responsible for cybersecurity, though it is uncharted territory for many. It’s a great challenge to secure, monitor, and maintain hundreds or thousands of devices against cyber attacks. In this session, Galvin will cover how systems integrators can fortify the security of their surveillance systems to prevent access to critical physical and digital assets – from end points at the edge to data center servers. Attendees will learn:

  • The various security vulnerabilities that put network security cameras and other IoT devices at risk;
  • The security issues and requirements of current and emerging surveillance applications such as analytics, machine learning, facial recognition, and more;
  • Best practices for hardening cameras, switches, and servers against cybersecurity threats; and
  • Automation options to ensure best practices are done correctly and at scale, saving physical security professionals hours of time spent manually performing hundreds of unfamiliar security tasks.

Read More: Accenture Wins GLOMO Award for Virtual Reality Mobile Application

Leave A Reply

Your email address will not be published.