To the Edge: Protecting Your Video Surveillance System from Camera to Server

To the Edge: Protecting Your Video Surveillance System from Camera to Server

November 20, 2019, 12:15 PM - 1:00 PM

Theater 2
Language:
English

The proliferation of connected devices and surveillance applications – IP cameras, sensors, machine learning, facial recognition, etc. – is a complicating factor for many physical security professionals. Ironically, the quest to exploit the latest technology is relegating the security of these elements to a secondary consideration in many organizations. In addition, many security pros lack the knowledge and tools to properly protect these assets. As a result, organizations and customers are vulnerable to cyberattacks and other security threats. The addition of even one camera or other IoT device that is not properly hardened can give hackers an opening to corporate networks. Also, the ad- hoc nature of many surveillance deployments leaves security pros out of the loop. For instance, many IoT devices are being deployed at the business unit level with some help from IT but few consultations with physical security experts. In addition, organizational changes such as M&A activity adds devices that make it difficult to know what security devices they have. As security professionals deploy or become responsible for cameras and other IoT devices, they must ensure that the entire ecosystem – from the edge to data center servers – is protected.

This session will cover how to successfully design, implement, and manage current and emerging surveillance and IoT solutions. The security weaknesses of IoT devices will be presented as well as the best practices for how to handle them, including automation. In addition, this session will discuss the best way to approach the surveillance architecture for an organization’s particular needs and network capabilities to secure devices and applications from the edge to the core.

Learning Outcomes:
1. Describe the security issues and requirements of current and emerging surveillance applications such as analytics, machine learning, facial recognition, cybersecurity, and more.
2. Execute several practical tasks to immediately to protect their video surveillance ecosystems.
3. Fix the various security vulnerabilities that put network security cameras and other IoT devices at risk and implement best practices for hardening cameras, switches, and servers against cybersecurity risks.
4. Apply automation to ensure best practices are done correctly and at scale, saving security pros hours of time spent manually performing hundreds of unfamiliar security tasks.

Contributors

  • Tom Galvin

    Presenter

    Chief Product Officer

    Razberi Technologies

    A 25-year veteran, Tom Galvin is an expert in the development of video management software and hardware for the electronic security and surveillance...

Categories

  1. Track
    Dealer, Installer, Integrator

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.