Seven Great ISC West Education Sessions Perfect for IT and IP Security Professionals

The calendar has flipped to April, so that means it is time for ISC West in Las Vegas once again. And just like in previous years, there will be a numerous high-quality education sessions for security professionals.

Here are some highlights of sessions perfect for IT and IP security professionals or end users:

Hackers in Physical Security: Real-World Methods and Remediation, 11:15 a.m. – 12:15 p.m. Wednesday, April 15, Room 202 – This interesting session will take attendees into the mind of a hacker and examine what they look for, how the hack, and what the weaknesses they often find that should be fixed immediately.

Cloud-Based Solutions for Law Enforcement: Navigating the Legal, Technical and Security Issues, 11:15 a.m. – 12:15 p.m. Wednesday, April 15, Room 307 – While the cloud offers a number of opportunities, there are a number of risks that should be understood – especially for law enforcement. This session will look at the legal, technical, and security considerations for cloud security.

Understanding Your CIO: A Primer for Security and IT Relations, 12:30 – 1:30 p.m. Wednesday, April 15, Room 202 – This session will provide a framework for discussion and tips to enhance communication between the CSOs and CIOs.

IT vs. Physical Security Turf Wars: Who owns video surveillance?, 3:30 – 4:30 p.m. Wednesday, April 15, Room 202 – According to a recent survey, 91 percent of IT departments are involved in video surveillance. Axis Communications' Fredrik Nilsson moderates this session that examines who ultimately owns security systems.

Making the Most of Big Data, 8:45 – 9:45 a.m. Thursday, April 16, Room 701 – Part of the Signature Series, the session will examine what exactly "big data" is and how it can be used in a practical and actionable sense to inform security operations.

Connecting Your Video System to the Internet: Mitigating Your Security Vulnerabilities and Threats, 10 – 11 a.m. Thursday, April 16, Room 309 – Eagle Eye Networks' CEO Dean Drako will talk about how to better mitigate IT security issues and build a video system that is secure and simple to deploy, effectively manages bandwidth, and more.

Enabling Compliance for Physical and Cyber Security in Mobile Devices, 11:30 – 12:30 p.m. Thursday, April 16, Room 302 – This session will examine the various mobile infrastructures and how different components works together to secure access. It will also highlight the concept of an "identity perimeter" and its importance for compliance.

Hope to see you on the ISC West floor or at an education session this week!

About the Author

Brent Dirks is senior editor for Security Today and Campus Security Today magazines.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3