Seven Great ISC West Education Sessions Perfect for IT and IP Security Professionals

The calendar has flipped to April, so that means it is time for ISC West in Las Vegas once again. And just like in previous years, there will be a numerous high-quality education sessions for security professionals.

Here are some highlights of sessions perfect for IT and IP security professionals or end users:

Hackers in Physical Security: Real-World Methods and Remediation, 11:15 a.m. – 12:15 p.m. Wednesday, April 15, Room 202 – This interesting session will take attendees into the mind of a hacker and examine what they look for, how the hack, and what the weaknesses they often find that should be fixed immediately.

Cloud-Based Solutions for Law Enforcement: Navigating the Legal, Technical and Security Issues, 11:15 a.m. – 12:15 p.m. Wednesday, April 15, Room 307 – While the cloud offers a number of opportunities, there are a number of risks that should be understood – especially for law enforcement. This session will look at the legal, technical, and security considerations for cloud security.

Understanding Your CIO: A Primer for Security and IT Relations, 12:30 – 1:30 p.m. Wednesday, April 15, Room 202 – This session will provide a framework for discussion and tips to enhance communication between the CSOs and CIOs.

IT vs. Physical Security Turf Wars: Who owns video surveillance?, 3:30 – 4:30 p.m. Wednesday, April 15, Room 202 – According to a recent survey, 91 percent of IT departments are involved in video surveillance. Axis Communications' Fredrik Nilsson moderates this session that examines who ultimately owns security systems.

Making the Most of Big Data, 8:45 – 9:45 a.m. Thursday, April 16, Room 701 – Part of the Signature Series, the session will examine what exactly "big data" is and how it can be used in a practical and actionable sense to inform security operations.

Connecting Your Video System to the Internet: Mitigating Your Security Vulnerabilities and Threats, 10 – 11 a.m. Thursday, April 16, Room 309 – Eagle Eye Networks' CEO Dean Drako will talk about how to better mitigate IT security issues and build a video system that is secure and simple to deploy, effectively manages bandwidth, and more.

Enabling Compliance for Physical and Cyber Security in Mobile Devices, 11:30 – 12:30 p.m. Thursday, April 16, Room 302 – This session will examine the various mobile infrastructures and how different components works together to secure access. It will also highlight the concept of an "identity perimeter" and its importance for compliance.

Hope to see you on the ISC West floor or at an education session this week!

About the Author

Brent Dirks is senior editor for Security Today and Campus Security Today magazines.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.