Webinars


On Demand

ShellShock is a vulnerability in a bash shell commonly found in Unix, Linux and OS X operating systems.

During this webinar, we will provide the technical details behind ShellShock vulnerability as well as how it is being exploited in the wild (along with telemetry data).

Duration: 1 Hour


4 Steps to Reduce Third-Party Personnel Risk

A systematic process for recognizing and minimizing identity-related personnel risks.

Duration: 1 Hour


Access Granted: Access Control Checklist for 2015

Join speakers from Avigilon as they provide you with actionable tips that will allow you to take your access control system to the next level in 2015.

Duration: 1 Hour


Transportation Worker Identification Credential (TWIC): Leveraging TWIC’s Identity Management Mediocrity into Better Risk Mitigation

Captain Mark Johnson, VP of Strategic Accounts at Eid Passport® and a seasoned expert in maritime vulnerability assessments, will discuss how maritime risk mitigation can be made more robust by using proven identity management solutions.

Duration: 1 Hour


Transportation Worker Identification Credential (TWIC): Leveraging TWIC’s Identity Management Mediocrity into Better Risk Mitigation

Captain Mark Johnson, VP of Strategic Accounts at Eid Passport® and a seasoned expert in maritime vulnerability assessments, will discuss how maritime risk mitigation can be made more robust by using proven identity management solutions.

Duration: 1 Hour


Meeting the Challenge of Secure Visitor Management for Secure Government Facilities

Join us for this FREE webinar as we detail the reasons why an enterprise visitor management system is absolutely necessary in today’s government facilities.

Duration: 1 Hour


ShellShock is a vulnerability in a bash shell commonly found in Unix, Linux and OS X operating systems.

During this webinar, we will provide the technical details behind ShellShock vulnerability as well as how it is being exploited in the wild (along with telemetry data).

Duration: 1 Hour


Don’t get left in the dark: HD surveillance options for different lighting conditions

Join us to learn what cameras to choose for your environment and how to combine them with powerful VMS software, to get the most out of your security investment.

Duration: 1 Hour


PIAM and IAM Debunked - Security Convergence – Understanding How Logical and Physical Identity Management Work Together for a More Comprehensive Approach

Join Quantum Secure for a FREE webinar to understand how organizations can benefit from the expertise of both worlds by having an integrated approach to managing the physical and digital identities

Duration: 1 Hour


Achieving Interoperability in Prevention, Preparation and Response to School Shootings

This presentation will focus on prevention, preparations and response to a school shooting.

Duration: 1 Hour