Access Control - How to protect legacy systems from common vulnerabilities

Access control infrastructure is purpose-built to be operated for a long time.  As access control has incorporated more and more networking services it has also encountered previously unexperienced vulnerabilities associated with the use of these services and the underlying networks.  This means that under the best of circumstances there are legacy access control systems that are in operation today in 2019 which risk exposing vulnerable devices to network attack.

This webinar will discuss  strategies and solutions available to protect those legacy systems by leveraging modern network hardware and services.

Register below for this free webinar
DATE: July 17, 2019
TIME: 2:00PM CT - 1:00PM CT - 11:00AM PT

Speaker:

Rodney ThayerRodney Thaeyr is a network infrastructure consultant with a practice focusing on physical security. He advises on the design, deployment, troubleshooting, and validation of network-connected physical security systems used for access, monitoring, and intrusion detection. He has decades of experience in software development with embedded systems, network protocols, and cryptography. He has implementation experience with a variety of crypto-based protocols including TLS. He participates in standards development focusing on the use of certificates and related cryptographic schemes. He is the maintainer of the libosdp open source implementation of SIA's OSDP protocol. He is a member of the ASIS IT Security Council and has contributed to several IETF RFCs.

 In addition to consulting he has written articles and product reviews and presented at conferences and delivered training courses for RSA, Black Hat, ISC West, ASIS, and Cloud+. His current areas of research include network stress testing of IoT devices, digital certificates & dual-key cryptography, and encrypted communications using TLS. He consults on the implementation of network security controls with a variety of clients from end user organizations through vendor supply chain partners delivering physical security solutions.

Sponsors:

Dataminr Corporations depend on Dataminr to receive the earliest possible warning of real-time threats to personnel, facilities, operations, and interests around the world, so security and enterprise risk management teams can quickly prepare the most effective response. https://www.dataminr.com/

HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, management, and use of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications. https://www.hidglobal.com/access-control

Johnson Controls – Security in your decision.
If your job is to secure some of the biggest venues, consider one of the largest security integrators in the world. Johnson Controls has the solutions for the world’s biggest stages, with everything from access control and intrusion detection to video surveillance and cybersecurity. In the end, it’s just as much about making you feel secure in your decision. http://e.tycois.com/

ASSA ABLOY Group
The ASSA ABLOY Group is the global leader in access solutions. Every day, we help billions of people experience a more open world. ASSA ABLOY Opening Solutions leads the development within door openings and products for access solutions in homes, businesses and institutions. Our offering includes doors, frames, door and window hardware, locks, perimeter fencing, access control and service. www.intelligentopenings.com

Identiv
Identiv, Inc. is a global provider of physical security and secure identification. Identiv’s products, software, systems, and services address the markets for physical and logical access control, video analytics and a wide range of RFID-enabled applications. Customers in the government, enterprise, consumer, education, healthcare, banking, retail, and transportation sectors rely on Identiv’s access and identification solutions. Identiv’s mission is to secure the connected physical world: from perimeter to desktop access, and from the world of physical things to the Internet of Everything. Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol “INVE.” For more information, visit identiv.com.

Continental Access
Continental Access, a division of NAPCO Security Technologies, is a respected security innovator and pioneer in end-to-end integrated access and security solutions for government, education & healthcare institutions, airports and business. Known for its enterprise class security management platform, CA4K® Continental provides its own optimized, long-lived hardware and software with leading edge features, i.e., open API, numerous integration partners, hosted services, wireless locks and POE- and conventional-controllers. www.cicaccess.com

Duration: 1 Hour


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.