Access Control - How to protect legacy systems from common vulnerabilities

Access control infrastructure is purpose-built to be operated for a long time.  As access control has incorporated more and more networking services it has also encountered previously unexperienced vulnerabilities associated with the use of these services and the underlying networks.  This means that under the best of circumstances there are legacy access control systems that are in operation today in 2019 which risk exposing vulnerable devices to network attack.

This webinar will discuss  strategies and solutions available to protect those legacy systems by leveraging modern network hardware and services.

Register below for this free webinar
DATE: July 17, 2019
TIME: 2:00PM CT - 1:00PM CT - 11:00AM PT


Rodney ThayerRodney Thaeyris a network infrastructure consultant with a practice focusing on physical security. He advises on the design, deployment, troubleshooting, and validation of network-connected physical security systems used for access, monitoring, and intrusion detection. He has decades of experience in software development with embedded systems, network protocols, and cryptography. He has implementation experience with a variety of crypto-based protocols including TLS. He participates in standards development focusing on the use of certificates and related cryptographic schemes. He is the maintainer of the libosdp open source implementation of SIA's OSDP protocol. He is a member of the ASIS IT Security Council and has contributed to several IETF RFCs.

In addition to consulting he has written articles and product reviews and presented at conferences and delivered training courses for RSA, Black Hat, ISC West, ASIS, and Cloud+. His current areas of research include network stress testing of IoT devices, digital certificates & dual-key cryptography, and encrypted communications using TLS. He consults on the implementation of network security controls with a variety of clients from end user organizations through vendor supply chain partners delivering physical security solutions..


Dataminr Corporations depend on Dataminr to receive the earliest possible warning of real-time threats to personnel, facilities, operations, and interests around the world, so security and enterprise risk management teams can quickly prepare the most effective response.

HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, management, and use of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications.

Date: Jul 17, 2019

Time: 2:00 PM ET

Duration: 1 Hour

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety