Loading...

Tips for Evaluating the Cybersecurity of Your Video Solution

  • Room: Virtual
Tuesday,May 24, 2022:10:00 AM -11:00 AM

Speaker(s)

Speaker
Todd Robinson
Product Manager - Recorders

Description

In the wake of recent high-profile video surveillance breaches, it’s more vital than ever that cybersecurity is taken seriously by a video surveillance provider. To ensure end-to-end cybersecurity, each individual element of a surveillance solution must be strong – from the technology you trust to manufacturers with a track record of investing in cybersecurity and data protection measures. In this session, attendees will learn the right cybersecurity questions to ask a video surveillance manufacturer and what things to consider when evaluating a video surveillance solution from a cybersecurity perspective such as systems with complete end-to-end encryption, how to limit vulnerabilities with the right operating system (OS), choosing a provider that constantly monitors for vulnerabilities and offers built-in security alarms with your video solution to notify you in the event of a potential attack, tightening controls on user rights and management and conducting stringent cybersecurity testing.


Track(s)


Super Track(s)


Methodology

The presentation will use slides that can aid in the delivery of our message with plenty of images and other visual aids. The structure of the presentation will consist of an introduction to recent high-profile security breaches, potential cybersecurity threats, and why this shows the importance of cybersecurity to video surveillance providers. Then the presentation will move into a discussion on the cybersecurity questions integrators should be asking of their video surveillance manufacturer so they can ensure their customer’s data is protected. Finally the presentation will cover best practices for minimizing security risks.
Audience members will be encouraged to ask questions and time will be left at the end of the presentation to conduct Q&A.
Participants will be provided with handouts so they can remain focused on the presenters instead of note-taking. In addition to handouts, participants will be given a short survey to extend the interaction after the presentation ends.

Learning Objectives

1. Investigate cybersecurity threats to your video surveillance system such as, potential network vulnerabilities, common attack strategies or human error
2. Identify how to safeguard your video system with end-to-end encryption and network protocols
3. Gain insight on other security features and best practices for minimizing cybersecurity risks including, controlling access to your system, real-time alerts, and maintaining secure infrastructure