SecurityDNA podcast recap: how to understand and respond to cybersecurity threats to physical security systems

July 24, 2023
In this episode of SecurityDNA, join host Steve Lasky of SecurityInfoWatch and guest Will Knehr, senior manager of information assurance and data privacy at i-PRO Americas.

As cyber-threats continue to grow increasingly sophisticated, many organizations struggle to keep up. When physical security systems are neglected, they become progressively more susceptible to attacks by malicious actors who know how to exploit their exact vulnerabilities. Will Knehr, who began his career in cryptologic warfare in 2004 and has remained a pillar of the security industry since, understands the threat presented to organizations with legacy physical security systems and how easily they can be targeted and hacked.

In this episode of SecurityDNA, join host Steve Lasky of SecurityInfoWatch and guest Will Knehr, senior manager of information assurance and data privacy at i-PRO Americas, as they discuss a wide range of topics, including the advent of Zero Trust initiatives, evolving security trends over the years, and the critical vulnerabilities present when utilizing legacy equipment.

Will Knehr: “Hackers have been living on critical infrastructure networks inside the US using tools that were just built into these devices and networks. Among some of these were IoT devices like camera systems, access control systems, and other security systems. These endpoints we have out there, whether they're security systems, ring cameras, or smart fridges, are great inventions that make our lives easier, but they also create vulnerabilities inside of our networks that hackers can take advantage of.”

Following a long and storied career in security, Knehr knows keenly how easily older physical security systems can be backdoored, "lived in" by hackers, and even used as conduits for data siphoning. Learn about how Knehr identifies and addresses security trends, the ways in which he believes end-users and integrators can come to better understand the vulnerabilities present in physical security systems, and why he places faith in Zero Trust initiatives to transform access control for the better.

Find this month’s episode of Security DNA here or listen below.

WHAT YOU WILL DISCOVER

  • How small vulnerabilities can add up to massive cybersecurity threats.
  • The impact that new security players, like AI, will have on the cybersecurity scene.
  • How hackers can thrive in legacy security networks and equipment.
  • Why Zero Trust systems are being implemented to revolutionize security.
  • The evolution - or lack thereof - of the most successful and prevalent types of cyber-threats.

RESOURCES

About the Author

Steve Lasky | Editorial Director, Editor-in-Chief/Security Technology Executive

Steve Lasky is a 34-year veteran of the security industry and an award-winning journalist. He is the editorial director of the Endeavor Business Media Security Group, which includes the magazine's Security Technology Executive, Security Business, and Locksmith Ledger International, and the top-rated website SecurityInfoWatch.com. He is also the host of the SecurityDNA podcast series.Steve can be reached at [email protected]