BACK BY POPULAR DEMAND: Hacked in 60 Seconds: How Legacy Wiegand Exposes Modern Access Control

BACK BY POPULAR DEMAND: Hacked in 60 Seconds: How Legacy Wiegand Exposes Modern Access Control

April 12, 2018, 1:15 PM - 2:15 PM

Sands 307 Level 1

Language:
English

Imagine wrapping up a high-profile access control project, then learning a criminal got in through an overlooked security hole. Biometric readers and modern credentials may work flawlessly, but pairing them with the Wiegand protocol means leaving the job half finished. Why? Because data passing from the credential to the reader may be secure, but the Wiegand connection leaves data vulnerable on the threat side of the door. Once considered inherently secure, today's technology has turned Wiegand into a liability. Find out why, and learn how SIA's OSDP standard secures the reader-panel connection in this session with ethical hacker Babak Javadi of The CORE Group security auditors, and Cypress CTO Tony Diodato, an expert in access control format and protocol conversions. Recommended for dealers, installers, integrators and access control manufacturers; useful information for security directors, managers and end users with a basic knowledge of access control systems.

Learning Outcomes:
1. Identify the technological changes affecting card reader hacking.
2. Analyze areas of vulnerability in access control systems.
3. Diagram the process of retrofitting a card reader to employ the OSDP protocol.

Show

  1. Show SIA Education@ISC

Categories

  1. Track
    Access & ID Management

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.