How to Deploy a Cyber Hardened Access Control System for Enhanced Security

How to Deploy a Cyber Hardened Access Control System for Enhanced Security

April 12, 2018, 2:30 PM - 3:30 PM

Sands 302 Level 1

Language:
English

Organizations are embracing the value and flexibility of open architecture access control systems to extend capabilities beyond simply open doors. The open model will continue to drive innovation and adoption of the latest technologies in access control to meet the constantly changing needs of these organizations, including the need to incorporate building automation and other smart building capabilities into a single, streamlined infrastructure as more connected environments become the norm. At the same time, cyber threats will become more pervasive and targeted towards these access control systems, which will require a more holistic approach–including hardware, software and end-user due diligence in identifying threats–to establish the strongest line of defense.
This bi-directional, secure/encrypted communications -- from connected peripheral devices through to host software applications -- capabilities will be enabled by incorporating industry standards such as OSDP and the latest encryption methods between devices. Implementing best practices for IT security will further facilitate closing vulnerability gaps from cloud, web, and network connections.

Learning Outcomes:
1.  Apply guidelines learned to select credential and reader technologies as part of an end-to-end secure access control ecosystem.
2. Implement a step-by-step approach to deploy a hardened access control infrastructure that is designed based on secure lifecycle best practices.
3. Integrate IT security best practices for securing access control systems by closing vulnerability gaps introduced by the cloud, web, networks and other systems.

Show

  1. Show SIA Education@ISC

Categories

  1. Track
    End-User Physical Security

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.