Security in the Connected Home

Security in the Connected Home

April 11, 2019, 11:00 AM - 12:00 PM

Sands 305

You: Alexa, tell me about the connected home trends. Alexa: I am the trend, security systems and smart home devices are now more tightly integrated in the connected home than ever before.
You: Hey Google, how secure is my connected home? Google Home: While both consumers and security dealers expect that security systems are secure; the reality is that many of the systems installed today have known vulnerabilities. Daily, outside attacks from hackers and malware find new weaknesses vulnerabilities and develop more and more tools to exploit them. The security systems our business sell, install and service, what is assumed to be secure, often is not. Security system providers need to consider all components and connections to the system, from the wireless connection between the sensors and the panel to the panel’s connection to the cloud.

Learning Objectives:
1. Review potential vulnerabilities associated with connected home and security technologies.
2. Understand available options to provide secure communications within and to/from the connected premises.
3. Become familar with secure vs. un-secured communications technologies.


  • Steve Shapiro


    General Manager of Residential, Commercial and Connected Home Products

    Johnson Controls/Tyco Security Products

    Steve Shapiro is the general manager for residential and commercial security systems including the connected home products and services at Johnson...

  • John Deskurakis


    Software Security Architect and Global Product Security Program Lead

    Johnson Controls

    John Deskurakis is a Software Security Architect and a Global Product Security Program Lead at Johnson Controls, a global diversified technology and...

  • Dina Abdelrazik


    Residential Security Research Lead

    Parks Associates

    Dina leads Parks Associates residential security research and is a member of the connected home team. She has authored numerous reports covering...



  1. Track
    Connected Security People & Process

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.