Addressing the Weak Link in Physical Security, the Proximity Card, with Open & Proven Secure Technologies

Addressing the Weak Link in Physical Security, the Proximity Card, with Open & Proven Secure Technologies

March 19, 2020, 11:00 AM - 12:00 PM

Sands 302
Language:
English

Proximity readers for access control were a game-changing technology and became widely accepted in the mid-90s. Since then, the access control industry has been dependent on that technology with more than 70% of all readers and cards in operation today being proximity. As with many older, popular technologies, the vulnerabilities of prox technology have become exposed and can now be hacked by purchasing an inexpensive device from consumer e-tailers. Newer, standardized technologies have closed the vulnerabilities exposed by proximity, such as 13.56mHz contactless smart card technology. And international standards and open technologies are becoming more mainstream today. This round table discussion will cover international standards and secure open technologies that are becoming mainstream, and explore how to help end users and integrators use safe and more secure solutions, which will advance our industry.

Learning Objectives:
1. Learn what options are available now to provide a more secure environment and future-proof their organization.
2. Understand the risks of proximity technology and why moving to a more secure technology is a necessity and not a “nice-to-have” option.
3. Aquire the information needed to create an action plan for your company and/or customers.

Contributors

  • Jason Schimpf

    Presenter

    VP Partner Programs & Education

    AMAG Technology

    Jason Schimpf is Vice President of Partner Programs & Education for AMAG Technology, a G4S Company.  In this role, Jason manages AMAG's preferred...

  • Scott Rusnak

    Presenter

    Senior Director of Global Security

    Qualcomm

    Scott Rusnak is a Senior Director of Global Security for Qualcomm and is in charge of the Physical Security group for the company.  Scott began his...

Categories

  1. Track
    Physical Security

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.