Learn processes to mitigate to vulnerabilities in Access Control Systems, and way to maintain protective postures.
Physical Security Access Control Systems are foundational security tools for modern security operations, but as they advance and become more complex, they also become more vulnerable to incomplete deployments as well as vulnerable to more threats, including cyber-attacks. In order to address these vulnerabilities, the security industry needs to expand their practices in the installation and operation of Access Control Systems. To support this goal, we will cover known vulnerabilities within the Access Control Systems themselves, the processes to mitigate the vulnerabilities (a.k.a. hardening), and ways to maintain a protective posture in the operation of Access Control Systems.
Sponsored by the ASIS Information Technology Security and the Security Architecture and Engineering Councils
Learning Objectives
Upon completion, participants will be able to:
- Understand known vulnerabilities and risk of Physical Security Access Control Systems.
- Understand foundational cyber security principles.
- Understand the value of Physical Security Access Control System Hardening Guides.
- Understand the importance of proper Physical Security Access Control Systems configurations.
- Understand the importance of proper Physical Security Access Control Systems maintenance and auditing.
Presenters
Mark Schreiber, CPP - Principal Consultant
Safeguards Consulting, Inc.Coleman L Wolf, CPP - Senior Security Consultant
Environmental Systems Design, Inc.Rene L Rieder, Jr, CPP, PSP - Principal Security Specialist
Burns Engineering
Credit Information
CPE credits for ASIS-sponsored webinars will be updated in your user profile within 48 hours of completion. Self-reporting of CPE credits is not required.
Expand Your Learning!
Need more information about cyber risks to access control systems? Check out the March issue of Security Management Magazine. Senior editor Megan Gates interviews Coleman Wolf, David Feeney, and Darrell Brown from the ASIS IT Security Council to get their insights on common threats, threat actors’ motives and prevention methods.