Home
Categories
EXPLORE
Music
True Crime
Society & Culture
Business
Comedy
Education
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/4c/91/b3/4c91b37b-fc2f-10cb-5392-710c9601282d/mza_13740880958916932621.jpg/600x600bb.jpg
Security DNA
Endeavor Business Media
56 episodes
3 weeks ago
Show more...
Technology
RSS
All content for Security DNA is the property of Endeavor Business Media and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/4c/91/b3/4c91b37b-fc2f-10cb-5392-710c9601282d/mza_13740880958916932621.jpg/600x600bb.jpg
Ethically Hacking Your Surveillance System With i-PRO's Will Knehr
Security DNA
31 minutes 36 seconds
3 months ago
Ethically Hacking Your Surveillance System With i-PRO's Will Knehr
The “streamlining” of video surveillance via unified systems and network-connected devices has taken the weight of alarm fatigue, manual video monitoring, and more off of the shoulders of security professionals. It has also dramatically increased their attack surface. Sit down with host Steve Lasky and i-PRO Americas’ Senior Manager of Information Assurance and Data Privacy, Will Knehr, to discuss how threat actors can hack cameras to breach networks, why AI analytics are becoming another attack vector, and what “ethical hacking” can do to harden your security systems on this week’s episode of SecurityDNA. Will is a cybersecurity expert, with master’s degrees in cybersecurity and business as well as numerous certifications, including CISSP, PMP, CEH, CNDA, CASP, CMMC RP, and more. A prominent figure in “ethical hacking” communities, he actively engages in demonstrations and discussions showcasing techniques and security exploits that are utilized by threat actors in real-world breaches. His career, which began in cryptologic warfare, saw him conduct critical cyber defense missions for agencies like the NSA, DoD, and DISA. Will’s later work with Northrop Grumman involved building virtualized environments, malware analysis, data brokering, and cybersecurity program management to support special NSA and DISA projects. In his current role at i-PRO, Will leverages his decades of cybersecurity experience to oversee the company’s product and network security.
Security DNA