Remove Authentication Remove Authorization Remove Presentation
article thumbnail

Trust the Source: Why Authenticating Video Data Is Essential

Security Industry Association

Now, with the integration of technologies like generative AI into video surveillance and security platforms, we are experiencing the creation of new use cases for the systems weve invested in; however, this progress comes with challenges, particularly regarding the authenticity of video data. But security is distinctively critical.

article thumbnail

Using Technology to Bring Employees Back Safely: Touchless Access Control and Other Solutions Enhance Both Security and Health

Security Industry Association

Access control applications, including touchless authentication, mobile credentials, and distancing analytics, can help businesses create a secure and healthy working environment for all employees. At the same time, touchless face authentication can be integrated into time management systems to improve workspace efficiency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RIMS ERM Conference 2021: A Case-Study Approach to “Solve Any DEI Issue in One Hour”

Risk Management Monitor

In one of the afternoon’s sessions, “Identify and Solve Any Organizational DEI Issue In One Hour,” presenter Layne Kertamus, professional in residence of risk management and insurance at Utah Valley University, explored “new ways to talk about what needs to be said, and what needs to be listened to.”.

article thumbnail

Security Industry Association Supports Cybersecurity Awareness Month

Security Industry Association

This year, specific themes for the month include enabling strong authentication and password practices, updating software and recognizing and reporting phishing. Additionally, i-PRO Americas’ Will Knehr will present on securing the Industrial Internet of Things using zero trust. At ISC East 2022 (taking place Nov.

article thumbnail

Money at Risk: Finance & Data Security in the Digital Age

NexusTek

Using measures such as multi-factor authentication (MFA) supports identity verification for both customers and internal stakeholders such as employees. employees at different levels of authority or in different departments) can access what portions of the network also creates safeguards that protect against internal and external malfeasance.

article thumbnail

Don’t Be Intimidated by OSDP

Security Industry Association

15-17 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program , including keynote presentations from top luminaries and over 30 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.

article thumbnail

Make This October Count by Focusing on Cybersecurity

Security Industry Association

Multifactor authentication (MFA) : Use it! Do you use certificates to provide device authenticity (and when available, do you have MFA turned on)? Best of all, lead by example and promote your cybersecurity success by presenting at industry conferences such as ISC West , ISC East and Securing New Ground.