Is Your Surveillance System A Hacking Vulnerability?


Forty percent of the traffic on the internet today is malicious and automated. Swarms of untiring bots roam the net, testing each system they encounter until they find a vulnerability they can exploit — such as port forwarding on an improperly configured security camera system. The results can be devastating. The average breach of this sort results in $11.8 million in costs. That can mean – and has meant – bankruptcy for hospitals, technology companies and even retail outlets. This sounds like science fiction, but it’s the reality Jeff Stutzman and his team from Trusted Internet deal with every day around the world. Join us for this one-hour webinar where Jeff and his team lay out the scope of the threat and explain the measures companies can take to protect themselves. This presentation will have a special focus on the vulnerability of surveillance, security and “headless” systems.

This webinar will be held on Thursday, May 16, 2024.

Jeff Stutzman 200x200

Jeff Stutzman, CISSP
Founder/CEO, Chief Information Security Officer
Trusted Internet

Jeff Stutzman is the CEO of Trusted Internet. Formerly a Navy Intelligence Officer specializing in Information Warfare (computers), Cisco Systems Information Security, the CISO for Northrop Grumman’s electronics business and the builder of their counter-advanced persistent threat. Stutzman worked for Carnegie Mellon twice, and was the GS-15 director of the group at the DoD Cyber Crime Center who built much of what’s now the underpinning of CMMC, NIST 800-171 and DFAR 7012. He holds a BS from Excelsior, MBA at WPI, and is a Harvard Kennedy School Senior Executive Fellow.

Nate Paddock 200x200Nathan Paddock, CISSP, PMP, ITIL
Director, Cyber Security Services
Trusted Internet

Nathan Paddock runs Trusted Internet’s cybersecurity practice. He’s a United States Air Force (USAF) Academy Graduate, with two master’s degrees in IT from Bowie State University and Air University. Paddock is a retired USAF Lieutenant Colonel who ran the AF Security Operations Center during his last tour.

 

Adam John 200x200Adam John
Virtual Chief Information Security Officer
Trusted Internet

Adam John is a Virtual CISOTM with Trusted Internet. He recently served as the CISOTM for defense…

Source…