February 15, 2024 |
10.00 - 11.30 AM (CET) |
English |
The first in a series on building cyber-resilience, this online training will help you get started, with insights on first steps to take to:
An unprotected device or an unpatched vulnerability could be an easy point of access for malicious actors wanting to gain access to surveillance system components or use the VMS as a gateway to a wider cyber-attack. Once inside, they might get hold of admin passwords, design plans, employee or financial records, or other valuable data. The aim could also be to gain access to confidential company information and to disturb or compromise the environment.
Carsten BøgelundHead of Security & Compliance |
|
John Hertel RasmussenPlatform Architect, Security and Compliance |
Roy BandCommunity Manager |
|
Tatiana PokrovskayaPan-EMEA Marketing Manager |
|
|