Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Endeavor Business Media. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Endeavor Business Media or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Ethically Hacking Your Surveillance System With i-PRO's Will Knehr

31:36
 
Share
 

Manage episode 502796866 series 3481908
Content provided by Endeavor Business Media. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Endeavor Business Media or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

The “streamlining” of video surveillance via unified systems and network-connected devices has taken the weight of alarm fatigue, manual video monitoring, and more off of the shoulders of security professionals.

It has also dramatically increased their attack surface.

Sit down with host Steve Lasky and i-PRO Americas’ Senior Manager of Information Assurance and Data Privacy, Will Knehr, to discuss how threat actors can hack cameras to breach networks, why AI analytics are becoming another attack vector, and what “ethical hacking” can do to harden your security systems on this week’s episode of SecurityDNA.

Will is a cybersecurity expert, with master’s degrees in cybersecurity and business as well as numerous certifications, including CISSP, PMP, CEH, CNDA, CASP, CMMC RP, and more. A prominent figure in “ethical hacking” communities, he actively engages in demonstrations and discussions showcasing techniques and security exploits that are utilized by threat actors in real-world breaches.

His career, which began in cryptologic warfare, saw him conduct critical cyber defense missions for agencies like the NSA, DoD, and DISA. Will’s later work with Northrop Grumman involved building virtualized environments, malware analysis, data brokering, and cybersecurity program management to support special NSA and DISA projects.

In his current role at i-PRO, Will leverages his decades of cybersecurity experience to oversee the company’s product and network security.

  continue reading

51 episodes

Artwork
iconShare
 
Manage episode 502796866 series 3481908
Content provided by Endeavor Business Media. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Endeavor Business Media or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

The “streamlining” of video surveillance via unified systems and network-connected devices has taken the weight of alarm fatigue, manual video monitoring, and more off of the shoulders of security professionals.

It has also dramatically increased their attack surface.

Sit down with host Steve Lasky and i-PRO Americas’ Senior Manager of Information Assurance and Data Privacy, Will Knehr, to discuss how threat actors can hack cameras to breach networks, why AI analytics are becoming another attack vector, and what “ethical hacking” can do to harden your security systems on this week’s episode of SecurityDNA.

Will is a cybersecurity expert, with master’s degrees in cybersecurity and business as well as numerous certifications, including CISSP, PMP, CEH, CNDA, CASP, CMMC RP, and more. A prominent figure in “ethical hacking” communities, he actively engages in demonstrations and discussions showcasing techniques and security exploits that are utilized by threat actors in real-world breaches.

His career, which began in cryptologic warfare, saw him conduct critical cyber defense missions for agencies like the NSA, DoD, and DISA. Will’s later work with Northrop Grumman involved building virtualized environments, malware analysis, data brokering, and cybersecurity program management to support special NSA and DISA projects.

In his current role at i-PRO, Will leverages his decades of cybersecurity experience to oversee the company’s product and network security.

  continue reading

51 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play