What You'll Learn

You'll learn how to protect physical security systems from cyber attacks

Who This is For

Any members of the physical security organization, risk team, facilities, operations or management who is concerned about protecting their business from Cyber-attacks.

Delivery Format

Protecting Physical Security Systems from Cyber Attacks is delivered entirely online, so you can enjoy the lessons at your convenience.

Get Notified When Protecting Physical Security Systems From Cyber Attacks Launches

Enter your name and email address below and click on the Sign Up button
Something went wrong. Please check your entries and try again.

"Colleagues, in the environment we are in today it is imperative that you have a working knowledge of the Cyber space. This program will give you the necessary tools to hold your own in a C suite discussion. Dave is a master at being able to explain in plain English what you need to know. This is an investment in your future."

Ray O'Hara

Vice President, AS Solution

"This kind of training is crucial for developing a more rounded and informed security professional equipped for the problems of today and tomorrow, not yesterday. This is simply the only program I am aware of that delivers what is needed, in a language everyone can understand."

John A. Petruzzi

Vice President, G4S

"This program is one of a kind, it gives the attendees a real foundational understanding of Cyber Security and leverages their existing security knowledge to accelerate the learning process."

Tim McCreight

Partner, Risk Rebels

Are You Ready to Learn How to Reduce Your Risks of Getting Hacked?

Protecting Physical Security Systems From Cyber Attacks is a cutting edge and one-of-a-kind program designed to explain the issues associated with protecting systems from cyber attacks – in plain English.

This program provides visibility into how hackers compromise computing systems and explains the steps they take and the weapons they use. This first involves explaining the general attack methodology and attack tools and techniques that are used to compromise a system.

Once that is understood, we explore the common mistakes made in physical security system deployment and management, and how that gives the hacker an edge. Finally, it describes the methods needs to design, deploy and manage systems in a secure manner

Protecting Physical Security Systems From Cyber Attacks dramatically increases the chances for you to defend your organization's physical security systems and withstand a cyber attack.

Cybersecurity In Plain English (No, Really!)

This program translates the technical field of cybersecurity into plain English so you will really be able to understand the world of cybersecurity.

We've made the principles easy to relate to and you can expect to have a number of "lightbulb" moments as you go through the course.

Is This Program Right for You?

Protecting Physical Security Systems From Cyber Attacks may be right for you if:

  • You are trying to expand your knowledge in the field of physical security
  • You are responsible for protecting or using physical security systems
  • You are concerned your company’s network may be exposing your systems to cyber risks
  • Your concerned about the protection your systems are getting and want to know the questions to ask to determine for yourself

What You'll Learn

This program highlights the most important issues, approaches, and examples of how security technology gets hacked and defines a roadmap to greatly reduce the risk. This delivers real-world techniques participants can take back to their organizations to improve their security – explained in Plain English without the techie talk.

It will explain how cyber-attacks are carried out and how building, deploying and managing security systems correctly can greatly reduce the risk of being hacked.

Who Should Participate

Members of the physical security organization, risk team, facilities, operations or management who is concerned about protecting their business from cyber attacks. Managers, supervisors, operations team and even executives should also consider participating.