Today, we attended the Cybersecurity Association of Maryland (CAMI) presentation by Talos about cyber security preventative measures and incident response. Matt Golueke attended this morning with the purpose of continuing to help bridge the gap between our physical/electronic security partners and cyber security best practices awareness through solution and relationship introductions.
CAMI is leading the advancement of cybersecurity through advocacy and collaboration. It is a trusted community for companies that view cybersecurity as a strategic issue to receive actionable resources and connect with their peers. More about CAMI >>
Why does connecting with CAMI and its members matter when deploying electronic security systems?
The biggest cyber risk when deploying a security system is opening your network to a vulnerability as a result of installing inappropriate devices or not programming them properly. Knowing how to mitigate the risk starts with education and relationships that can help improve your level of understanding and take steps to implement improvement measures as a trusted partner.
What are top security system manufacturers doing about cyber security?
As more video security cameras get connected to the Internet of Things (IoT), the role of video security is changing. Cameras are no longer part of a “closed” system, solely focused on gathering, recording, and viewing images. They are transitioning into intelligent sensors that collect significantly more data than video security images alone. The surge in data collection also increases the risk of cybercriminals looking to steal sensitive data.
Every Bosch security camera has a built-in Secure Element with Trusted Platform Module (TPM) functionality. The hardware securely stores all certificates and cryptographic keys needed for authentication and encryption. Depending on the camera model, the Secure Element supports RSA encryption key lengths of up to 4096 bits, ensuring data remains safe beyond 2030. All cameras offer extensive user management capabilities to ensure only authorized users have access to camera data. They support a Public Key Infrastructure set-up and provide software sealing to detect any change in the cameras' configuration settings. Data security measures built-in at the edge by design:
In this video from the Security Technology Forum 2022, David Brent from Bosch Security Systems discusses the importance of bolstering your cyber security appetite as it relates to physical and electronic security, whether your organization is installing the devices or using the devices >>
BOSCH CYBER SECURITY DOCUMENTS >>
Bosch cyber security classes here >>
Contact our team to discuss implementing cyber security measures for your video surveillance, intercom, and other security systems here >>