Is Your Surveillance System A Hacking Vulnerability? | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

Forty percent of the traffic on the internet today is malicious and automated. Swarms of untiring bots roam the net, testing each system they encounter until they find a vulnerability they can exploit — such as port forwarding on an improperly configured security camera system. The results can be devastating. The average breach of this sort results in $11.8 million in costs. That can mean – and has meant – bankruptcy for hospitals, technology companies and even retail outlets. This sounds like science fiction, but it’s the reality Jeff Stutzman and his team from Trusted Internet deal with every day around the world. Join us for this one-hour webinar where Jeff and his team lay out the scope of the threat and explain the measures companies can take to protect themselves. This presentation will have a special focus on the vulnerability of surveillance, security and “headless” systems.

This webinar will be held on Thursday, May 16, 2024.

Jeff Stutzman, CISSP
Founder/CEO, Chief Information Security Officer
Trusted Internet

Jeff Stutzman is the CEO of Trusted Internet. Formerly a Navy Intelligence Officer specializing in Information Warfare (computers), Cisco Systems Information Security, the CISO for Northrop Grumman’s electronics business and the builder of their counter-advanced persistent threat. Stutzman worked for Carnegie Mellon twice, and was the GS-15 director of the group at the DoD Cyber Crime Center who built much of what’s now the underpinning of CMMC, NIST 800-171 and DFAR 7012. He holds a BS from Excelsior, MBA at WPI, and is a Harvard Kennedy School Senior Executive Fellow.

Nate Paddock 200x200Nathan Paddock, CISSP, PMP, ITIL
Director, Cyber Security Services
Trusted Internet

Nathan Paddock runs Trusted Internet’s cybersecurity practice. He’s a United States Air Force (USAF) Academy Graduate, with two master’s degrees in IT from Bowie State University and Air University. Paddock is a retired USAF Lieutenant Colonel who ran the AF Security Operations Center during his last tour.


Adam John 200x200Adam John
Virtual Chief Information Security Officer
Trusted Internet

Adam John is a Virtual CISOTM with Trusted Internet. He recently served as the CISOTM for defense contractor in the Washington D.C. area. He is a senior cyber engineer for the Centers for Medicaid and Medicare (CMS) under the Dept. of Health and Human Services, and is an expert in health care cybersecurity and compliance. John has a BS in information science/digital forensics from Johns Hopkins University.

Lou Saviano 200x200

Lou Saviano
Virtual Chief Information Security Officer
Trusted Internet

Lou Saviano is a Virtual CISOTM for Trusted Internet, but most recently a cybersecurity SME for Advizex, the CIO and CISOTM for Skillsoft in Nashua, an engineer for Textron, and a CIO at Osram Sylvania. Saviano holds a BS in computer science and business management from Franklin Pierce and an MS in OSRAM/Cornell Business Management Institute from Cornell Johnson Graduate School of Management.

Paul Wagner 200x200Paul Wagner, PhD
Virtual Chief Information Security Officer
Trusted Internet

Paul Wagner is a part time Virtual CISOTM with Trusted Internet, an associate professor with the University of Arizona where he runs their cyber program. He’s a retired Army E9, and holds a BS from Park University and a PhD in cyber defense from Dakota State.


(function(d, s, id){
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) {return;}
js = d.createElement(s); = id;
js.src = “//”;
fjs.parentNode.insertBefore(js, fjs);
}(document, ‘script’, ‘facebook-jssdk’));


Click Here For The Original Story From This Source.


National Cyber Security