(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-NG2RVR'); .async-hide { opacity: 0 !important} (function(a,s,y,n,c,h,i,d,e){s.className+=' '+y; h.end=i=function(){s.className=s.className.replace(RegExp(' ?'+y),'')}; (a[n]=a[n]||[]).hide=h;setTimeout(function(){i();h.end=null},c); })(window,document.documentElement,'async-hide','dataLayer',4000,{'GTM-NG2RVR':true}); window.addEventListener("load", function(){ window.cookieconsent.initialise({ "cookie": { "name": "int_cookieconsent_status", "domain": "integrate-expo.com", "expiryDays": 3650 }, "palette": { "popup": { "background": "#000" }, "button": { "background": "#f66666" } }, "theme": "classic", "position": "bottom-right", "content": { "message": "This website uses cookies for proper functioning and enhancing the user experience. By clicking ‘Accept’ on this banner or using our site you accept our use of cookies.\nYou can also ‘Read More’ to view our Cookie Policy and learn how to control them.\n", "dismiss": "Accept", "link": "Read More", "href": "https://integrate-expo.com/cookie-policy/" } })}); piAId = '1014352'; piCId = ''; piHostname = 'go.integrate-expo.com'; (function() { function async_load(){ var s = document.createElement('script'); s.type = 'text/javascript'; s.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + piHostname + '/pd.js'; var c = document.getElementsByTagName('script')[0]; c.parentNode.insertBefore(s, c); } if(window.attachEvent) { window.attachEvent('onload', async_load); } else { window.addEventListener('load', async_load, false); } })();
21-23 Aug 2024
ICC, Sydney

Session Information

18-Aug, 16:00 - 16:50

Implementing Cybersecurity for IoT, AV, Media, and Workplace Technology within Enterprise Environments

AVIXA Education

Traditional methods and strategies for securing IT assets are not as effective within environments that contain devices like smart TVs, touch screens, cameras, AV-over-IP systems, microphones, speakers, sound masking devices, digital assistants, room sensors, and the like. And because an organization’s cyber resiliency is only as good as its weakest link, equal efforts must be made to secure these new types of devices and networks. This session covers several cybersecurity considerations for audiovisual environments, including the most common vulnerabilities and strategies on how to manage them. Topics covered include the importance of network discovery and continuous monitoring, asset identification, risk assessment, security configuration management, and tracking network media. Attendees will gain practical working knowledge on how to reduce the cyber risk from IoT, AV, and Workplace Technology and how to handle a cyber-attack.

CTS: 1 | CTS-D: 1 | CTS-I: 1


Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×