Physical Security: Introductory Applications and Technology

Feb. 25, 2013 - Feb. 28, 2013

Learn how to identify and manage the most cost-effective products and services that positively impact security effectiveness and business value. Maximize existing systems with the appropriate improvements. Capitalize on utilizing or integrating with legacy devices while producing improved results. Learn the pitfalls of delivery and scheduling.

Arkadiusz Warguła / iStock / Getty Images Plus via Getty Images
Maliciously crafted inputs can exploit machine learning models at the algorithmic level, bypassing traditional cybersecurity defenses.
Pakhnyushchyy / iStock / Getty Images Plus via Getty Images
Advocates highlight that with proper oversight and adherence to the Five Cs — Community Engagement, Civil Liberties Protection, Common Procedures, Clear Oversight, and Cybersecurity — drones can enhance public safety without compromising civil rights.