SecurityDNA podcast recap: how to understand and respond to cybersecurity threats to physical security systems

July 24, 2023
In this episode of SecurityDNA, join host Steve Lasky of SecurityInfoWatch and guest Will Knehr, senior manager of information assurance and data privacy at i-PRO Americas.

As cyber-threats continue to grow increasingly sophisticated, many organizations struggle to keep up. When physical security systems are neglected, they become progressively more susceptible to attacks by malicious actors who know how to exploit their exact vulnerabilities. Will Knehr, who began his career in cryptologic warfare in 2004 and has remained a pillar of the security industry since, understands the threat presented to organizations with legacy physical security systems and how easily they can be targeted and hacked.

In this episode of SecurityDNA, join host Steve Lasky of SecurityInfoWatch and guest Will Knehr, senior manager of information assurance and data privacy at i-PRO Americas, as they discuss a wide range of topics, including the advent of Zero Trust initiatives, evolving security trends over the years, and the critical vulnerabilities present when utilizing legacy equipment.

Will Knehr: “Hackers have been living on critical infrastructure networks inside the US using tools that were just built into these devices and networks. Among some of these were IoT devices like camera systems, access control systems, and other security systems. These endpoints we have out there, whether they're security systems, ring cameras, or smart fridges, are great inventions that make our lives easier, but they also create vulnerabilities inside of our networks that hackers can take advantage of.”

Following a long and storied career in security, Knehr knows keenly how easily older physical security systems can be backdoored, "lived in" by hackers, and even used as conduits for data siphoning. Learn about how Knehr identifies and addresses security trends, the ways in which he believes end-users and integrators can come to better understand the vulnerabilities present in physical security systems, and why he places faith in Zero Trust initiatives to transform access control for the better.

Find this month’s episode of Security DNA here or listen below.


  • How small vulnerabilities can add up to massive cybersecurity threats.
  • The impact that new security players, like AI, will have on the cybersecurity scene.
  • How hackers can thrive in legacy security networks and equipment.
  • Why Zero Trust systems are being implemented to revolutionize security.
  • The evolution - or lack thereof - of the most successful and prevalent types of cyber-threats.


Sponsored Recommendations

Appdome releases new defenses to combat accessibility malware

Two of the most advanced variants focus on Android banking apps - BrasDex in Latin America and Xenomorph in the U.S. and Europe use Automated Transfer Systems (ATS) malware.

DigiFlight, Inc. welcomes Michael Perrin as Senior Vice President, National Intelligence

With a career spanning 27 years in the U.S. Department of Defense (DoD) and 20 years in the intelligence community, Perrin will serve as DFI's primary point of contact for all...

Sternum shines with UL Solutions’ Diamond Level Qualification for IoT defense

With this UL qualification, Sternum’s Embedded Security and IoT Observability platform is a leading full stack solution that delivers unparalleled runtime protection and continuous...

GSX highlights PKOC demonstration

With PKOC, interoperability is simple, the credential is secure with PKI level authentication and there is no cost for a PKOC compatible credential.