ESX 2019 Registration
Next Session


Friday, June 22 | 11:00AM-12:00PM

The Evolving Cyber Threat for Connected Devices and Cloud-based Services
Friday, June 22, 2018 11:00AM - 12:00PM
Ransomware, headless worms, machine-to-machine attacks - oh my! Threats from malware will continue to challenge the Internet of Things (IoT), affecting technology environments for both homes and businesses. The large number of connected devices presents an unprecedented opportunity for cybercrime to increase dramatically. How does this affect your company from a legal perspective, knowing that dealers and integrators are installing more connected devices, offering more cloud-based services, and touching more network environments? We’ll explore the legal ramifications associated with being connected in a playground of intelligent and vulnerable devices. In this session, you’ll learn:
• How cyber threats can affect your company and customers
• Why contract language must be updated to address cyber crime
• How you can minimize your risks from customer cyberattacks
101 D
Craig Carstens photo
Craig Carstens
Product Manager, Video and Cybersecurity
UTC Climate Controls & Security
Craig has 17 years of experience in the physical security industry, beginning with the intrusion manufacturer ITI in 2001, then continuing through the GE and UTC acquisitions, ultimately expanding into video and transmission products. He has worked throughout the Americas managing training and application engineering efforts for UTC, and application engineering and system integration eventually led Craig to a passion for cybersecurity equal to that for physical security. This ultimately led him to his current role of managing the cybersecurity process for Interlogix video and transmission product development. He holds a Masters of Arts in Spanish from Wichita State University and completed a Masters of Applied Science in Information Security at the University of Denver in 2016. He speaks fluent Spanish and Portuguese.
Salvatore D'Agostino photo
Salvatore D'Agostino
Salvatore (Sal) D’Agostino is CEO and founder of IDmachines and leads its consulting practice and deployment of the Eidola technical automation platform. Sal has 30+ years in design, integration, operation and maintenance of identity, access control, security, automation, machine intelligence and intelligent infrastructure projects around the world. Past projects and infrastructure delivered includes; US Capitol and Pentagon security systems, EZ Pass and other intelligent transport systems, 100+ industrial automation systems and numerous government and enterprise security, access control and ID programs.
Timothy Pastore photo
Timothy Pastore
Duval & Stachenfeld LLP
Timothy J. Pastore is a Partner in the New York law firm of Duval & Stachenfeld LLP.

Previously, he was an officer and Judge Advocate General (JAG) in the U.S. Air Force and a Special Assistant U.S. Attorney with the U.S. Department of Justice.

Mr. Pastore has represented some of the largest companies in the security industry, including Comcast, Charter, Time Warner Cable, Cox, Altice, Mediacom, Protection One and others. He regularly provides counsel on risk management, contracting, operations, licensing, sales practices, etc. Mr. Pastore also has served as lead counsel in courts throughout the country in over fifty distinct litigation matters involving the security industry.

Among other examples, Mr. Pastore led the successful defense at trial of cable giant Comcast in a home invasion case in Seattle, Washington. The case received significant press attention and was heralded by CVN as a top-ten defense verdict for 2015.

Mr. Pastore hosts an annual security summit of the large cable companies and electronic security service providers. The summit focuses on industry best practices and risk mitigation.

Mr. Pastore is a graduate of Bucknell University and Boston College Law School.

He can be reached by telephone at (212) 692-5982 or by e-mail at
Rodney Thayer photo
Rodney Thayer
Convergence Engineer
Smithee Solutions LLC
Rodney Thayer is a network infrastructure consultant with a practice focusing on physical security. He advises on the design, deployment, troubleshooting, and validation of network-connected physical security systems used for access, monitoring, and intrusion detection. He has decades of experience in software development with embedded systems, network protocols, and cryptography. He has implementation experience with a variety of crypto-based protocols including TLS. He participates in standards development focusing on the use of certificates and related cryptographic schemes. He is the maintainer of the libosdp open source implementation of SIA's OSDP protocol. He is a member of the ASIS IT Security council and has contributed to several IETF RFC's.

In addition to consulting he has written articles and product reviews and presented at conferences and delivered training courses for RSA, Black Hat, and privately as well as at conferences including ISC West, ASIS, Cloud+. His current areas of research include network stress testing of IoT devices, digital certificates & dual-key cryptography, and encrypted communications using TLS. He consults on the implementation of network security controls with a variety of clients from end user organizations through vendor supply chain partners delivering physical security solutions. Sponsor Logo