Breakouts & Training

 

Training


Thomas Badger

Secure Your Footprint – A review of best practices for system hardening  (ASIS certified) 

Securing your system’s digital footprint is increasingly becoming a top priority. From edge devices and infrastructure to software and networking, all components play a key role in boosting and ensuring cybersecurity. Learn more about Genetec’s system hardening best practices and tools to improve your system’s security posture. 

 

Thomas Badger

Amplify Your Training – How to leverage a Learning Management System to enhance professional education (ASIS certified) 

Digital learning has revolutionized the way we train our staff. Onboarding team members, driving technology adoption, and creating a culture of performance improvement can all be optimized and enhanced through a Learning Management System. Discover how to leverage advanced functionality to create hybrid and on-demand training to meet your team’s goals.

 

Charles Pitman

Looking back at Security Center 5.10 and forward to 5.11

Discover some of the major innovations introduced in Genetec Security Center 5.10 and get a preview of what’s to come with Security Center 5.11. The latest major release of our unified security platform broadens operators’ ability to aggregate and interact with operational data while enhancing your on-the-ground staff’s visibility into security. We’ll show you how you can leverage Security Center 5.10 to bridge the gap between on-premises and the cloud, maintain cyber-hygiene over the lifecycle of your system, and ensure regulation compliance. Likewise, we’ll give a sneak peek at how we’re improving access to Security Center across media and providing new flexibility when deploying security in hybrid environments.

 

François Brouillet

Time for an upgrade? What to consider when upgrading your access control system (ASIS-certified)

A modern IP-based access control system helps you maximize your investment by improving all areas of your business. From real-time occupancy management to the monitoring of your enclosures, the possibilities are endless. Likewise, upgrading your access control system can improve your cybersecurity and reduce your risk of a cyberattack. In this course, we’ll take a look at the various aspects and steps to consider when migrating to a new access control system.

Breakouts


Francois Brouillet

Mark Feider

Think outside the door 

Access control systems have significantly evolved over the last decade. Modern access control solutions offer flexibility, ensure cybersecurity, and provide ROI. During this session we’ll discuss what you can gain from today’s access control system and considerations as you build a migration strategy. We’ll share insights and examples from effective solutions in a variety of vertical markets. We’ll also discuss our new enclosure management solution that replaces traditional mechanical locks and enables you to manage, monitor, and secure your remote enclosures. 

 

John Burger

Laurent Villeneuve

Security infrastructure – your system backbone 

Have your cake and eat it too. Explore the Genetec infrastructure vision via connected appliances that enable an easy transition to hybrid-cloud, with a special focus on multi-site operations such as banking, retail, and businesses with remote or unmanned sites. Appliance infrastructure ensures your system achieves its full potential while being protected from external threats. This session will center on how to protect your data and deployment with multiple layers of cybersecurity, best practices and how to achieve ongoing system health with connected services.  

 

Larry Legere

Lucia Di-Sclafani

The next frontier of license plate recognition 

Providing situational awareness of who is on-premises when an incident occurs or getting notified when an unwanted vehicle is approaching is of crucial to occupant safety.  Join us to learn how a solar-powered ALPR solution lets you go beyond traditional license plate recognition to help solve crime. Take a look at how a cloud-based software leverages advanced analytics like vehicle characteristics and driving behaviors can keep your community safe. Also on the agenda is how full-scale collaboration can be achieved by removing complexities of deployment, following cybersecurity best practices, and fostering collaboration between local stakeholders. 

 

Nicholas Mathe

Scott Thomas

Leveraging video for business operations & process improvement 

Video is a powerful tool that most organizations have access to, but one that few departments can take advantage of. While typical usage trends towards security and safety scenarios, enabling easier access to recordings for adjacent departments (legal, operations and risk) allows video to be leveraged for other purposes such as claims management, process improvement and operations review. Join us to learn how you can facilitate secure and streamlined video sharing with other stakeholders for improved business outcomes. 

 

Gabriel Labrecque

Mortimer Hubin

Extend the reach of your security – How to take unification to the next level

Learn how to seamlessly connect your security and operational systems and help your organization achieve your immediate and long-term goals. Discover how we’ve pushed the boundaries of unification through recent advancements in our data ingestion, automation, and guidance solutions. Use standard protocols and formats to tap into existing data sources in your environment, without overwhelming your operators. Once incorporated, collaborative incident management qualifies events and alarms, cutting through the noise to trigger an automated or operator-led response only when necessary. Leverage unification to the fullest whether you are in the control room, in the field, or at a remote location thanks to enhancements to our web and mobile solutions.