The Voice of Cyber®

KBKAST
Episode 287 Deep Dive: Leon Langlais | Sovereign Data Capability For The Physical Security Technology In The Modern World
First Aired: January 01, 2025

In this episode, we sit down with Leon Langlais, Chief Product Security Officer APAC at Genetec, as he discusses the pervasive cybersecurity gaps in both home and corporate networks. Leon delves into the consequences of inadequate updates and the critical need for secure, trusted devices, especially for critical infrastructures. We also explore regulatory debates, the role of state-owned vendors, and the integration of security from a product’s inception.

Leon has been with Genetec for five years having previously served in a multitude of technology leadership roles at Tyco across a near fifteen year tenure. Leon has previously worked as Senior Director of Growth Markets and Regional Strategy at Tyco Security Products, and Director of Product Management at Tyco Safety Products. Leon is an alumnus of the prestigious Universite de Sherbrooke and Polytechnique Montreal.

Help Us Improve

Please take two minutes to write a quick and honest review on your perception of KBKast, and what value it brings to you professionally. The button below will open a new tab, and allow you to add your thoughts to either (or both!) of the two podcast review aggregators, Apple Podcasts or Podchaser.

Episode Transcription

These transcriptions are automatically generated. Please excuse any errors in the text.

Leon Langlais [00:00:00]:
Companies should only interact with trusted vendors according to their own guidelines. The threats are constantly evolving. The only way that they can make their infrastructure secure is about working with trusted partners and having constant vigilance and not assuming that what they’re doing today is secure.

Karissa Breen [00:00:36]:
Joining me now is Leon Langley, Chief Product Officer, APAC from Genetec. And today, we’re discussing where physical security meets cybersecurity. So Leon, thanks for joining and welcome.

Leon Langlais [00:00:51]:
Thank you. I’m glad to be here.

Karissa Breen [00:00:53]:
So I wanna start perhaps, Leon, with your view on how physical security intersects with cybersecurity.

Leon Langlais [00:01:01]:
There’s a lot of intersection between, physical security and cybersecurity. There’s been a strong push from the physical security space, to more IP devices. And I think today, everything is IP based and server based. And as part of the physical security, it’s about protecting people, assets, and we gather a lot of information that are pretty sensitive on people, on the business, the activity of the business. There is also the physical security infrastructure is now, very critical to operations, for a lot of businesses. On top of gathering information, if, those, the system gets compromised, it can have a lot of adverse effect on the, operations of, those, businesses. Definitely a big intersection in between and a need to protect that infrastructure and the data it generates. Also, when it comes to physical security, I think the number of devices that, actually get deployed on, company premises have exploded in terms of complexity, in terms of variety as to what they do.

Leon Langlais [00:02:20]:
So a good example of that is IOT devices. Most of them are IP based today. And, more and more of those devices are connected to the network and can pose a significant threat to cyber security. Another angle of intersection, the physical security software do not work in isolation anymore. Especially in the enterprise space are connected to many, enterprise wide applications. So if we talk about a single sign on application, if we talk about HR management system, ERP, and the list can go on and on depending on, what type of businesses, you are in. As such, any compromise of the physical infrastructure, physical security infrastructure can have some deep implications, for, the company. Also, we’re moving into more and more sensors that gather, person personal identifiable, data on users.

Leon Langlais [00:03:24]:
So we’re talking here about biometrics or facial recognition, biometric templates, and things related to the identity of people, their license plate, some identification number, and things of that nature. And it’s more and more critical that, the sensitive data gets protected. And in case of any breach, it can create fairly severe impact to, first of all, the personnel, and second of all, the the company and its reputation.

Karissa Breen [00:03:53]:
So you’ve spoken a lot around physical and cyber operating in their independent silos. Obviously, now things need to integrate more and work well together. I was just literally interviewing someone before around OT versus IT that they need to sort of, you know, operate a little bit more harmony. So what how do you see that sort of, you know, physical side sort of working a bit more with cybersecurity? I mean, I’ve previously been security while myself, and we had a physical security team, but they sat nowhere near us. So it did feel even if it was, you know, in terms of distance, there was a gap there. But what do you sort of see? How can these sort of 2 teams work in tandem versus isolation?

Leon Langlais [00:04:36]:
Well, the the trend has started several years ago where IT got more and more involved into the physical security space. We’ve seen many examples where actually the IT department very often will have the without sign up from the IT security, physical security cannot go ahead. And we’ve seen many examples where the IT security actually, owns a significant portion of the budget to deploy the physical security. So the time where both would work independently, I think is gone. And in most organization now, to physical security, but the IT will definitely get involved to assess to physical security, but the IT will definitely get involved to assess the threat from a, cybersecurity perspective, from a data perspective, and we’ll need to sign off on anything that gets deployed in their network. And they go beyond just the product. They will also very often ask questions around what type of certifications do we have? As you’ve done penetration tests, in context of very high security, end users, we’ve seen them also request that they perform their own penetration tests on our solutions and our products to make sure that they meet the highest standards that they have. So there is more and more interaction.

Leon Langlais [00:05:59]:
And I don’t think approaching physical security, without thinking about that department is no longer a thing. I think it they’re both equally important in the decision process.

Karissa Breen [00:06:10]:
Do you think from your experience people are still approaching it without thinking about physical and cyber sort of being well, you know, being on the same page?

Leon Langlais [00:06:20]:
So people have a tendency to minimize some of those aspects. What we’ve seen also, very often people think about cybersecurity, and and they believe in what we call we like to call silver bullets. So they they’re like, oh, well, I have a firewall. Or in certain cases, my system is disconnected from the internet, so I’m protected. And, and, and there’s many angles of attack. So minimizing the risk that your physical infrastructure poses from a cybersecurity standpoint is very dangerous. And we see that trend is quickly changing, but we still see a lot of people that are either not seeing the risk or minimizing it when it comes to the the physical infrastructure.

Karissa Breen [00:07:07]:
And from your experience, how where do people sort of forget when it comes to, like, physical security?

Leon Langlais [00:07:14]:
I think what people forget is that very simple attack are very efficient to bridge the vast majority of organization. One of the most basic attack is default username and password. And you would be surprised about how many cameras out there in the wild still have the basic manufacturer username and password, and it has never been changed. So, just this simple practice is very important to security infrastructure. And this applies, I’m talking about cyber, IP camera, but it applies to a router. It applies to really any IoT or IP devices deployed on your network. Another thing that is quite simple and that is often not done in most company is keeping your infrastructure up to date. So, as threats evolve, new vulnerabilities are identified and very often manufacturers will come out with, new versions of firmware to In many cases, if in many cases.

Leon Langlais [00:08:31]:
If you have, I don’t know, 10,000 IP camera updating the firmware on them is a daunting task. It’s not something that is simple. In Genentech, we’ve spent, part of our engineering around cybersecurity building tools to alleviate and make this kind of an automated one click update process from a firmware vault that we control. So ensuring that the firmwares that are available have been tested, vetted, and that the actual process to update the infrastructure is simple and not too expensive for customers. So changing simple username and password, making sure all of your applications are up to date, that there’s no known vulnerabilities that are being deployed and used, currently in use in your infrastructure are very simple ways, but they are very effective at protecting you. Now, that in itself is not enough, But if you do not have that, this is the foundation of all your protection. And if you don’t do this well, no matter what else you do, you will be, very vulnerable to cyberattack and penetration attacks.

Karissa Breen [00:09:42]:
Okay. So you wanna go you mentioned something before about, you know, manufacturing of, like, physical, like, devices. I only use perhaps maybe like a router, for example. So you would probably know better than myself, but a lot of people, when you go to, like, their house, like, oh, here’s my WiFi. And it’s like the standard syntax in which the manufacturer slash the, you know, telcos provider that you’ve you’ve gone and procured. And then it’s like, oh, here’s the standard password. But then CyberArk criminals know that syntax in which, you know, have those SSID numbers. Right.

Karissa Breen [00:10:16]:
And that syntax. So I think that you’re saying absolutely makes sense. So why are people just defaulting to just the standard way rather than updating? It’s because they just genuinely don’t know, they can be bothered, don’t have enough time. What would you sort of attribute that to?

Leon Langlais [00:10:32]:
Well, it depends. Right? For a company, I think it’s a matter of, cost, difficulty visibility. For homeowners, let’s say, if I we take the example of a homeowner, how often do people in their lives go to the website, let’s say, of their router manufacturer to see if there’s a vulnerability, if there’s a firmware update? How many people have the knowledge to actually know that not changing the username and password poses a threat and that people can gain access to your home network simply by leveraging fairly simple attacks. So, I think there’s a knowledge gap. And if I switch back to, let’s say, the corporate world, it’s really down to visibility and, and how easy it is to do, right? If you don’t have an easy way to update all of your IoT infrastructure, to monitor it, to track the vulnerabilities in a simple manner, update them, you’re simply not gonna do it. Then it becomes a cost benefit and you will accept the risk. You’ll say, okay, how probable is it that I’m gonna get attacked versus how much it’s gonna cost me to keep my, my maintenance up to date? There was some example of some cyber attack in the US where there was a fairly large amount of user record that were compromised. And this happened because the IT department of a large corporation decided, let’s wait to deploy the updates to combine it with another update in order to reduce our costs.

Leon Langlais [00:12:07]:
And during the 3 months it took them to update to the latest, there was a vulnerability that was exploited and millions of records were stolen. So, it’s important to do it in a timely manner, but it’s a very expensive and labor intensive task dependent on how you are organized. It’s something we need to do as a community. I’m talking to physical community to make it easy for people to do the right thing and to make sure that they have, better visibility as to the threat that their infrastructure is pausing and make it as making it as easy as possible for them to update their infrastructure and close potential threats.

Karissa Breen [00:12:48]:
And just following this a little bit more on example, the router for, you know, on not necessarily being secure. It was just sort of, you know, defaulting to the default settings. I’ve asked the question historically to people around while why are the manufacturers, like, trying to make it more secure? And the question is, well, sure. But one, they’re not going to be as profitable because it’s going to cost more money. And if they were to do that, they’re going to then push those costs onto the consumers. So do you think we’ll ever get to the stage where we are manufacturing better slash more secure devices with the intent of, well, perhaps we don’t have the problem, you know, down down the road and we’re not kicking that can down the road. Do you think we’ll ever get there though? And then also, do you think that any of these sort of, you know, on the physical hardware side of things, do you think it’ll ever be more so regulated, whether this has to be a thing that companies do? What are your thoughts then on that?

Leon Langlais [00:13:40]:
Yeah. I I definitely think we’re moving towards there. The industry as a whole needs to to to increase the the level of practice and produce better secured devices. There’s many ways of doing this, sign firmware, with technology, example, making sure you have a TPN switch that signs your hardware, ensuring that this is the original hardware from the manufacturer. There is a component of cost to it, but I do not think there is any choice that we need to evolve there. The ransomware, the data theft are costing a lot of, money, to the society and to the end user and reputational damage. I’ve seen some ransomware attack where some end users had to pay 1,000,000 of dollars to pirates because, they couldn’t operate anymore. And they had no choice.

Leon Langlais [00:14:36]:
The pirates came in and they just encrypted the entire server and, they didn’t have time to fix it or rebuild their infrastructure. So, they have no choice to pay for it. So, it’s very costly. Now, I’m not going to lie to say that cost is still a very important factor in our industry. And I’ve seen a lot of end users take unsecured devices. I’m going to, again, take an, an example of IP based camera. So they will take unreliable IP cameras because they are way more cheaper than, I would say, more reliable options. They don’t perceive the risk that those devices can pass to the infrastructure.

Leon Langlais [00:15:18]:
A good example I can give you is in Europe, we had a fairly critical infrastructure that went for a state owned camera vendors, that is, really non secured. And in 2017, Genentech as a business, we took the decision to ban certain devices, that we deemed unsecured from state owned. And in that particular case, that end user was trying to force our hand and say, no, we, we have selected the, those IP cameras and you need to integrate them into your product or, we will pass the project and we will not be using Genentech in our infrastructure. After a deliberation, we decided to pass on the deal and we decided not to compromise on cybersecurity. And what happened to that site is several months later, it’s a fairly large installation. We’re talking thousands of IP camera. All the infrastructure, contacted, China at the same time. And it was detected by the threat intrusion.

Leon Langlais [00:16:23]:
And they contacted us again, asking us, what could be done to prevent those cameras from going outside. We advised them that the only options that they had was to replace the camera because they are not secured devices. And ultimately that end user came back to Genetech, switched back their entire infrastructure to replace every single IP cameras that they deployed to more secure and more trusted vendors. They put in Genetix. So since then they’re still an end user of ours. So saving money on that initial IP camera deployment seemed like a good deal to them, but ultimately, and it ended up costing them a lot more in the long term. And, they were very afraid that when they saw all those camera contacting China, it increased their awareness that this was a real threat to their infrastructure. If they would’ve been hacked, in this context, they have not been hacked, it could have paused significant business risk to them.

Leon Langlais [00:17:23]:
So, then they started realizing that the risk that unsecured infrastructure is pausing to their business greatly outweighs the cost or the cost of the infrastructure itself. We’ve seen more and more governments. I think the 5 high countries. So, US, Canada, UK, Australia, and New Zealand have come together. And, they’ve started expelling some of those untrusty devices from critical and government infrastructure, because they really pause threat to national security. And they also pause threat to those critical infrastructure for cybersecurity attacks. So, I think there is more and more awareness coming from all sides and users from governments. And us as an industry in physical security, we need to continue to push that narrative that, you know, cybersecurity is very important and it cannot be, looked in isolation to physical security.

Leon Langlais [00:18:26]:
They go hand in hand. We need to elevate the bar, I think in our in our industry.

Karissa Breen [00:18:31]:
So just go with your example a little bit more. Would you say that was definitely the case for the Huawei deployment, for everything you’re

Leon Langlais [00:18:39]:
saying? No. It was a camera vendor. It wasn’t Huawei. It was Hikvision.

Karissa Breen [00:18:43]:
No. No. But I’m saying that the same, like, well, you know, the obviously Chinese vendor, and then they were worried about, you know, national security. That was the same sort of concern as Huawei.

Leon Langlais [00:18:54]:
The thing is, for us, it’s not about Chinese vendor. It’s about state owned vendors. Huawei is definitely one of them. And and Huawei is is not supported within Genetec. So you cannot connect a Huawei product to the Genetec software. It’s a notion of state ownership, and it’s a notion of unsecured devices. And it’s a mix of both, when it comes to, those types of devices.

Karissa Breen [00:19:21]:
Would you say that probably in recent time or recent years, is anything in terms of any product coming from certain regions, governments in Australia perhaps are just really concerned, like, going even that extra mile. Like, you look what we don’t even look at the sanctions, for example. Like, obviously that was, you know, related to a specific war. But even when that sort of came out, we started to see sanctions implemented across different parts of the world. And I believe there was a security vendor, conspiracy. They got impacted by that. Now, whether they were related or weren’t related, that’s other people’s, you know, opinions. But just a result of them being a Russian based security company, they were basically banned.

Karissa Breen [00:20:07]:
Are you starting to see that more happening, though? It just depends on where some of these companies are located. This is an immediate ban.

Leon Langlais [00:20:16]:
I think there’s more and more awareness about the threats, that, those state owned companies can pause. Will some people ban it based solely on, oh, it’s Russian or it’s Chinese, let’s ban it? Maybe. But I, I, I don’t think that’s necessarily gonna be the case, but I think some people are very concerned about we saw the, the war in Ukraine when, when Russia started the war in Ukraine. And, there’s been a lot of activities on the cyber front when it comes to that war up to hacking, unsecured camera devices deployed in cities by Russian secret services to see when they send their initial waves of missile. Did we miss the target? Did we hit the target? Where did the missile end? You can also hack those devices, start doing denial of service attack. So you can really bring down some critical infrastructure. So I’m thinking from a governmental standpoint, there will definitely be more regulations around this and more concerns. Yesterday I read in the news that, the Canadian government, started banning, part of TikTok in Canada based on cyber on national security grounds.

Leon Langlais [00:21:34]:
And I think we’ll see more and more of that. Now from a business standpoint, it really depends on what type of business you have. I think if you take, small retail shop, it might be more difficult for them to start banning some of those lower cost product because the cost component will not go away. I don’t think the cost component will go away. Let’s say in in the context of a Russian, you know, like, let’s say a Russian antivirus product, Are people comfortable? Should banks be comfortable with this? Should government agency be comfortable with this? I’ll let them decide. But for us at Genentech, we took a strong stance against state owned enterprise, and especially if they are linked to military or secret services.

Karissa Breen [00:22:21]:
Those are great points. And I think that and I asked that question because, like, you’re right on the, you know, the state side of it in terms of state ownership. It was just more so what I’m seeing come up a lot in the media and just like commentary, just even just someone just being based in certain regions is like automatic. No. Probably that’s being also backed up by current world affairs. That’s happened in the last few years. It’s probably a lot of being stemmed from that in terms of the decision. Would you say so like moving forward with things that are going on well, there was a very large election this week.

Karissa Breen [00:22:53]:
So do you think things are still going to progress in that direction around your state? I would one thing just certain parts of the world, we will start to see, like, countries like Australia, for example, just completely banning it altogether because of the the risk or the, you know, the the potential risk that some of these, you know, certain areas in in the world pose perhaps? Like, it’s I’ve seen it come through more and more in recent times.

Leon Langlais [00:23:19]:
There’s a few things here. First is a significant portion of attacks are coming from insider threats. So, I’m going back to nationality here. So as a company, especially large organization, your own employees can pose a significant threat to your own infrastructure. So it’s not always gonna be external agent. It can be internal agent. And those attack can be as simple as simply plugging a US an infected USB device in one of your computer at work. And from that infected devices, the, your network gets compromised and people start infecting your network and, and, and whatever they they’re trying to achieve penetrating your infrastructure.

Leon Langlais [00:24:06]:
So, the background on employee, the high assurance of identities of employee is very important. And as part of cybersecurity, we’ve been talking a lot about technology, but an important aspect to protect yourself, I think is it has to do with policies and governance. When it comes to policies and governance, to protect yourself effectively, I think where you are in the world matters a lot. So a good example is let’s say you are allowed to approve, I don’t know, a $1,000,000 of expense in your company because you’re the CFO of the company. Well, maybe you can approve that $1,000,000 if you’re sitting in your office, but maybe if you’re traveling to China or you’re on a business trip to Indonesia, maybe your approval rating becomes, I don’t know, 5,000 or maybe it’s 0 depending on the country. So, where you are from, I think is an important aspect that needs to be taken into consideration. I think it’s going to evolve to something more dynamic, especially trying to identify unusual patterns. Like, why is this person approving this type of expanse from this area? This seems unusual.

Leon Langlais [00:25:25]:
So that entire policies and governance around your activity is a very important aspect. There was I don’t know if you read it, but I think it was a year ago or 2 years ago, there was a deep fake attack in Hong Kong from an Hong Kong bank. And they use real time deep fake technology, and they simulated the CFO of a large bank with 2 staff from that same bank. And they called the person to convince them to transfer. At the time it was 200,000,000 Hong Kong dollar to another account. The employee did the transfer because the deep fake attack had the real face of the CFO and the real voice of the CFO. And it was a live call with 2 additional people saying that they approve and that they authorized. It’s for a special project.

Leon Langlais [00:26:18]:
It’s super urgent. And the person transferred the money. So, the first question is there’s a few question coming from this. How do you protect yourself from such an attack? Because it was very convincing and we can’t blame the employee of doing this. So for me, it becomes a matter of governance. Like how can you transfer $200,000,000 There should be proper check and balances to make sure that there’s it’s a real project and approval from known I known email address, known, known tools within the company. It gets very complicated very fast. So, where people are coming from or where those state agents are is important, but I think in the context of governance, in the context of policies.

Karissa Breen [00:27:04]:
Yes. I did I did see that incident. I read about that incident. That was quite prolific, I think in terms of in the media on what was going on, which I think sort of set the scene of what’s yet to come. So I I wanna switch gears slightly and I wanna get your thoughts on physical security sort of being a little bit more secure and following this talk track a bit. So do you think people just expect physical security devices to just be secure, kind of like turning on the electricity. Like, you don’t really think about how it works. You just know it turns on.

Karissa Breen [00:27:40]:
But when it doesn’t turn on, you’ve got a problem. Sussar has developed a pledge to ensure that security is sort of built in more from, like, a software perspective. But what do you think we can learn from that pledge? It was developed in the in the US. So do you is there anything that we can take from that pledge that can be sort of implemented into the physical sort of device side of things?

Leon Langlais [00:28:05]:
Yes, definitely. People tend to minimise the risk. So we’ve seen, I’ve seen this quite a lot in dealing with end users and SIs where we explain to them the risk caused by certain devices. People either minimize the risk or it’s a cost component, but they decide to accept that risk. And then they think that the way their infrastructure, will protect them. So they have a good firewall, or some say, no, my system is disconnected from the internet, so I’m secured. And they tend to believe that they have a silver bullet that protects them and don’t see the evolving nature of cybersecurity threats, and how important it is to choose a device. And we like to advise, our customers that they should adopt a defense in-depth strategy when it comes to cybersecurity.

Leon Langlais [00:29:06]:
And as part of that defense in-depth, one of the layers we, we segmented in 3 layers, one of the layer is the actual, technology or cyber technology layer, which we’re trying to educate people that cybersecurity is really not a feature. So what you described, I think some people think it’s a feature and that it should come in it, but it’s not a feature. Cybersecurity is something that needs to be built in at the inception of a product. It goes beyond technology. Technology is an important point, but it’s also how you develop the product. It’s also the best practices, that you have in place and that is being followed by your engineering team. So one good example of that is, are you using open source software? Well, do you track that open source? Do you know if there’s no vulnerability in that open source? Because in today’s world, most application use a lot of those open source. They, they interact a lot with different various APIs and SDKs.

Leon Langlais [00:30:08]:
And all of these can cause a threat. So you will buy product from a company, let’s say company A, and they’re in that, in, in that product, there’s 20 different open source software that you are not exposed to and that you will not know they pose a threat to you. So I think as an industry, like building product secure from the inception of the product and through the entire life cycle of the product. It’s not just when you release a product, it’s done and my product’s cyber secure. I tick the feature box and it’s good. I think it’s something that require constant vigilance, constant communication. And as a manufacturer, we need to communicate any vulnerabilities very rapidly in a very honest and transparent manner and provide the fixes in a very short timeframe. So, you are right.

Leon Langlais [00:31:04]:
I think people expect it to work out of the box, but that’s not the case. Even if it’s a good product, there needs to be constant vigilance around it. People tend to minimize the risk. And there’s a cost factor where people tend to just accept the risk because they simply don’t want to spend the money. And I think this is ill advised because a cybersecurity incident can be very damaging to a business, very costly, and very bad for reputation. So and then in case of government, it can be even worse than that. So

Karissa Breen [00:31:38]:
So I’m just curious to know. So, I mean, you raise a great point, you know, security by design, you know, defense in-depth. Why is it now as a community society, whatever you wanna call it, is only thinking about, oh, well, maybe we should look at the manufacturing, the security element of that. Why wasn’t that ever considered initially when creating, for example, a router? Is it because it just came down to it was cheaper to cut corners? No one thought about it? What do you think went up? What happened there?

Leon Langlais [00:32:07]:
Implementing proper cybersecurity processes, developing proper secured products from a cybersecurity standpoint is not an easy task. It’s very difficult. It require more effort to do. It requires also a lot of knowledge. So, there is a definitely a knowledge component. So, when it comes to physical security, I think there was a knowledge gap for many vendors throughout the years, simply on how to properly secure the cost component, organizational component. You need to have full time teams that are really just focused on cybersecurity because you can never rest. It’s constantly evolving.

Leon Langlais [00:32:55]:
You always need to be very, careful monitoring, doing product modification. So I think it’s more than just a technology play. It’s a knowledge play. It’s a process play. And it’s not easy to do. It’s a very complex, it’s very complex to implement. And I read a study 2 years ago in Asia, one of the biggest problem most end user face is a lack of talent and knowledge when it comes to cybersecurity. They cannot hire enough people.

Leon Langlais [00:33:29]:
There’s simply not enough people available to fill all the position required to security infrastructure and we can train the people fast enough. So the technology needs to evolve to make this easier. Also explain a part of the push to cloud and some people are simply going to 3rd party consultant when it comes to their IP infrastructure, because they can’t manage it internally. It’s, it’s a very daunting task. We see in Australia, especially the government making a very strong push for critical infrastructure with IRAP and Essential 8. So IRAP is a very complete cybersecurity, guideline where, we’re in the process of, of, making all of our product compliant or cloud product compliant to IRAP. Where we got to have explained all the tools, processes that we have in place, all the technologies that we have as part of our products. And, it’s going to be audited by an independent auditor.

Leon Langlais [00:34:31]:
And we’re going to be able to provide a report to the IT departments of the various end users. And then they’re going to be able to leverage that report and do a risk assessment based on their specific realities and the, the various, the various practices that we have. And it will allow them to better select, I would say, the vendors for which they’re gonna interact with when it comes to software and various devices.

Karissa Breen [00:34:59]:
So, Leon, do you have any closing comments or final thoughts you’d like to leave our audience with today?

Leon Langlais [00:35:05]:
For many years, the physical security space has not taken cybersecurity seriously enough, I would say. We’ve been working very hard to raise awareness at all levels. So, within the community, so with our old tech partners, we have a lot of discussion on how we can make mutual products more secure and elevate the cybersecurity practice within the physical security space. We’ve also been raising awareness, government and users. And at every type of events that we do, we’re trying to raise awareness around cybersecurity and the threat that they paused. There’s a lot of education that needs to be done. I would invite anyone, listening to this podcast to think about their own policies. Company, should have strong policies around it and interact with vendors that have strong policies.

Leon Langlais [00:36:04]:
They should have evaluation of the technologies and the partners that they’re gonna bring in to their companies and make sure that they have proper policies in place when it comes to cybersecurity. And that they should only interact with trusted vendors according to their own guidelines. The threats are constantly evolving. The only way that they can make their infrastructure secure is about working with trusted partners and and adding constant vigilance and not assuming that what they’re doing today is secure and and be appraised of threats. Start with the simple things like changing username, passwords, making sure the infrastructure is up to date. Just that is already gonna be something big to help elevate, I would say, the the level of protection we have in Ireland.

Share This