SlideShare a Scribd company logo
1 of 36
Kiana	
  Analy)cs	
  2018	
  
Disrupting Physical Security
Through Digitalization and IoT
Nader Fathi, CEO
www.kiana.io
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsKiana – IoP (Internet of Persons)
REMOTE LOCATION
ANALYTICS
EMPOWERING
PHYSICAL
SECURITY
Kiana
Analytics
*Awareness *Physical Security *Proximity Services
REAL-TIME
LOCATION SERVICES
2
www.kiana.io
Kiana	
  Analy)cs	
  2018	
  
•  Problem
•  IoT World
•  Possible Solutions
•  Examples
•  Privacy Considerations
•  Takeaways
Agenda
3
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsRecent US Mass Shootings
4
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsCorporations Grapple with Safety & Security Risks
5
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsWork Place Emergency and Safety
6
Kiana	
  Analy)cs	
  2018	
  
IoT: Connecting “Things” to the “Internet”
7
Source: http://jayblues.com/blog/
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsDigital Footprint
8
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsWiFi Everywhere
9
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsWiFi Players
10
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsBetter Visibility into the Customer Journey
11
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsRetail Example
Source: Centerstate Bank blog
12
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsConvention Center Example
13
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsWearables & IoT
14
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsSmart Lighting & Buildings
15
Kiana	
  Analy)cs	
  2018	
  
16
IoT Analytics
iOS AccurateAndroid
1 FIND DEVICE
Location Time Device ID
NO APPS REQUIRED
Footage Profile
2 CAPTURE DATA
In Real Time
Heat maps Pattern Traffic
3 ANALYZE
Kiana	
  Analy)cs	
  2018	
  
17
How do we Leverage Big Data?
Kiana	
  Analy)cs	
  2018	
  
18
Today’s Safety & Security Environment
	
  	
  
Security Camera (CCTV)
IT Security Guards
Emergency Team
Kiana	
  Analy)cs	
  2018	
  
19
IoT and Situational Awareness
Guard
Emergenc
y
Worker
Maintenance
Employee
Bad Actor
Kiana	
  Analy)cs	
  2018	
  
20
Security Camera Limitations
•  Face detection fail
•  Angle/Light
•  Environmental i.e., fog
•  Mask
•  No automated way to search video
•  People Counting Cameras not reliable
Wrong guys!
Where else?
Kiana	
  Analy)cs	
  2018	
  
21
IoT Path Analysis
Path Analysis
Visitor Analysis
Kiana	
  Analy)cs	
  2018	
  
22
Path, Camera Images + AI Analytics
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsExample Corporate Campus Safety & Security
§ Use existing infrastructure
§ Designated employees opt-in
§ Search & rescue
§ Alert unauthorized persons in or
around the building
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video Alerts
24
Intelligent Video Surveillance
•  Image-to-Device Association
•  Automated Video Footage Analysis
•  Forensic Analysis Tool
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video Alerts
25
Crowd Safety Analytics & Communications
•  Enhance Situational Awareness
•  Optimize Safety Procedures
•  Emergency Alerts &
Communications
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video Alerts
26
Benefits
Delivers Peace of Mind
Enhances Existing
Video Surveillance
Capabilities
Scalable
Existing Hardware
Passive, Always-On
Services
Optimizes Operations
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsRecently in the News – Can IoT Help?
27
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsA Note About Privacy
•  Signage
•  Cell Tracking
•  GDPR
•  Opt-In
•  Unions, etc.
•  Laws are changing. Talk to your lawyer
Note This is for reference only and is not intended to be a definitive authority on the subject of privacy
28
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsSecurity Cameras in London: 1 for every 14 people
29
Source: /www.caughtoncamera.net
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsSecurity Cameras
30
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsTransport for London Collecting WiFi MAC data
31
Kiana	
  Analy)cs	
  2018	
  
Forensic Analysis & Video AlertsCell Phone Location Tracking Laws By State
32
June 22, 2018
Kiana	
  Analy)cs	
  2018	
  
General Data Protection Regulation (GDPR)
33
Kiana	
  Analy)cs	
  2018	
  
Good Reference
34
Kiana	
  Analy)cs	
  2018	
   35
Takeaways
Augmenting security capabilities at campuses, stores and open
spaces through image device association, forensic analytics and
pattern tracking
Optimizing resource utilization through human capital planning,
asset management and foot traffic analytics
Enabling remote visibility by monitoring persons of interest
Kiana	
  Analy)cs	
  2018	
  
Q&A
email: nader @ kiana.io
Twitter: @ nader128

More Related Content

What's hot

IoT business models for Insurance
IoT business models for InsuranceIoT business models for Insurance
IoT business models for InsuranceUpgrade-Code.org
 
Civic api track amsterdam 27 march 2014
Civic api track amsterdam 27 march 2014Civic api track amsterdam 27 march 2014
Civic api track amsterdam 27 march 2014Katalin Gallyas
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceBit Stew Systems
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Manolis Nikiforakis
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the CloudAegify Inc.
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internetinside-BigData.com
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide shareBit Stew Systems
 
5 cool things you can do with the WSO2 IoT Server
5 cool things you can do with the WSO2 IoT Server 5 cool things you can do with the WSO2 IoT Server
5 cool things you can do with the WSO2 IoT Server WSO2
 
Keith Nakasone - Innovation In IT Acquisition
Keith Nakasone - Innovation In IT AcquisitionKeith Nakasone - Innovation In IT Acquisition
Keith Nakasone - Innovation In IT Acquisitionscoopnewsgroup
 
neXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event ReviewneXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event ReviewLeonard Lee
 
IoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesIoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesBart Jonkers
 
PhD and Post PhD Network Security Visualization Research
PhD and Post PhD Network Security Visualization ResearchPhD and Post PhD Network Security Visualization Research
PhD and Post PhD Network Security Visualization ResearchKulsoom Abdullah
 

What's hot (13)

IoT business models for Insurance
IoT business models for InsuranceIoT business models for Insurance
IoT business models for Insurance
 
Civic api track amsterdam 27 march 2014
Civic api track amsterdam 27 march 2014Civic api track amsterdam 27 march 2014
Civic api track amsterdam 27 march 2014
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine Intelligence
 
Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days Enterprise IoT solution in 30 days
Enterprise IoT solution in 30 days
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
Project Grace - Towards a Secure Internet
Project Grace - Towards a Secure InternetProject Grace - Towards a Secure Internet
Project Grace - Towards a Secure Internet
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
5 cool things you can do with the WSO2 IoT Server
5 cool things you can do with the WSO2 IoT Server 5 cool things you can do with the WSO2 IoT Server
5 cool things you can do with the WSO2 IoT Server
 
Keith Nakasone - Innovation In IT Acquisition
Keith Nakasone - Innovation In IT AcquisitionKeith Nakasone - Innovation In IT Acquisition
Keith Nakasone - Innovation In IT Acquisition
 
neXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event ReviewneXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event Review
 
IoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesIoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approaches
 
PhD and Post PhD Network Security Visualization Research
PhD and Post PhD Network Security Visualization ResearchPhD and Post PhD Network Security Visualization Research
PhD and Post PhD Network Security Visualization Research
 

Similar to Data Con LA 2018 - Physical Security via Digitization and IOT by Nader Fathi

CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Big Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AI
Big Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AIBig Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AI
Big Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AIMatt Stubbs
 
Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...
Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...
Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...Shift Conference
 
Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...
Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...
Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...Sogeti Nederland B.V.
 
Big Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYOND
Big Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYONDBig Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYOND
Big Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYONDMatt Stubbs
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTPeter Nguyen
 
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...Amazon Web Services
 
Beyond analytics: Prescriptive analytics for the future of your business by Á...
Beyond analytics: Prescriptive analytics for the future of your business by Á...Beyond analytics: Prescriptive analytics for the future of your business by Á...
Beyond analytics: Prescriptive analytics for the future of your business by Á...Big Data Spain
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applicationsconfluent
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016Ulf Mattsson
 
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Enterprise Management Associates
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
Top Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValueTop Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValueRapidValue
 
Cool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityCool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityAndrew Goldsmith
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldAgile Testing Alliance
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesCloudera, Inc.
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
 

Similar to Data Con LA 2018 - Physical Security via Digitization and IOT by Nader Fathi (20)

CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Big Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AI
Big Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AIBig Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AI
Big Data LDN 2018: ACCELERATING YOUR ANALYTICS JOURNEY WITH REAL-TIME AI
 
Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...
Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...
Shift AI 2020: Business benefits of privacy-preserving synthetic data | Sebas...
 
Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...
Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...
Revolutionising Testing with the Power of AI - Deepa Mamtani, Pillay Almira &...
 
Big Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYOND
Big Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYONDBig Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYOND
Big Data LDN 2018: THE NEXT WAVE: DATA, AI AND ANALYTICS IN 2019 AND BEYOND
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoT
 
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
A Data Driven Roadmap to Enterprise AI Strategy (Sponsored by Contino) - AWS ...
 
Beyond analytics: Prescriptive analytics for the future of your business by Á...
Beyond analytics: Prescriptive analytics for the future of your business by Á...Beyond analytics: Prescriptive analytics for the future of your business by Á...
Beyond analytics: Prescriptive analytics for the future of your business by Á...
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applications
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016
 
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
Next-Generation Network Packet Brokers: Defining the Future of Network Visibi...
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
Top Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValueTop Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValue
 
Cool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland SecurityCool Infographics: what venture capitalists tell us about Homeland Security
Cool Infographics: what venture capitalists tell us about Homeland Security
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real World
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use Cases
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 

More from Data Con LA

Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA
 
Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA
 
Data Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup ShowcaseData Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup ShowcaseData Con LA
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA
 
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA
 
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA
 
Data Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learningData Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learningData Con LA
 
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA
 
Data Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentationData Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentationData Con LA
 
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA
 
Data Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA
 
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA
 
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA
 
Data Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data ScienceData Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data ScienceData Con LA
 
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA
 
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA
 
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA
 
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA
 
Data Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with KafkaData Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with KafkaData Con LA
 

More from Data Con LA (20)

Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 Keynotes
 
Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 Keynotes
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 Keynote
 
Data Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup ShowcaseData Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup Showcase
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 Keynote
 
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendations
 
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA 2022 - AI Ethics
Data Con LA 2022 - AI Ethics
 
Data Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learningData Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learning
 
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
 
Data Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentationData Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentation
 
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
 
Data Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWS
 
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
 
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
 
Data Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data ScienceData Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data Science
 
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
 
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
 
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
 
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
 
Data Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with KafkaData Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with Kafka
 

Recently uploaded

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Data Con LA 2018 - Physical Security via Digitization and IOT by Nader Fathi

  • 1. Kiana  Analy)cs  2018   Disrupting Physical Security Through Digitalization and IoT Nader Fathi, CEO www.kiana.io
  • 2. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsKiana – IoP (Internet of Persons) REMOTE LOCATION ANALYTICS EMPOWERING PHYSICAL SECURITY Kiana Analytics *Awareness *Physical Security *Proximity Services REAL-TIME LOCATION SERVICES 2 www.kiana.io
  • 3. Kiana  Analy)cs  2018   •  Problem •  IoT World •  Possible Solutions •  Examples •  Privacy Considerations •  Takeaways Agenda 3
  • 4. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsRecent US Mass Shootings 4
  • 5. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsCorporations Grapple with Safety & Security Risks 5
  • 6. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsWork Place Emergency and Safety 6
  • 7. Kiana  Analy)cs  2018   IoT: Connecting “Things” to the “Internet” 7 Source: http://jayblues.com/blog/
  • 8. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsDigital Footprint 8
  • 9. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsWiFi Everywhere 9
  • 10. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsWiFi Players 10
  • 11. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsBetter Visibility into the Customer Journey 11
  • 12. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsRetail Example Source: Centerstate Bank blog 12
  • 13. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsConvention Center Example 13
  • 14. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsWearables & IoT 14
  • 15. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsSmart Lighting & Buildings 15
  • 16. Kiana  Analy)cs  2018   16 IoT Analytics iOS AccurateAndroid 1 FIND DEVICE Location Time Device ID NO APPS REQUIRED Footage Profile 2 CAPTURE DATA In Real Time Heat maps Pattern Traffic 3 ANALYZE
  • 17. Kiana  Analy)cs  2018   17 How do we Leverage Big Data?
  • 18. Kiana  Analy)cs  2018   18 Today’s Safety & Security Environment     Security Camera (CCTV) IT Security Guards Emergency Team
  • 19. Kiana  Analy)cs  2018   19 IoT and Situational Awareness Guard Emergenc y Worker Maintenance Employee Bad Actor
  • 20. Kiana  Analy)cs  2018   20 Security Camera Limitations •  Face detection fail •  Angle/Light •  Environmental i.e., fog •  Mask •  No automated way to search video •  People Counting Cameras not reliable Wrong guys! Where else?
  • 21. Kiana  Analy)cs  2018   21 IoT Path Analysis Path Analysis Visitor Analysis
  • 22. Kiana  Analy)cs  2018   22 Path, Camera Images + AI Analytics
  • 23. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsExample Corporate Campus Safety & Security § Use existing infrastructure § Designated employees opt-in § Search & rescue § Alert unauthorized persons in or around the building
  • 24. Kiana  Analy)cs  2018   Forensic Analysis & Video Alerts 24 Intelligent Video Surveillance •  Image-to-Device Association •  Automated Video Footage Analysis •  Forensic Analysis Tool
  • 25. Kiana  Analy)cs  2018   Forensic Analysis & Video Alerts 25 Crowd Safety Analytics & Communications •  Enhance Situational Awareness •  Optimize Safety Procedures •  Emergency Alerts & Communications
  • 26. Kiana  Analy)cs  2018   Forensic Analysis & Video Alerts 26 Benefits Delivers Peace of Mind Enhances Existing Video Surveillance Capabilities Scalable Existing Hardware Passive, Always-On Services Optimizes Operations
  • 27. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsRecently in the News – Can IoT Help? 27
  • 28. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsA Note About Privacy •  Signage •  Cell Tracking •  GDPR •  Opt-In •  Unions, etc. •  Laws are changing. Talk to your lawyer Note This is for reference only and is not intended to be a definitive authority on the subject of privacy 28
  • 29. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsSecurity Cameras in London: 1 for every 14 people 29 Source: /www.caughtoncamera.net
  • 30. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsSecurity Cameras 30
  • 31. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsTransport for London Collecting WiFi MAC data 31
  • 32. Kiana  Analy)cs  2018   Forensic Analysis & Video AlertsCell Phone Location Tracking Laws By State 32 June 22, 2018
  • 33. Kiana  Analy)cs  2018   General Data Protection Regulation (GDPR) 33
  • 34. Kiana  Analy)cs  2018   Good Reference 34
  • 35. Kiana  Analy)cs  2018   35 Takeaways Augmenting security capabilities at campuses, stores and open spaces through image device association, forensic analytics and pattern tracking Optimizing resource utilization through human capital planning, asset management and foot traffic analytics Enabling remote visibility by monitoring persons of interest
  • 36. Kiana  Analy)cs  2018   Q&A email: nader @ kiana.io Twitter: @ nader128