Breakout
AI Attacks on Physical Security Systems: What Government Buyers Should Require
AI is accelerating real-world attacks against physical security environments—from deepfake voice calls that bypass verification, to AI-assisted reconnaissance that finds exposed cameras, intercoms, and video management system (VMS) interfaces faster than ever. This session breaks down how adversaries are using AI across the attack life cycle, with practical examples of where physical security systems most commonly fail. Attendees leave with a vendor-neutral set of technical and procurement requirements government buyers can use to reduce risk.
Speaker
-
Will KnehrDirector of IT and Cybersecurity/Global Cybersecurity Advisor
i-PROWill Knehr leads enterprise IT and cybersecurity with a business-first approach, helping organizations reduce risk, meet compliance expectations, and modernize technology while enabling growth. As director of IT and cybersecurity and global cybersecurity advisor at i-PRO Americas, he translates security, regulatory and customer requirements into practical programs that improve resilience, streamline operations and strengthen customer trust in regulated markets.
Knehr’s work spans enterprise security strategy, governance, incident readiness, identity and endpoint security, vulnerability management and cloud and network hardening. He has led successful audit and compliance outcomes including SOC 2 Type II and PCI-DSS, aligns controls to CMMC Level 2 and NIST-based frameworks, and draws on prior Navy experience supporting NSA/DISA environments.


