Wayne Dorris

Wayne Dorris
Business Development Manager - Cybersecurity, Axis CommunicationsA 25+ year industry veteran, Wayne Dorris, CISSP, is the cybersecurity business development manager for Axis Communications covering North America. In this capacity, Dorris generates awareness and assists with cyberstrategy and demand in Axis products. He also influences IP solutions for all segments of Axis’ business relative to cybersolutions. Prior to joining Axis, Dorris held the position of applications and field sales engineer for other security manufacturers. He also served nearly 10 years as the technical security director for a major fortune 150 company. Dorris is currently an active member of ASIS.
Round table contributions
As cutting-edge trends go, convergence has been around for at least two decades. The meaning has shifted over the years, and if anything, the idea of convergence has gotten even more aspirational. Unf...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in r...
Protecting video involves many of the same strategies and protocols as those used to protect any other type of data. In the world of IP cameras and systems, video can be transmitted anywhere in the wo...
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, mode...
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of clou...
Articles by Wayne Dorris
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security profe...
News mentions
As cutting-edge trends go, convergence has been around for at least two decades. The meaning has shifted over the years, and if anything, the idea of convergence has gotten even more aspirational. Unf...
Axis Communications announced that the company has achieved the System and Organisation Controls (SOC 2®) Type 1 attestation for its cloud-based solutions, Axis Cloud Connect and AXIS Device Manag...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in r...
Protecting video involves many of the same strategies and protocols as those used to protect any other type of data. In the world of IP cameras and systems, video can be transmitted anywhere in the wo...
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, mode...
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of clou...
Cyber security concerns regularly top the list of things that keep business leaders up at night. The threat landscape is constantly shifting and evolving, as determined malicious actors launch new att...
Key people from Axis
Security experts
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download