Will Knehr

Will Knehr
Senior Manager of Information Security and Data Privacy, i-PROWill Knehr is the Senior Manager of Information Assurance and Data Privacy at i-PRO Americas, Inc. where he works to secure their products and networks. He has been working to secure networks since 2004 when he started his career in Cryptologic Warfare conducting cyber defense missions for the NSA, CMF, DoN, DoD, and DISA – helping to defend, accredit, certify, and provide digital forensics and incident response on the Nation’s most sensitive and secure networks. He also worked for Northrop Grumman supporting special projects for the NSA and DISA building virtualized environments for malware analysis, data brokering, and managing their cybersecurity program. He has a Master’s Degree in CyberSecurity and another Master’s Degree in Business. He holds many certifications including CISSP, PMP, CEH, CNDA, CASP, CMMC RP, and many more.
Round table contributions
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network ex...
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and im...
Time flies in the busy world of security, so it’s no surprise that the midpoint of 2023 comes before know it. Let’s pause after the first half of the year to look ahead at what can expect...
A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in r...
Protecting video involves many of the same strategies and protocols as those used to protect any other type of data. In the world of IP cameras and systems, video can be transmitted anywhere in the wo...
Some systems and assets are so vital that their incapacity or destruction would have a debilitating impact on security, economic security, public health or safety, or any combination of those factors....
For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protect...
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of clou...
News mentions
The Security Industry Association (SIA) has named 24 recipients for this year’s SIA RISE Scholarship, a program offered through SIA’s RISE community, which supports the...
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network ex...
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
At ISC West 2024 in booth # 10037, i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for surveillance and public safety, will showcase its newly releas...
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and im...
“Ask any security vendor how cybersecure their solutions are, and you’ll most likely be told ‘it’s great’, but how can we objectively measure the relative cyber-worthines...
Time flies in the busy world of security, so it’s no surprise that the midpoint of 2023 comes before know it. Let’s pause after the first half of the year to look ahead at what can expect...
The Security Industry Association (SIA) has announced the schedule, speaker lineup, and programme for the 2023 AcceleRISE conference, hosted by SIA’s RISE community for young leaders and those n...
A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in r...
Protecting video involves many of the same strategies and protocols as those used to protect any other type of data. In the world of IP cameras and systems, video can be transmitted anywhere in the wo...
Some systems and assets are so vital that their incapacity or destruction would have a debilitating impact on security, economic security, public health or safety, or any combination of those factors....
At ISC West 2023 in booth # 10037, i-PRO Co., Ltd., a global pioneer in professional security solutions for surveillance and public safety, will showcase multiple new products, including new multi-sen...
For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protect...
At ISC East 2022 in booth # 918, i-PRO Co., Ltd., a pioneer in professional security solutions for surveillance and public safety, will showcase the latest enhancements to its line of products, includ...
The Security Industry Association (SIA) reiterates its commitment to cybersecurity as the 2022 Cybersecurity Awareness Month – observed every October – begins. “Whether your company...
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of clou...
Key people from i-PRO
Security experts
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadSecurity practices for hotels
Download2025 Trends in video surveillance
DownloadMaximising security and performance
Download