Brandon-Reich

Brandon Reich

Senior Director of Surveillance Solutions

Pivot3

Brandon Reich is a VP of Security and IoT for Pivot3. He came to Pivot3 in 2014 from Honeywell Security Group, where he led the Product Marketing and Global Strategy functions for the commercial and enterprise technology business unit. Prior to Honeywell, he spent 10 years leading a security consulting and engineering firm where he advised some of the world’s largest organizations in security technology strategy and deployment. He started his career as an ASIC design engineer for Nortel Networks and GE, and has a degree in Electrical Engineering and an MBA from the University of Louisville.

Sessions

Enterprise Technology Trends to Watch

Tuesday, July 30th
1:00pm2:00pm
Research firms forecast that video will produce 15.1 zettabytes of data annually – no other IoT application comes close to this rate of data production. This influx in data, as well as the growing adoption of video analytics and artificial intelligence, propels video to be used in a wide variety of ways. These trends enhance video’s value but also pose challenges, such as threats related to cybersecurity. This presentation explores how the latest innovations in IT enable users to better capture, store and protect data. Attendees will understand how data has become today’s “modern currency” and how deep learning enables you to pinpoint the exact data that is important to your business. Attendees will also learn how video data is affected by data privacy regulations like the Health Insurance Portability and Accountability Act and Europe’s General Data Protection Regulation and mandates encryption.

Learning objectives:
  • Establish why video will produce 15.1 zettabytes of data annually — no other IoT application comes close to this rate of data production
  • Infer how this influx in data, as well as the growing adoption of video analytics and artificial intelligence, propels video to be used in a wide variety of ways
  • Examine how the rise in the value of video transforms the need for robust cyber security protocols