Chris Peckham

Chris Peckham

Chief Operating Officer

Building Intelligence

Christopher Peckham is currently the Chief Operating Officer of Building Intelligence Inc. where he is responsible for operations including software development, project management, customer deployments, and partner management. Previously he served as the Senior Vice President, CTO and Special Projects at Kratos Public Safety & Security Solution, Inc. In his capacity as the CTO, he led efforts on complex projects and programs and was the primary driver of the technology efforts that maintained the company’s innovations in emerging trends. Dr. Peckham received his Ph.D., M.S., and B.S. in electrical engineering from New Jersey Institute of Technology and his M.B.A. from Rutgers University. He is a certified information systems security professional (CISSP) and a licensed professional engineer in the state of NJ.


The Cloud and You: Cybersecurity in the Cloud

Wednesday, July 31st
The cloud has revolutionized the scale and security of physical security operations, reducing maintenance and provisioning time and redirecting those efforts to the actual practice of security; however, even with the major cloud service providers ramping up security and implementing world class cybersecurity procedures, these back-end practices do not always translate to security on endpoint applications, as standards and APIs must be configured securely by customers. This session will take attendees through the recommended on-premises procedures of deploying a security application securely on the major cloud services.

In this session, attendees will learn how to:
  • Explore the NIST framework and how it can be applied to complex systems and how the uses of this framework can reduce the concerns of deploying systems, both internally and in the cloud
  • Differentiate between the major cloud service providers: Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. This understanding will also include how basic cybersecurity principles are covered and managed within each environment.
  • Examine monitoring, multi factor authentication, software maintenance, upgrades, and deployments in a cloud environment

Session Slides