IWCE is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Advanced Persistent Cyber Threats (APTs) Are Wearing Us Out

James "Jim" Jarvis  (Emergency Communications Coordinator, Cybersecurity and Infrastructure Security Agency (CISA))

Location: W230A

Date: Tuesday, March 26

Time: 3:35 pm - 4:05 pm

Track: State & Local Government, Incident Management

Topic: Cybersecurity

Format: Power Session

Vault Recording: TBD

The Cybersecurity and Infrastructure Security Agency (CISA) leads the Nation's effort to understand, manage, and reduce risk to our cyber and physical infrastructure. A key part of that goal is collaboration with stakeholders both public and private through events like IWCE 2024. Advanced Persistent Cyber Threats (APTs) are trying to wear out and disrupt our public safety, schools, health care systems, emergency managers, and managed service providers. Their malignant software and sophisticated techniques are increasingly targeting managed service providers (MSPs). MSPS use a variety of remote management and monitoring software tools to support their customers' networks. This presentation will provide attendees with actionable information about CISA services to protect their emergency communications systems. It will also provide an overview of the extent of APTs working as proxies for nation-state adversaries impacting law enforcement, fire, and emergency management. This is timely in light of the tsunami wave of cyber-attacks affecting smaller jurisdictions and rural areas who lack IT resources to deal with cyber issues.

Key Takeaways:
1. Have a more in-depth understanding of the serious APTs that are impacting law enforcement, fire, and emergency management.
2. Learn cybersecurity strategies that can help their organization/agency to better protect their emergency communications systems.
3. Learn more about the impacts of cyber-attacks on smaller jurisdictions and rural areas.