IWCE is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Hurry! Early Bird Rates Expire at Midnight on February 7 >> Register Now to Secure Lowest Prices of the Year!


Cybersecurity and Infrastructure: Who Can and Should You Depend On?

Edward "Ted" Lawson  (Program Analyst, Cybersecurity and Infrastructure Security Agency)

Karen White  (Principal Engineer/Analyst, CTC Technology & Energy)

Karla Jurrens  (Texas Department of Public Safety, Deputy SWIC)

Chris Maiers  (Iowa Statewide interoperability Coordinator , Iowa Statewide Interoperable Communications System Board)

Travis Johnson  (Telecommunications Specialist, Cybersecurity and Infrastructure Security Agency (CISA))

Track : Cybersecurity / Security, Critical Infrastructure & Private Networks

Format: Short Course

Vault Recording: TBD

Emergency communications systems today are remarkably complex, often relying on capabilities in the form of infrastructure and services from entities outside the system host agency, to include critical functions such as power, data management, and technical support. Not only can these dependencies present challenges operationally, but such reliance might open the communications system to operational and cyber vulnerabilities that may not be well understood during system planning, acquisition, and implementation. In this panel, emergency communications experts will discuss steps agencies can take to ensure continuity of operations and system resiliency, as well as review resources from SAFECOM, the National Council of Statewide Interoperability Coordinators (NCSWIC), and the Cybersecurity and Infrastructure Security Agency (CISA) that can aid agencies in addressing vulnerabilities throughout the emergency communications system lifecycle.

Takeaway

1. How emergency communications systems and capabilities interconnect and depend on infrastructure or services outside of public safety agencies
2. How to prevent or mitigate cybersecurity incidents and service disruptions related to dependencies on non-agency infrastructure and services
3. How to build resiliency and redundancy into system planning and development
4. What resources are available to public safety agencies when cybersecurity incidents or interdependency failures occur, as well as resources available to prevent such disruptions