This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Cybersecurity and Infrastructure: Who Can and Should You Depend On?
Edward "Ted" Lawson (Program Analyst, Cybersecurity and Infrastructure Security Agency (CISA))
Karla Jurrens (Texas Department of Public Safety, Texas SWIC)
Chris Maiers (Iowa Statewide interoperability Coordinator , Iowa Statewide Interoperable Communications System Board)
Travis Johnson (Emergency Communications Coordinator, Cybersecurity and Infrastructure Security Agency (CISA))
Richard Tenney (Senior Advisor, Public Safety Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA))
Date: Wednesday, March 23
Time: 10:15 am - 11:30 am
Track: Cybersecurity / Security, Critical Infrastructure & Private Networks
Format: Short Course
Vault Recording: TBD
Emergency communications systems today are remarkably complex, often relying on capabilities in the form of infrastructure and services from entities outside the system host agency, to include critical functions such as power, data management, and technical support. Not only can these dependencies present challenges operationally, but such reliance might open the communications system to operational and cyber vulnerabilities that may not be well understood during system planning, acquisition, and implementation. In this panel, emergency communications experts will discuss steps agencies can take to ensure continuity of operations and system resiliency, as well as review resources from SAFECOM, the National Council of Statewide Interoperability Coordinators (NCSWIC), and the Cybersecurity and Infrastructure Security Agency (CISA) that can aid agencies in addressing vulnerabilities throughout the emergency communications system lifecycle.
1. How emergency communications systems and capabilities interconnect and depend on infrastructure or services outside of public safety agencies
2. How to prevent or mitigate cybersecurity incidents and service disruptions related to dependencies on non-agency infrastructure and services
3. How to build resiliency and redundancy into system planning and development
4. What resources are available to public safety agencies when cybersecurity incidents or interdependency failures occur, as well as resources available to prevent such disruptions