Defense in Depth-Is Your P25 System Really Secure?
Stephen Nichols (Executive Director, Project 25 Technology Interest Group)
Scott Wright (Senior Telecommunications Engineer 2, Connecticut Department of Emergency Service and Public Protection)
Nina Koshinski (Chief of Radio Operations Engineering & Support, Pennsylvania State Police PA-STARNet)
Alan Massie (Standards - Encryption Manager , FBI)
James Downes (Senior Advisor for Encryption and P25 Standards and Security. , DHS CISA)
Track: Government & Enterprise
Topics: Cybersecurity, Interoperability, LMR, Project Management, PTT, Regulatory & Legal + Standards, Situational Awareness
Format: Panel Session
Vault Recording: TBD
Interest in communications security and encryption is growing. Learn how P25 offers "Defense-in-Depth" through multiple layers of security services. Hear about updated P25 standards offering improved, secure communications and encryption key management. Real world examples of security operating in P25 systems today will be presented by knowledgeable experts from the FBI, State of Connecticut, and the Commonwealth of Pennsylvania.
Detailed descriptions for three case studies of P25 Security Services will be presented:
Pennsylvania is a leader in the deployment of P25 Authentication to validate the identity of subscriber units (SUs) to ensure they are legitimate.
The State of Connecticut offers End-to-end 256 bit AES encryption for secure interoperable exchange of voice and data across multiple P25 LMR systems in the State. Lessons learned and best practices for multiple agency deployments will be shared.
P25 LMR Interoperability with the FBI and other federal agencies requires careful planning and key management. Learn about the requirements to share secure channels with federal agencies.
Takeaway
- How is P25 Security deployed today in Connecticut, Pennsylvania and with the FBI?
- What are the three unique Security Services available for P25 LMR Systems?
- What protection does each P25 Security Service offer to Government and Public Safety user agencies?
- What new improvements are available for Key Management in P25 Systems using the recently updated P25 key fill interface (KFI) and Inter KMF Interface (IKI)?