LMR Networks are Vulnerable to Cyberattacks and Costly Recovery
James "Jim" Jarvis (Emergency Communications Coordinator, Cybersecurity and Infrastructure Security Agency (CISA))
Jason Matthews (Sergeant, Lake County Sheriff’s Office)
Sean McCloskey (Chief of Cybersecurity, CISA Region 4, Cybersecurity and Infrastructure Security Agency (CISA))
Rob Richardson (Senior Account Executive , Motorola Solutions)
Date: Wednesday, March 27
Time: 10:10 am - 11:10 am
Track: Federal Government, First Responder Communications
Topic: Cybersecurity, Interoperability, LMR, System Resiliency
Format: Panel Session
Vault Recording: TBD
Imagine hearing traffic through your Land Mobile Radio (LMR) system that officers are under fire and need immediate back-up. Now imagine learning that message came from someone who had hijacked the LMR system so they could falsely direct officers to an ambush. Not only is this a possibility, but it is an increasing possibility as LMR systems today employ a wide variety of complex networking technologies. They include components ranging from those commonly found in the Internet Protocol (IP) networks of most any business or enterprise to components and technologies unique to wireless, including push-to-talk group communications. Cybersecurity increasingly becomes a concern as this complexity grows. This presentation will show how similarly the networks are designed and why we need to be aware of known exploited vulnerabilities (KEV). They can impact the daily and emergency operations of first responders and public safety operators. Given limited resources, important decisions must be made about how much an agency should invest in cybersecurity. Furthermore, important decisions must be made about prioritizing prevention, detection, and other cybersecurity functions. Understanding the impacts and costs of eradication and recovery as well as the indirect losses from cyber incidents can help to inform these and other essential decisions. Real-world examples will be shared by panelists to provide an overview of new technologies and how they can be compromised, including where there have been known incidents of security being breached.
1. Be able to identify risks to your LMR network.
2. Be aware of known exploited vulnerabilities (KEVs) that could be present in your network.
3. Learn how to prevent and detect attacks on LMR systems.