IWCE is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

LMR Networks are Vulnerable to Cyberattacks and Costly Recovery

Moderator:

Pam Montanari  (Emergency Communications Coordinator, Cybersecurity and Infrastructure Security Agency (CISA))

Panelists:

Jason Matthews  (Sergeant, Lake County Sheriff’s Office)

Sean McCloskey  (Chief of Cybersecurity, CISA Region 4, Cybersecurity and Infrastructure Security Agency (CISA))

Rob Richardson  (Senior Account Executive , Motorola Solutions)

Location: W230A

Date: Wednesday, March 27

Time: 10:10 am - 11:10 am

Track: Federal Government, First Responder Communications

Topic: Cybersecurity, Interoperability, LMR, System Resiliency

Format: Panel Session

Vault Recording: TBD

Imagine hearing traffic through your Land Mobile Radio (LMR) system that officers are under fire and need immediate back-up. Now imagine learning that message came from someone who had hijacked the LMR system so they could falsely direct officers to an ambush. Not only is this a possibility, but it is an increasing possibility as LMR systems today employ a wide variety of complex networking technologies. They include components ranging from those commonly found in the Internet Protocol (IP) networks of most any business or enterprise to components and technologies unique to wireless, including push-to-talk group communications. Cybersecurity increasingly becomes a concern as this complexity grows. This presentation will show how similarly the networks are designed and why we need to be aware of known exploited vulnerabilities (KEV). They can impact the daily and emergency operations of first responders and public safety operators. Given limited resources, important decisions must be made about how much an agency should invest in cybersecurity. Furthermore, important decisions must be made about prioritizing prevention, detection, and other cybersecurity functions. Understanding the impacts and costs of eradication and recovery as well as the indirect losses from cyber incidents can help to inform these and other essential decisions. Real-world examples will be shared by panelists to provide an overview of new technologies and how they can be compromised, including where there have been known incidents of security being breached.

Key Takeaways:
1. Be able to identify risks to your LMR network.
2. Be aware of known exploited vulnerabilities (KEVs) that could be present in your network.
3. Learn how to prevent and detect attacks on LMR systems.