SlideShare a Scribd company logo
1 of 9
Download to read offline
PANEL DISCUSSION: How to be Cyber Secure Airport
Infrastructure Issues
Moderator: Philip Baum, Editor, Aviation Security International
Panellists:
Dominic Nessi, Deputy Director & Chief Information Officer, Los Angeles World Airports
Marc Pearl, President and CEO, Homeland Security & Defense Business Council
Dr John McCarthy,ServiceTec Research Fellow, Cranfield University / UK Defence Academy
How to be Cyber Secure:
Airport Infrastructure Issues
• * * * * * * *
Marc Pearl
President & CEO
Homeland Security & Defense Business Council
WHAT DOES “CYBER SECURE” MEAN?
• Much more than traditional notions of
passwords and firewalls
• “Cyber secure” is NOT a one-size-fits-all
concept…
• Need to balance risk v. probability and cost v. benefit
• “Definition” is up to each individual airport authority
• As you all well know: “Cyber” now extends into
almost every facet of airport infrastructure.
• Network
• Physical
• Human
1. Network Security
• The most closely linked to “cyber”
• Threat level: Wide and varied
• Numerous layering/overlapping –
oftentimes missing network coordination
• Major consequences of network breach
• Loss of integrity;
• Loss of availability; and
• Loss of confidentiality
2. Physical Security
• Still one of the most important aspects of
security
• Far more interconnected with network security
than ever due to increasing technological
advances
• Encompasses: CCTV security cameras,
intrusion detection systems, perimeter lighting,
and CBRNE detection
3. Human Component of Security
• Airports – Veritable Melting Pots of different
types, classes, security-level of personnel.
• Cyber-security is only as good as the humans
that operate and oversee it.
• Is it better to screen all workers or to train them
to spot suspicious behavior?
• Is/should it even be a trade off?
How Does 1 + 1 + 1 = 4?
• Cannot work on the 3 elements in isolation
• True/Real cybersecurity is based on the symbiotic
and cooperative interaction of all 3 elements.
• No one single component of security will protect
airport infrastructure.
• Including both physical and electronic ensures that
threats can be mitigated as “far down/away from the
supply chain” from the critical vulnerabilities as possible.
• Farthest circle can be thought of as the intelligence on
threats long before they even reach the airport and the
closest can be the final ticket or baggage check before
boarding the plane.
Litmus Test – Questions To Ask
• Is the approach/idea economically reasonable?
• Will the approach/idea be technologically
feasible?
• Have we thought through the unintended
consequences of implementing this
approach/idea?
Thank You!!
Marc Pearl
mpearl@homelandcouncil.org
+1 202 470 6441
www.homelandcouncil.org

More Related Content

What's hot

Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
 
The New Arms Race: Operations in the Cyber Electromagnetic Domain
The New Arms Race: Operations in the Cyber Electromagnetic DomainThe New Arms Race: Operations in the Cyber Electromagnetic Domain
The New Arms Race: Operations in the Cyber Electromagnetic DomainLeonardo
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2DroneSec
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA AdamAdler10
 
UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019ChadCogan
 
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...DroneSec
 
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Bikram Kumar Sinha
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42DroneSec
 
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli ALIAS Network
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...Investorideas.com
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrialSherid444
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
 
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...Marco Lisi
 

What's hot (20)

Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
Drone forensics
Drone forensics Drone forensics
Drone forensics
 
The New Arms Race: Operations in the Cyber Electromagnetic Domain
The New Arms Race: Operations in the Cyber Electromagnetic DomainThe New Arms Race: Operations in the Cyber Electromagnetic Domain
The New Arms Race: Operations in the Cyber Electromagnetic Domain
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
 
UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019
 
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
 
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
The need for security
The need for securityThe need for security
The need for security
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42
 
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
 
SIA-Q1-2016
SIA-Q1-2016SIA-Q1-2016
SIA-Q1-2016
 

Similar to Airport security 2013 cyber security panel discussion

Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015Paul F. Roberts
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxNune SrinivasRao
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxharrisonhoward80223
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
An infosec watershed moment
An infosec watershed momentAn infosec watershed moment
An infosec watershed momentRob Ferrill
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxDIPESH30
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Claus Cramon Houmann
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfEN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfssuser886cfe
 
EN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfEN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfVinay379568
 
certifieced ethical hacker course old an
certifieced ethical hacker course old ancertifieced ethical hacker course old an
certifieced ethical hacker course old anradio02moura
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systemsEinar Landre
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems Einar Landre
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdfssuserfb92ae
 

Similar to Airport security 2013 cyber security panel discussion (20)

Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Cyber security
Cyber securityCyber security
Cyber security
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
An infosec watershed moment
An infosec watershed momentAn infosec watershed moment
An infosec watershed moment
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfEN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
 
EN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfEN-Ethical Hacking.pdf
EN-Ethical Hacking.pdf
 
certifieced ethical hacker course old an
certifieced ethical hacker course old ancertifieced ethical hacker course old an
certifieced ethical hacker course old an
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 

More from Russell Publishing

Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Russell Publishing
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRussell Publishing
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Russell Publishing
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailRussell Publishing
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailRussell Publishing
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilRussell Publishing
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)Russell Publishing
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)Russell Publishing
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicRussell Publishing
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Russell Publishing
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Russell Publishing
 

More from Russell Publishing (20)

Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Denis castanet
Denis castanetDenis castanet
Denis castanet
 
Tim gray
Tim grayTim gray
Tim gray
 
Kari rouhonen
Kari rouhonenKari rouhonen
Kari rouhonen
 
Gunther koller
Gunther kollerGunther koller
Gunther koller
 
David thomasson
David thomassonDavid thomasson
David thomasson
 
Carl bjorgan
Carl bjorganCarl bjorgan
Carl bjorgan
 
Johnny sorenson
Johnny sorensonJohnny sorenson
Johnny sorenson
 
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF Security
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern Rail
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Airport security 2013 cyber security panel discussion

  • 1. PANEL DISCUSSION: How to be Cyber Secure Airport Infrastructure Issues Moderator: Philip Baum, Editor, Aviation Security International Panellists: Dominic Nessi, Deputy Director & Chief Information Officer, Los Angeles World Airports Marc Pearl, President and CEO, Homeland Security & Defense Business Council Dr John McCarthy,ServiceTec Research Fellow, Cranfield University / UK Defence Academy
  • 2. How to be Cyber Secure: Airport Infrastructure Issues • * * * * * * * Marc Pearl President & CEO Homeland Security & Defense Business Council
  • 3. WHAT DOES “CYBER SECURE” MEAN? • Much more than traditional notions of passwords and firewalls • “Cyber secure” is NOT a one-size-fits-all concept… • Need to balance risk v. probability and cost v. benefit • “Definition” is up to each individual airport authority • As you all well know: “Cyber” now extends into almost every facet of airport infrastructure. • Network • Physical • Human
  • 4. 1. Network Security • The most closely linked to “cyber” • Threat level: Wide and varied • Numerous layering/overlapping – oftentimes missing network coordination • Major consequences of network breach • Loss of integrity; • Loss of availability; and • Loss of confidentiality
  • 5. 2. Physical Security • Still one of the most important aspects of security • Far more interconnected with network security than ever due to increasing technological advances • Encompasses: CCTV security cameras, intrusion detection systems, perimeter lighting, and CBRNE detection
  • 6. 3. Human Component of Security • Airports – Veritable Melting Pots of different types, classes, security-level of personnel. • Cyber-security is only as good as the humans that operate and oversee it. • Is it better to screen all workers or to train them to spot suspicious behavior? • Is/should it even be a trade off?
  • 7. How Does 1 + 1 + 1 = 4? • Cannot work on the 3 elements in isolation • True/Real cybersecurity is based on the symbiotic and cooperative interaction of all 3 elements. • No one single component of security will protect airport infrastructure. • Including both physical and electronic ensures that threats can be mitigated as “far down/away from the supply chain” from the critical vulnerabilities as possible. • Farthest circle can be thought of as the intelligence on threats long before they even reach the airport and the closest can be the final ticket or baggage check before boarding the plane.
  • 8. Litmus Test – Questions To Ask • Is the approach/idea economically reasonable? • Will the approach/idea be technologically feasible? • Have we thought through the unintended consequences of implementing this approach/idea?
  • 9. Thank You!! Marc Pearl mpearl@homelandcouncil.org +1 202 470 6441 www.homelandcouncil.org