SlideShare a Scribd company logo
1 of 9
Download to read offline
PANEL DISCUSSION: How to be Cyber Secure Airport
Infrastructure Issues
Moderator: Philip Baum, Editor, Aviation Security International
Panellists:
Dominic Nessi, Deputy Director & Chief Information Officer, Los Angeles World Airports
Marc Pearl, President and CEO, Homeland Security & Defense Business Council
Dr John McCarthy,ServiceTec Research Fellow, Cranfield University / UK Defence Academy
How to be Cyber Secure:
Airport Infrastructure Issues
• * * * * * * *
Marc Pearl
President & CEO
Homeland Security & Defense Business Council
WHAT DOES “CYBER SECURE” MEAN?
• Much more than traditional notions of
passwords and firewalls
• “Cyber secure” is NOT a one-size-fits-all
concept…
• Need to balance risk v. probability and cost v. benefit
• “Definition” is up to each individual airport authority
• As you all well know: “Cyber” now extends into
almost every facet of airport infrastructure.
• Network
• Physical
• Human
1. Network Security
• The most closely linked to “cyber”
• Threat level: Wide and varied
• Numerous layering/overlapping –
oftentimes missing network coordination
• Major consequences of network breach
• Loss of integrity;
• Loss of availability; and
• Loss of confidentiality
2. Physical Security
• Still one of the most important aspects of
security
• Far more interconnected with network security
than ever due to increasing technological
advances
• Encompasses: CCTV security cameras,
intrusion detection systems, perimeter lighting,
and CBRNE detection
3. Human Component of Security
• Airports – Veritable Melting Pots of different
types, classes, security-level of personnel.
• Cyber-security is only as good as the humans
that operate and oversee it.
• Is it better to screen all workers or to train them
to spot suspicious behavior?
• Is/should it even be a trade off?
How Does 1 + 1 + 1 = 4?
• Cannot work on the 3 elements in isolation
• True/Real cybersecurity is based on the symbiotic
and cooperative interaction of all 3 elements.
• No one single component of security will protect
airport infrastructure.
• Including both physical and electronic ensures that
threats can be mitigated as “far down/away from the
supply chain” from the critical vulnerabilities as possible.
• Farthest circle can be thought of as the intelligence on
threats long before they even reach the airport and the
closest can be the final ticket or baggage check before
boarding the plane.
Litmus Test – Questions To Ask
• Is the approach/idea economically reasonable?
• Will the approach/idea be technologically
feasible?
• Have we thought through the unintended
consequences of implementing this
approach/idea?
Thank You!!
Marc Pearl
mpearl@homelandcouncil.org
+1 202 470 6441
www.homelandcouncil.org

More Related Content

What's hot

Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Positive Hack Days
 
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
ALIAS Network
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
Investorideas.com
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
Sherid444
 

What's hot (20)

Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
Drone forensics
Drone forensics Drone forensics
Drone forensics
 
The New Arms Race: Operations in the Cyber Electromagnetic Domain
The New Arms Race: Operations in the Cyber Electromagnetic DomainThe New Arms Race: Operations in the Cyber Electromagnetic Domain
The New Arms Race: Operations in the Cyber Electromagnetic Domain
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
 
ADAM ADLER FLORIDA
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
 
UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019UAS Threat to Aviation - January 2019
UAS Threat to Aviation - January 2019
 
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
The State of Drone Security – Analysing 1000+ drone incidents (Mike Monnik) -...
 
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
Database management for Secured operation of Aircraft by Bikram Kumar Sinha, ...
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
The need for security
The need for securityThe need for security
The need for security
 
Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42Weekly UAV Threat Intelligence - DroneSec Notify #42
Weekly UAV Threat Intelligence - DroneSec Notify #42
 
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
INNOVATIVE TECHNOLOGIES IN RPAS by Sarah Bardelli
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
Security in Large, Strategic and Complex Systems: Challenges and Solutions_Li...
 
SIA-Q1-2016
SIA-Q1-2016SIA-Q1-2016
SIA-Q1-2016
 

Similar to Airport security 2013 cyber security panel discussion

Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
DIPESH30
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Airport security 2013 cyber security panel discussion (20)

Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Cyber security
Cyber securityCyber security
Cyber security
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
An infosec watershed moment
An infosec watershed momentAn infosec watershed moment
An infosec watershed moment
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdfEN-Ethical-Hacking-2023-18-08-03-26-15.pdf
EN-Ethical-Hacking-2023-18-08-03-26-15.pdf
 
EN-Ethical Hacking.pdf
EN-Ethical Hacking.pdfEN-Ethical Hacking.pdf
EN-Ethical Hacking.pdf
 
certifieced ethical hacker course old an
certifieced ethical hacker course old ancertifieced ethical hacker course old an
certifieced ethical hacker course old an
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 

More from Russell Publishing

Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Russell Publishing
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF Security
Russell Publishing
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Russell Publishing
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Russell Publishing
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern Rail
Russell Publishing
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Russell Publishing
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)
Russell Publishing
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
Russell Publishing
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Russell Publishing
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Russell Publishing
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Russell Publishing
 

More from Russell Publishing (20)

Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Elisabeth sinclair
Elisabeth sinclairElisabeth sinclair
Elisabeth sinclair
 
Denis castanet
Denis castanetDenis castanet
Denis castanet
 
Tim gray
Tim grayTim gray
Tim gray
 
Kari rouhonen
Kari rouhonenKari rouhonen
Kari rouhonen
 
Gunther koller
Gunther kollerGunther koller
Gunther koller
 
David thomasson
David thomassonDavid thomasson
David thomasson
 
Carl bjorgan
Carl bjorganCarl bjorgan
Carl bjorgan
 
Johnny sorenson
Johnny sorensonJohnny sorenson
Johnny sorenson
 
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
Stephen Thomas, QPM Assistant Chief Constable, Operations, British Transport ...
 
Robin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF SecurityRobin Forrest, International Relations, SNCF Security
Robin Forrest, International Relations, SNCF Security
 
Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)Richard Aaroe, CEO, WaveTrainSystems (WTS)
Richard Aaroe, CEO, WaveTrainSystems (WTS)
 
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network RailPeter Guy, Operational Security & Continuity Planning Manager, Network Rail
Peter Guy, Operational Security & Continuity Planning Manager, Network Rail
 
Martyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern RailMartyn Guiver, Head of Crime Management, Northern Rail
Martyn Guiver, Head of Crime Management, Northern Rail
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)José Pires, Senior Security Advisor, International Union of Railways (UIC)
José Pires, Senior Security Advisor, International Union of Railways (UIC)
 
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
David Roney, Superintendent, Counter Terrorism, British Transport Police (BTP)
 
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer ElectronicDaniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
Daniel Berchtold, Head Business Unit Rail Automation, Schweizer Electronic
 
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
Antonio de Santiago Laporte, Industrial Technical Engineer, Madrid Metro & Co...
 
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
Thomas Kritzer, Head of Security & Service Department, Wiener Linien & Chair,...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Airport security 2013 cyber security panel discussion

  • 1. PANEL DISCUSSION: How to be Cyber Secure Airport Infrastructure Issues Moderator: Philip Baum, Editor, Aviation Security International Panellists: Dominic Nessi, Deputy Director & Chief Information Officer, Los Angeles World Airports Marc Pearl, President and CEO, Homeland Security & Defense Business Council Dr John McCarthy,ServiceTec Research Fellow, Cranfield University / UK Defence Academy
  • 2. How to be Cyber Secure: Airport Infrastructure Issues • * * * * * * * Marc Pearl President & CEO Homeland Security & Defense Business Council
  • 3. WHAT DOES “CYBER SECURE” MEAN? • Much more than traditional notions of passwords and firewalls • “Cyber secure” is NOT a one-size-fits-all concept… • Need to balance risk v. probability and cost v. benefit • “Definition” is up to each individual airport authority • As you all well know: “Cyber” now extends into almost every facet of airport infrastructure. • Network • Physical • Human
  • 4. 1. Network Security • The most closely linked to “cyber” • Threat level: Wide and varied • Numerous layering/overlapping – oftentimes missing network coordination • Major consequences of network breach • Loss of integrity; • Loss of availability; and • Loss of confidentiality
  • 5. 2. Physical Security • Still one of the most important aspects of security • Far more interconnected with network security than ever due to increasing technological advances • Encompasses: CCTV security cameras, intrusion detection systems, perimeter lighting, and CBRNE detection
  • 6. 3. Human Component of Security • Airports – Veritable Melting Pots of different types, classes, security-level of personnel. • Cyber-security is only as good as the humans that operate and oversee it. • Is it better to screen all workers or to train them to spot suspicious behavior? • Is/should it even be a trade off?
  • 7. How Does 1 + 1 + 1 = 4? • Cannot work on the 3 elements in isolation • True/Real cybersecurity is based on the symbiotic and cooperative interaction of all 3 elements. • No one single component of security will protect airport infrastructure. • Including both physical and electronic ensures that threats can be mitigated as “far down/away from the supply chain” from the critical vulnerabilities as possible. • Farthest circle can be thought of as the intelligence on threats long before they even reach the airport and the closest can be the final ticket or baggage check before boarding the plane.
  • 8. Litmus Test – Questions To Ask • Is the approach/idea economically reasonable? • Will the approach/idea be technologically feasible? • Have we thought through the unintended consequences of implementing this approach/idea?
  • 9. Thank You!! Marc Pearl mpearl@homelandcouncil.org +1 202 470 6441 www.homelandcouncil.org