Drones and cybersecurity part 1: The challenges we face and cybersecurity’s role,” we’ve heard of more incidents of drones flying around and near airports, discussions about the exploding use of drones for official, commercial, and private use, …and a private drone crashing on the White House lawn. Safe to say the sense of urgency has ratcheted up quite a bit.
Conventional methods to detect and mitigate threats from drones are limited; radars either don’t detect drones or characterize them incorrectly (i.e. migratory birds). Additionally, if radar does detect the drone, it cannot mitigate the threat or identify the source. Clearly a comprehensive solution that finds and IDs the drone platform, mitigates the threat safely, and provides forensic evidence to government and law enforcement officials is necessary whether you’re protecting the Super Bowl, an airport, or a government facility.
As I mentioned last time, drones have onboard logic and communications channels, therefore the use of advanced cybersecurity platform protection techniques can be employed. Defense contractors and technology companies alike are developing cybersecurity solutions to address the aforementioned challenges. One approach that has been developed creates a “cyber fence” that employs the use of cyber defense techniques found on traditional IT networks, except it uses those techniques against platforms such as drones. This cyber fence can be integrated into other physical, electronic, and cyber defense mechanisms to offer full protection against this threat.
Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.