Secure Rail Education
Threats and risks have become increasingly present in transit agencies. In an effort to combat these threats, LA Metro and TSA partnered to implement new, advanced passenger screening technology to help detect weapons and other security threats. This session will discuss the successful implementation of new screening technology in addition to best practices for undertaking such a project, considerations prior to implementation and the results.
Alex Wiggins, Chief, System Security & Law Enforcement Division Los Angeles County Metropolitan Transportation Authority
1. Discuss the new, advanced passenger screening technology at LA Metro
2. Identify best practices, considerations and results of implementing and undertaking a new, security screening project
3. Review best practices for protecting passengers, employees and equipment
4. Analyze best approaches to assessing and managing risk
View session: Passenger Screening at LA Metro
Cyber has been a key issue across both private and public sector for many years; decades for some. With cyber attacks increasing and becoming more destructive and dramatic, no entity wants to appear to be the ‘weakest gazelle in the pack.’ Each sector has learned lessons, innovated, and deployed increasingly resilient approaches to cyber defense and cyber risk management. Drawing from their many years of experience with the US Air Force and financial sector, Jim Cummings and Paul Mee will share their perspectives on cross industry best practices, the requirements to achieve these, and the outlook for cyber resiliency.
1. Discuss sense of urgency - cyber attacks are increasing and becoming more destructive 2. Examine customer impact - no entity wants to be perceived as a cyber risk
3. Idenitfy lessons learned - overview of mistakes and innovations across different industries
4. Highlight trends - outlook for cyber resiliency
View session: Lessons Learned from Other Sectors
Today we tend to think outside the box, looking to reinvent the wheel when addressing physical security in the rail realm. However, with increased budget restrictions and decreased funding for high-tech options, there is an opportunity to look back in the box, where there are low-cost physical security options that get the job done and get it done well. This session offers examples and success stories of getting back to basics with physical security.
John Walsh, AVP Safety & Security Genesee & Wymoning Railroad Services, Inc.
1. Identify effective, low-cost physical security options
2. Analyze the impact of decreased security funding on a rail organization
3. Give examples of how going back to the basics for physical security has proven to be successful
4. Present alternatives to high-cost technology options
View session: Back to Basics with Physical Security
Web-based applications are a prime vector of attack for malicious actors. Organizations have seen their own applications turned against them as attackers exploit vulnerabilities in custom code and commonly used open source frameworks. In 2015, a global shipping company had bills of lading exfiltrated from its homegrown Content Management System by pirates, used later to attack ocean-going vessels.
This session will explore several common web-based application attacks, review tools that scan for vulnerabilities, and discuss operational technologies that protect production applications. The session will round out its review of Railinc's defense-in-depth approach by discussing the importance of a Secure Software Development Lifecycle and risk assessments in protecting Railinc’s software as a service model.
Bill Dupre, Director of Security Railinc
1. Understand the different attacks against web-based applications
2. Discuss Railinc's defense-in-depth approach to application security
3. Review technologies for scanning applications to help identify vulnerabilities — including those in open source libraries/frameworks — and operational technologies that protect production applications
4. Discuss the importance of application risk assessments in securing the software as a service model.
Thursday May 2
Within most transit systems the VMF represents a recognizable target that can be exploited by terrorists, insiders, criminals and vandals. Traditionally, this critical asset has been protected with combination of a security force, physical barriers, and electronic security. However, modern security practices and advanced technologies can offer enhanced protection against various threats, to include the prevention of harmful devices being placed within rail vehicle undercarriages.
Robert Carter, Chief of Security Transit Safety and Security Solutions
1. Identify various physical threats to a VMF
2. Explain the value of the application of CPTED principles and a properly designed and integrated physical and electronic security system
3. Discuss the effectiveness of an “event-driven” security approach
4. List the possible benefits of introducing advanced protection measures via new technologies
On February 13, 2015, the White House under President Obama issued an Executive Order (EO) “Promoting Private Sector Cybersecurity Information Sharing”. The government believed that private sector cybersecurity information sharing could be a game changer against well-resourced and motivated adversaries who target the private sector. This EO called for the development of Information Sharing and Analysis Organizations (ISAOs) to engage with the Department of Homeland Security National Cybersecurity and Communications Integration Center (NCCIC) for purposes of “sharing of information related to cybersecurity risks and incidents”. Fast forward to 2019, the Maritime and Port Security Information Sharing and Analysis Organization (MPS-ISAO), which was operationalized in 2017, has brought together rail, ports, and maritime stakeholders for cybersecurity collaboration. Through the MPS-ISAO, shared malicious and suspicious activity along with countermeasure solutions enable proactive defense. This presentation will provide the audience with current examples of how early situational awareness makes a difference. Case studies and technologies will be examined.
Christy Coffey, EVP of Member Services Maritime & Port Security Information Sharing and Analysis Organization (MPS-ISAO)
Scott Cole, Manager of Information Technology New Orleans Public Belt Railroad Corporation
1. Define ISAO cybersecurity information sharing – What’s shared, with whom, and how?
2. List the benefits associated with early situational awareness
3. Discuss Rail and Ports adversary overlap (Why working together makes sense?)
4. Highlight technologies that makes a difference
This case study will detail DART's migration from a Synchronous Optical Network (SONET) topology to a Multi-Protocol Label Switching - Transport Profile (MPLS-TP) network topology. The discussion will include the rationale behind the decision to migrate, the challenges encountered, cybersecurity concerns, and lessons learned.
1. Discuss why DART migrated from SONET to MPLS-TP
2. Explain challenges that were encountered
3. Identify cybersecurity concerns
4. Summarize lessons learned and the project outcome
View session: Migrating From SONET to MPLS-TP In A Transit Environment