Welcome to your XPONENTIAL Exhibitor Console!
The Exhibitor Console is your XPONENTIAL hub for all the information you need to know – from deadlines to promotional items - in one convenient location.
Important Dates and Information |
Thank you for exhibiting at XPONENTIAL 2021, we look forward to seeing you at XPONENTIAL 2022 in Orlando, April 25-28. Click here to reserve your space. |
Defining Appropriate Cyber Security Requirements - A Risk Based Approach
- Room: Virtual
- Session Number:3321
Tuesday, May 04, 2021: 2:00 PM - 2:45 PM
Speaker(s)
Description
This year’s Xponential theme is “Assured Autonomy”. Without assurance, trust in UAS safety and correct operation is constrained, impeding broad deployment and adoption and hindering proving UAS benefits for society. Foundational to this fabric of trust is that this technology must be robust, secure, and resilient at all levels. An operator who does not take appropriate cyber security precautions becomes the proverbial “weak link” in security creating an exploitable “back door” into the wider UAS ecosystem. Since this ecosystem depends on digital and machine-to-machine communications, the human who traditionally provides a level of resilience may no longer be present and thus their role must be replaced by technology, policy, and processes - requirements for which need to be proportionate to risk and appropriate for the operation. A Joint Authorities for Rulemaking on Unmanned Systems working group has developed a “Cyber SORA” – a methodology allowing UAS operators to perform such a risk assessment from a cyber standpoint and build in risk proportionate safeguards against cyber threats to their UAS operations as well as ways to mitigate the consequences of cyber incidents, were one to occur. This panel will discuss the group’s work and proposed set of Cyber SORA performance criteria.
Job Role:
C-Level Executive,Management,Engineering/Technical,Research & Development
Tags:
Air,Security,Education/ Training & Operations Safety,Standards,Autonomy,Automated Vehicles,Certification,Cybersecurity,Policy,Public Acceptance & Trust