LMR Cybersecurity: Are You Paying Attention Yet?

  • Presenter(s): Nick Falgiatore
  • Session Length: 60 minutes
  • Date: Jul 30, 2025
Buy Package - See Options

This product is already in cart

Purchase this session to continue watching !!!

LMR systems provide the mission critical voice communications that first responders and dispatchers rely on during the most dangerous of their responsibilities. Even momentary system disruptions can have monumental consequences for first responders. This begs the question, how secure are our LMR networks? This presentation will take a holistic review at the security of LMR systems. Topics covered will include types of service disruption, LMR network cyber security, security of voice communications, jamming, physical security, best practices, and mitigation strategies.

Learning Objectives:

  1. Attendees will gain an understanding of the different types of disruption to LMR systems and their potential impacts.
  2. Attendees will gain an understanding of the different vulnerabilities faced by LMR systems.
  3. Attendees will be taught the best practices and mitigation strategies they should employ to mitigate the discussed risks.

description

LMR systems provide the mission critical voice communications that first responders and dispatchers rely on during the most dangerous of their responsibilities. Even momentary system disruptions can have monumental consequences for first responders. This begs the question, how secure are our LMR networks? This presentation will take a holistic review at the security of LMR systems. Topics covered will include types of service disruption, LMR network cyber security, security of voice communications, jamming, physical security, best practices, and mitigation strategies.

Learning Objectives:

  1. Attendees will gain an understanding of the different types of disruption to LMR systems and their potential impacts.
  2. Attendees will gain an understanding of the different vulnerabilities faced by LMR systems.
  3. Attendees will be taught the best practices and mitigation strategies they should employ to mitigate the discussed risks.

Resources

You must be logged in and have purchased access to this course to view/download the handouts.

Presenters

Browse sessions in this event