Now that FirstNet is a reality, you need to fully understand how FirstNet will operate and how the nationwide public-safety broadband network will impact public safety. Gain the insight needed to prepare your organization to take advantage of FirstNet's mission-critical networking capabilities for data and video—as well as how to bridge voice communications between LMR and LTE—while ensuring that each packet of information is secure and received only by authorized personnel.
Once FirstNet rolls out, what will subscribers need to purchase, in terms of hardware and devices? Many first-responder agencies will seek purpose-built devices that include features like a dedicated push-to-talk button, a large battery and a hardened exterior, while covert users will prefer products that are more discreet. Discuss some of the new hardware, devices and accessories that will be available to FirstNet users and learn about the testing these products undergo before becoming commercially available.
Most access to the FirstNet network will be through applications that are designed to enhance the capabilities of first responders. Developers and integrators need to fully understand the unique needs of the first-responder user community and the expectations of FirstNet. Meanwhile, public-safety agencies and end users need to be aware of the apps that are available and how they have been vetted—both for functionality and cybersecurity purposes.
Panelists: Chief Charles L. Werner (Ret.), Chair, National Council on Public Safety UAS & Association of American Railroads Public Safety Advisory Committee
In today's environment, threats come at public safety from all angles that can block communications in serious situations or jeopardize sensitive data, and FirstNet promises be a prime target for the hacking community. FirstNet officials repeatedly have touted the fact that cybersecurity has been built into the system to protect network, but what steps do agencies and end users need to take to protect their data? In addition, how will FirstNet's identity, credential and access management (ICAM) ensure only authorized access to information without interfering with normal operations? And once you've decided these operational and policy decisions, examine how to keep your network and devices can remain secure in the new digital age.
|
|
|
|
|
|
|
|
|
|
|
|
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
By submitting this form, I acknowledge and agree to Informa's Terms of Service and to Informa's use of my contact information to communicate with me about Informa's or its third-party partners' products, services, events and research opportunities. Informa's use of the information I provide will be consistent with Informa's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.
|
|