Because the difference between a hard target and a soft target … is everything

Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. 

Kinetic cyber attacks are a real and growing threat that is generally being ignored as unrealistic or alarmist. These types of attacks have been validated experimentally in the laboratory environment, they have been used operationally in the context of espionage and sabotage, and they have been used criminally in a number of attacks throughout the world. While these types of attacks have thus far been statistically insignificant, the rapid growth and integration of cyber-physical systems into everything from automobiles to SCADA systems implies a significant kinetic cyber threat in the near future. It is imperative that the security community begin to take these types of threats seriously and address vulnerabilities associated with cyber-physical systems and other devices that could be utilized to cause kinetic effects through cyber attacks.

Join us in New York City in 2018 across the street from Port Authority a national landmark of transportation and in the heart of New York City, Time Square.  This event will have attendees and speakers from around the WORLD

Be part of defining solutions and illuminate risks aimed at Critical National Infrastructure

  • financial services (banking, clearing);
  • security services (police, military)
  • electricity generation transmission and distribution;
  • gas production, transport and distribution;
  • oil and oil products production, transport and distribution;
  • telecommunications
  • water supply (drinking water, waste water/sewage, stemming of surface water (e.g. dikes and sluices));
  • agriculture, food production and distribution;
  • heating (e.g. natural gas, fuel oil, district heating);
  • public health (hospitals, ambulances);
  • transportation systems (fuel supply, railway network, airports, harbors, inland shipping);

This event is about sharing big ideas on how we will fortify our daily life and economic vitality.  The threat of attack aimed at Critical National Infrastructure is real as services supporting our communities and businesses face common vulnerabilities and an unspoken kinetic threat.  

Content in support of The NIST Cyber Security Framework is aligned to five functional areas;

  • Identify - "Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities."
  • Protect - "Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services."
  • Detect - "Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event."
  • Respond -"Develop and implement the appropriate activities to take action regarding a detected cybersecurity event."
  • Recover - "Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event."

Who Should Attend

 operators preview   Join other information security decision makers, developers, penetration testers, cryptographers, analysts, engineers, and risk professionals. Influence the conversation and sharpen your technical skills. Bring your laptop and get your hands dirty with the latest tools and techniques.  
    We provide the platform, you steer the conversation with 1:1 and group sessions using the mobile application. Engage with industry leaders, practitioners, and potential investors to ignite an open conversation in “think tank” style.  Mold how we fortify our critical infrastructure with unmatched east coat networking and learning opportunities
sponsors preview    Reach thousands of cybersecurity experts, decision makers, and influencers. Bring your best and brightest minds to the big apple and influence the ability to secure critical infrastructure.  BOF Sessions for government, healthcare, finance, transportation, energy, law, policy and more. 
 ticket   Meet face-to-face with the top international talent committed to defining and defending the future of security. Meet with the most influential companies and recruiters who are hiring now. Register online, schedule your meetings in advance and plan to make life-changing connections.


*Continuing professional education credits (CPE)

2018 Speakers

Executive Producer | Founder
CTO Security (Cloud & Enterprise)
Microsoft Corporation
Gula Tech Adventures
Lead Security Strategist
Adobe Systems Incorporated
Non-Resident Senior Fellow
Atlantic Council
Bank of America
Cyber Safety Innovation Fellow, Scowcroft Center for Strategy and Security
Atlantic Council
Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) Instructor
Cyber Security Forum Initiative
Lt. Col. James Emerson, USMC (Retired) Chief Operating Officer/Managing Director
iThreat Cyber Group
Senior Manager
Senior Security Architect
Program Manager
Consortium for IT Software Quality (CISQ)
Founder Director President at Cyber Security Forum Initiative
Cyber Security Forum Initiative
I Am The Cavalry
Senior Research Scholar
Columbia University
Product Manager
Managing Director, Cybersecurity
Chief Information Security Officer
BGC Partners
BioHacking Village Project Manager
Head of Automotive & IoT
Gotham Digital Science
Principal Consultant
New York University
Founder, Principal Security Consultant
Chief of Police
City of Hampton, VA
LJ Kushner & Associates
Founder & CEO
VP of Security Solutions
Check Point
Co-Founder and COO
New York Internet
Cyberman Security LLC
Firm Partner
Tor Ekeland Law PLLC
EVP, Strategy and Analytics
Director of Infrastructure
Interfaith Medical Center
Senior Principal Engineer
MITRE Corporation
Technical Director
NCC Group
Security Consultant
NCC Group
Sr. Vulnerability Researcher
CERT / Carnegie Mellon University
Founder, Consultant
Managing Consultant
Spirent Communications
BWG Strategy
VP, Security Intelligence
Chief Operational Risk Officer
Goldman Sachs
Maven Security Consulting Inc.
Host Intrusion Engineer


This event would not be possible without the industry support of "The Team"

Managing Partner
Applied Control Solutions, LLC
Distinguished Engineer
Firm Partner
Tor Ekeland Law PLLC
IT Specialist
U.S. Department of Homeland Security
Chief Operating Officer
BSides DE | RedLion
Executive Producer | Founder
Senior Director
TrapX Security
Senior Principal Engineer
MITRE Corporation
Senior Vice President and Chief Evangelist
Center for Internet Security
Chief Scientist
International Board of Directors, Chairman for Education & Professional Development
ISSA International
Computer and Information Science
New Jersey Institute of Technology
Leader & Director, DevSecOps (Red Team, Cloud Security, Security Engineering)
Principal Engineer at McAfee and SANS Certified Instructor
Assistant Special Agent in Charge (ASAC) - National Security Branch at FBI
Federal Bureau of Investigation (FBI)
Vice President - Technology Risk
Goldman Sachs
Critical Infrastructure Association of America, Inc.
Executive Director
Cyber Security Problem Solver | Podcaster
Kivu Consulting | Cyber Security Interviews
Co-Founder, Producer
All Day DevOps
Principal Software Assurance Engineer
MITRE Corporation
Executive Director
NetSPI East Security Labs
BWG Strategy
Advisory Board
CISO / Head of Risk and Security Management
Community Resilience Panel - NIST
Dragos, Inc.
Vice President - Application Security
Pershing, a BNY Mellon company
Consulting Security Group (C.G.S.) Independent P.P.S.
Executive Protection Institute
Co-Executive Producer / Virtualization Security
VMware , Owasp NYC president
Information Security
Global Head of Services, Security, and Integration
Partnerships & Outreach
NJ Cybersecurity & Communications Integration Cell
Problem Solver
Chief Investigator
District Attorney's Office
Whiteside Security
Founder, Principal Security Consultant
Assistant Professor
Pace University
New York University


 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.