You’ve only got three choices in life: Give up, give in, or give it all you’ve got. The countdown begins... are you a hard target?

Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. 

Kinetic cyber attacks are a real and growing threat that is generally being ignored as unrealistic or alarmist. These types of attacks have been validated experimentally in the laboratory environment, they have been used operationally in the context of espionage and sabotage, and they have been used criminally in a number of attacks throughout the world. While these types of attacks have thus far been statistically insignificant, the rapid growth and integration of cyber-physical systems into everything from automobiles to SCADA systems implies a significant kinetic cyber threat in the near future. It is imperative that the security community begin to take these types of threats seriously and address vulnerabilities associated with cyber-physical systems and other devices that could be utilized to cause kinetic effects through cyber attacks.

Join us in New York City in 2018 across the street from Port Authority a national landmark of transportation and in the heart of New York City, Time Square.  This event will have attendees and speakers from around the WORLD

Be part of defining solutions and illuminate risks aimed at Critical National Infrastructure

  • financial services (banking, clearing);
  • security services (police, military)
  • electricity generation transmission and distribution;
  • gas production, transport and distribution;
  • oil and oil products production, transport and distribution;
  • telecommunications
  • water supply (drinking water, waste water/sewage, stemming of surface water (e.g. dikes and sluices));
  • agriculture, food production and distribution;
  • heating (e.g. natural gas, fuel oil, district heating);
  • public health (hospitals, ambulances);
  • transportation systems (fuel supply, railway network, airports, harbors, inland shipping);

This event is about sharing big ideas on how we will fortify our daily life and economic vitality.  The threat of attack aimed at Critical National Infrastructure is real as services supporting our communities and businesses face common vulnerabilities and an unspoken kinetic threat.  

Content in support of The NIST Cyber Security Framework is aligned to five functional areas;

  • Identify - "Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities."
  • Protect - "Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services."
  • Detect - "Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event."
  • Respond -"Develop and implement the appropriate activities to take action regarding a detected cybersecurity event."
  • Recover - "Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event."

Who Should Attend

 operators preview   Join other information security decision makers, developers, penetration testers, cryptographers, analysts, engineers, and risk professionals. Influence the conversation and sharpen your technical skills. Bring your laptop and get your hands dirty with the latest tools and techniques.  
    We provide the platform, you steer the conversation with 1:1 and group sessions using the mobile application. Engage with industry leaders, practitioners, and potential investors to ignite an open conversation in “think tank” style.  Mold how we fortify our critical infrastructure with unmatched east coat networking and learning opportunities
sponsors preview    Reach thousands of cybersecurity experts, decision makers, and influencers. Bring your best and brightest minds to the big apple and influence the ability to secure critical infrastructure.  BOF Sessions for government, healthcare, finance, transportation, energy, law, policy and more. 
 ticket   Meet face-to-face with the top international talent committed to defining and defending the future of security. Meet with the most influential companies and recruiters who are hiring now. Register online, schedule your meetings in advance and plan to make life-changing connections.


*Continuing professional education credits (CPE)

2018 Speakers

New York University
Chief of Police
City of Hampton, VA
VP of Security Solutions
Check Point
Gula Tech Adventures
Cyberman Security LLC
Deputy Chief Information Security Officer
City of New York
Lt. Col. James Emerson, USMC (Retired) Chief Operating Officer/Managing Director
iThreat Cyber Group
Chief Operational Risk Officer
Goldman Sachs
Maven Security Consulting Inc.
CTO Security (Cloud & Enterprise)
Microsoft Corporation
Managing Consultant
Spirent Communications
Bank of America
I Am The Cavalry
Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) Instructor
Cyber Security Forum Initiative
Lead Security Strategist
Adobe Systems Incorporated
Managing Director
Cyber Safety Innovation Fellow, Scowcroft Center for Strategy and Security
Atlantic Council
Founder Director President at Cyber Security Forum Initiative
Cyber Security Forum Initiative
Program Manager
Consortium for IT Software Quality (CISQ)
Senior Security Architect
Senior Research Scholar
Columbia University
Product Manager
USMC Recon Marine, GORuck Cadre
Managing Director, Cybersecurity
BioHacking Village Project Manager
Principal Consultant
Gotham Digital Science
Founder & CEO
LJ Kushner & Associates
Chief Operating Officer
New York Internet
Criminal Defense Lawyer
EVP, Strategy and Analytics,
Director of Infrastructure
Interfaith Medical Center
Security Consultant
NCC Group
Technical Director
NCC Group
Sr. Vulnerability Researcher
CERT / Carnegie Mellon University
Senior Principal Engineer
MITRE Corporation
Founder, Consultant
BWG Strategy
Chief Information Security Officer
BGC Partners
VP, Security Intelligence
Host Intrusion Engineer
Detect & Response, The Butterfly Effect way!
Director of Cybersecurity Services


This event would not be possible without the industry support of "The Team"

Distinguished Engineer
Criminal Defense Lawyer
IT Specialist
U.S. Department of Homeland Security
Chief Operating Officer
BSides DE | RedLion
Senior Director
TrapX Security
Senior Principal Engineer
MITRE Corporation
Senior Vice President and Chief Evangelist
Center for Internet Security
Chief Scientist
International Board of Directors, Chairman for Education & Professional Development
ISSA International
Computer and Information Science
New Jersey Institute of Technology
Leader & Director, DevSecOps (Red Team, Cloud Security, Security Engineering)
Principal Engineer at McAfee and SANS Certified Instructor
Assistant Special Agent in Charge (ASAC) - National Security Branch at FBI
Federal Bureau of Investigation (FBI)
Vice President - Technology Risk
Goldman Sachs
Critical Infrastructure Association of America, Inc.
Executive Director
Senior Manager
Cyber Security Problem Solver | Podcaster
Kivu Consulting | Cyber Security Interviews
Co-Founder, Producer
All Day DevOps
Principal Software Assurance Engineer
MITRE Corporation
Moderator | Security Advisor
BWG Strategy
Advisory Board
CISO / Head of Risk and Security Management
Community Resilience Panel - NIST
Dragos, Inc.
Vice President - Application Security
Pershing, a BNY Mellon company
Consulting Security Group (C.G.S.)
* EPI Gradute as a P.P.S. *
Co-Executive Producer / Virtualization Security
VMware , Owasp NYC president
Information Security
Global Head of Services, Security, and Integration
Unit Head | NJSP Cyber Threat Intelligence Unit
New Jersey Cybersecurity & Communications Integration Cell
Senior Solutions Architect
Micro Focus, Fortify
Chief Investigator
District Attorney's Office
Whiteside Security
Founder, Principal Security Consultant
Assistant Professor
Pace University
New York University


Microsoft Corporation logo image
Checkpoint logo image
Adobe logo image
Colliers Real Estate  logo image
Log Rhythm logo image
Proactive Risk logo image
Versive logo image
Contrast Security logo image
Spirent Communications logo image
Dispel logo image
Comodo logo image
Mission Secure Inc. logo image
Data Robot logo image
Synack logo image
TrustedSec logo image
NetSPI logo image
OWASP Foundation logo image
Center for Internet Security logo image
City of New York logo image
New York Internet logo image
Software Assurance Marketplace (SWAMP) logo image
Dragos, Inc. logo image
AGM logo image
MITIS logo image
ITSP Magazine logo image
Peerlyst logo image
BWG Strategy logo image
I Am The Cavalry logo image
Consortium for IT Software Quality (CISQ) logo image
Cyber Security Interviews logo image
BugHeist logo image
MAGE Groupe logo image
OWASP 24/7 Security Podcast logo image
CREST International  logo image
ISSA International logo image
BSidesNYC logo image
SAFECode logo image
Amazon logo image
US Bank logo image
New Jersey Cybersecurity & Communications Integration Cell   logo image
All Day DevOps logo image
Flashpoint logo image
Goldman Sachs logo image
Lares logo image
Pace University logo image
VMWare logo image
New Jersey Institute of Technology logo image
NYU logo image
Intuit logo image
Micro Focus, Fortify logo image
Nuix logo image
Mandelbaum Salsburg logo image

Travel, Lodging & Entertainment

Whether you’re attending the conference solo or with your family, we’ve compiled a list of the very best attractions, Broadway show tickets, dining recommendations and New York airport shuttles so you can plan your entire NYC experience.

May we suggest seeing the sights on a double-decker bus tour? Perhaps you’d like to sail away on a New York sightseeing cruise. Or save on a combination of attractions, museum tickets, and visits with a New York tour package.

Helicopter rides from the airport, anyone? The possibilities are endless.

11 Times Square, New York, NY 10036


 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.