Live Airport Exploit

Who Will Defend The Airport?

Prove Your Cyber Defenses in a Live Airport Attack Simulation

Demonstrate your cybersecurity solutions within TAC’s Adega Airport interactive environment, where your technology will face cyber-attacks targeting both IT infrastructure and industrial control systems.

This high-impact cybersecurity challenge takes place within a fully operational airport simulation; giving you the opportunity to showcase your technology in a live demonstration, observed by  attendees.

6 Scenarios. One Goal: Total Airport Defense.

Play Video:
Defend the Airport Collaborative: Securing Critical Infrastructure Like Baggage Handling Systems

In this video, we spotlight the importance of securing the baggage handling system – a key component of airport operations.
At the collaborative, participating organizations will defend systems like this and other core components commonly found in airport infrastructure.

Showcase Your Competitive Advantage to Attendees

This is more than just a demonstration—it’s a competitive advantage. By showcasing your ability to detect and respond to real-time threats in a high-stakes, live environment, you will differentiate your company from competitors and reinforce your role as a trusted cybersecurity provider. The insights gained from this experience will not only validate your technology but also enhance its capabilities for future challenges.

This will be a challenging exercise. The airport infrastructure will operate at full speed, simulating normal business hours. Our AI-driven traffic generation will create realistic background noise, requiring defensive solutions to filter out routine activity and detect actual threats in real time.

Adega Airport consists of dozens of IT assets, industrial control systems, and IoT devices operating in real time across a Gigabit Ethernet network implemented across multiple Ethernet network switches. The exact number of devices will remain undisclosed, adding to the challenge. Your mission is to ingest the live PCAP feed and demonstrate your ability to :

Perform real-time asset discovery and identification

Providing as much detail as possible: vendor, firmware, industrial function.

Perform Industrial Protocol Analysis

There are multiple industrial protocols used in this network identifying key assets based on protocol and commands captured.

Anomalous Behavior (attack) Identification

Alert based on source/destination and actions taken to include both information technology and industrial attacks.

Attack Chain Correlation

Suggest/Identify prepositioning events and attacks and correlate to subsequent industrial attacks or exploits (based on time, source/destination, etc.

Why Defending Aviation Matters

On The Blog : Advancing Aviation Cybersecurity Through Collective Action | Featuring A Comprehensive Review Of Recent Cyber Attacks Targeting The U.S. Aviation Sector

Stay up to date with future events like this by filling out the form:

Social

Sign up to Receive our Newsletter:

TheLink

7000 Columbia Gateway, Suite 150
Columbia, MD 21046
+1 443 626 4450

We use cookies to ensure the best browsing experience possible