Summit Highlights


Keynote Speaker

Dex Torrick Barton Headshot.jpg

Dex Torricke-Barton
Director, Brunswick Group

From the office of the UN Secretary General to the executive offices of SpaceX, Facebook, and Google, Dex has advised the world’s most influential leaders and organizations on issues surrounding global connectivity and emerging technologies. He has advised major tech companies, UK and US political leaders on strategic communications and works to educate audiences on how technology can and will impact global operations, human safety, and the progress of communities and businesses.

A New York Times-bestselling ghostwriter, Dex holds an MPhil in Russian & East European Studies from the University of Oxford, and a BA in Politics & East European Studies from University College London.


Tabletop Exercise

Stress Testing Global Aviation Operations: An Interactive, Real-World Scenario Crisis Management Exercise

Facilitated by Crowdstrike, this year’s tabletop will put participants in the metaphorical hot seat of a simulated real-world, real-time major aviation cybersecurity incident.

Participants will engage with their private and public sector counterparts to work through incident response, identify strengths and weaknesses, and determine an improved path forward to help improve resiliency should a worst case event occur.

Attendees will see first-hand how industry responds and be able to leave the exercise with best practice improvements they can incorporate into their incident response plans.



  • GDPR: One Year In

  • Your Friends Love Seeing Your Boarding Pass on Social Media . . .And So Do Cybersecurity Thieves Hunting Passenger Loyalty Accounts: A University Research Analysis of More Than 100,000 #Boardingpass Instagram Posts

  • Aircraft Systems and the Data You Need to Protect

  • Landing the Right Security Metrics with your Board: A Fireside Chat with Aviation ISAC Member CISOs

  • The Black Box of Business Email Compromise: Dispatches from the Fight Against BEC Scammers

  • Take Cyber Security Beyond the Absolute Ceiling: The Evolving Nature of Cyber Threats and how Security Teams can Expand their Coverage beyond the Traditional Perimeter to include ‘Un-agentable’ Devices and Systems

  • Implementing a Product Secure Development Life Cycle: Development, Deployment, and Maintenance Challenges

  • Ideas Whose Time Has Come for Aviation: Coordinated Vulnerability Disclosure (CVD), Software Bill of Materials (SBoM), and Secure Over-The-Air (SOTA) updates

  • The Theoretical and Practical Security Vulnerabilities of Current Aviation Wireless Communication Technologies