Workshops Emergency Services Quantum Security for Response Infrastructure
Emergency Services Full Day Workshop

Quantum Security for Critical Response Infrastructure

A technical workshop for emergency operations centre architects, dispatch system engineers, and critical infrastructure security leads securing CAD systems, AVL platforms, and NG112/NG9-1-1 infrastructure against quantum cryptographic threats.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Emergency response infrastructure operates under a zero-tolerance reliability constraint. Computer Aided Dispatch (CAD) systems handle every emergency call and resource assignment. Automatic Vehicle Location (AVL) platforms track every responding unit. Next-generation emergency calling (NG112 in Europe, NG9-1-1 in North America) routes calls over IP with SIP signalling and RTP media streams. Each of these systems depends on cryptographic protocols for authentication, integrity, and confidentiality. A quantum compromise of dispatch infrastructure does not result in data loss. It results in misdirected emergency responses, spoofed caller locations, and compromised officer safety.

This workshop maps the cryptographic attack surface of critical response infrastructure: CAD-to-CAD interoperability encryption, AVL data authentication and anti-spoofing, NG112/NG9-1-1 SIP signalling security (TLS for SIP, SRTP for media), PIDF-LO (Presence Information Data Format Location Object) integrity for caller positioning, ECRF (Emergency Call Routing Function) and LVF (Location Validation Function) authentication, and body-worn video evidence chain integrity. For each system, we identify the specific quantum vulnerabilities, assess the threat timeline, and design PQC migration paths that meet NENA i3 and ETSI ES 203 178 security requirements. Participants leave with a prioritised migration plan for their response infrastructure.

What participants cover

  • CAD system cryptographic dependencies: database encryption, operator authentication, CAD-to-CAD interoperability (CAP, DE protocol), and mobile data terminal secure communication
  • AVL platform security: GPS/GNSS data authentication, vehicle tracking data integrity, anti-spoofing for real-time fleet position, and PQC migration for AVL communication channels
  • NG112/NG9-1-1 SIP and RTP security: TLS for SIP signalling, SRTP for voice media, certificate-based SRTP key exchange, and PQC implications for call routing infrastructure
  • PIDF-LO location integrity: signed location objects for caller positioning, ECRF routing function authentication, and LVF validation function certificate chains under PQC
  • Body-worn video chain of custody: cryptographic integrity for BWV evidence, timestamp signing, and ensuring PQC migration maintains IOPC/CPS evidence admissibility
  • Standards compliance: NENA i3 security requirements, ETSI ES 203 178 (NG112 security), FIPS 203/204/205 algorithm selection for emergency response infrastructure

Preliminary Agenda

Full-day session structure with scheduled breaks. Content is configurable to your dispatch platform, communications infrastructure, and regulatory requirements.

# Session Topics
1 Response Infrastructure Cryptographic Architecture Where cryptography secures dispatch and operations
2 CAD System Security Dispatch platform cryptographic dependencies
  • CAD database encryption: TDE and column-level encryption for incident records, personal data, and intelligence markers; PQC implications for key management
  • Operator authentication: Active Directory/LDAP integration, smart card/certificate-based login, and PQC migration for dispatcher workstation security
  • CAD-to-CAD interoperability: Common Alerting Protocol (CAP), Data Exchange (DE) protocol encryption, and cross-force dispatch data sharing under PQC
Break, after 50 min
3 AVL and Mobile Data Security Vehicle tracking and field communications
  • AVL data authentication: GPS/GNSS position report signing, anti-spoofing for vehicle tracking, and PQC migration for AVL communication channels (TETRA/LTE/4G)
  • Mobile Data Terminal (MDT) security: TLS connections to CAD, certificate-based device authentication, and PQC key exchange overhead on vehicle-mounted terminals
  • Real-time fleet position integrity: ensuring quantum-era position spoofing cannot misdirect resources or create false deployment records
4 NG112 and NG9-1-1 Security Next-generation emergency calling infrastructure
  • SIP signalling security: TLS 1.3 for SIP over TCP/TLS, certificate-based SRTP key exchange, and PQC implications for emergency call routing
  • PIDF-LO integrity: signed Presence Information Data Format Location Objects for caller positioning; XML digital signature PQC migration
  • ECRF and LVF authentication: Emergency Call Routing Function and Location Validation Function certificate chains under PQC; trust anchor migration
Break, after 45 min
5 Evidence Integrity and Body-Worn Video Cryptographic chain of custody for emergency services
  • Body-worn video integrity: SHA-256/SHA-3 hash chains for footage tampering detection; PQC implications for hash-based evidence integrity (symmetric hashing is quantum-safe)
  • Timestamp signing for evidence: RFC 3161 timestamp authority migration and maintaining evidence admissibility during PQC transition
  • IOPC and CPS evidence requirements: ensuring cryptographic changes do not compromise the evidential chain for misconduct investigations or criminal proceedings
6 Standards and Regulatory Framework NENA, ETSI, and procurement requirements
  • NENA i3 security standard: authentication, encryption, and integrity requirements for next-generation emergency services IP infrastructure
  • ETSI ES 203 178: NG112 security framework and PQC readiness assessment for European emergency calling infrastructure
  • Procurement specifications: embedding PQC requirements in CAD, AVL, and NG112 system procurement and upgrade contracts
7 Q&A and Infrastructure Migration Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and emergency services systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

EM

Emergency Services Partners

Domain expertise and operational validation

Emergency Services workshops are co-delivered with sector specialists who bring direct operational experience in emergency dispatch operations, CAD system engineering, and emergency communications infrastructure. This ensures workshop content is grounded in the availability, reliability, and safety-of-life requirements of critical response infrastructure.

Commission This Workshop

Sessions are configured around your dispatch platform, communications architecture, and operational requirements. Get in touch to discuss requirements and schedule a date.

Contact Us