Keeping Interoperability at the Core

We are living during times of growing advancements in drones, automation and IoT that couple with an advanced evolving threat landscape to create great uncertainty and need for diligence. This year’s Critical National Infrastructure Summit from September 15th -17th will provide the updates and necessary dialogue to help drive security initiatives and maintain preparedness and resiliency.

When we discuss critical infrastructure (CI), a myriad of questions come to mind, but two questions stand out; Are we safe and how can we be better prepared? The 2020 Critical National Infrastructure summit is bringing together 100+ C-Suites, Vice Presidents, and Directors across industry and government to cross-pollinate how we can best navigate the critical challenges within the community and address these core questions:

Connect OT to IT- Anything of value that is connected can be compromised and put the entire network at risk. Learn critical parameters to evaluate when procuring IOT equipment to support your facilities’ operations. Join us as we focus on physical and virtual convergence within our operating environments.

Drones and Critical Infrastructure Protection – As more CIP professionals have to do more with less, many are leveraging drones to patrol and surveil large or remote assets to save time and manage resources more effectively.  Investigating alerts with drones first before committing security personal to the site. Join to learn about the best course of action to deter, detract and mitigate these threats.

Insider Threats - We are seeing an increasing rise to the number of breaches caused by insider threats but discovery of Insider threats can take months and cost organizations upwards of $8.76 million. We have dedicated panels and workshops set up to share the most cutting edge techniques and tools to counter insider threats.

It is with ongoing learning, development and information sharing that you can prepare and take every precaution necessary against these unwarranted threats. Join our Critical National Infrastructure summit for the unique opportunity to participate in our roundtables, training and panel discussions.

End User vs. Vendor Attendance Qualifications 

All attendees will be evaluated based on the below qualifications.
End User An individual responsible for evaluating, purchasing or managing resources, products and/or services for their organization’s internal usage. An end user organization does not offer products, services or solutions associated with the domain of cyber security. No restrictions based on title, seniority, experience, company, or industry.
Vendor An individual from a company that offers cyber or physical security products or solutions regardless of the role, responsibility, or job title of the executive considering attendance. This includes but is not limited to Cybersecurity Technology, Consulting Services, and Cyber or Physical Security Hardware or Software. It is at sole discretion of the Automotive IQ staff to determine eligibility by considering these guidelines.



globe image

A unique forum where critical infrastructure operators and their federal government counterparts can come together to troubleshoot problems, vulnerabilities, and to discuss how to overcome these.

globe image

The first event of its kind to provide a dedicated space for critical infrastructure owners and operators to discuss advancing technologies in the industry.

iphone image

A combination focus and workshop day, offering insights into the future of critical infrastructure through smart cities and additional risk management workshops.



Take a look at the experts that have attended the 2019 summit.


Enjoy 3 of our top rated presentations from the 2019 CNI summit. 


Fast track your attendance to Critical National Infrastructure 2020.


Present your approving manager with this customizable letter.