The first presidential inauguration since 9/11 was also the first major test of a new 68 square mile wireless broadband security network across the District of Columbia.When the district, which is the first-responder entity for the U.S. Capitol, started coordinating with the Secret Service last fall for Inauguration Day security, “we told them we could give them wireless broadband access to any of their officers anywhere in D.C.,” says Robert LeGrande, the district’s deputy CTO. For Inauguration Day, and then again for the State of the Union address, the district opened its wireless network to federal agencies like the Secret Service and U.S. Park Police.During the inauguration, mobile units from D.C.’s Metropolitan Police Department and the coroner’s office also used the system, the latter so that it could quickly identify bodies in case of a mass attack. Live video feeds from the metro area transit agency’s tunnels enabled the various participants to monitor for possible attacks, and video feeds from Secret Service vehicles and other sites were transmitted wirelessly to the central surveillance system.There were no attacks or other disasters at either event, but the coordinated effort proved the effectiveness of a regional wireless integrated network, notes D.C. CTO Suzanne Peck. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe