Managing uncertainties: the protection of critical infrastructures

Marc Cools, Veerle Pashley

Research output: Unpublished contribution to conferenceOther

Abstract

As a society, we depend on infrastructures such as water, energy, telecommunication etc. Subsequently, they pose a (potential) threat to criminal organisations and natural disasters. If a critical infrastructure is not adequately protected, its destruction would have economic, political and psychological consequences. As a result, intelligence services fulfil a fundamental role in protecting organisations which are vital in the preservation of our society.
Ever since the Cuban Missile Crisis of 1962, critical infrastructure protection (CIP) has encountered an important transition. Kennedy, former President of the United States, and Khrushchev, former Prime Minister of the Soviet Union, witnessed problems in telecommunications. It would the first infrastructure which was labelled “critical”.
But what do we know today about the protection of critical infrastructures? When is an infrastructure defines as “critical”? Which strategies and partnerships are eligible? These questions are covered during this conference. First, we will focus on the legal conceptualisation. Next, the crisis centre of the government will highlight CIP. Subsequently, we will focus on the European framework. Last, the conference will end with a debate between the intelligence services and the private security industry.
Original languageEnglish
Publication statusPublished - 2017
EventManaging uncertainties: the protection of critical infrastructures: BISC Conference - Universiteit Gent, Ghent, Belgium
Duration: 12 May 201712 May 2017

Conference

ConferenceManaging uncertainties: the protection of critical infrastructures
Country/TerritoryBelgium
CityGhent
Period12/05/1712/05/17

Keywords

  • Intelligence services
  • Critical infrastructure protection

Fingerprint

Dive into the research topics of 'Managing uncertainties: the protection of critical infrastructures'. Together they form a unique fingerprint.

Cite this