enterprise cyber security

8
DRAFT COPY And many moreHost Organization: Government & Trade: Industry Insight From: Expert Speakers End User Perspective DISCOVER the emerging national and federal initiatives driving your industry forward and giving you the competitive edge ESTABLISH a clear governance policy to enhance awareness through education generating confidence in the security of your system LEARN to mitigate the risk through certification & prioritization to build resilience, improve response times and enhance system robustness DEVELOP a clear process to efficiently manage the changing regulatory landscape ensuring effective and efficient compliance BUILD a clear plan to navigate the rapidly evolving threat landscape and guarantee the protection of your critical information and operational assets REALIZE how to certify the secure deployment of the latest technologies to maximize the protection of your critical assets and guarantee ROI ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT EXCLUSIVE GAME-CHANGING INFORMATION INCULDING` Up-to-date case studies from key US industry end users including:Wells Fargo & UTC ` Expert technical analysis on major industry challenges including integrated risk management and ‘big data’ from BT Global & Verizon ` Case studies to build clear strategies for efficient and economic compliance from Sempra & Enbridge ` Perspective from US government agencies including the FBI and NSTA on initiatives to ensure the security and reliability of critical infrastructure ` Workshops and roundtables discussing the international threat and critical infrastructure & key resource protection from GICSR industry ISACs 17-18 April, 2012, San Jose, California, USA As we navigate new and uncertain challenges in the digital age, we must also address the growing threat cyberattacks present to our transportation networks, electricity grid, financial systems and other assets and infrastructure. President Obama, 2011 Researched & Organized by: With the increasing number of regulations and threats facing information assets the time to invest in this area has never been more critical. Especially when considering the cost of the breakdown of one critical infrastructure could top $230bn SAVE $400 register before 17th February DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT www.cybersummits.com/enterprise For the latest speaker line up and agenda updates please visit:

Upload: nsheel

Post on 22-Jan-2015

839 views

Category:

Technology


1 download

DESCRIPTION

Develop Strategies to Utilize People, Process & Technology to Optimize your Governance, Risk & Compliance Management

TRANSCRIPT

Page 1: Enterprise cyber security

DRAFT COPY

And many more…

Host Organization:

Government & Trade:

Industry Insight From:

Expert Speakers End User Perspective

• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardandgivingyouthecompetitiveedge

• establishacleargovernancepolicytoenhanceawarenessthrougheducationgeneratingconfidenceinthesecurityofyoursystem

• learntomitigatetheriskthroughcertification&prioritizationtobuildresilience,improveresponsetimesandenhancesystemrobustness

• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance

• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets

• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI

ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT

ExClUSIvE GAME-CHANGING INFORMATION INCUlDING… ` Up-to-date case studies from key US industry end users including:Wells Fargo & UTC

` Expert technical analysis on major industry challenges including integrated risk management and ‘big data’ from BT Global & Verizon

` Case studies to build clear strategies for efficient and economic compliance from Sempra & Enbridge

` Perspective from US government agencies including the FBI and NSTA on initiatives to ensure the security and reliability of critical infrastructure

` Workshops and roundtables discussing the international threat and critical infrastructure & key resource protection from GICSR industry ISACs

17-18 April, 2012, San Jose, California, USA

“ Aswenavigatenewanduncertainchallengesinthedigital

age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.

President Obama, 2011

Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassetsthetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn

save $400

register before 17th February

DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT

www.cybersummits.com/enterpriseFor the latest speaker line up and agenda updates please visit:

Page 2: Enterprise cyber security

DRAFT COPY

Welcome to the enterprise cyber security & information assurance summit

Tel:+44(0)2073757537Email:[email protected]/enterprise

Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459

Dear Reader,

In the past few years there have been land mark changes to the Cyber Security industry; from the implementation of integrated technology, to the game changing power of the countless publi-cized breaches and malware. This is all without mentioning the rapidly evolving regulatory and compliance landscape.

Toguaranteeasecureandefficiententerprisesystemitisvitaltoconsiderthethreecoredisciplinesofpeople,processandtechnology.ThewaytobalancetheseareasisthroughtheconceptofGovernance,Risk&Compliance(GRC).EnterpriseGRCbringsthematterofITsecuritytotheboardlevel,drivingspendingandinvestmentinthissector.

` The GRC market is estimated to be worth over $32bn

` By 2015 the US federal Cyber Security market will reach $15bn

` The USA alone spends $14BN a year on IT-governance

Theattacksof2011havetaughtusthatthethreatlandscapeisnotjustevolvingbutrapidlymutating.Thisrequiressecuritymanagerstoconsidernewandcreativetechniquestodetect,preventandprepareforabreachscenario.Withthecostofthebreakdownofonecriticalinfrastructuretopping$230bnandaddedcomplexitycomingfromtheincreasingnumberofregulationsandthefrequentdynamicchangesthisareaisgrowingrapidly.

Noonewantstobetheweaklinkinglobalinfrastructureorhavetheirreputationtarnishedbyabreacheventbutmaintainingsecurityandcomplianceinarapidlyevolvingindustryiscostly, time consuming and technically challenging.Itisnowmorevitalthaneverforpublicandprivatepartnershipstorethinksecuritystrategiestominimizerisk,maximizeresiliencyandensurebusinesscontinuity.

TheEnterpriseCyberSecurity&InformationAssuranceSummitwillsupplyyourbusinesswith:

Thecriticalintelligenceandtoolsyouneedtobuildacosteffective,timeefficientcybersecuritystrategy

Keylessonsandtriedandtestedactionplanstomitigateriskandsave millions of USDincomplianceandreliability

Theinsightandconnectionyouneedtosecureyourplaceinthisboomingindustry

TheEnterpriseCyberSecurity&InformationAssuranceSummitwillbringtogether150cybersecuritysubjectmatterandindustryexpertsfortwodaysofbusinesscriticalstrategy,unrivallednetworkingandstimulatingdiscussion.

IlookforwardtomeetingyouinSanJoseinApril.

Natasha SheelSeniorIndustryAnalystFC Business Intelligence

register today - visit www.cybersummits.com/enterprise or phone +44207375 7537

Enterprise Security Mangers – Protect Against Risk and Regulatory Violation

Withthechallengesandcostsofsecuringthereliabilityofyourinfrastructureincreasingrapidlyitisessentialtoapproachthesecomplexconcernswithdetailedplanning.Thisfocussedmeetingwillequipyouwiththeforesighttoeconomicallyensuretheresiliencyofyourassets.

` Industry leading case studies on integrated risk management and compliance solutions from Sempra & Enbridge

` Federal and national initiatives driving change in standards and auditing

` Government strategies to enhance resilience to cyber incidents and manage the cyber threat including the FBI Infragard partnership

Don’tgetcaughtouttherapidlychanginglandscapeandthecostofabreach.Discoverclearprovenstrategiesbeingimplementedbyyourinformationsecuritypeersbysigninguptoday!

Solution Providers – Cyber Security Activity is on the Rise…Asintegratedandmobiledevicesbecomeubiquitousitisvitalthatthetechnologysecuringkeyinformationassetsevolvewiththis.WiththelikelyhoodofaPearlHarbor-scaleintrusionin2012increasingmilitaryinformationsecurityspendingby50%to$9bn-thepotentialforhugecontractshasneverbeengreater!

Atthisgroundbreakinggroundbreakingindustryeventyouwillhear…

• National risk management and security initiatives from international trend setters including BT & Wells Fargo

• Enterprise end user need for industry wide co-operation and standardization outlined by FBI and ISA

• Federal and national plans for regulations and enhancing security

JonthepremierCyberSecurityforumtoreceivemarketforecastandinsightintogovernmentleadindustrydriverstoaccuratelyplanyourbusinessfor2012andbeyond.

We’llputyouinfrontofindustryleadingbuyersfromacrossNorthAmericatofill your order books in 2 days!

What We Are Going To Do for You…

PracticalrealworldstrategiesandsharingbestpracticeareattheforefrontoftheEnterprise Cyber Security & Information Assurance Summit.Wearecommittedtoensuringyougoawaywithnewcontactsandthemostup-to-dateinformation.Mostimportantlyyouwillleaveknowingyourbusinessisgoingtomoveforward

` REALIZE initiatives to ensure the security and reliability of critical infrastructure

` ASCERTAIN how to ensure cost effective and efficient security and compliance maintenance

` UNDERSTAND the persistent and evolving threats and how to securely integrate new technology

` LISTEN to case studies from leading end users and government bodies for how to successfully merge people, process & technology to ensure the reliability of your assets

` DISCOVER the innovative methods developed by global industry leaders to enhance system robustness and resiliency

“GICSRisproudtobecollaboratingwithFCBusinessIntelligenceonthisprojectbringingtogetherkeyseniorlevelITSecuritypersonneltotacklethekeychallengesfacingNorthAmericancriticalenterprises.

TheEnterpriseCyberSecurity&InformationAssuranceSummitwillhelpyouto:

` Develop strategies to utilize people, process & technology

` Optimizing your governance, risk & compliance management

Withtheincreasingnumberofregulationsandthreatsfacinginformationassetsthetimetoinvestinthisareahasneverbeenmorecriticalespeciallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn.”Richard Zaluski, Executive VP – International, GICSR

Page 3: Enterprise cyber security

DRAFT COPY

MORNING AFTERNOON EXTRAS

Day 1

April 17th

•IndustryDrivers:latestonWhitehouse,DoDandDHSinitiatives•Lookingatthestandardsandtheirevolutiontomanagingyourgovernance&compliancestrategy

•Mitigatingtheriskandunderstandingthethreat•BuildingincidentresponseplansandSIEM

•RedDragonRisingWorkshop:ManagingInternationalcyberThreat•CISOroundtable•Networkingdrinksreception

Day 2 April 18th

•Maximizingsecuritythroughmergingpeople,process&technology•Ensuringaneducated&awareworkforce

•Managingregulationthroughintegratedrisksolutions•Breachscenarioevent

•CriticalInfrastructureandKeyResourceProtectionworkshop•RedDragonRisingWorkshop:ManagingChinesecyberThreat

Conference at a glance

register today - visit www.cybersummits.com//enterprise or phone +44 (0) 207 375 7537

expert speakers at this year’s meeting include:

Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459

KEYNOTE SPEAKERS

Jay Bavisi, President & CEO, EC Council

John Chesson, Special Agent, FBI

Rob Duiven Programme Director, National Cyber Security Strategy, Ministry of Security and

PHOTO

Munillal Chatarpal, Manager - Risk Management & Security, enbridge energy

Ola Lawal, Corporate Security Officer, enbridge energy

Alexander Kunz, Security Governance Manager, sempra

Ken Baylor, VP / CISO of Security & Antifraud, Wells Fargo

TBA, Director – Governance, Risk, Compliance, bt Global

Catherine Lester, Solutions Architect, verizon

TBA, Director, raytheon

Christopher Leigh, Global IT Compliance & Risk Officer, utc

David Gavilan, Executive Director & Assistant General Counsel, Jp Morgan chase

END USER PERSPECTIVE

GOVERNMENT & TRADE BODIES:

Deborah Kobza, Executive Director / CEO, Gicsr & nh-isac

Richard Zaluski, Executive Vice President - International, Gicsr

Larry Clifton, CEO / President, internet security alliance

(RET) General Mick Kicklighter, Director, Department of cip & hs, George Mason university

Steve Haynes, Director - Cyber Security & information Assurance, Whitehouse national security telecommunications advisory committee

INDUSTRY EXPERTS INCLUDING:

Peter Allor, Senior Security Strategist, Cyber Incident & Vulnerability Handling, ibM

Gene Fredriksen, Global CISO, tYco

Ernie Rakaczky, Principal Security Architect, invensys

William Hagestad II, Lieutenant Colonel US Marine Corps (RET), Chief Cyber Security Strategist, red-Dragon rising

Marci McCarthy, President CEO, tech exec networks

Ourexpertspeakerlineupwillbediscussingtheissuescriticaltoyou.TheFBIComputerIntrusion&CounterIntelligencealongwithIBMwhowillbediscussingtheneedforbuildingalongtermincidentresponseplan.

Turnover to see the extensive agenda, established techniques and forward looking strategies our internationally renowned speakers will be presenting and sharing at this premier industry meeting...

Page 4: Enterprise cyber security

DRAFT COPY

register today - visit www.cybersummits.com/enterprise or phone +44207375 7537

Session 1: Industry Drivers Guide to EU and National Policies and Initiatives• Hearfirstthelegislationandstandardsassociatedwiththerolloutofsmartgridtechnologyensuringyourknowledgeisup-to-date

• Realizethetruerequirementforsecurityasintelligentandintegratedtechnologybecomesarealityallowingyoustandoutinacompetitiveindustry

• Learnhowtosecurelyintegratesmarttechnologythroughouttheindustrytoenhanceyourproductivityandreliability

• DiscoverthetruepotentialforintegratedoperationstoensurethesecurityofEurope’senergyfuture

EvangelosOuzonis,Senior Expert, Network Security Policy,ENISA

Panel Session: Certifying Vendor Security and Utility Operations• Looktheatco-operativeeffortstoestablishtestingandcertificationofvendortechnologytoguaranteeyouworkwithtrustedproviders

• Explorethedevelopmentofcross-industrypartnershipstoestablishstandardsthatwillproduceresults

• Discussthelogisticsofensuringthattechnologyandequipmentareutilizedsecurelythroughcertifyingtheoperatorsofcriticalinfrastructureensuringoverallsystemrobustness

• Uncovertheneedtoverifytheorganizationalprocessesandinternalsecurityoftheendusertoimproveresilienceanddriveenhancedsecurity

Moderator:TylerWilliams,President,WurldTECH

EndUsers:Cyber Security Lead, Shell, WIB members

Case Study: The Efforts of EuroSCSIE in Standards and Guidelines• Anexpertleadlookatthestandardsandguidelinesavailabletoboostyourunderstanding

• Learnwhichstandardsarecompatibleandusethesetobuildaneffectivesecurityprogram

• Hearabouttheeffortstobuildinternationalindustry-widebestpracticeguidelinesandrequirementsplacingyouaheadofthecompetition

• DiscovertheEuropeanwideeffortstoincreaseawarenessthroughsharingandexchanginginformationtobuildprovenstrategies

AnnemarieZielstra,Director, EuroSCSIE / CPNI.NL

Session 2: Managing the ThreatCase Study: Defending the Triad - Energy and Critical Infrastructure• Learnhowenergyinfrastructureisakeypartofanynationaldefensivecyber-securityposturetoensureeffectiveprotection

• Discoveranationalsecurityprospectivetocounteringcyber-spiesfromNationalCyber-Entitiescompromisingtheelectricitygridtoensurethesecurity

• Understandthecyber-threatsandimpactofanattacktotheEnergyCriticalInfrastructuresoyoucanbeconfidentinyourpreparation

• Expertleadcasestudiesofpastcyber-eventstothepowerinfrastructureincludingtheAuroraandStuxnetvulnerabilitiesdefiningcomprehensivesecurityprecautionsfortheenergysector

RichardZaluski,Executive Vice President, International,GICSR

Panel Session: Vulnerability and Impact Analysis• Learnhowtoutilizepenetrationtestingandlookatrealisticattackscenariostostudytheconsequencesandimpactsidentifyingthevulnerabilitiessoyoucanprotectyoursystem

• Analyzeyoursystemstoidentifyhighriskhighimpactareastoefficientlyfocusyourresourcestoenhanceyourresiliencyandsystemrobustness

• Establishthebestwaytoascertainwhatisconnectedguaranteeingthesafemigrationfromanisolatedsystem

• Understandingthescopeofadditionalconnectivityandtheassociatedrisksbuildingcomprehensivesecurityprecautions

Moderator:DavidSpinks,Chairman,CSIRS

Vendor:PeterWood,CEO, First Base Technologies

Case Study: Establishing emergency response plans and CERT• Understandthethreats.vulnerabilitiesandconsequencesofabreachsoyoucanbuildaclearactionplan

• Establishacomputeemergencyresponsesothereisaclearactionplanforsystemfailuresensuringyouarebackon-lineasquicklyaspossible

• Learnhowtoimproveyourresiliencyandrecoverytominimizeyourdowntimeifthesystemfails

• Discovertheoperationalbenefitsofcybersecurityandsystemrobustnessmaximizingproductivity

DimitriosSerpanos,Director, ISI

Session 3: Mitigating the riskBuilding Multi-layer Security• Discoverhowtoeffectivelyanddynamicallyprioritizebetweenavailability,integrityandconfidentialitymaximizingtheefficiencyofyouroperations

• DevelopprovenandeffectivestrategiesofprotectionmergingITandphysicaltechniquestoenhanceyoursystemsecurity

• Learntechniquestomonitorwhatishappeningbothinsideandoutsidetheofficetomitigaterisk

• Mastertheartofeducatingpersonnelinhowtoprotecttheirindustryensuringsecurityandefficiency

ErnieHayden,Managing Principal,Global Energy and Utility Vertical,Verizon

Case Study: Shell and WurldTECH's collaboration in Infrastructure Security• Understandthescopeofadditionalconnectivityandtheassociatedriskstomaximiseyoursecurity

• Learnmethodstoprotectagainstmalwareandsocialengineeringtargetingsensitivebusinessinformationthatyoucanimplement

• Discoverprovenrealworldstepstosecurecriticalinformationinfrastructuresoyoucanbeconfidentinthestrengthofyoursystem

• Gainanup-to-theminuteunderstandingofwherethesecurityneeds,threatsandsolutionsareheadingensuringyoustaycompetitive

Expert,Cyber Security Lead, Shell

TylerWilliams,President,WurldTECH

Access Control• Discoverrealworldtechniquestoauthenticateusersgivingyouconfidenceinthesecurityofyoursystem

• learnprovenmethodstomanagewhohasauthorizationandaccessallowingyoutomaximizetheprotectionofyoursystem

• Discoverstrategiestoidentifytheindividualsbeinggrantedaccesstoyoursystemtostrengthenyourdefenses

• Hearastepbystepguidetoenforceuseraccountabilitytoenhanceyoursecurity

November 8th - 9th, Movenpick, Amsterdam, Netherlands

GET THE MOST OUT OF THE CONFERENCEAttend one of our exclusive workshops

CSIRS and RUSIClosed Door Meeting:Confidentialdiscussionofthethreatsyouarefacing,thestepsbeingutilizedtoprotectyourorganizationandguidestobuildingresponseplanstoenhanceoverallsystemrobustness

Red Dragon Rising Workshop:Expertleadsessioncoveringthemotivationsforgovern-mentandcommerciallysponsoredcyber-attacks.Takeawayaclearstepbystepguideforyoutoimplementinyourorganizationmaximizingyourresilience

Visit www.cybersummits.com/EU to find out more

3 SIMPlE STEPS TO REGISTER do this before August 19th to save $400Email [email protected] with BOOKME in the subject lineCall me now on +44 207 375 7537Or register on line at: https://secure.eyeforenergy.com/cyber/register.shtml

Page 5: Enterprise cyber security

DRAFT COPY

Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459register today - visit www.cybersummits.com/enterprise or phone +44207375 7537

Session 4: People and Policy National Cyber Security Strategy: 'Success through cooperation'• DiscussmethodstosecuretheICTinfrastructurecriticaltoensurethestrengthofthenationalandEuropeansocietyandeconomy

• Hearplansfornecessarycooperationbetweenexistingparties(public&private)inthedigitalsocietyataninternationallevel

• DiscovermethodstobuildsecuritythroughLinkingandreinforcinginitiativesandencouragingindividualresponsibilityensuringyouhavetheresponsecapacitytowithstandICTdisruptionsandcyberattacks

• LearnhowestablishingtheCyberSecurityBoardandNationalCyberSecurityCentrewillusetoself-regulation,legislationandifnecessaryregulationsincreasetheresilienceofCriticalInfrastructure

RobDuiven,Programme Director,National Cyber Security Strategy, Ministry of Security and Justice

Case Study: CPNI and Dutch Government Policy and Training Initiatives• Discoverhowpublic–privatepartnershipscanbeusedtomakeyourcriticalinfrastructuremoreresilient

• Learntestedtechniquestoeducate,raiseawarenessandmanagethelatesttechnologiesandchallengesfromtheCybercrimeInformationExchangeincreasingyouroperationalrobustness

• Discovertheprocesscontrolandsmartgridroadmapoutliningastepbystepguidetoguaranteesecurity

• GainthelatestinsightintotheplannedNetherlandsandEuropeancybertechnologyandtrainingfacilityandlearnhowthisfitsintotheDutchNCSSandEU-USinitiativesoncyber-securitylettingyougaintheedgeinatoughindustry

AukeHuistra,Project Manager Cybercrime Information Exchange,CPNI.NL

RobDuiven,Programme Director, NationalCyberSecurityStrategy,Ministry of Security and Justice

People and Process• Realizethattechnologyisnecessaryforsecuritybutpeopleandprocessareofequalorgreaterimportancetoguaranteecompletesecurity

• Understandthataddressingpeople,processandtechnologytogetherwillgiveagreaterchanceofmaintainingandprotectingtheintegrityofyourIPnetworks

• Learnhowtoguaranteepersonnel(andfamilies)arefullyeducated,professionalandcompetentthroughutilizinggovernanceandpolicytobuildawareness

• Hearstrategiestotrainsecurityandnetworkpersonneltokeepavigilanteyeonthetrafficpatternstodiscerntheprecursoranomaliestonewanddifferentlevelsofattackensuringyouareprepared

JohnBasset,Assosciate, RUSI

Session 5: Operational and Information Technology

Security Challenges for Information Technology controlling Energy Systems• Realizethechallengestounitingthetwodifferentworldstodeterminehowtobridgethegapimprovingeducationandcommunication

• Uncovertherequirementsforsmartsecurityacrosstheenergychainfromsmartappliances,gridandmarketoperatorsbuildingactionplansthatdriveresults

• Learnwhysomeonemayconsiderdisruptingtheenergychainandyouroperationsguaranteeingtheprotectionofyoursystem

• Hearplansforpathwaytoavoidsecuritybecomingashowstopperfornewenergysystemsensuringyoustayproductiveandprofitable

EricLuiijf,C(I)IP Consultant, TNO / CPNI.NL

Case Study: Alliander’s work in Uniting Process and IT Security• LearnhowtouniteprocesscontrolandICTsecurityinadvanceofimplementingsmartgridinfrastructuresavingtimefrustrationandmoney

• Hearprovenstrategiestosecuretheintersectionsoftransmission,distributionandgenerationwhichyoucanputtouseimmediately

• DiscoverhowtosuccessfullyapplytheexpertisewithinITtotheoperationsproblemturningwastedhourstoproductiveones

• Realizetheneedforco-ordinationandcollaborationacrossEuropetohelpyoustaycompetitive

JohanRambi, Privacy and Security Officer, Alliander

Building Security in Design• Learnhowtoplanlongtermsecurityintothepurchasinganddeploymentprocesstosavingyoutimeandmoney

• Discovermethodstofactorinthedifferenceinlifespanandtherealisticcostsofupgradestolegacysystemsensuringyoustayprofitable

• Hearrealworldstrategiestobuildhighsecuritylowlatencysolutionsmaximizingyourproductivity

• Developprovenmethodstomaintainsecuritythroughpatching,anti-virusandfirewallsguaranteeingthesecurityofyoursystem

Session 6: Securing Process Control Systems

The connection of SCADA and Corporate networks• HearrealworldproceduresforhowSCADAandbusinessnetworkscanco-existensuringSCADAsystemsarecompliantwithbusinessnetworksecurityrequirementsguaranteeingthesecurityofyoursystem

• LearnclearstrategiestomanageSCADAsysteminventoryinandoutsidetheindustrialITnetworkallowingyoutoconfidentinthestrengthofyoursystem

• DiscoverprovenstrategiestosecuretheconnectionsbetweenprocesscontrolandofficeITnetworksthatwillproduceresults

• UnderstandthetypesoffirewallsavailableforsegregatingtheSCADAandcorporatenetworksmaximizingtheproductivityofyoursystems

GitteBergknut,MU Nordic Information Security Manager, E.ON Sverige AB

Case Study: Elia’s effort to integrate cyber security in the migration from SDH to IP/MPLS network• UncovertestedstrategiestoovercomethetechnicalandorganizationalchallengesofthemigrationfromSDHtoIP/MPLSallowingyoutostaycompetitive

• Discusstheneedforatheimplementationofalayeredsecuritysolutiontoguaranteetheefficiencyofyouroperations

• Listentotheevolvingbusinessneedsrequiredtohandlethemigrationtoasecurelyconnectedsystemgivingyoutheedge

• HearrealworldmethodstoallowITpracticesandoperationalengineeringtoharmonizehelpingdriveyourproductivity

KrisHallaert,IT Security Officer,Elia

Viking Panel Session: Vital Infrastructure, NetworKs, INformation and Control System ManaGement• ExpertleadguidetothevulnerabilitiesofSCADAsystemsandthecostofcyber-attacksonsocietyresultingfromdifferentarchitecturesolutionssavingyoutimeandmoney

• Hearthetriedandtestedstrategiesandtechnologiesusedtomitigateandprotectagainstweaknesses

• Discovertheexistingandinnovativecommunicationsolutionsyoucanutilizetosecureyoupowersystem

• Learnhowemployingsimulations,modelingandtestingtoensurethesolutionsyouimplementonyourlegacysystemdrivereliabilityandsecurity

GunnarBjoerkman, Project Co-ordinator, Viking

November 8th - 9th, Movenpick, Amsterdam, Netherlands

GROUP DISCOUNTS Moreheadsarebetterthanone!Maximisethebenefitstoyourbusiness,andensurevaluablelessonsmakeitbacktotheoffice,bysendingateamtothisevent.

Qualify for a group [email protected]+44 (0) 207 375 7537Register before August 19th to save $400You can do this in 3 easy steps:Reply to this email with BOOKME in the subject line

Page 6: Enterprise cyber security

DRAFT COPY

look at who you could be networking with in 2011TheEnterpriseCyberSecurity&InformationAssuranceSummitprovidesoutstandingnetworkingopportunitiesforanyoneinvolvedwitheGRCstrategiestosecureCriticalInfrastructure.Thisisthepremiercybersecuritymeeting–attracting150+security&industrystakeholders.Ifsecurityorcompliancearepartofyoujobrole–yousimplycan’taffordtomissout!

We will be providing: `Dedicated networking time across the conference

` Fully interactive panel sessions for you to identify yourself to the entire delegate audience as a topic expert

`Dedicated workshops, discussion groups, coffee breaks, lunches and evening drinks for you to target key clients

Youcouldhavemorefacetofaceconversationsatthisconferencethaninayear.Leadingindustryenduserswillbeattendingthisconferencetomeetsolutionprovidersofferingnewtechnologiesandstrategiestoreducethecostandtimeofensuringsecurityandcompliance.Signuptodayandfillyourorderbook!

ManagingDirectorsPresidentsChiefExecutivesChiefSecurityOfficer(CSO)ChiefInformationSecurityOfficer(CISO)ChiefInformationOfficer(CIO)ChiefTechnologyofficer(CTO)Seniorsecurityleads/EngineersCyberSecurityManagersReliabilityManagersDirectorofComplianceTechnicalDirectorsOperationalSecurityITSecurityStandardsManagersSeniorInformationProtectionAnalystEnterpriseinformationSecurityPrinciple

Senior/ChiefSecurityOfficersComplianceSpecialistCyberSecurityArchitectSecurityLead.SeniorSecurityConsultantDirector,NetworkSecurityPracticeSecurityLead/Co-ordinatorDirectorofCommunicationsandInformationSystemSecurityChiefTechnologistSeniorSecurityAnalystDirector/VP/ManagerofRiskDirector/VP/ManagerAuditDirector/VP/ManagerComplianceDirector/VP/ManagerInformationSecurityRisk&compliancemanagerCorporateinformation

Take a look at the job titles this conference will attract:

INDUSTRY END USERS

ATTVerizonTSystemsBTGlobalVISAEbayJPMorganChase

PaypalBankofAmericaWellFargoPGESCESempraRaytheon

NorthropGrummanBoeingLockheedMartinSAIC

Specialist Solution Providers

RSASymantecHP

SAPMicrosoftCISCO

McAfeeTyco

Key Sponsorship and Exhibition Benefits

• ThisistheonlyEnterpriseCyberSecurity&InformationAssuranceSummitwithindustrysupportcoveringthewholeofNorthAmerica–meetovera150keyindustrycolleaguesin2daysofintensebusinessdevelopment.

• Thisistheexhibitionthatprojectmanagersandkeydecisionmakerswillattendtosourcethelatestservicesandtechnologies.Don’tgetleftbehindbyyourcompetitors!

• Buildyourowncybersecuritybrandthroughhighlevelexposureonallourconferencemarketing,onsiteandinpersontofillyoursalesbookfor2012andbeyond

• Unlikemanyotherindustrytradeshows,exhibitionsandconferencesourpackagesarenot“onesizefitsall”.Telluswhatyouwanttogetoutoftheevent,whatyourbudgetisandwewillbuilditforyou…simple!

Conference Room

Coffee

REGISTRATION

Conference Room

Coffee

Coffee

1 2 10 9 8

1

2

3

4

5

6

7

8

3 4 5 67

Make a list of your most important aims

•Exhibitionbooth

•Brandvisibility

•Privatemeetings

•Breakfastbriefings

•Speakingslots

•Conferencematerialbranding•Sponsorasession

register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537

Call me at EyeforEnergy to discuss your package now!Exhibitionspaceregularlysellsoutweeksinadvance.Don’tmissout–secureyourplacetoday!

CAll NOWIeuan [email protected]

+44 207 375 4304

The types of Organization this conference is aimed at attracting:

Work out your budget

Speakwithyourmarketingteamanddecideyourannualconfer-enceinvestment–makesureyouassigntherightbudgettotherightshow.Nomatterwhatyourbudgetiswewillworkwithyoutobuildapackagethatachievesyouraimsandexceedsexpectations.

DepartmentofDefenceGICSRNICEFBI

DHSISACANSANIST

CERTISA

Government Agencies and Trade Associations

Break Down of Audience at Previous FC Cyber Summits

Page 7: Enterprise cyber security

DRAFT COPY

register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537

Date & VenueNovember 17th - 18th, 2012Hyatt Place, San Jose, CA, USA

Hotel DiscountFC Business Intelligence has negotiated a discounted rate for all conference attendees. SImily quote the name of the conference when booking your accommodation

4 Reasons why your company needs you here...

1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they are putting in place and what solutions are leading the way in cyber security

2. Gain invaluable knowledge and insight into cost and time effective compliance, security and strategies to ensure the successful integration of new technology

3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas, strategies and contacts that ensure your business leads the way when it comes to cyber security and smart grid deployment

4. Save your department time and money by attending this one stop shop for all things regarding cyber security; give your company the chance to make 2012 the most profitable year ever!

Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before Feb 17th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. Design by www.thecreativetree.co.uk

REGISTER NOW IN 3 EASY STEPS

I enclose a check/draft for:

(Payable to First Conferences Ltd)

Please invoice my company:

Purchase Order Number: Please

charge my credit card: Amex Visa Mastercard

Credit card number:

Expiry date: Security number:

Name on card:

Signature:

Pass Features PLATINUM PASS GOLD PASS POST CONFERENCE MATERIALS

` Full access to conference, workshops and exhibition ` Full access to all lunches, breaks ` Full access to all networking events ` Full Post Conference Materials including audio recordings,

PDF presentation files and digital attendee list Super Early Bird Price - Before 17th Februrary $1795 $1595

$495 Early Bird Price - Before 16th March $1995 $1795

Full price $2195 $1995

1. Select Your Registration Package

3. Payment Options

MORE WAYS TO REGISTER

CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: [email protected]: www.cybersummits.com/enterprise

Mr/Mrs/Ms/Dr: First name: Last name:

Company: Position/Title:

Telephone: Fax: Email:

Address: Zipcode: Country:

2. Enter Attendee details DIScOunT cODE:

Enter the discount code when you register to save $100

ONLINE100

ENTERPRISE CYBER SECURITY & INFORMATION

ASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA

Researched & Organized by:

“ Ihavebeenimpressedwiththelevelofunderstandingandresearchundertakenbytheorganisers,thequalityofspeakerswill

surelymakethisaneventnoonewillwanttomiss

” David Spinks, CSIRS

save $400

register before 17th February

Page 8: Enterprise cyber security

DRAFT COPY

And many more…

Host Organization:

Government & Trade:

Industry Insight From:

Expert Speakers End User Perspective

4 EASY WAYS TO REGISTER

CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: [email protected]: www.cybersummits.com/enterprise

• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardandgivingyouthecompetitiveedge

• establishacleargovernancepolicytoenhanceawarenessthrougheducationgeneratingconfidenceinthesecurityofyoursystem

• learntomitigatetheriskthroughcertification&prioritizationtobuildresilience,improveresponsetimesandenhancesystemrobustness

• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance

• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets

• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI

ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT17-18 April, 2012, San Jose, California, USA

“ Aswenavigatenewanduncertainchallengesinthedigital

age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.

President Obama, 2011

Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassetsthetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn

save $400

register before 17th February

DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT

Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information sharing and Business

Development at the Premier Industry Gathering: www.cybersummits.com/enterprise

ExClUSIvE Case Studies from:

` SEMPRA

` ENBRIDGE

` Raytheon

` BT Global

` Wells Fargo

` Verizon

` JP Morgan Chase

` UTC

` FBI