Approaches to Network Monitoring and Situational Awareness in Critical Infrastructure

Size: px
Start display at page:

Download "Approaches to Network Monitoring and Situational Awareness in Critical Infrastructure"

Transcription

1 SMi proudly present their 3rd annual conference European Smart Grid Cyber and SCADA Security Behaviour, Detection, Applications and Devices 11th - 12th March 2013 Copthorne Tara Hotel, London, United Kingdom KEY SPEAKERS INCLUDE: European Network and Information Security Agency, Head of Resilience and CIIP Unit, Dr. Vangelis Ouzounis European SCADA and Control Systems Information Exchange, Chair European Reference Network of Critical Infrastructure Protection, Coordinator Annemarie Zielstra Iberdrola, IT Manager SIMOD, Miguel Escamilla Chavero E.ON, Information Security Manager, Gitte Bergknut Enel Distribuzione SpA, IT and Security Systems, Daniela Pestonesi Con Edison of New York, Smart Grid Project Manager, Patricia Robison Vattenfall, Senior Research and Development Engineer, Daniel Zajd Alliander, Alliance Manager Privacy & Security, Johan Rambi Swissgrid, Senior Advisor Operations, TSC SC Chairman, Rudolf Baumann CRISALIS, FP7 Project Co-ordinator, Corrado Leita DNV KEMA Energy & Sustainability, Business Director Management and Operations Consulting, Maurice Adriaensen FOX IT, Sales Director Europe CNI, Henk Pieper Infrastructure Security Labs, President, John McNabb Cylance, Senior Researcher, Justin Clarke Zigbee Alliance, Principal Consultant, Robert Cragie Security Matters, COO, Damiano Bolzoni CNA Insurance, European Underwriting Director, Technology & Cyber Risks, Jacob Ingerslev POST CONFERENCE WORKSHOP 13th MARCH 2013 Approaches to Network Monitoring and Situational Awareness in Critical Infrastructure Presented by Dr Damiano Bolzoni, University of Twente 8.30am pm SPONSORED BY Register online and receive full information on all of SMi s conferences Alternatively fax your registration to +44 (0) or call +44 (0) Book by 7th December and save 300 Book by 18th January and save 200

2 DAY ONE 11th March REGISTRATION & COFFEE 9.00 CHAIRMAN'S OPENING REMARKS Mark Ossel, ESNA Board Member and VP, Echelon Energy and Utility EUROPEAN RECOMMENDATIONS 9.10 ENHANCING THE SECURITY OF SMART GRIDS ENISA'S CONTRIBUTION Recommendations on Smart Grids Security Minimum Security Measures Risks Assessment and Management of Smart Grids Certification of Smart Grids products EU US co-operation on Smart Grids Evangelos Ouzounis, Senior Expert, Network Security Policy, ENISA - European Network and Information Security Agency 9.50 DEPLOYING WORLDWIDE CYBERSECURITY ON THERMAL POWER GENERATION CONTROL SYSTEMS Iberdrola overview Iberdrola & Thermal Stations Strategy Cyber Security s Goal and Vision AURA Project (Cybersecurity projects examples) Conclusions Miguel Chavero, IT Manager SIMOD, Iberdrola MORNING COFFEE RISK MANAGEMENT ASSESSMENT PROTECTING CRITICAL NETWORKING INFRASTRUCTURE FROM CYBER ATTACKS USING UNI-DIRECTIONAL GATEWAYS What kind of CNI are we talking about and what are we trying to protect? Standardization efforts Threat Scenarios Migrating from IT defense to Industrial defense, the need for Defense in depth Implementations of cyber protection in Transport CNI Henk Pieper, Sales Director Europe CNI, FOX IT RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURE Making security a priority Lack of standards and the effect on investment Cyber Security and Electricity pricingcause and effect Fostering a culture of awareness Measuring resiliency Incident response and countermeasures Technical, cultural, and political cooperation for success Maurice Adriaensen, Business Regional Director Management and Operations Consulting, DNV KEMA Energy & Sustainability NETWORKING LUNCH DETECTION, AWARENESS, CHALLENGES 1.50 LESSONS LEARNED FROM THE NEW SMART METER/GRID RISK ASSESSMENT METHODOLOGY IN THE NETHERLANDS Introduction Explanation IS1 Risk Assessment methodology on Smart Meter/Grid in NL Practice on case sector Privacy & Security AMI requirements v2.0 Lessons learned Status European standard on Smart Grid Cyber Security Next steps Johan Rambi, Alliance Manager Privacy & Security, Alliander 2.30 FP7 EARLY WARNING DETECTION PRESENTED BY CRISALIS FP7 project funded by DG Enterprise called CRISALIS, Critical Infrastructure Security AnaLysIS Project focuses: Creation of practical, short-term solutions for the protection of critical infrastructure environment from targeted attacks- primarily power grid Consortium members- Enel, Symantec, Security Matters and Alliander First deliverables of the project: Requirement study, in which we will study in depth the characteristics of the power generation and smart metering environments Identify risks and possible threat scenarios Feedback on our activity Corrado Leita, Project Coordinator, CRISALIS 3.10 AFTERNOON TEA 3.40 ICS CYBER SECURITY IN POWER GENERATION AND FUTURE SCENARIO Electric grid and power generation scenario in Italy Power Generation: Architecture and Frameworks Risk Analysis: Threats and impacts CI owner requirements for ICS protection Enel Cyber Security ICS Laboratory CRISALIS project participation Daniela Pestonesi, Project Leader Research Technical Area, Automation & Diagnostics, Enel Engineering and Research Spa 4.20 CHALLENGES IN POWER-NETWORK SECURITY AND IT Updates and improvements in power-network and IT Common processes, systems and collaboration procedures Integration of system planning, operations and IT Future developments and sharing knowledge Rudolf Baumann, Chairman of the Transmission Security Cooperation, Senior Advisor Operations, swissgrid AG 5.00 ENHANCING NETWORK MONITORING AND SITUATIONAL AWARENESS IN CRITICAL INFRASTRUCTURE Current approaches to network monitoring and situational awareness Strengths and shortcomings of current approaches Non-signature based approaches for improved monitoring and situational awareness WORKSHOP ON THIS TOPIC MARCH 13TH Discussion of 2 use cases Damiano Bolzoni, COO, Security Matters 5.40 CHAIRMAN'S CLOSING REMARKS AND CLOSE OF DAY ONE Register online at: Alternatively fax your registration

3 DAY TWO 12th March REGISTRATION & COFFEE NETWORKING LUNCH 9.00 CHAIRMAN'S OPENING REMARKS Annemarie Zielstra, Director CPNINL, Centre for the Protection of National Infrastructure (CPNI) 9.10 HOW THE BOARD SHOULD TAKE CARE OF CYBER RESILIENCE Cyber incidents on the increase, now a risk for any business This leads to serious concerns on business process continuity, privacy of consumers, identity theft or the protection of intellectual property Cyber resilience needs to be part of strategic (both risk and reputation) management and leadership is required Creating concrete, visible boardroom recognition of cyber resilience, as an enabler for cyber benefits Translating boardroom recognition into risk management, communications, legal and operations Annemarie Zielstra, Annemarie Zielstra, Chair of EuroSCSIE, Coordinator of ERNCIP 9.50 SCADA AND ICS SECURITY EXPERIENCES Experiences of how to run a Cyber Security program Business Awareness and Societal Responsibility - Compliance & Review - Training Use of technical mitigations such as IDS in - Cogeneration - Hydro - Heating Results and lessons learned Gitte Bergknut, MU Nordic Information Security Manager, EON Sverige AB SYSTEMS, DEVICES, APPLICATIONS MORNING COFFEE SMART GRID INTEGRATES LEGACY AND NEW ICS (SCADA, DCS, PLC) SYSTEMS, DEVICES, AND APPLICATIONS Smart Grid Cyber Security Integrating legacy and new ICS enhances the grid and simultaneously increases complexity and vulnerability Cyber Security needs to address ICS at all levels: field devices, the device systems, the applications supporting the devices and systems, the communications/network interfacing to the devices and systems, etc. ICS Cyber Security Controls: Technical, Physical, Administrative Risk Management Smart Grid More challenging with increased complexity and extended systems and communications Leverage existing ICS standards and frameworks: IEC, NIST, DOE, ISA, ISO, NERC Smart Grid Architecture and Frameworks with ICS Threats and Vulnerabilities Examples of ICS systems utilized for Smart Grid: transformers, switches, inverters, DG Patricia Robison, Smart Grid Project Manager, Con Edison of New York CREATING AN APP CONNECTED TO A BACKEND SYSTEM Low awareness within the organisation about the effects of a connected app The least secure point in a network will be the target An app will be an extension of the company environment Data stored on the mobile device Daniel Zajd, Senior R and D Engineer, Vattenfall A B 1.50 SECURING DEVICES FOR HOME AND CONTROL NETWORKS Home and Control Networks What is a Home network (HAN)? What is a Control Network? Topologies Devices - Types of devices on home and control networks - Distinguishing characteristics - Security challenges - Information Security Pillars - Cryptography - Public key cryptography - Symmetric key cryptography - Hybrid cryptography - Protocol stack security - Building blocks - Frame security - Authentication and key establishment - Credentials - ZigBee SEP 1.0 stack security description - ZigBee SEP 2.0 stack security description Robert Cragie, Chair, Security Task Group, Zigbee Alliance 2.30 SECURITY ISSUES OF CONTROL SYSTEMS & WIRELESS METERS AT DRINKING WATER UTILITIES How do they differ from Smart energy meters? Communications infrastructure vulnerabilities of fixed and wireless Lack of encryption Theft Data collection privacy Billing John McNabb, Principal, Infrastructure Security Labs 3.10 AFTERNOON TEA New for 2013 EXPOSING VULNERABILITIES AND CYBER RISK AND INSURANCE 3.40 VULNERABILITIES IN CRITICAL INFRASTRUCTURE AND EMBEDDED DEVICES Key roles of embedded devices in our every day lives Vulnerabilities in embedded system Findings and impact behind several recent SCADA vulnerabilities that had worldwide impact Moving towards a resolution of existing vulnerabilities and avoidance of future vulnerabilities -Education of manufacturers, end users, academia, government, and the general public The process that occurs when end users or the general public identify vulnerabilities in critical infrastructure - What to expect - How to reduce your risk - How to leverage existing agencies - Processes to minimize your required effort Justin Clarke, Security Researcher, Cylance 4.20 CYBER RISKS & INSURANCE Cyber Crime as an Industry Legal environment What is Cyber Insurance Industry specific exposures Jacob Ingerslev, European Underwriting Director, CNA Europe 5.00 CHAIRMAN'S CLOSING REMARKS AND CLOSE OF DAY TWO to +44 (0) or call +44 (0) GROUP DISCOUNTS AVAILABLE

4 POST CONFERENCE WORKSHOP Wednesday 13th March 2013, Copthorne Tara Hotel, London, UK Approaches to Network Monitoring and Situational Awareness in Critical Infrastructure 8.30am 1.00pm In Association with University Twente Overview of workshop This workshop will present solutions currently available for monitoring critical networks and situational awareness. We will analyse what are the major strengths and weaknesses of each approach, when it can be used and what is the output users can expect. We will wrap up the session with demonstrations of the approaches presented using real-life examples. Why you should attend: Understand the importance of situational awareness and behavioural monitoring Gain insight in to the benefits and disadvantages of signature based, rule based, behavioural and visualisation based solutions Learn what threats can be detected and what skills are required to operate Interact with industry and engage with our workshop leader who is actively involved in two security projects with major energy companies at present. Programme 8:30 Registration and Coffee 9.00 Current solutions for network monitoring and situational awareness of critical networks - Signature-based - Rule-based - Behaviour-based - Visualization Advantages and disadvantages of each approach - Where and when use what - Which threats can be detected? - Technical skills required to operate Coffee Break Demonstrations 1.00 Question and Answer session About the workshop host Dr Damian Bolzoni (1981) received his PhD in 2009 from the University of Twente, where he performed research on anomalybased intrusion detection. Since 2008 he has been involved in securing computer networks of critical infrastructure. Before joining the University of Twente, he has been working for the Italian branch of KPMG, within the Information Risk Management division. Since 2009 he holds the position of Chief Operations Officer within SecurityMatters BV.. SMi's Event Communities SMi Group is a global events business specialising in business to business conferences, workshops and masterclasses. We successfully create and run 250 events every year across 6 sectors including Defence and Security, Energy and Utilities, Finance and Pharmaceutical. We believe in bringing together the most knowledgeable experts from across the globe in each sector to learn, engage, share and network be it in London, Paris or Singapore. To further enhance the SMi experience, we have launched our very own SMi Event Communities. These will be exclusive, private and secure communities in which our clients will learn, share, engage and network. The SMi Event Communities will build and expand your experience beyond the conference, workshop or Masterclass you attend. Not just another "social network, SMi s Event Communities have been specifically designed around the needs of our delegates, speakers and sponsors, allowing all of our clients to foster longer term relationships with all of the other attendees beyond the two day event for year round engagement. To take part all you need to do is register for this event. SMi Group Communities Learn Engage Share Network

5 Sponsored by Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Advantech, world leading industrial electronics platform provider for SCADA and Smart Grid applications, supplying network appliances to solution builders for data-centre security and rugged end-point platforms in harsh and remote environments, such as high-voltage and distribution substations, renewable (distributed) energy resources, electric vehicle charging stations and meter data collection nodes. DNV KEMA Energy & Sustainability, with more than 2,300 experts in over 30 countries around the world, is committed to driving the global transition toward a safe, reliable, efficient, and clean energy future. With a heritage of nearly 150 years, we specialize in providing world-class, innovative solutions in the fields of business & technical consultancy, testing, inspections & certification, risk management, and verification. As an objective and impartial knowledge-based company, we advise and support organizations along the energy value chain: producers, suppliers & endusers of energy, equipment manufacturers, as well as government bodies, corporations and non-governmental organizations. DNV KEMA Energy & Sustainability is part of DNV, a global provider of services for managing risk with more than 10,000 employees in over 100 countries. For more information on DNV KEMA Energy & Sustainability, visit Waterfall Security Solutions Ltd. is the leading provider of Unidirectional Security Gateways for industrial control networks and critical infrastructures. Frost & Sullivan awarded Waterfall the 2012 Network Security Award for Industrial Control Systems Entrepreneurial Company of the Year. Waterfall s offerings include support for leading industrial Historians, SCADA and IT protocols. Supported by For Sponsorship or Speaking Opportunities please contact Jamison Nesbitt Business Development Director P: +44 (0) M: +44 (0) jnesbitt@smi-online.co.uk TM Don t miss out on social media networking! Follow us on and join us on Linkedin

6 EUROPEAN SMART GRID CYBER AND SCADA SECURITY Conference: 11th & 12th March 2013, Copthorne Tara Hotel, London Workshop: 13th March WAYS TO REGISTER ONLINE at FAX your booking form to +44 (0) POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor PHONE on +44 (0) South, Harling House, Great Suffolk Street, London, SE1 0BS Register by 7th December 2012 and receive 300 EARLY BIRD off the conference price DISCOUNT Register by 18th January 2013 and receive 200 off the conference price CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE I would like to attend: (Please tick as appropriate) Fee Total Unique Reference Number Our Reference LV U-013 DELEGATE DETAILS Please complete fully and clearly in capital letters. Please photocopy for additional delegates. Title: Forename: Surname: Job Title: Department/Division: Company/Organisation: Address: Town/City: Post/Zip Code: Direct Tel: Mobile: Switchboard: Signature: Country: Direct Fax: Date: I agree to be bound by SMi's Terms and Conditions of Booking. ACCOUNTS DEPT Title: Surname: Forename: Address (if different from above): Town/City: Post/Zip Code: Direct Tel: Country: Direct Fax: Terms and Conditions of Booking Payment: If payment is not made at the time of booking, then an invoice will be issued and must be paid immediately and prior to the start of the event. If payment has not been received then credit card details will be requested and payment taken before entry to the event. Bookings within 7 days of event require payment on booking. Access to the Document Portal will not be given until payment has been received. Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates may not share a place at an event. Please make separate bookings for each delegate. Cancellation: If you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a 50 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept cancellations of orders placed for Documentation or the Document Portal as these are reproduced specifically to order. If we have to cancel the event for any reason, then we will make a full refund immediately, but disclaim any further liability. Alterations: It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme. Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or to tell you about other products and services. Unless you tick here we may also share your data with third parties offering complementary products or services. If you have any queries or want to update any of the data that we hold then please contact our Database Manager databasemanager@smi-online.co.uk or visit our website quoting the URN as detailed above your address on the attached letter. PUBLIC SECTOR, ACADEMICS & UTILITIES Conference & Workshop VAT Conference only VAT Workshop only VAT COMMERCIAL ORGANISATIONS Conference & Workshop VAT Conference only VAT Workshop only VAT PROMOTIONAL LITERATURE DISTRIBUTION Distribution of your company s promotional literature to all conference attendees VAT The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations. VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR. Please contact me to book my hotel Alternatively call us on +44 (0) , hotels@smi-online.co.uk or fax +44 (0) DOCUMENTATION Payment must be made to SMi Group Ltd, and received before the event, by one of the following methods quoting reference U-013 and the delegate s name. Bookings made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment: UK BACS Sort Code , Account Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU Swift (BIC): LOYDGB21013, Account IBAN GB48 LOYD Cheque We can only accept Sterling cheques drawn on a UK bank. Credit Card Visa MasterCard American Express All credit card payments will be subject to standard credit card charges. Card No: Valid From / Expiry Date / CVV Number 3 digit security on reverse of card, 4 digits for AMEX card Cardholder s Name: Signature: I agree to be bound by SMi's Terms and Conditions of Booking. Card Billing Address (If different from above): (Shipped days after the event) I cannot attend but would like to purchase access to the following Document Portal/paper copy documentation: Price Total Access to the conference documentation on the Document Portal VAT The Conference Presentations - paper copy (or only 300 if ordered with the Document Portal) PAYMENT VAT Date: VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on Document Portal and Literature Distribution for all UK customers and for those EU customers not supplying a registration number for their own country here: If you have any further queries please call the Events Team on tel +44 (0) or you can them at events@smi-online.co.uk

Oil and Gas Cyber Security

Oil and Gas Cyber Security BOOK BY SEPTEMBER 30TH AND SAVE 200 BOOK BY OCTOBER 30TH AND SAVE 100 SMi present their 5th annual conference on Oil and Gas Cyber Security Defend assets, ensure compliance and secure systems to build

More information

Contactless Cards and Payments

Contactless Cards and Payments Uncovering the key developments and unmissable opportunities the contactless cards and mobile payments sector has to offer... SMi present their 9th annual conference on Contactless Cards and Payments The

More information

Clinical Trial Logistics

Clinical Trial Logistics BOOK BY 31ST MARCH TO SAVE 100 SMi presents the 8th conference and exhibition series... Clinical Trial Logistics 21ST - 22ND MAY 2014 MARRIOTT REGENTS PARK LONDON, UK EUROPE'S LEADING CLINICAL TRIAL LOGISTICS

More information

Financial Modelling for PPP/PFI Enhance your modelling capabilities

Financial Modelling for PPP/PFI Enhance your modelling capabilities Definitive Project Managers Guide to Modelling PPP SMi s 10th Conference on Financial Modelling for PPP/PFI Enhance your modelling capabilities Are you taking the right decisions for your PFI project?

More information

Introducing the leading forum for Cyber Security Professionals in Asia. Cyber Security ASIA

Introducing the leading forum for Cyber Security Professionals in Asia. Cyber Security ASIA GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR Introducing the leading forum for Cyber Security Professionals in Asia Cyber Security ASIA 9th & 10th November

More information

Business Improvement in Universities

Business Improvement in Universities Business Improvement in Universities Transforming back-of-house functions to maximise efficiency gains 24th & 25th September, 2014, Rydges Melbourne Key Speakers Benefits of attending Peter Marshall Chief

More information

COLD CHAIN 3RD - 4TH DECEMBER 2013 MARRIOTT HOTEL REGENTS PARK, LONDON, UK PLUS AN INTERACTIVE HALF-DAY PRE-CONFERENCE WORKSHOP

COLD CHAIN 3RD - 4TH DECEMBER 2013 MARRIOTT HOTEL REGENTS PARK, LONDON, UK PLUS AN INTERACTIVE HALF-DAY PRE-CONFERENCE WORKSHOP THE 8TH ANNUAL CONFERENCE ON... COLD CHAIN DISTRIBUTION NEW AGENDA 3RD - 4TH DECEMBER 2013 MARRIOTT HOTEL REGENTS PARK, LONDON, UK FEDEX PHARMA CLIENTS ONLY 899 The UK's only pharmaceutical cold chain

More information

DYNAMIC HEDGING ESSENTIALS, MASTER CLASS AND WORKSHOP

DYNAMIC HEDGING ESSENTIALS, MASTER CLASS AND WORKSHOP DYNAMIC HEDGING ESSENTIALS, MASTER CLASS AND WORKSHOP Chicago, Illinois August 8 9, 2013 About the course Tremendous advances have been made in the last few years in the area of dynamic hedging of variable

More information

Operational Risk Management for Energy Companies

Operational Risk Management for Energy Companies Energy Risk magazine presents David Hirst on Operational Risk Management for Energy Companies Led by David Hirst, Director, Ainsty Risk Consulting Ltd incisive-training.com/opriskenergy About the course

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

incisive-training.com/generationasset Generation Asset Analytics and Risk Management Course highlights

incisive-training.com/generationasset Generation Asset Analytics and Risk Management Course highlights Course highlights Apply the latest approaches for modelling energy prices Practical lessons on calibrating models and implementing Monte-Carlo simulations Value generation assets Hedge portfolios of generation

More information

Smart Cities. Smart partners in tomorrow s cities

Smart Cities. Smart partners in tomorrow s cities DNV KEMA serving the energy industry Smart Cities Smart partners in tomorrow s cities Experience, knowledge and advanced methods & tools for smart city planning and implementation 02 I DNV KEMA SERVING

More information

Volcker Rule Breakfast Briefing

Volcker Rule Breakfast Briefing Volcker Rule Breakfast Briefing Venue: Date: Pinners Hall, 105-108 Old Broad Street, London, EC2N IEX 7 April 2014 Volcker and cross-border bank resolution Speakers include: Barnabas Reynolds Head of the

More information

Supply Chain Excellence

Supply Chain Excellence Executive MasterClass For fee, dates & location details see page 8 The Overview Introduction How can industry leaders build an effective supply chain to reduce costs and enhance value? Effective Supply

More information

ENCS/NEC RESEARCH MEETING

ENCS/NEC RESEARCH MEETING ENCS/NEC RESEARCH MEETING Benessa Defend ベネッサ ディフェンド Benessa.Defend@encs.eu April 21, 2014 NEC, Kawasaki 1 PARTNERING FOR CYBER RESILIENCE We create and bring together knowledge and resources to secure

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack NextGen SCADA security Erwin Kooi Setting the stage This talk is not An introduction to SCADA security AIC versus CIA The latest blinky-lights SCADA security appliance How to use IT security in OT envrionments

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Martin Keogh Acting Chief Operating Officer ALFRED HEALTH, VIC. Dr Ian Scott Director, Department of Internal Medicine & Clinical Epidemiology

Martin Keogh Acting Chief Operating Officer ALFRED HEALTH, VIC. Dr Ian Scott Director, Department of Internal Medicine & Clinical Epidemiology Driving whole of hospital reform to Improve Patient Flow 19th & 20th May, 2015, Oaks on Market Hotel, Melbourne Key Speakers Benefits of attending Colton Miller Nurse Manager, Emergency Department TAMPA

More information

EU CIP Project DENSEK. Joining forces against cyber threats on European level

EU CIP Project DENSEK. Joining forces against cyber threats on European level EU CIP Project DENSEK Joining forces against cyber threats on European level DENSEK EU CIP Objectives Improving the resilience of the energy infrastructure i.e. improving the security of the Smart Energy

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE

More information

A FORUM FOR DEBATE, A CATALYST FOR CHANGE

A FORUM FOR DEBATE, A CATALYST FOR CHANGE 7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes

More information

Project Finance in the Oil and Gas Industry

Project Finance in the Oil and Gas Industry Book early and SAVE 10% www.clariontraining.com/energy A three-day practical applied training course for Oil and Gas Industry Professionals Get to grips with financial and economic techniques, sources

More information

Business Continuity & Resilience Conference

Business Continuity & Resilience Conference Business Continuity & Resilience Conference Venue: Date: The City, London (TBC) 9 September 2014 Building capacity for resilient growth and development Speakers include: Andrew Gracie Executive Director

More information

Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation

More information

How To Protect A Smart Grid From Cyber Security Threats

How To Protect A Smart Grid From Cyber Security Threats Smart Grid Cyber Security System Reliability, Defense-in-Depth, Business Continuity, Change Management, Secure Telecommunications, Endpoint Protection, Identity Management, and Security Event Management

More information

TRAINING COURSE: COMPLIANCE MANAGEMENT & PRACTICE

TRAINING COURSE: COMPLIANCE MANAGEMENT & PRACTICE TRAINING COURSE: COMPLIANCE MANAGEMENT & PRACTICE 2nd December 2015 At DENTONS One Fleet Place, London, EC4M 7WS (Nearest Stations: City Thameslink, St. Pauls) FOCUSSING ON EFFECTIVE & EFFICIENT COMPLIANCE

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

Congress on the Future of Firefighter Safety

Congress on the Future of Firefighter Safety Friday 09 October 2015 Caledonian Club, London Congress on the Future of Firefighter Safety How best to safeguard our firefighters when protecting the public and property Organised by Programme monitored

More information

Industrial Control Security

Industrial Control Security Industrial Control Security Holiday Inn, Sacramento, California www.industrialcontrolsecurityusa.com www.cybersenate.com The Effective Approach for Protecting Oil and Gas Critical Infrastructures from

More information

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation

More information

Management, Carbon and Water Footprinting

Management, Carbon and Water Footprinting Course outline & registration Management, Carbon and Water Footprinting To secure your Early Bird Rate register and pay by Friday, 20 December, 2013 Be smart and benefit from business opportunities 3 day

More information

Successfully Implementing and Using Mobility for Enterprise Asset Management

Successfully Implementing and Using Mobility for Enterprise Asset Management Register online at: www.tacook.com/mobile-emea November 28 29, 2012, Amsterdam, Netherlands Successfully Implementing and Using Mobility for Enterprise Asset Management Discover the Potential of Mobile

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

Receivables Finance Masterclass

Receivables Finance Masterclass Receivables Finance Masterclass 19 April 2016 Stephenson Harwood, London In only one day out of the office you will be able to: The different variations of receivables finance Legal considerations in creating

More information

Application form for Certification

Application form for Certification Application form for Certification 2nd Floor North, Chancery Exchange 10 Furnival Street, London EC4A 1AB, United Kingdom T. +44 (0)20 7245 6883 applications@irca.org www.irca.org The following information

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

ADVANCED STRESS TESTING

ADVANCED STRESS TESTING SYDNEY 15 & 16 SEPTEMBER 2008 T R A I N I N G ADVANCED STRESS TESTING Course Highlights: Course Tutors: Efficiently analysing, reporting and communicating stress test results The problem with haircuts

More information

M2M Technologies The future is upon us. Is this stuff secure?

M2M Technologies The future is upon us. Is this stuff secure? M2M Technologies The future is upon us. Is this stuff secure? CQR 2012 San Diego, CA Bob Lesnewich Applied Communication Sciences rlesnewich@appcomsci.com 732-699-3267 (office) 1 M2M Technologies Advancements

More information

Regulation Regulation Regulation. Conference Programme 2013. 02/07/13 America Square Conference Centre, London www.insuranceage.co.

Regulation Regulation Regulation. Conference Programme 2013. 02/07/13 America Square Conference Centre, London www.insuranceage.co. 02/07/13 America Square Conference Centre, London www. Conference Programme 2013 #iaregulation Dear colleague, I am delighted to announce the launch of an Insurance Age specific event: The Three R s. Join

More information

Obstetrics for lawyers

Obstetrics for lawyers www.rcog.org.uk/meetings Register on-line today at Obstetrics for lawyers A practical, workshop based course Wednesday 4 March 2009 Why Attend? To improve understanding of the clinical Obstetrics and Gynaecology

More information

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it www.technologytransfer.it

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Channel Islands Conference 2015. 17 19 June Radisson Blu Waterfront Hotel, Jersey

Channel Islands Conference 2015. 17 19 June Radisson Blu Waterfront Hotel, Jersey Channel Islands Conference 2015 17 19 June Radisson Blu Waterfront Hotel, Jersey Channel Islands Conference Wednesday 17 Friday 19 June 2015 ACCA UK s annual Channel Islands Conference focuses on key issues

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

Regulatory Issues - Review of the Cullen International Economic System

Regulatory Issues - Review of the Cullen International Economic System MASTERING EUROPEAN AUDIOVISUAL REGULATION A two-day training course Organised by Cullen International The training will provide attendees with: key market data on the audiovisual sector a historical perspective

More information

Managing SCADA Network Security Risks

Managing SCADA Network Security Risks Organized by AmericanBusinessConferences May 25-26, 2011 Holiday Inn Golden Gateway San Francisco The First And Only Dedicated SCADA Security Event Quantify Risk, Evaluate Vulnerabilities, & Discover Solutions

More information

RECEIVABLES FINANCE MASTERCLASS

RECEIVABLES FINANCE MASTERCLASS RECEIVABLES FINANCE MASTERCLASS exploiting the opportunities provided by receivables purchasing REED SMITH LONDON, UK 13TH OCTOBER 2015 In only one day out of the office you will be able to: Master the

More information

Achieving success through data analytics

Achieving success through data analytics Please go to the back page and Register now @Connect_BI #ConnectBI Achieving success through data analytics Sponsored by What is BI? Business intelligence (BI) enables you to make informed business decisions

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

European Network for Cyber Security

European Network for Cyber Security European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy

More information

Stamford Bridge Chelsea, London Thursday 17 June 2010

Stamford Bridge Chelsea, London Thursday 17 June 2010 Presented by MODELLING Stamford Bridge Chelsea, London Thursday 17 June 2010 WORLD 2010 PEDESTRIAN MODELLING DATA COLLECTION TRANSPORT MODELLING Sponsors 09.00 Registration 10.00 Morning Plenary TRANSPORT

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

How to prove the value of PR to your organization!

How to prove the value of PR to your organization! Register before 30th April 2013 for EUR 359! How to prove the value of PR to your organization! www.thepworld.com +3892 5 111 350 info@thepworld.com Dear Colleague, In March 2011 in Belgrade, Serbia, we

More information

RECEIVABLES FINANCE MASTERCLASS

RECEIVABLES FINANCE MASTERCLASS RECEIVABLES FINANCE MASTERCLASS exploiting the opportunities provided by receivables purchasing REED SMITH LONDON, UK 13TH OCTOBER 2015 In only one day out of the office you will be able to: Master the

More information

Waterfall for NERC-CIP Compliance

Waterfall for NERC-CIP Compliance Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall

More information

CGI Cyber Risk Advisory and Management Services for Insurers

CGI Cyber Risk Advisory and Management Services for Insurers CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their

More information

There are both sponsorship and exhibition opportunities at the meeting, detailed in the document below.

There are both sponsorship and exhibition opportunities at the meeting, detailed in the document below. Dear Prospective Exhibitor! We would like to extend to you an invitation to join us at the Society for Experimental Biology s Annual Main Meeting 2011 taking place from the 1 st 4 th July 2011 in Glasgow,

More information

Mediators Conference. 27 28 October 2012. Surfers Paradise Marriott Resort and Spa Gold Coast, Queensland

Mediators Conference. 27 28 October 2012. Surfers Paradise Marriott Resort and Spa Gold Coast, Queensland Mediators Conference 27 28 October 2012 Surfers Paradise Marriott Resort and Spa Gold Coast, Queensland 9 CPD points Ethics, practice management, mediators, non-allocated Special thanks to our sponsor:

More information

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014

More information

FINANCIAL CRIME COMPLIANCE PROFESSIONALS CERTIFICATION PROGRAMME

FINANCIAL CRIME COMPLIANCE PROFESSIONALS CERTIFICATION PROGRAMME FINANCIAL CRIME COMPLIANCE PROFESSIONALS CERTIFICATION PROGRAMME 17 th June 2015 At DENTONS One Fleet Place, London, EC4M 7WS (Nearest Stations: City Thameslink or St. Pauls) DEVELOPING PRACTICAL SKILLS

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

30 th - 31 st January 2014 Management & Financing of Offshore Renewable Projects

30 th - 31 st January 2014 Management & Financing of Offshore Renewable Projects SUMMIT GUIDE SUMMIT HIGHLIGHTS INCLUDE: Surfing through investment opportunities Ingeniero Jorge Juan Foundation is delighted to invite you to participate in the "Management & Financing Offshore Renewable

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

SPONSORSHIP & EXHIBITION OPPORTUNITIES

SPONSORSHIP & EXHIBITION OPPORTUNITIES SPONSORSHIP & EXHIBITION OPPORTUNITIES Predictive Analytics for Dynamic Grid Performance 2-Day Conference, Exhibition & Networking Forum Tuesday 5 th & Wednesday 6 th April 2016 Novotel Amsterdam City,

More information

Privacy and Security in Healthcare

Privacy and Security in Healthcare 5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

2. Upon receipt of your registration form we will send you an invoice by email in PDF format.

2. Upon receipt of your registration form we will send you an invoice by email in PDF format. PROCEEDINGS FOR DELEGATES 1. Send the registration form to us by email or by fax. 2. Upon receipt of your registration form we will send you an invoice by email in PDF format. 3. Once the invoice is paid

More information

ACT WORKING CAPITAL CONFERENCE

ACT WORKING CAPITAL CONFERENCE CONNECTING MINDS ACT WORKING CAPITAL CONFERENCE Making capital work Tuesday 15 September 2015 Grange St. Paul s,london Lead sponsor Workshop sponsor Exhibitor FREE FOR ACT MEMBERS AND CORPORATES FOLLOW

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

REliAbilitY AND ASSEt MANAGEMENt. MAKiNG PRODuctS AND SERvicES work better for longer.

REliAbilitY AND ASSEt MANAGEMENt. MAKiNG PRODuctS AND SERvicES work better for longer. REliAbilitY AND ASSEt MANAGEMENt. MAKiNG PRODuctS AND SERvicES work better for longer. safety and reliability group Seminar 14 november 2012 london www.imeche.org/events/s1727 WHY YOU SHOULD BE THERE the

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS

PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS 2 Separately Bookable Seminars, 1 Mega Professional Development Forum for EAs and Pas 25 th & 26 th August, Marque Hotel, Brisbane Including

More information

Industry involvement in education and research - TCIPG

Industry involvement in education and research - TCIPG 1 Industry involvement in education and research - TCIPG Peter W. Sauer and William H. Sanders (and the TCIPG team) IEEE/PES GM, Denver, CO July 29, 2015 Outline History and facts TCIPG Overview and Vision

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER THE NEW INTEGRATION MANIFESTO APPLICATIONS, DATA, CLOUD, MOBILE, AND THE INTERNET OF THINGS DECEMBER 10-11, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME

More information

End-to-End Cyber Security for the Smart Grid

End-to-End Cyber Security for the Smart Grid SPONSORSHIP & EXHIBITION OPPORTUNITIES End-to-End Cyber Security for the Smart Grid 2-Day Conference, Exhibition & Networking Forum 29-30 November 2016 Amsterdam, The Netherlands Event Format Case-study

More information

Employee Surveillance and the Law

Employee Surveillance and the Law One day conference Employee Surveillance and the Law Understanding the challenges posed by surveillance and monitoring in the workplace Supported by 4 November 2015 Central London Book online at www.regonline.com/employeesurveillance

More information

Vulnerable Children Reforming systems to improve service delivery & quality of care

Vulnerable Children Reforming systems to improve service delivery & quality of care Pathways for Vulnerable Children Reforming systems to improve service delivery & quality of care 17th & 18th March 2015, CQ Functions, Melbourne Key speakers Director of Policy Research and Development

More information

SAVE! EARLY BIRD DISCOUNTS ARE AVAILABLE Contact Jasmin Sangha on 020 7004 7560 jasmin.sangha@incisivemedia.com

SAVE! EARLY BIRD DISCOUNTS ARE AVAILABLE Contact Jasmin Sangha on 020 7004 7560 jasmin.sangha@incisivemedia.com 1 March, Millennium Hotel, Mayfair, London SAVE! EARLY BIRD DISCOUNTS ARE AVAILABLE Contact Jasmin Sangha on 020 7004 7560 jasmin.sangha@incisivemedia.com search innovate navigate user engage connect ranking

More information

12/11/2012. North America. New York. Risk management and strategy in a low rates environment. insurancerisknorthamerica.com

12/11/2012. North America. New York. Risk management and strategy in a low rates environment. insurancerisknorthamerica.com Regulatory update Economic capital Risk appetite ALM optimization Risk management and strategy in a low rates environment insurancerisknorthamerica.com Inaugural Insurance Risk North America conference

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens Robert Malmgren Smart Grid Security Challenges - Legacy and Infrastructure Burdens Short bio Robert Malmgren Independent consultant that have worked with utility companies regarding IT- and info sec since

More information

aamg Airborne Particles: Origins, composition and effects Airborne Particles: Origins, composition and effects Programme and call for posters

aamg Airborne Particles: Origins, composition and effects Airborne Particles: Origins, composition and effects Programme and call for posters Airborne Particles: Origins, composition and effects Email: conference@aamg-rsc.org Web site: www.aamg-rsc.org Advancing the Chemical Sciences aamg Monitoring Ambient Air 2008 Airborne Particles: Origins,

More information

CCT Venues Plus South Quay, London E14. A One-Day Conference Thursday 5 th February 2015. Organised by. City & Financial Global.

CCT Venues Plus South Quay, London E14. A One-Day Conference Thursday 5 th February 2015. Organised by. City & Financial Global. A One-Day Conference Thursday 5 th February 2015 The UK Energy Cyber Security Executive Forum Addressing the cyber security risks at the board level The new realities of cybercrime in the energy sector

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Steve Lusk Alex Amirnovin Tim Collins

Steve Lusk Alex Amirnovin Tim Collins Steve Lusk Alex Amirnovin Tim Collins ViaSat Inc. Cyber-intrusion Auto-response and Policy Management System (CAPMS) Cybersecurity for Energy Delivery Systems Peer Review August 5-6, 2014 Summary: Cyber-intrusion

More information

February 24-26, 2016 Westin Hotel Ottawa, ON

February 24-26, 2016 Westin Hotel Ottawa, ON February 24-26, 2016 Westin Hotel Ottawa, ON SPONSORSHIP OPPORTUNITIES available sold LEVEL OPPORTUNITY MEMBER VALUE SPONSOR URANIUM Opening Reception $100,000 sold PLATINUM Thursday Lunch $50,000 available

More information

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY

MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY LA TECHNOLOGY TRANSFER PRESENTS PRESENTA MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY DECEMBER 14-15, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information

Performance Management in Public Sector Organisations: The Contribution of the CAF

Performance Management in Public Sector Organisations: The Contribution of the CAF Seminar Performance Management in Public Sector Organisations: The Contribution of the CAF Maastricht (NL), 17-19 February 2016 European Institute of Public Administration Institut européen d administration

More information

Strategic Platforms Information Security 2014

Strategic Platforms Information Security 2014 Strategic Platforms Information Security 2014 -------------------------- Data Mining for security process monitoring New authentication mechanism for System Information Call for «Expression of Interest»

More information

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad

More information

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy

More information

MAKING BETTER DECISIONS MISTAKES, BIASES, IRRATIONAL EFFECTS, AND INSPIRED GENIUS!

MAKING BETTER DECISIONS MISTAKES, BIASES, IRRATIONAL EFFECTS, AND INSPIRED GENIUS! MAKING BETTER DECISIONS MISTAKES, BIASES, IRRATIONAL EFFECTS, AND INSPIRED GENIUS! One Day Workshop Saturday 8 September 2007 (9am 4pm) Diana Plaza Hotel, Brisbane Qld (Annerley Road, Woolloongabba) Unexpected

More information

EXECUTIVE ASSISTANT TRAINING SEPTEMBER 2015

EXECUTIVE ASSISTANT TRAINING SEPTEMBER 2015 EXECUTIVE ASSISTANT TRAINING SEPTEMBER 2015 11 BOOK 2 $200 + GST EVERYBODY LEADS EMOTIONAL INTELLIGENCE (EI) HILTON BRISBANE 14 SEPTEMBER 2015 HILTON BRISBANE 16 SEPTEMBER 2015 BOOK 3 $390 + GST THE EA

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information