Oil & Gas Cybersecurity

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Oil & Gas Cybersecurity"

Transcription

1 COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1

2 Overview The energy industry has witnessed an increase in the number of cyber-attacks in recent years. Cybersecurity is critical to the infrastructure of the oil and natural gas industry. Advanced attacks have redefined security reality for the energy sector in a multitude of ways. This event will discuss the knowledge and strategies required to proactively address and to prevent these increasing attacks. Attendees will learn to describe cyber events, the nature and proliferation of cyber-attacks, and emerging cyber threats in the oil & gas industry. The instructor will discuss the trends in industrial control system threats. Attendees will evaluate best practices for asset integrity and secure information management for the oil & gas industry. They will learn to assess cyber incident recovery plans and employ risk analysis and management strategies. Attendees will leave with an understanding of endpoint security management. At the end of the day, attendees will engage in a conversation about the future of cybersecurity in oil & gas and participate in a Q&A discussion. Who Should Attend Oil & gas IT management Oil & gas IT security professionals System administrators Database administrators Data privacy specialists Application support personnel Corporate security professionals Learning Outcomes Describe cyber vulnerabilities, the nature and proliferation of cyber-attacks, and emerging cyber threats in the oil & gas industry Discuss the trends in industrial control system threats Evaluate best practices for asset integrity and secure information management for the oil & gas industry Assess cyber damage recovery plans Employ risk analysis and management strategies to combat the prolonged effects of malicious entities that are accessing your systems Describe the importance of endpoint security management Discuss the future of cybersecurity in oil & gas Participate in a Q&A and hot topics session REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 2

3 Agenda Monday, 8:00-8:30 a.m. Registration and Continental Breakfast 8:30-9:30 a.m. Cyber Vulnerabilities and Risks: An Introduction A brief history of cyber conflict Discussing the nature and proliferation of ransomware/crypto-locker type cyberattacks on the oil & gas industry State of oil & gas cybersecurity threats Emerging cyber threats in the oil & gas industry Identifying cyber espionage and cyber warfare 9:30-10:00 a.m. Networking Break 10:00-11:00 a.m. The Trends in Industrial Control System Threats The effect of cyber damage on big data and cloud computing systems Managing supply chain risk in field operations through improved ICS security Cyber threat intelligence & information sharing Oil & Natural Gas Information Sharing and Analysis Center (ONG-ISAC) Advanced persistent threats/next generation/advanced evasive techniques 11:00 a.m. - 12:00 p.m. Protecting the Data vs. Protecting the Network Best practices for asset integrity and secure information management for the oil & gas industry Hacking critical infrastructure: A summary from cyber mythology to cyber realityseparating fact from fiction Application security and information process technologies/drm/dlp Protecting against advanced persistent threat (APT) malware and increasingly complex hacker abilities Utilizing traffic capture analyses to identify, in real time, when and how malicious entities are gaining access to your systems Advanced persistent threats/advanced evasive techniques Rapidly responding after a cyber-attack and implementing a disaster recovery plan 12:00-1:00 p.m. Group Luncheon 3

4 Agenda Monday, (Continued) 1:00-2:00 p.m. Institutionalizing Cybersecurity Development of system architecture as a means to mitigate the risk of cyber intrusion and as a defense of critical network data Identity & access management and establishing true data privacy Integrating the increasingly automated SCADA and ICS controls with IT and cyber security measures Employing risk analysis and management strategies for combating the prolonged effects of malicious entities that are accessing your systems Designing incident response management plans Developing information protection programs and risk management Integrating operators in the field with the cybersecurity plans of the IT and cybersecurity departments The importance of endpoint security management How to determine if and when third party software and companies should be used 2:00-2:30 p.m. Networking Break 2:30-3:30 p.m. The Future of Cybersecurity in Oil & Gas Future cyber threat trends in both domestic and international arenas The impact of cyber threats on industry network integrity and social engineering Discussing the increasing importance of mobility/mobile device and service management The emergence of endpoint security management Addressing the necessity of mitigating the risk of data leaks and security incidents with industry partners and joint ventures The emerging face of cyber actors and their objectives 3:30-4:30 p.m. Q&A and Hot Topics This session will be an opportunity to ask questions of the expert and discuss hot topics within oil & gas cybersecurity 4

5 INSTRUCTORs Hans Holmer / Senior Strategist / Technical Intelligence Center at Intelligent Decisions / US Government Hans Holmer is a Senior Strategist with over 25 years of government, human intelligence and private industry experience. Mr. Holmer is the recipient of a host of awards for his work and contributions, including: CIA Intelligence Star, CIA Career Commendation Medal, 2 CIA Meritorious Unit Awards, 11 CIA Exceptional Performance Awards, Director of National Intelligence Meritorious Unit Award, National Intelligence Certificate, National Intelligence Award, and the U.S. Army Commendation Medal. A successful strategist and planner, performing complex analyses and briefing at the highest levels and an accomplished public speaker in demand, Hans is a leader and developer of multidisciplinary teams. Rick Wilson / Director / Enterprise Cyber Defense Rick Wilson has been instrumental in developing and deploying cyber defense programs throughout the nation. He was responsible for developing and deploying the DoD s first enterprise-wide cyber intrusion detection system. In 2009 and 2010 Rick was detailed to the Department of Homeland Security as the Technical Director for the National Cybersecurity Center where he developed and deployed the current national intrusion protection system. As Technical Director for the NSA Technical Counterintelligence Center he led a diverse team of analysts, technologists and investigators to identify and neutralize penetrations and compromises of NSA and national equities. He later became the NSA Director s Special Assistant for Cyber responsible for overseeing and representing NSA cyber programs and policies. Rick s accomplishments have been recognized with numerous national level awards and commendations. 5

6 Instructional Methods Case studies, PowerPoint presentations and group discussion will be used for in this event. Requirements for Successful Completion of Program Participants must sign in/out each day and be in attendance for the entirety of the course to be eligible for continuing education credit. iacet Credits has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, has demonstrated that it complies with the ANSI/IACET Standard which is recognized internationally as a standard of good practice. As a result of their Authorized Provider status, is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standard. is authorized by IACET to offer 0.6 CEUs for the course. EVENT LOCATION A room block has been reserved at the Sheraton Pentagon City Hotel, 900 S. Orme Street, Arlington, VA 22204, for the night of February Room rates are $109, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is January 11, 2015, but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. PROCEEDINGS The proceedings of the course will be published, and one copy will be distributed to each registrant at the course. 6

7 REGISTRATION INFORMATION EVENT LOCATION Mail Directly To: Electric Utility Consultants, Inc. () 4601 DTC Blvd., Ste. 800 OR, scan and to: please register the following Oil & Gas Cybersecurity Course : US $995 Early bird on or before January 30, 2015: US $895 A room block has been reserved at the Sheraton Pentagon City Hotel, 900 S. Orme Street, Arlington, VA 22204, for the night of February Room rates are $109, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is January 11, 2015, but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. ENERG ZE WEEKLY s Energize Weekly newsletter compiles and reports on the latest news and trends in the energy industry. Newsletter recipients also receive a different, complimentary conference presentation every week on a relevant industry topic. The presentations are selected from a massive library of more than 1,000 current presentations that has gathered during its 26 years organizing conferences. Sign me up for Energize Weekly. How did you hear about this event? (direct , colleague, speaker(s), etc.) Print Name Job Title Company What name do you prefer on your name badge? Address City State/Province Zip/Postal Code Country Telephone List any dietary or accessibility needs here CREDIT CARD Name on Card Account Number Billing Address Billing City Billing State Billing Zip Code/Postal Code exp. Date Security Code (last 3 digits on the back of Visa and MC or 4 digits on front of AmEx) OR Enclosed is a check for $ to cover registrations. All cancellations received on or before January 9, 2015, will be subject to a US $195 processing fee. Written cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other event or publication. This credit will be good for six months. In case of event cancellation, s liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at reserves the right to alter this program without prior notice. 7

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW This

More information

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities WEBINAR Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities May 2, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer

More information

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS COURSE ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS Houston Marriott West Loop by The Galleria is authorized by IACET to offer 0.7 CEUs for the course. Media Sponsor 1 OVERVIEW There is seldom

More information

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW

More information

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS COURSE AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS Hilton Houston Southwest is authorized by IACET to offer 1.1 CEUs for the course. is authorized by CPE to offer 13.5 credits for this

More information

Strengthening Utility Critical

Strengthening Utility Critical WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White

More information

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: AN ACCOUNTING COURSE ON DERIVATIVE INSTRUMENTS, HEDGING ACTIVITIES, AND FAIR VALUE Hyatt Regency Miami COURSE is authorized by IACET to offer 1.0

More information

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS COURSE ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS Denver Marriott City Center is authorized by IACET to offer 1.0 CEUs for the course. This course has been approved for 12.0 CPEs. 1 OVERVIEW This course

More information

CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM

CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM WEBINAR CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM April 16, 2015 12:00 1:30 p.m. Eastern Time Online is authorized by IACET to offer

More information

PROJECT PORTFOLIO MANAGEMENT

PROJECT PORTFOLIO MANAGEMENT COURSE PROJECT PORTFOLIO MANAGEMENT Hyatt Regency Louisville EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Many organizations struggle with limited resources and too many projects

More information

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center EUCI is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW

More information

September 22-23, 2014 JW Marriott Houston Houston, TX

September 22-23, 2014 JW Marriott Houston Houston, TX COurse Energy Joint Ventures JW Marriott Houston is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 12.0 credits for this program. 1 Overview This course will provide

More information

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the details

More information

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING COURSE POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING October 27-28, 2015 Houston Marriott West Loop by The Galleria Houston, TX is authorized by IACET

More information

NATURAL GAS UTILITY BASICS

NATURAL GAS UTILITY BASICS COURSE NATURAL GAS UTILITY BASICS Hilton Houston Southwest EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW This training is targeted at participants in the natural gas industry

More information

THE BASICS OF COLLECTIONS & BANKRUPTCY IN THE OIL & GAS INDUSTRY:

THE BASICS OF COLLECTIONS & BANKRUPTCY IN THE OIL & GAS INDUSTRY: WEBINAR THE BASICS OF COLLECTIONS & BANKRUPTCY IN THE OIL & GAS INDUSTRY: GETTING PAID IN HARD TIMES Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW The purpose of this webinar

More information

Project Prioritization and Utility Project Portfolio Management

Project Prioritization and Utility Project Portfolio Management COurse Project Prioritization and Utility Project Portfolio Management Denver Marriott Tech Center EUCI is authorized by IACET to offer 1.2 CEUs for the course. 1 Overview As utilities face increasing

More information

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers The Westin Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts

More information

Lessons Learned from Utilities that are in the Cloud

Lessons Learned from Utilities that are in the Cloud Webinar Lessons Learned from Utilities that are in the Cloud Online Photo credit: WikiUser Sam Johnston is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview It is increasingly inefficient

More information

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS WEBINAR IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW In recent years regulatory authorities have placed increased

More information

Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures

Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures COurse Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 1.0

More information

Fundamentals of Oil and Gas Taxation

Fundamentals of Oil and Gas Taxation COurse Fundamentals of Oil and Gas Taxation Houston Marriott West Loop by The Galleria EUCI is authorized by IACET to offer 1.0 CEUs for the course. EUCI is authorized by CPE to offer 12 credits for this

More information

COurse Workforce AnAlytics October 21-22, 2014 Marina del rey Marriott Los Angeles, CA euci is authorized by IACeT to offer 1.0 Ceus for the course.

COurse Workforce AnAlytics October 21-22, 2014 Marina del rey Marriott Los Angeles, CA euci is authorized by IACeT to offer 1.0 Ceus for the course. COurse Workforce Analytics Marina del Rey Marriott is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Within the last 5 years, we have moved from an environment where HR reporting and

More information

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS WEBINAR MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY November 19, 2015 1:00 2:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW Insurance

More information

Improving Utility Call Centers

Improving Utility Call Centers CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street EUCI is authorized by IACET to offer 1.0 CEUs for the conference. 1 Overview

More information

Estimation and Cost Control Fundamentals for Oil & Gas

Estimation and Cost Control Fundamentals for Oil & Gas COurse Estimation and Cost Control Fundamentals for Oil & Gas Capital Projects Denver Marriott City Center EUCI is authorized by IACET to offer 1.1 CEUs for the course. 1 Overview Managing the complexity

More information

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the

More information

Minimizing Disputes in Energy Project Development

Minimizing Disputes in Energy Project Development COurse Minimizing Disputes in Energy Project Development Hilton Charlotte University is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Energy development projects are fraught with potential

More information

in Ontario and Key Canadian

in Ontario and Key Canadian CONFERENCE The Future of Electricity Prices in Ontario and Key Canadian Markets Toronto Don Valley Hotel & Suites Supporting Organizations is authorized by IACET to offer 0.9 CEUs for the conference. 1

More information

Improving Utility Call Centers

Improving Utility Call Centers CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street Featuring Georgia Power Call Center Tour Friday, December 6, 2013 Sponsor

More information

Data Centers and Utilities: Planning, Incentives, Audits & Trends

Data Centers and Utilities: Planning, Incentives, Audits & Trends CONFERENCE Data Centers and Utilities: Planning, Incentives, Audits & Trends September 29-30, 2014 Denver Marriott Tech Center Denver, CO Photo Credit: Wikimedia User123net is authorized by IACET to offer

More information

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS Millennium Knickerbocker Hotel Chicago Instructed by COURSE Baltimore

More information

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse FERC Natural Gas 101 Renaissance Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview FERC Natural Gas 101 provides a comprehensive overview of the agency s impact

More information

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE:

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: CONFERENCE 5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: Houston Marriott West Loop by the Galleria Pre-Conference Workshop All Hazards Emergency Predicting, Planning and Response: An Evolving

More information

(IN)CONDUIT HYDRO-ELECTRIC GENERATION

(IN)CONDUIT HYDRO-ELECTRIC GENERATION COURSE (IN)CONDUIT HYDRO-ELECTRIC GENERATION Royal Sonesta Harbor Court Baltimore is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Adding renewable energy like solar and wind to the

More information

CYBERSECURITY FOR UTILITIES

CYBERSECURITY FOR UTILITIES CONFERENCE CYBERSECURITY FOR UTILITIES Offices of Troutman Sanders, LLP Pre-Conference Workshop Disaster Recovery and Contingency Planning Managing and Delivering after your Cyber Apocalypse Tuesday, April

More information

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY CONFERENCE LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY Sheraton Indianapolis City Centre Hotel PRESENTATIONS FROM Keynote Presentations from: Department Of Energy - The Honorable Patricia Hoffman, Assistant

More information

Cybersecurity for Utilities: Compliance, Protection and Improving

Cybersecurity for Utilities: Compliance, Protection and Improving CONFERENCE Cybersecurity for Utilities: Compliance, Protection and Improving Overall April 24-25, 2014 Offices of Troutman Sanders, LLP Washington, DC Pre-conference Workshop The New IT/OT/Telecom Convergence:

More information

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS CONFERENCE AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 0.8 CEUs for the course. is authorized by CPE to offer

More information

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES EUCI presents a conference on: WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES National Arts Centre Ottawa, Ontario TESTIMONIALS FROM PAST ATTENDEES "Exceeded my expectations. It was great

More information

SOUTHEAST CLEAN POWER SUMMIT

SOUTHEAST CLEAN POWER SUMMIT CONFERENCE 4 TH ANNUAL SOUTHEAST CLEAN POWER SUMMIT Hyatt Regency Atlanta Post Conference Workshop Pricing the Purchase of Renewable Energy Tuesday, March 31, 2015 Studies and Presentations from Entergy

More information

WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA

WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT May 24-25, 2012 Atlanta, GA OVERVIEW Clean and simple content based on the top tasks your visitors want to accomplish online

More information

LEGAL UPDATE FOR OIL & GAS ENTITIES:

LEGAL UPDATE FOR OIL & GAS ENTITIES: COURSE LEGAL UPDATE FOR OIL & GAS ENTITIES: CONTRACTS TO LIABILITY, PERMITS TO INDEMNITY, STRATEGIES TO AVOID RISK, AND CYBERSECURITY CHALLENGES Houston Marriott West Loop by The Galleria is authorized

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

PLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA

PLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA PLANNING & GROWING ONLINE LEARNING INITIATIVES October 25 26, 2010 Atlanta, GA OVERVIEW Many institutions wanting to improve student access and increase degree completion rates are looking to online programs

More information

Online Course Design. August 2 4, 2010 Denver, CO

Online Course Design. August 2 4, 2010 Denver, CO Online Course Design August 2 4, 2010 Denver, CO An excellent study of the elements that must be considered when conceptualizing, executing, and revising course content. Thomas Friedmann, Instructional

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION

UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION As an institution trying to bring both its online course offerings and the support services to distance education students up to the next level, it was

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES 13 TH ANNUAL CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES Millenium Knickerbocker CONFERENCE Host Utility Sponsors is authorized by IACET to offer 1.0 CEUs for the conference.

More information

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE CONFERENCE HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE Hyatt Regency Orange County Pre-Conference Workshop THE CLOUD: A VIABLE OPTION FOR UTILITIES Wednesday, January 27, 2016 Sponsor Media Partner is

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Security Management Program Development:

Security Management Program Development: Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are

More information

Storm Planning and Response

Storm Planning and Response EUCI presents a conference on: Best Practices in Storm Planning and Response Hyatt Regency New Orleans New Orleans, LA Pre-conference workshop Storm Planning 101 February 25, 2013 Platinum Sponsor Gold

More information

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, 2013 1:00PM EST

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, 2013 1:00PM EST Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, 2013 1:00PM EST November 6, 2013 Copyright 2013 Trusted Computing Group 1 November 6, 2013 Copyright 2013 Trusted Computing

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

OIL & GAS CYBERSECURITY

OIL & GAS CYBERSECURITY CONFERENCE OIL & GAS CYBERSECURITY Houston Marriott West Loop by The Galleria Post-Conference Workshop CYBERSECURITY AND INDUSTRIAL CONTROL SYSTEMS August 11, 2015 Speakers Include: Paul Brager, Lead Associate

More information

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com Next Generation Security Strategies Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Why the Global Cyber Security Landscape Paints a Concerning Picture

Why the Global Cyber Security Landscape Paints a Concerning Picture SESSION ID: SPO-W07A Why the Global Cyber Security Landscape Paints a Concerning Picture Simon Goldsmith Director of Cyber Security (Commercial Sectors) BAE Systems @BAE_AI Today s Discussion PART 1 THE

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

N-Dimension Solutions Cyber Security for Utilities

N-Dimension Solutions Cyber Security for Utilities AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Persistence Mechanisms as Indicators of Compromise

Persistence Mechanisms as Indicators of Compromise Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October

More information

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES OCTOBER 2014 3300 North Fairfax Drive, Suite 308 Arlington, Virginia 22201 USA +1.571.481.9300 www.lunarline.com OUR CLIENTS INCLUDE Contents Healthcare

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

Cyber Risk to Help Shape Industry Trends in 2014

Cyber Risk to Help Shape Industry Trends in 2014 Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s

More information

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3 GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Cybersecurity: An Innovative Approach to Advanced Persistent Threats Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY CYBER HYGIENE AND ORGANIZATIONAL PLANNING ARE AT LEAST AS INTEGRAL TO SECURING INFORMATION NETWORKS AS FIREWALLS AND ANTIVIRUS SOFTWARE Cybersecurity

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Redefining SIEM to Real Time Security Intelligence

Redefining SIEM to Real Time Security Intelligence Redefining SIEM to Real Time Security Intelligence David Osborne Security Architect September 18, 2012 Its not paranoia if they really are out to get you Malware Malicious Insiders Exploited Vulnerabilities

More information

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON PERIODIC INFORMATION SECURITY AND PENETRATION AUDITS OF THE EXECUTIVE BRANCH INFORMATION TECHNOLOGY SYSTEMS APRIL 1, 2016 SUBMITTED TO THE TWENTY-EIGHTH

More information

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Learn the essential components of designing effective online courses.

Learn the essential components of designing effective online courses. MAKING THE SHIFT FROM CLASSROOM TO ONLINE COURSE DESIGN Session 1: (Re)Mapping Course Design Wednesday, September 7, 2011 :: 1:00 2:45 p.m. EDT Session 2: Course Organization Monday, September 12, 2011

More information

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON PERIODIC INFORMATION SECURITY AND PENETRATION AUDITS OF THE EXECUTIVE BRANCH INFORMATION TECHNOLOGY SYSTEMS JULY 2016 SUBMITTED TO THE TWENTY-EIGHTH

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information