The Importance of Cyber Security and Risk Management

Size: px
Start display at page:

Download "The Importance of Cyber Security and Risk Management"

Transcription

1 CONFERENCE Cybersecurity for Utilities: Compliance, Protection and Improving Overall April 24-25, 2014 Offices of Troutman Sanders, LLP Washington, DC Pre-conference Workshop The New IT/OT/Telecom Convergence: How It Impacts Utilities Cybersecurity & How To Prepare and Manage the Convergence Wednesday, April 23, 2014 Dinner Workshop GridEx 2013: Preparation, the Attack and Lessons Learned Thursday, April 24, 2014 is authorized by IACET to offer 0.9 CEUs for the Conference, 0.4 CEUs for the Pre-Conference Workshop, and 0.3 for the Dinner Workshop. Sponsors 1

2 Overview As the Department of Homeland Security has reported, cyber security threats to the utility industry are increasing in number and sophistication. Because of this challenge, the North American Reliability Corporation (NERC) is increasing the Critical Infrastructure Protection (CIP) regulatory requirements to ensure organizations and facilities are meeting basic standards in this area. The White House and Congress are also increasingly concerned about critical infrastructure cybersecurity. Legislation, hearings, and the President s Executive Order/NIST Framework on Cybersecurity will all impact the way that owners and operators of critical infrastructure - including electric utilities - manage cyber risk. This conference will examine the changing industry standards and costs to comply with NERC CIP realm as well as legislative and executive changes, how the scope has expanded, and the best way for utilities to deal with issues from better controls to greater automation. Attendees of the conference will better understand the framework of the executive order, how to prepare and implement the changes and how to manage the costs that go with implementation, including protection, vendor risk, and cybersecurity team development. This conference will address liability issues best practices for electric utilities. Who Should Attend Utility and energy company staff from the following departments: Directors and CEOs Compliance and regulatory managers Legal and regulatory staff Information technology and information security Operations and engineering Administrative and support staff Control systems As well as: Attorneys and regulators Regional entity staff Contractors and vendors Learning Outcomes Discuss the NIST Framework key elements and applications Identify benefits and challenges of receiving SAFETY Act protections for a utility cybersecurity program Compare CIP version 5 to future versions as well as and other key security policy issues Discuss insurance liability exposure for information sharing Analyze the implications of the different CIP versions on generator owners and operators in regional blackstart programs Appraise the cost of adopting the NIST Cybersecurity Framework for utilities and tactics to recover those costs Discuss standards that help provide cybersecurity measurement Identify when to balance business needs against security controls Recognize when physical security is not enough to safeguard Critical Infrastructure Assets Review technical responses to smart grid incidents 2

3 Agenda Thursday, April 24, :30 9:00 a.m. registration & Continental Breakfast 9:00 9:30 a.m. Keynote: NERC Security Initiatives for the Bulk Power System - Brian Harrell, Associate Director of CIP Programs, NERC 9:30 10:15 a.m. NIST Framework 1.0: Where We Stand Now Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President under the Executive Order Improving Critical Infrastructure Cybersecurity has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure. Framework version 1.0, to be published in February 2014, was developed in collaboration with industry and provides guidance to an organization on managing cybersecurity risk. The Framework relies on existing standards, guidance, and best practices to achieve outcomes that can assist organizations in managing their cybersecurity risk. By relying on those practices developed, managed, and updated by industry, the Framework will evolve with technological advances and business requirements. Building off those standards, guidelines, and practices, the Framework provides a common language and mechanism for organizations to: 1) describe their current cybersecurity posture; 2) describe their target state for cybersecurity; 3) identify and prioritize opportunities for improvement within the context of risk management; 4) assess progress toward the target state; and 5) foster communications among internal and external stakeholders. - Jon Boyens, Senior Advisor - Computer Security Division, NIST - Vicky Yan Pillitteri, Advisor for Information System Security Computer Security Division, NIST 10:15 10:45 a.m. Networking Break 10:45 11:30 a.m. SAFETY Act: Challenges and Opportunities The SAFETY Act provides incentives for the development and deployment of anti-terrorism technologies, including a liability cap, a bar on punitive damages, and limitations on noneconomic damages. While the SAFETY Act might ultimately provide some benefits to the industry, there are a number of issues that require consideration and clarification before any utility should attempt to receive SAFETY Act protections. Bonnie Suchman will discuss the issues of concern with seeking SAFETY Act Designation or Certification for a utility cybersecurity program, particularly one based on the NIST Cybersecurity Framework. - Bonnie Suchman, Of Counsel, Troutman Sanders, LLC 11:30 a.m. 12:15 p.m. Decoding CIP Version 5 and Other Cybersecurity Challenges for the Electric Sector This presentation will discuss key highlights of CIP Version 5, key differences between Version 5 and previous versions, as well as what to expect from future versions of CIP. It will cover how CIP obligations align with the new NIST Framework, highlight information exchange in a post-snowden Era and discuss other key security policy issues on the Hill and in the executive branch. - Jacob Olcott, Good Harbor Consulting 12:15 1:15 p.m. Group Luncheon 1:15 2:00 p.m. Cybersecurity on a State Level - Christina Cody, Senior Program Officer, NARUC 2:00 2:45 p.m. insurance Liability Exposure for Sharing Information - Matthew McCabe, Marsh 2:45 3:15 p.m. networking Break 3

4 Agenda Thursday, April 24, 2014 (CONTINUED) 3:15 4:00 p.m. Considering CIP Compliance Responsibilities for Blackstart Generation The various versions of the CIP Standards have changed substantially with regard to cyber systems supporting blackstart generation. The uncertainty around CIP compliance responsibilities has made many entities think twice about enrolling generators in regional blackstart programs. Leading experts will discuss the implications of the different CIP versions on generator owners and operators. - John Paiserb, Senior Project Manager, GDS Associates - Alex Hobbs, Analyst, GDS Associates 4:00 4:45 p.m. Cybersecurity Cost Recovery and Regulatory Discussion The topic of cost recovery for cybersecurity investments is once again a hot topic, but what makes these investments different from historical investments in IT? How does a utility commission determine what are cost-effective cybersecurity investments? How might the federal government throw a wrench into this rate making machine? - Chris Villarreal, Regulatory Analyst, California Public Utilities Commission (Invited) 4:45 5:30 p.m. articulating Value of Security Through Cybersecurity Metrics Articulating a business case for cybersecurity is a challenge. This presentation will provide a primer on developing practical cybersecurity metrics and using them to articulate the value of cybersecurity in order to gauge performance and facilitate improvement. It will demonstrate productive and counterproductive (useful and useless) metrics, articulate the difference between metrics for internal and external consumption, and describe how to establish a cybersecurity measurement program. - Nadya Bartol, Senior Cybersecurity Strategist, UTC 5:30 6:30 p.m. networking Reception REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 4

5 Agenda Friday, April 25, :30 9:00 a.m. Continental Breakfast 9:00 9:45 a.m. Cybersecurity Reality: Knowing When to Compromise Effective cybersecurity involves identifying threats and applying mitigating controls designed to reduce risk to critical business systems. Unfortunately for security professionals, the realities of business are often incompatible with effective cybersecurity. It is therefore imperative to factor business systems and operational functionality into security design. This often includes compromising some aspects of security in the interests of the business. This presentation will address a few ways to work around these challenges in order to provide proper security controls without overly disrupting business processes. - Jon Stitzel, Security Analyst III, Ameren 9:45 10:30 a.m. Surpassing Physical Security Needs to Safeguard Critical Infrastructure Assets The mindset in today s business environment is to focus on computer hacking, cyber exploits and cyberspace identity theft. When dealing with protection of IT infrastructure, however, physical security is just as important when considering a holistic security model you cannot have one without the other. With the latest developments in cyber warfare against the power grid it is important that organizations identify risks, develop new physical programs, and conduct new dynamic models. The best cyber security plans are useless without a cohesive approach to physical security. By understanding the facilities characteristics (system characterization), the capability and motivation of those who threaten the facility (threat assessment) and the existing security posture, we can effectively analyze the vulnerabilities to a facility as they pertain to the identified threats. Physical security is in the forefront of many minds and generates increasing concerns as to the future security of the bulk electric system. - Jim Rowan, Manager- Critical Infrastructure Protection Programs Manager, SERC 10:30 11:00 a.m. Networking Break 11:00 11:45 a.m. A Technical Glance at Smart Grid Incident Response - Seth Bromberger, NCI Security 11:45 a.m. 12:00 p.m. Formal Q&A Session 5

6 Pre-Conference Workshop: The New IT/OT/Telecom Convergence: How It Impacts Utilities Cybersecurity & How To Prepare and Manage the Convergence Overview This workshop will assist utilities/generation/transmission IT & OT staff and management understand the rapidly advancing convergence of IT/OT/Telecom capabilities, its potential impact, and the means to address that impact. This will be focused on business leadership and cybersecurity management concerns within the perspectives of organizational culture, governance, risk, and technical operations. The end goal is to provide guidance, understanding, best practices, and specific techniques for organization to maximizing its benefits and proactively engage the challenges of the coming Convergence. Learning Outcomes Define Convergence and its impact on both the business and its cybersecurity functions Articulate organizational changes and engagement & communication methods, tools, techniques utilized to address the impact of convergence (viewed through the perspectives of organizational culture, governance, risk, and technical operations by business leadership and cybersecurity management) Illustrate successful best practices and observed/reported industry cases Agenda Wednesday, April 23, :30-1:00 p.m. Registration 1:00-5:00 p.m. pre-conference Workshop Timing Introduction & Common Terms What is the Convergence & its impact on the organization? What is the impact of Convergence specifically in terms of the organization s cybersecurity? Engagement & communication concepts and strategies to address convergence and its impact on cybersecurity Application of concepts and strategies into specific organizational constructs Review & summation Final questions and close 6

7 INSTRUCTORs Nadya Bartol / Senior Cybersecurity Strategist / UTC Nadya Bartol spent almost 20 years working in cybersecurity. At Utilities Telecom Council (UTC) she is responsible for helping UTC member utilities address cybersecurity challenges, from policies and standards to practical implementation. Prior to UTC she worked at a large consulting company leading security program management, supply chain risk management, security measurement, and standards engagements. She co-authored several NIST publications on the topics of measurement and supply chain risk management. She served as Co-chair of DoD/DHS/NIST SwA Measurement Working Group and a principal author of Practical Measurement Guidance for Software Assurance and Information Security. She is Project Editor for ISO/IEC Information technology IT security techniques Information Security for Supplier Relationships. Nadya was named one of the Top 15 Women in Energy by Fierce Energy in 2012 and a is recipient of International Committee for Information Technology Standards (INCITS) Team Award in 2013 for cyber supply chain standards work. Ernest Wohnig / CEO & CIP Cyber Security Principal / Wohnig, Chaman, and Associates Ernest Wohnig is an internationally recognized cyber security and assurance leader having written, presented, and advised senior corporate leadership on security and assurance issues across the energy and water sectors and to the federal government for over 20 years. He advises clients across a number of industries, helping them understand their risk posture and to develop proactive security strategies and programs resulting in clear alignment of cyber security practices and risk tolerance to business objectives. As CEO and Security Principal of Wohnig, Chaman & Associates, Ernest leads a specialized consulting firm providing cyber security and assurance and reliability advisory, assessment, and strategy services to senior commercial Energy and Federal sector clients. As Security and Assurance Principal he consults to clients on a range of issues including cyber and assurance strategy development and execution, information protection and risk management/response, convergence of physical/logical security, cyber program development and implementation practices, and intellectual capital development related to cyber and assurance issues in the industry. Prior to founding Wohnig, Chaman & Associate, Ernest lead the development and delivery of cyber security and assurance services for a large consulting firm s Infrastructure (Energy, Environment, & Transportation) division. He oversaw the design, implementation, and management of new programs, approaches, methodologies, and service solutions for C-suite clients in federal, public utility, and oil & gas entities. 7

8 Dinner Workshop: GridEx 2013: Preparation, the Attack and Lessons Learned Overview In November 2013, more than 200 industry and government organizations participated in the North American Electric Reliability Corporation s two-day cyber and physical security exercise. NERC designed the exercise, GridEx II, to enhance and improve cyber and physical security resources and practices within the industry. The exercise gave participants the opportunity to check the readiness of their crisis action plans through a simulated security exercise to self-assess response and recovery capabilities, and to adjust actions and plans as needed, while communicating with industry and government information sharing organizations. GridEx II, which built on lessons learned from NERC s initial exercise in 2011, brought together more than 1,800 participants from North America, including the electricity industry, the Department of Energy, Department of Homeland Security and Department of Defense and the Federal Bureau of Investigation, as well as Canadian and Mexican utilities and agencies. The scenario was designed to stress the system through a series of prolonged coordinated cyber-attacks against certain automated systems used by power system operators. The scenario also included coordinated physical attacks against key transmission substations and generation facilities. These attacks caused utilities to enact their crisis response plans and walk through internal security procedures. New York Power Authority was one of the utilities to participate in GridEx II. In this workshop, NYPA and NERC will discuss how each side prepared for the attack, their account of the attack, and lessons learned. Attendees will walk away with the understanding of how to prepare for an attack and an understanding of what the real life consequences of an attack can be. agenda / Learning Outcomes Thursday, April 24, :00-9:00 p.m. workshop Timing (Dinner will be provided) Review the history and purpose of GridEx Identify key participants Discuss how participants (utilities and NERC) prepared for the simulated attack Analyze what happened during the attack from both perspectives Analyze how the utility responded to the attack and the results of their actions Identify key lessons learned from the simulated attack 8

9 INSTRUCTORs Bill Lawrence / Manager of Critical Infrastructure Protection Awareness, Critical Infrastructure Department / NERC Bill is the Manager of Critical Infrastructure Protection Awareness at the North American Electric Reliability Corporation (NERC), where he manages the GridSecCon and GridEx programs. Prior to joining NERC, he flew F-14 Tomcats and F/A-18F Super Hornets for the Navy, and most recently was the Deputy Director, Character Development & Training Division, at the United States Naval Academy, where he also taught courses in Ethics and Cyber Security. Bill has a Bachelor s degree in Computer Science from the US Naval Academy, a Master s in International Relations from Auburn Montgomery, and a Master of Military Operational Art and Science from the Air Command and Staff College. He holds a Project Management Professional certification. James Rowan / Critical Infrastructure Protection Programs Manager / SERC Prior to joining SERC Jim Rowan was the leader of the Business Continuity Practice at AliTek Consulting in Houston, TX specializing in regulatory, business continuity, disaster recovery, security, and knowledge management. Jim has recently been chosen as one of 25 people to attend the Homeland Security Executive Leaders Program held at the Center for Homeland Defense and Security, Naval Postgraduate School, Monterrey, CA. With over 25 years of practical experience in regulatory, information technology, security, crisis management and business continuity in both government and the private sector, Mr. Rowan has served in senior management with Apple Computers, PriceWaterhouseCoopers, LLP, and QCorps, Inc. following his tenure as Department Head of the Management Information Systems Office of the United States Marine Corps. He was recognized as Apple Computer Inc. s Engineer of the year for He retired with the U.S. Marine Corps, having served as an aviator, tactical aviation instructor and special weapons/operations officer while deployed onboard several Atlantic Fleet aircraft carriers in a tactical aviation squadron. Other assignments included being the Director of Operations at Navy Operational Intelligence Command, Suitland, Maryland and as a tactical intelligence officer/aviator working with the Central Intelligence Agency, Defense Intelligence Agency, National Security Agency, Navy Fighter Weapons School (TOPGUN), the Navy Strike Warfare Center (SLATS), and the Marine Weapons Training Squadron (MAWTS-1) where he was a specialist in physical, logical, and geo-political vulnerabilities. He earned an ABD Ph.D. from LaSalle University, an MBA/MIS from the University of Maryland and a BS from the U.S. Naval Academy. Lena Smart / Chief Information Security Officer / New York Power Authority Lena has worked in cyber security for more than 20 years. She has worked at the New York Power Authority (NYPA) for 13 years, and has managed the cyber security group there for 10 years. Prior to NYPA, Lena worked for a private banking firm in London, and traveled throughout the world designing and implementing secure computer networks. Outside of work she plays cello in chamber ensembles, and a local orchestra. 9

10 Instructional Methods This program will use PowerPoint presentations, group and panel discussions, as well as active participation. Requirements for Successful Completion of Program Participants must sign in/out each day and be in attendance for the entirety of the conference to be eligible for continuing education credit. iacet Credits has been approved as an Authorized Provider by the International Association for Continuing Education and Training (IACET), 1760 Old Meadow Road, Suite 500, McLean, VA In obtaining this approval, has demonstrated that it complies with the ANSI/IACET Standards, which are widely recognized as standards of good practice internationally. As a result of its Authorized Provider membership status, is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standards. is authorized by IACET to offer 0.9 CEUs for the Conference, 0.4 CEUs for the Pre-Conference Workshop, and 0.3 CEUs for the Dinner Workshop. EVENT LOCATION Troutman Sanders, LLP 401 9th St NW #1000, Washington, DC Phone: (202) PROCeEDINGS A copy of the conference proceedings will be distributed to attendees at the event. If you are unable to attend or would like to purchase additional copies, flash drives are available two weeks after the conference is complete. The cost per flash drive is US $395 (add US $50 for international shipments). Flash drives include visual presentations only. Upon receipt of order and payment, the flash drive will be shipped to you via regular USPS mail. NOTE: All presentation flash drive sales are final and are nonrefundable. sponsorship opportunities Do you want to drive new business through this event s powerful audience? Becoming a sponsor or exhibitor is an excellent opportunity to raise your profile before a manageably sized group of executives who make the key purchasing decisions for their businesses. There is a wide range of sponsorship opportunities available that can be customized to fit your budget and marketing objectives, including: Platinum, gold, or VIP sponsor Workshop sponsor Reception host Lanyard sponsor Networking break host Luncheon host Tabletop exhibit Breakfast host Custom sponsorship opportunities are also available. Please contact Jen Murray at or jsmith@euci.com for more information. REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 10

11 REGISTRATION information Mail Directly To: Electric Utility Consultants, Inc. () 4601 DTC Blvd., Ste. 800 please register the following EVENT LOCATION Troutman Sanders, LLP 401 9th St NW #1000, Washington, DC Phone: (202) Cybersecurity for Utilities and both Pre-conference and Dinner Workshop April 23-25, 2014: US $2195 Early bird on or before April 11, 2014: US $1995 Cybersecurity for Utilities and one workshop (CHOOSE ONE) Pre-CONFERENCE WORKSHOP: April 23, 2014: US $1795 Early bird on or before April 11, 2014: US $1595 Dinner Workshop : April 24, 2014: US $1795 Early bird on or before April 11, 2014: US $1595 Cybersecurity for Utilities conference only April 24-25, 2014: US $1395 Early bird on or before April 11, 2014: US $1195 Workshop only (CHOOSE ONE) Pre-CONFERENCE WORKSHOP: April 23, 2014: US $595 Early bird on or before April 11, 2014: US $495 Dinner Workshop : April 24, 2014: US $595 Early bird on or before April 11, 2014: US $495 I'M SORRY I CANNOT ATTEND, BUT PLEASE SEND ME THE CONFERENCE PROCEEDINGS FOR US $395. (PLEASE ADD $50 FOR INTERNATIONAL SHIPPING.) ENERG ZE WEEKLY s Energize Weekly newsletter compiles and reports on the latest news and trends in the energy industry. Newsletter recipients also receive a different, complimentary conference presentation every week on a relevant industry topic. The presentations are selected from a massive library of more than 1,000 current presentations that has gathered during its 26 years organizing conferences. Sign me up for Energize Weekly. How did you hear about this event? (direct , colleague, speaker(s), etc.) Print Name Job Title Company What name do you prefer on your name badge? Address City State/Province Zip/Postal Code Country Telephone List any dietary or accessibility needs here CREDIT CARD Name on Card Account Number Billing Address Billing City Billing State Billing Zip Code/Postal Code Exp. Date Security Code (last 3 digits on the back of Visa and MC or 4 digits on front of AmEx) OR Enclosed is a check for $ to cover registrations. All cancellations received on or before March 28, 2014, will be subject to a US $195 processing fee. Written cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other event or publication. This credit will be good for six months. In case of event cancellation, s liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at reserves the right to alter this program without prior notice. 11

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities WEBINAR Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities May 2, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer

More information

Strengthening Utility Critical

Strengthening Utility Critical WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW

More information

CYBERSECURITY FOR UTILITIES

CYBERSECURITY FOR UTILITIES CONFERENCE CYBERSECURITY FOR UTILITIES Offices of Troutman Sanders, LLP Pre-Conference Workshop Disaster Recovery and Contingency Planning Managing and Delivering after your Cyber Apocalypse Tuesday, April

More information

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS COURSE AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS Hilton Houston Southwest is authorized by IACET to offer 1.1 CEUs for the course. is authorized by CPE to offer 13.5 credits for this

More information

Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures

Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures COurse Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 1.0

More information

CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM

CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM WEBINAR CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM April 16, 2015 12:00 1:30 p.m. Eastern Time Online is authorized by IACET to offer

More information

Project Prioritization and Utility Project Portfolio Management

Project Prioritization and Utility Project Portfolio Management COurse Project Prioritization and Utility Project Portfolio Management Denver Marriott Tech Center EUCI is authorized by IACET to offer 1.2 CEUs for the course. 1 Overview As utilities face increasing

More information

in Ontario and Key Canadian

in Ontario and Key Canadian CONFERENCE The Future of Electricity Prices in Ontario and Key Canadian Markets Toronto Don Valley Hotel & Suites Supporting Organizations is authorized by IACET to offer 0.9 CEUs for the conference. 1

More information

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW This

More information

Lessons Learned from Utilities that are in the Cloud

Lessons Learned from Utilities that are in the Cloud Webinar Lessons Learned from Utilities that are in the Cloud Online Photo credit: WikiUser Sam Johnston is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview It is increasingly inefficient

More information

Improving Utility Call Centers

Improving Utility Call Centers CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street EUCI is authorized by IACET to offer 1.0 CEUs for the conference. 1 Overview

More information

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS COURSE ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS Houston Marriott West Loop by The Galleria is authorized by IACET to offer 0.7 CEUs for the course. Media Sponsor 1 OVERVIEW There is seldom

More information

PROJECT PORTFOLIO MANAGEMENT

PROJECT PORTFOLIO MANAGEMENT COURSE PROJECT PORTFOLIO MANAGEMENT Hyatt Regency Louisville EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Many organizations struggle with limited resources and too many projects

More information

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: AN ACCOUNTING COURSE ON DERIVATIVE INSTRUMENTS, HEDGING ACTIVITIES, AND FAIR VALUE Hyatt Regency Miami COURSE is authorized by IACET to offer 1.0

More information

Learn About the Billing and Collection Process Through an Onlineinar

Learn About the Billing and Collection Process Through an Onlineinar WEBINAR THE BASICS OF COLLECTIONS & BANKRUPTCY IN THE OIL & GAS INDUSTRY: GETTING PAID IN HARD TIMES Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW The purpose of this webinar

More information

Improving Utility Call Centers

Improving Utility Call Centers CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street Featuring Georgia Power Call Center Tour Friday, December 6, 2013 Sponsor

More information

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING COURSE POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING October 27-28, 2015 Houston Marriott West Loop by The Galleria Houston, TX is authorized by IACET

More information

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS COURSE ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS Denver Marriott City Center is authorized by IACET to offer 1.0 CEUs for the course. This course has been approved for 12.0 CPEs. 1 OVERVIEW This course

More information

September 22-23, 2014 JW Marriott Houston Houston, TX

September 22-23, 2014 JW Marriott Houston Houston, TX COurse Energy Joint Ventures JW Marriott Houston is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 12.0 credits for this program. 1 Overview This course will provide

More information

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS WEBINAR MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY November 19, 2015 1:00 2:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW Insurance

More information

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE:

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: CONFERENCE 5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: Houston Marriott West Loop by the Galleria Pre-Conference Workshop All Hazards Emergency Predicting, Planning and Response: An Evolving

More information

NATURAL GAS UTILITY BASICS

NATURAL GAS UTILITY BASICS COURSE NATURAL GAS UTILITY BASICS Hilton Houston Southwest EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW This training is targeted at participants in the natural gas industry

More information

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the details

More information

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS WEBINAR IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW In recent years regulatory authorities have placed increased

More information

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center EUCI is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW

More information

Data Centers and Utilities: Planning, Incentives, Audits & Trends

Data Centers and Utilities: Planning, Incentives, Audits & Trends CONFERENCE Data Centers and Utilities: Planning, Incentives, Audits & Trends September 29-30, 2014 Denver Marriott Tech Center Denver, CO Photo Credit: Wikimedia User123net is authorized by IACET to offer

More information

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY CONFERENCE LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY Sheraton Indianapolis City Centre Hotel PRESENTATIONS FROM Keynote Presentations from: Department Of Energy - The Honorable Patricia Hoffman, Assistant

More information

Fundamentals of Oil and Gas Taxation

Fundamentals of Oil and Gas Taxation COurse Fundamentals of Oil and Gas Taxation Houston Marriott West Loop by The Galleria EUCI is authorized by IACET to offer 1.0 CEUs for the course. EUCI is authorized by CPE to offer 12 credits for this

More information

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers The Westin Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts

More information

Minimizing Disputes in Energy Project Development

Minimizing Disputes in Energy Project Development COurse Minimizing Disputes in Energy Project Development Hilton Charlotte University is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Energy development projects are fraught with potential

More information

How To Learn Workforce Analytics

How To Learn Workforce Analytics COurse Workforce Analytics Marina del Rey Marriott is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Within the last 5 years, we have moved from an environment where HR reporting and

More information

Estimation and Cost Control Fundamentals for Oil & Gas

Estimation and Cost Control Fundamentals for Oil & Gas COurse Estimation and Cost Control Fundamentals for Oil & Gas Capital Projects Denver Marriott City Center EUCI is authorized by IACET to offer 1.1 CEUs for the course. 1 Overview Managing the complexity

More information

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse FERC Natural Gas 101 Renaissance Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview FERC Natural Gas 101 provides a comprehensive overview of the agency s impact

More information

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES EUCI presents a conference on: WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES National Arts Centre Ottawa, Ontario TESTIMONIALS FROM PAST ATTENDEES "Exceeded my expectations. It was great

More information

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the

More information

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS Millennium Knickerbocker Hotel Chicago Instructed by COURSE Baltimore

More information

SOUTHEAST CLEAN POWER SUMMIT

SOUTHEAST CLEAN POWER SUMMIT CONFERENCE 4 TH ANNUAL SOUTHEAST CLEAN POWER SUMMIT Hyatt Regency Atlanta Post Conference Workshop Pricing the Purchase of Renewable Energy Tuesday, March 31, 2015 Studies and Presentations from Entergy

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

(IN)CONDUIT HYDRO-ELECTRIC GENERATION

(IN)CONDUIT HYDRO-ELECTRIC GENERATION COURSE (IN)CONDUIT HYDRO-ELECTRIC GENERATION Royal Sonesta Harbor Court Baltimore is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Adding renewable energy like solar and wind to the

More information

Storm Planning and Response

Storm Planning and Response EUCI presents a conference on: Best Practices in Storm Planning and Response Hyatt Regency New Orleans New Orleans, LA Pre-conference workshop Storm Planning 101 February 25, 2013 Platinum Sponsor Gold

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE CONFERENCE HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE Hyatt Regency Orange County Pre-Conference Workshop THE CLOUD: A VIABLE OPTION FOR UTILITIES Wednesday, January 27, 2016 Sponsor Media Partner is

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org. 2014 Utilities Telecom Council

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org. 2014 Utilities Telecom Council Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential

More information

Online Course Design. August 2 4, 2010 Denver, CO

Online Course Design. August 2 4, 2010 Denver, CO Online Course Design August 2 4, 2010 Denver, CO An excellent study of the elements that must be considered when conceptualizing, executing, and revising course content. Thomas Friedmann, Instructional

More information

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES 13 TH ANNUAL CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES Millenium Knickerbocker CONFERENCE Host Utility Sponsors is authorized by IACET to offer 1.0 CEUs for the conference.

More information

Sponsorship Opportunities

Sponsorship Opportunities 2015 THE INTERNATIONAL ASSOCIATION OF Conference on Philanthropy April 27-29 Loews Chicago O Hare, Rosemont, IL AiP 216 W. Jackson Blvd. Suite 625 Chicago, IL 60606 312.252.2501 The International Association

More information

WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA

WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT May 24-25, 2012 Atlanta, GA OVERVIEW Clean and simple content based on the top tasks your visitors want to accomplish online

More information

10 th Annual API Cybersecurity Conference for the Oil and Gas Industry

10 th Annual API Cybersecurity Conference for the Oil and Gas Industry 10 th Annual API Cybersecurity Conference for the Oil and Gas Industry July 7, 2015 Dear Sponsor/Exhibitor, Thank you for your interest in the 10 th Annual API Cybersecurity Conference for the Oil and

More information

Key Accounts Certificate Program

Key Accounts Certificate Program Key Accounts Certificate Program Sept. 29 Oct. 3, 2014 n Fall Education Institute n Scottsdale, Ariz. Visit us at www.appaacademy.org Certificate Requirements To earn this certificate, participants must

More information

July 22-25, 2016 Washington, DC Marriott Wardman Park Hotel

July 22-25, 2016 Washington, DC Marriott Wardman Park Hotel Partner with NASW to Reach Social Workers and Other Health and Human Service Professionals at the 2016 NASW National Conference Leading Change Transforming Lives July 22-25, 2016 Washington, DC Marriott

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

LEGAL UPDATE FOR OIL & GAS ENTITIES:

LEGAL UPDATE FOR OIL & GAS ENTITIES: COURSE LEGAL UPDATE FOR OIL & GAS ENTITIES: CONTRACTS TO LIABILITY, PERMITS TO INDEMNITY, STRATEGIES TO AVOID RISK, AND CYBERSECURITY CHALLENGES Houston Marriott West Loop by The Galleria is authorized

More information

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure

More information

EMERGING LEADERS PROGRAM

EMERGING LEADERS PROGRAM SFA e rs Memb d Atten Free! October 25-27, 2015 Georgetown University, Washington, D.C. REGISTRATION DEADLINE: September 25, 2015 Designed for the Future Leaders of the Snack Food Industry Overview A two-and-a-half

More information

PLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA

PLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA PLANNING & GROWING ONLINE LEARNING INITIATIVES October 25 26, 2010 Atlanta, GA OVERVIEW Many institutions wanting to improve student access and increase degree completion rates are looking to online programs

More information

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS CONFERENCE AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 0.8 CEUs for the course. is authorized by CPE to offer

More information

EXHIBITOR, ADVERTISING, & SPONSORSHIP OPPORTUNITIES

EXHIBITOR, ADVERTISING, & SPONSORSHIP OPPORTUNITIES EXHIBITOR, ADVERTISING, & SPONSORSHIP OPPORTUNITIES 2014 ASHE Conference Washington D.C. November 19-22, 2014 EXHIBITOR & SPONSORSHIP OPPORTUNITIES Thank you for your interest in the 2014 ASHE Conference

More information

UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION

UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION As an institution trying to bring both its online course offerings and the support services to distance education students up to the next level, it was

More information

CONTEMPORARY APPROACHES TO INTEGRATED RESOURCE, DEMAND & TRANSMISSION PLANNING

CONTEMPORARY APPROACHES TO INTEGRATED RESOURCE, DEMAND & TRANSMISSION PLANNING 15 TH ANNUAL CONTEMPORARY APPROACHES TO INTEGRATED RESOURCE, DEMAND & TRANSMISSION PLANNING Hyatt Regency Atlanta CONFERENCE Pre-Conference Workshop IRP PLANNING CHALLENGES AND CRITICAL ANALYSIS FOR THE

More information

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage. Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee

More information

Sept. 30 - Oct. 2, 2012 ENCORE LAS VEGAS

Sept. 30 - Oct. 2, 2012 ENCORE LAS VEGAS Navigating the Road to the Future: Transforming the Way Hospitals, Physicians & Health Plans Conduct Business Sept. 30 - Oct. 2, 2012 ENCORE LAS VEGAS LEARN FROM INDUSTRY LEADERS ABOUT THESE EMERGING &

More information

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security

More information

CUNA Human Resources and Development Council Sponsor Information

CUNA Human Resources and Development Council Sponsor Information CUNA Human Resources, Training & Development Council Sponsor Information We appreciate your interest in sponsoring. You can decide which level fits your needs and budget. Use these links to jump directly

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

More information

2015 AESC 3rd Annual Oilfield Trucking Conference. Hilton Hotel Downtown Fort Worth, Texas. November 17-19, 2015

2015 AESC 3rd Annual Oilfield Trucking Conference. Hilton Hotel Downtown Fort Worth, Texas. November 17-19, 2015 2015 AESC 3rd Annual Oilfield Trucking Conference Hilton Hotel Downtown Fort Worth, Texas REGISTER NOW November 17-19, 2015 Association of Energy Service Companies 14531 FM 529, Suite 250 Houston, TX 77095

More information

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise

More information

2015 NAGC COMMUNICATIONS SCHOOL June 2-4, 2015

2015 NAGC COMMUNICATIONS SCHOOL June 2-4, 2015 Good Communication Good Government 2015 NAGC COMMUNICATIONS SCHOOL June 2-4, 2015 Sheraton Memphis Downtown 250 N. Main Street Memphis, TN 38103 Maximize your exposure to federal, state, tribal, and local

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security

More information

InstructIonal strategies for Blended & online. December 9 11, 2009 Scottsdale, AZ

InstructIonal strategies for Blended & online. December 9 11, 2009 Scottsdale, AZ InstructIonal strategies for Blended & online learning December 9 11, 2009 Scottsdale, AZ overview To teach well in the online environment, instructors need to explore new pedagogical options and craft

More information

We look forward to working with you to make the GSASC & SCASCA February 2016 Semi-Annual Conference and Trade Show a success!

We look forward to working with you to make the GSASC & SCASCA February 2016 Semi-Annual Conference and Trade Show a success! Dear Potential Exhibitor: The Georgia Society of Ambulatory Surgery Centers and the South Carolina Ambulatory Surgery Center Association are pleased to invite your company to participate in the GSASC/SCASCA

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Charlotte, NC. smartcities.energycentral.com. Contact your Energy Central Marketing Services Representative 800.459.2233 sales@energycentral.

Charlotte, NC. smartcities.energycentral.com. Contact your Energy Central Marketing Services Representative 800.459.2233 sales@energycentral. May 12-13, Charlotte, NC Sponsoring an event with Energy Central offers your company a wide range of benefits and a tailored level of exposure to conference attendees. Energy Central has created a number

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

EXHIBITOR AND SPONSOR PROSPECTUS. http://spring.afssociety.org/ Oil, Gas and Chemicals Filtration & Separations Conference Expo

EXHIBITOR AND SPONSOR PROSPECTUS. http://spring.afssociety.org/ Oil, Gas and Chemicals Filtration & Separations Conference Expo Oil, Gas and Chemicals Filtration & Separations Conference Expo May 9-11, 2016 Houston Marriott Westchase, Houston, TX EXHIBITOR AND SPONSOR PROSPECTUS http://spring.afssociety.org/ About the AFS and Why

More information

NIST Cybersecurity Framework What It Means for Energy Companies

NIST Cybersecurity Framework What It Means for Energy Companies Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

2008-2014 The Sales Management Association. All rights reserved. Version 2.0

2008-2014 The Sales Management Association. All rights reserved. Version 2.0 2008-2014 The Sales Management Association. All rights reserved. Version 2.0 Alpha Bravo Distribution (B) Sales Compensation Plan Policies Join Us Dec 2010 At The YEAR S BEST SALES FORCE EFFECTIVENESS

More information

Center for Advanced Medical Learning and Simulation October 20-22, 2015 Tampa, FL. Sponsorship & Exhibit Opportunities

Center for Advanced Medical Learning and Simulation October 20-22, 2015 Tampa, FL. Sponsorship & Exhibit Opportunities Center for Advanced Medical Learning and Simulation October 20-22, 2015 Tampa, FL Sponsorship & Exhibit Opportunities Our New Tradition The second annual IDSA Medical Design Conference will continue to

More information

Advanced Performance Measures

Advanced Performance Measures Advanced Performance Measures Establish a performance measurement system to guide decision making Presented By: Developing and utilizing: performance measures, data, & reporting for organization results

More information

Security Management Program Development:

Security Management Program Development: Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are

More information

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School MARCH 31, 2014 2013 Venable LLP 1 EO 13636: Improving Critical Infrastructure Cybersecurity Directs to NIST to develop

More information

SPONSORSHIP AND EXHIBITOR OPPORTUNITIES

SPONSORSHIP AND EXHIBITOR OPPORTUNITIES SPONSORSHIP AND EXHIBITOR OPPORTUNITIES OTTAWA MAY 1-3, 2013 INK+BEYOND The annual INK+BEYOND conference and trade show is the only event in Canada that brings together professionals from all facets of

More information

Cybersecurity Framework: Current Status and Next Steps

Cybersecurity Framework: Current Status and Next Steps Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards

More information

February 24-26, 2016 Westin Hotel Ottawa, ON

February 24-26, 2016 Westin Hotel Ottawa, ON February 24-26, 2016 Westin Hotel Ottawa, ON SPONSORSHIP OPPORTUNITIES available sold LEVEL OPPORTUNITY MEMBER VALUE SPONSOR URANIUM Opening Reception $100,000 sold PLATINUM Thursday Lunch $50,000 available

More information

2015 EMERGING LEADERS INSTITUTE

2015 EMERGING LEADERS INSTITUTE 2015 EMERGING LEADERS INSTITUTE LEADERSHIP // INVOLVEMENT // DEVELOPMENT Sponsored by Victor O. Schinnerer & Company, Inc., the CNA Insurance Companies, and The AIA Trust, providers of the AIA Trust Professional

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

Corporate Membership and Sponsorship Opportunities

Corporate Membership and Sponsorship Opportunities 2015 Corporate Membership and Sponsorship Opportunities 2015 Membership and Sponsorship Dates Corporate Membership January 1 December 31 Mid-Year Meeting January 23-25 Loews Madison Hotel Washington, DC

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Missouri Association of School Administrators. Missouri School Public Relations Association. Spring Conference

Missouri Association of School Administrators. Missouri School Public Relations Association. Spring Conference Missouri Association of School Administrators & Missouri School Public Relations Association Spring Conference NEW! The Lodge of Four Seasons March 20, 21 and 22, 2013 Wednesday, Thursday, Friday Pre-Conference

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

Industrial Control Security

Industrial Control Security Industrial Control Security Holiday Inn, Sacramento, California www.industrialcontrolsecurityusa.com www.cybersenate.com The Effective Approach for Protecting Oil and Gas Critical Infrastructures from

More information

Learn the essential components of designing effective online courses.

Learn the essential components of designing effective online courses. MAKING THE SHIFT FROM CLASSROOM TO ONLINE COURSE DESIGN Session 1: (Re)Mapping Course Design Wednesday, September 7, 2011 :: 1:00 2:45 p.m. EDT Session 2: Course Organization Monday, September 12, 2011

More information

BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity

BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity Working together, Blank Rome LLP and Good Harbor Security Risk Management LLC, haved teamed to provide a comprehensive solution for protecting your company s property and reputation from the unprecedented

More information