The Importance of Cyber Security and Risk Management
|
|
- Poppy Charles
- 3 years ago
- Views:
Transcription
1 CONFERENCE Cybersecurity for Utilities: Compliance, Protection and Improving Overall April 24-25, 2014 Offices of Troutman Sanders, LLP Washington, DC Pre-conference Workshop The New IT/OT/Telecom Convergence: How It Impacts Utilities Cybersecurity & How To Prepare and Manage the Convergence Wednesday, April 23, 2014 Dinner Workshop GridEx 2013: Preparation, the Attack and Lessons Learned Thursday, April 24, 2014 is authorized by IACET to offer 0.9 CEUs for the Conference, 0.4 CEUs for the Pre-Conference Workshop, and 0.3 for the Dinner Workshop. Sponsors 1
2 Overview As the Department of Homeland Security has reported, cyber security threats to the utility industry are increasing in number and sophistication. Because of this challenge, the North American Reliability Corporation (NERC) is increasing the Critical Infrastructure Protection (CIP) regulatory requirements to ensure organizations and facilities are meeting basic standards in this area. The White House and Congress are also increasingly concerned about critical infrastructure cybersecurity. Legislation, hearings, and the President s Executive Order/NIST Framework on Cybersecurity will all impact the way that owners and operators of critical infrastructure - including electric utilities - manage cyber risk. This conference will examine the changing industry standards and costs to comply with NERC CIP realm as well as legislative and executive changes, how the scope has expanded, and the best way for utilities to deal with issues from better controls to greater automation. Attendees of the conference will better understand the framework of the executive order, how to prepare and implement the changes and how to manage the costs that go with implementation, including protection, vendor risk, and cybersecurity team development. This conference will address liability issues best practices for electric utilities. Who Should Attend Utility and energy company staff from the following departments: Directors and CEOs Compliance and regulatory managers Legal and regulatory staff Information technology and information security Operations and engineering Administrative and support staff Control systems As well as: Attorneys and regulators Regional entity staff Contractors and vendors Learning Outcomes Discuss the NIST Framework key elements and applications Identify benefits and challenges of receiving SAFETY Act protections for a utility cybersecurity program Compare CIP version 5 to future versions as well as and other key security policy issues Discuss insurance liability exposure for information sharing Analyze the implications of the different CIP versions on generator owners and operators in regional blackstart programs Appraise the cost of adopting the NIST Cybersecurity Framework for utilities and tactics to recover those costs Discuss standards that help provide cybersecurity measurement Identify when to balance business needs against security controls Recognize when physical security is not enough to safeguard Critical Infrastructure Assets Review technical responses to smart grid incidents 2
3 Agenda Thursday, April 24, :30 9:00 a.m. registration & Continental Breakfast 9:00 9:30 a.m. Keynote: NERC Security Initiatives for the Bulk Power System - Brian Harrell, Associate Director of CIP Programs, NERC 9:30 10:15 a.m. NIST Framework 1.0: Where We Stand Now Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President under the Executive Order Improving Critical Infrastructure Cybersecurity has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure. Framework version 1.0, to be published in February 2014, was developed in collaboration with industry and provides guidance to an organization on managing cybersecurity risk. The Framework relies on existing standards, guidance, and best practices to achieve outcomes that can assist organizations in managing their cybersecurity risk. By relying on those practices developed, managed, and updated by industry, the Framework will evolve with technological advances and business requirements. Building off those standards, guidelines, and practices, the Framework provides a common language and mechanism for organizations to: 1) describe their current cybersecurity posture; 2) describe their target state for cybersecurity; 3) identify and prioritize opportunities for improvement within the context of risk management; 4) assess progress toward the target state; and 5) foster communications among internal and external stakeholders. - Jon Boyens, Senior Advisor - Computer Security Division, NIST - Vicky Yan Pillitteri, Advisor for Information System Security Computer Security Division, NIST 10:15 10:45 a.m. Networking Break 10:45 11:30 a.m. SAFETY Act: Challenges and Opportunities The SAFETY Act provides incentives for the development and deployment of anti-terrorism technologies, including a liability cap, a bar on punitive damages, and limitations on noneconomic damages. While the SAFETY Act might ultimately provide some benefits to the industry, there are a number of issues that require consideration and clarification before any utility should attempt to receive SAFETY Act protections. Bonnie Suchman will discuss the issues of concern with seeking SAFETY Act Designation or Certification for a utility cybersecurity program, particularly one based on the NIST Cybersecurity Framework. - Bonnie Suchman, Of Counsel, Troutman Sanders, LLC 11:30 a.m. 12:15 p.m. Decoding CIP Version 5 and Other Cybersecurity Challenges for the Electric Sector This presentation will discuss key highlights of CIP Version 5, key differences between Version 5 and previous versions, as well as what to expect from future versions of CIP. It will cover how CIP obligations align with the new NIST Framework, highlight information exchange in a post-snowden Era and discuss other key security policy issues on the Hill and in the executive branch. - Jacob Olcott, Good Harbor Consulting 12:15 1:15 p.m. Group Luncheon 1:15 2:00 p.m. Cybersecurity on a State Level - Christina Cody, Senior Program Officer, NARUC 2:00 2:45 p.m. insurance Liability Exposure for Sharing Information - Matthew McCabe, Marsh 2:45 3:15 p.m. networking Break 3
4 Agenda Thursday, April 24, 2014 (CONTINUED) 3:15 4:00 p.m. Considering CIP Compliance Responsibilities for Blackstart Generation The various versions of the CIP Standards have changed substantially with regard to cyber systems supporting blackstart generation. The uncertainty around CIP compliance responsibilities has made many entities think twice about enrolling generators in regional blackstart programs. Leading experts will discuss the implications of the different CIP versions on generator owners and operators. - John Paiserb, Senior Project Manager, GDS Associates - Alex Hobbs, Analyst, GDS Associates 4:00 4:45 p.m. Cybersecurity Cost Recovery and Regulatory Discussion The topic of cost recovery for cybersecurity investments is once again a hot topic, but what makes these investments different from historical investments in IT? How does a utility commission determine what are cost-effective cybersecurity investments? How might the federal government throw a wrench into this rate making machine? - Chris Villarreal, Regulatory Analyst, California Public Utilities Commission (Invited) 4:45 5:30 p.m. articulating Value of Security Through Cybersecurity Metrics Articulating a business case for cybersecurity is a challenge. This presentation will provide a primer on developing practical cybersecurity metrics and using them to articulate the value of cybersecurity in order to gauge performance and facilitate improvement. It will demonstrate productive and counterproductive (useful and useless) metrics, articulate the difference between metrics for internal and external consumption, and describe how to establish a cybersecurity measurement program. - Nadya Bartol, Senior Cybersecurity Strategist, UTC 5:30 6:30 p.m. networking Reception REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 4
5 Agenda Friday, April 25, :30 9:00 a.m. Continental Breakfast 9:00 9:45 a.m. Cybersecurity Reality: Knowing When to Compromise Effective cybersecurity involves identifying threats and applying mitigating controls designed to reduce risk to critical business systems. Unfortunately for security professionals, the realities of business are often incompatible with effective cybersecurity. It is therefore imperative to factor business systems and operational functionality into security design. This often includes compromising some aspects of security in the interests of the business. This presentation will address a few ways to work around these challenges in order to provide proper security controls without overly disrupting business processes. - Jon Stitzel, Security Analyst III, Ameren 9:45 10:30 a.m. Surpassing Physical Security Needs to Safeguard Critical Infrastructure Assets The mindset in today s business environment is to focus on computer hacking, cyber exploits and cyberspace identity theft. When dealing with protection of IT infrastructure, however, physical security is just as important when considering a holistic security model you cannot have one without the other. With the latest developments in cyber warfare against the power grid it is important that organizations identify risks, develop new physical programs, and conduct new dynamic models. The best cyber security plans are useless without a cohesive approach to physical security. By understanding the facilities characteristics (system characterization), the capability and motivation of those who threaten the facility (threat assessment) and the existing security posture, we can effectively analyze the vulnerabilities to a facility as they pertain to the identified threats. Physical security is in the forefront of many minds and generates increasing concerns as to the future security of the bulk electric system. - Jim Rowan, Manager- Critical Infrastructure Protection Programs Manager, SERC 10:30 11:00 a.m. Networking Break 11:00 11:45 a.m. A Technical Glance at Smart Grid Incident Response - Seth Bromberger, NCI Security 11:45 a.m. 12:00 p.m. Formal Q&A Session 5
6 Pre-Conference Workshop: The New IT/OT/Telecom Convergence: How It Impacts Utilities Cybersecurity & How To Prepare and Manage the Convergence Overview This workshop will assist utilities/generation/transmission IT & OT staff and management understand the rapidly advancing convergence of IT/OT/Telecom capabilities, its potential impact, and the means to address that impact. This will be focused on business leadership and cybersecurity management concerns within the perspectives of organizational culture, governance, risk, and technical operations. The end goal is to provide guidance, understanding, best practices, and specific techniques for organization to maximizing its benefits and proactively engage the challenges of the coming Convergence. Learning Outcomes Define Convergence and its impact on both the business and its cybersecurity functions Articulate organizational changes and engagement & communication methods, tools, techniques utilized to address the impact of convergence (viewed through the perspectives of organizational culture, governance, risk, and technical operations by business leadership and cybersecurity management) Illustrate successful best practices and observed/reported industry cases Agenda Wednesday, April 23, :30-1:00 p.m. Registration 1:00-5:00 p.m. pre-conference Workshop Timing Introduction & Common Terms What is the Convergence & its impact on the organization? What is the impact of Convergence specifically in terms of the organization s cybersecurity? Engagement & communication concepts and strategies to address convergence and its impact on cybersecurity Application of concepts and strategies into specific organizational constructs Review & summation Final questions and close 6
7 INSTRUCTORs Nadya Bartol / Senior Cybersecurity Strategist / UTC Nadya Bartol spent almost 20 years working in cybersecurity. At Utilities Telecom Council (UTC) she is responsible for helping UTC member utilities address cybersecurity challenges, from policies and standards to practical implementation. Prior to UTC she worked at a large consulting company leading security program management, supply chain risk management, security measurement, and standards engagements. She co-authored several NIST publications on the topics of measurement and supply chain risk management. She served as Co-chair of DoD/DHS/NIST SwA Measurement Working Group and a principal author of Practical Measurement Guidance for Software Assurance and Information Security. She is Project Editor for ISO/IEC Information technology IT security techniques Information Security for Supplier Relationships. Nadya was named one of the Top 15 Women in Energy by Fierce Energy in 2012 and a is recipient of International Committee for Information Technology Standards (INCITS) Team Award in 2013 for cyber supply chain standards work. Ernest Wohnig / CEO & CIP Cyber Security Principal / Wohnig, Chaman, and Associates Ernest Wohnig is an internationally recognized cyber security and assurance leader having written, presented, and advised senior corporate leadership on security and assurance issues across the energy and water sectors and to the federal government for over 20 years. He advises clients across a number of industries, helping them understand their risk posture and to develop proactive security strategies and programs resulting in clear alignment of cyber security practices and risk tolerance to business objectives. As CEO and Security Principal of Wohnig, Chaman & Associates, Ernest leads a specialized consulting firm providing cyber security and assurance and reliability advisory, assessment, and strategy services to senior commercial Energy and Federal sector clients. As Security and Assurance Principal he consults to clients on a range of issues including cyber and assurance strategy development and execution, information protection and risk management/response, convergence of physical/logical security, cyber program development and implementation practices, and intellectual capital development related to cyber and assurance issues in the industry. Prior to founding Wohnig, Chaman & Associate, Ernest lead the development and delivery of cyber security and assurance services for a large consulting firm s Infrastructure (Energy, Environment, & Transportation) division. He oversaw the design, implementation, and management of new programs, approaches, methodologies, and service solutions for C-suite clients in federal, public utility, and oil & gas entities. 7
8 Dinner Workshop: GridEx 2013: Preparation, the Attack and Lessons Learned Overview In November 2013, more than 200 industry and government organizations participated in the North American Electric Reliability Corporation s two-day cyber and physical security exercise. NERC designed the exercise, GridEx II, to enhance and improve cyber and physical security resources and practices within the industry. The exercise gave participants the opportunity to check the readiness of their crisis action plans through a simulated security exercise to self-assess response and recovery capabilities, and to adjust actions and plans as needed, while communicating with industry and government information sharing organizations. GridEx II, which built on lessons learned from NERC s initial exercise in 2011, brought together more than 1,800 participants from North America, including the electricity industry, the Department of Energy, Department of Homeland Security and Department of Defense and the Federal Bureau of Investigation, as well as Canadian and Mexican utilities and agencies. The scenario was designed to stress the system through a series of prolonged coordinated cyber-attacks against certain automated systems used by power system operators. The scenario also included coordinated physical attacks against key transmission substations and generation facilities. These attacks caused utilities to enact their crisis response plans and walk through internal security procedures. New York Power Authority was one of the utilities to participate in GridEx II. In this workshop, NYPA and NERC will discuss how each side prepared for the attack, their account of the attack, and lessons learned. Attendees will walk away with the understanding of how to prepare for an attack and an understanding of what the real life consequences of an attack can be. agenda / Learning Outcomes Thursday, April 24, :00-9:00 p.m. workshop Timing (Dinner will be provided) Review the history and purpose of GridEx Identify key participants Discuss how participants (utilities and NERC) prepared for the simulated attack Analyze what happened during the attack from both perspectives Analyze how the utility responded to the attack and the results of their actions Identify key lessons learned from the simulated attack 8
9 INSTRUCTORs Bill Lawrence / Manager of Critical Infrastructure Protection Awareness, Critical Infrastructure Department / NERC Bill is the Manager of Critical Infrastructure Protection Awareness at the North American Electric Reliability Corporation (NERC), where he manages the GridSecCon and GridEx programs. Prior to joining NERC, he flew F-14 Tomcats and F/A-18F Super Hornets for the Navy, and most recently was the Deputy Director, Character Development & Training Division, at the United States Naval Academy, where he also taught courses in Ethics and Cyber Security. Bill has a Bachelor s degree in Computer Science from the US Naval Academy, a Master s in International Relations from Auburn Montgomery, and a Master of Military Operational Art and Science from the Air Command and Staff College. He holds a Project Management Professional certification. James Rowan / Critical Infrastructure Protection Programs Manager / SERC Prior to joining SERC Jim Rowan was the leader of the Business Continuity Practice at AliTek Consulting in Houston, TX specializing in regulatory, business continuity, disaster recovery, security, and knowledge management. Jim has recently been chosen as one of 25 people to attend the Homeland Security Executive Leaders Program held at the Center for Homeland Defense and Security, Naval Postgraduate School, Monterrey, CA. With over 25 years of practical experience in regulatory, information technology, security, crisis management and business continuity in both government and the private sector, Mr. Rowan has served in senior management with Apple Computers, PriceWaterhouseCoopers, LLP, and QCorps, Inc. following his tenure as Department Head of the Management Information Systems Office of the United States Marine Corps. He was recognized as Apple Computer Inc. s Engineer of the year for He retired with the U.S. Marine Corps, having served as an aviator, tactical aviation instructor and special weapons/operations officer while deployed onboard several Atlantic Fleet aircraft carriers in a tactical aviation squadron. Other assignments included being the Director of Operations at Navy Operational Intelligence Command, Suitland, Maryland and as a tactical intelligence officer/aviator working with the Central Intelligence Agency, Defense Intelligence Agency, National Security Agency, Navy Fighter Weapons School (TOPGUN), the Navy Strike Warfare Center (SLATS), and the Marine Weapons Training Squadron (MAWTS-1) where he was a specialist in physical, logical, and geo-political vulnerabilities. He earned an ABD Ph.D. from LaSalle University, an MBA/MIS from the University of Maryland and a BS from the U.S. Naval Academy. Lena Smart / Chief Information Security Officer / New York Power Authority Lena has worked in cyber security for more than 20 years. She has worked at the New York Power Authority (NYPA) for 13 years, and has managed the cyber security group there for 10 years. Prior to NYPA, Lena worked for a private banking firm in London, and traveled throughout the world designing and implementing secure computer networks. Outside of work she plays cello in chamber ensembles, and a local orchestra. 9
10 Instructional Methods This program will use PowerPoint presentations, group and panel discussions, as well as active participation. Requirements for Successful Completion of Program Participants must sign in/out each day and be in attendance for the entirety of the conference to be eligible for continuing education credit. iacet Credits has been approved as an Authorized Provider by the International Association for Continuing Education and Training (IACET), 1760 Old Meadow Road, Suite 500, McLean, VA In obtaining this approval, has demonstrated that it complies with the ANSI/IACET Standards, which are widely recognized as standards of good practice internationally. As a result of its Authorized Provider membership status, is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standards. is authorized by IACET to offer 0.9 CEUs for the Conference, 0.4 CEUs for the Pre-Conference Workshop, and 0.3 CEUs for the Dinner Workshop. EVENT LOCATION Troutman Sanders, LLP 401 9th St NW #1000, Washington, DC Phone: (202) PROCeEDINGS A copy of the conference proceedings will be distributed to attendees at the event. If you are unable to attend or would like to purchase additional copies, flash drives are available two weeks after the conference is complete. The cost per flash drive is US $395 (add US $50 for international shipments). Flash drives include visual presentations only. Upon receipt of order and payment, the flash drive will be shipped to you via regular USPS mail. NOTE: All presentation flash drive sales are final and are nonrefundable. sponsorship opportunities Do you want to drive new business through this event s powerful audience? Becoming a sponsor or exhibitor is an excellent opportunity to raise your profile before a manageably sized group of executives who make the key purchasing decisions for their businesses. There is a wide range of sponsorship opportunities available that can be customized to fit your budget and marketing objectives, including: Platinum, gold, or VIP sponsor Workshop sponsor Reception host Lanyard sponsor Networking break host Luncheon host Tabletop exhibit Breakfast host Custom sponsorship opportunities are also available. Please contact Jen Murray at or jsmith@euci.com for more information. REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 10
11 REGISTRATION information Mail Directly To: Electric Utility Consultants, Inc. () 4601 DTC Blvd., Ste. 800 please register the following EVENT LOCATION Troutman Sanders, LLP 401 9th St NW #1000, Washington, DC Phone: (202) Cybersecurity for Utilities and both Pre-conference and Dinner Workshop April 23-25, 2014: US $2195 Early bird on or before April 11, 2014: US $1995 Cybersecurity for Utilities and one workshop (CHOOSE ONE) Pre-CONFERENCE WORKSHOP: April 23, 2014: US $1795 Early bird on or before April 11, 2014: US $1595 Dinner Workshop : April 24, 2014: US $1795 Early bird on or before April 11, 2014: US $1595 Cybersecurity for Utilities conference only April 24-25, 2014: US $1395 Early bird on or before April 11, 2014: US $1195 Workshop only (CHOOSE ONE) Pre-CONFERENCE WORKSHOP: April 23, 2014: US $595 Early bird on or before April 11, 2014: US $495 Dinner Workshop : April 24, 2014: US $595 Early bird on or before April 11, 2014: US $495 I'M SORRY I CANNOT ATTEND, BUT PLEASE SEND ME THE CONFERENCE PROCEEDINGS FOR US $395. (PLEASE ADD $50 FOR INTERNATIONAL SHIPPING.) ENERG ZE WEEKLY s Energize Weekly newsletter compiles and reports on the latest news and trends in the energy industry. Newsletter recipients also receive a different, complimentary conference presentation every week on a relevant industry topic. The presentations are selected from a massive library of more than 1,000 current presentations that has gathered during its 26 years organizing conferences. Sign me up for Energize Weekly. How did you hear about this event? (direct , colleague, speaker(s), etc.) Print Name Job Title Company What name do you prefer on your name badge? Address City State/Province Zip/Postal Code Country Telephone List any dietary or accessibility needs here CREDIT CARD Name on Card Account Number Billing Address Billing City Billing State Billing Zip Code/Postal Code Exp. Date Security Code (last 3 digits on the back of Visa and MC or 4 digits on front of AmEx) OR Enclosed is a check for $ to cover registrations. All cancellations received on or before March 28, 2014, will be subject to a US $195 processing fee. Written cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other event or publication. This credit will be good for six months. In case of event cancellation, s liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at reserves the right to alter this program without prior notice. 11
Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities
WEBINAR Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities May 2, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer
More informationStrengthening Utility Critical
WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White
More informationOil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
More informationFUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS
COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW
More informationCYBERSECURITY FOR UTILITIES
CONFERENCE CYBERSECURITY FOR UTILITIES Offices of Troutman Sanders, LLP Pre-Conference Workshop Disaster Recovery and Contingency Planning Managing and Delivering after your Cyber Apocalypse Tuesday, April
More informationAN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS
COURSE AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS Hilton Houston Southwest is authorized by IACET to offer 1.1 CEUs for the course. is authorized by CPE to offer 13.5 credits for this
More informationPower Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures
COurse Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 1.0
More informationCONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM
WEBINAR CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM April 16, 2015 12:00 1:30 p.m. Eastern Time Online is authorized by IACET to offer
More informationProject Prioritization and Utility Project Portfolio Management
COurse Project Prioritization and Utility Project Portfolio Management Denver Marriott Tech Center EUCI is authorized by IACET to offer 1.2 CEUs for the course. 1 Overview As utilities face increasing
More informationin Ontario and Key Canadian
CONFERENCE The Future of Electricity Prices in Ontario and Key Canadian Markets Toronto Don Valley Hotel & Suites Supporting Organizations is authorized by IACET to offer 0.9 CEUs for the conference. 1
More informationINLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING
COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW This
More informationLessons Learned from Utilities that are in the Cloud
Webinar Lessons Learned from Utilities that are in the Cloud Online Photo credit: WikiUser Sam Johnston is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview It is increasingly inefficient
More informationImproving Utility Call Centers
CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street EUCI is authorized by IACET to offer 1.0 CEUs for the conference. 1 Overview
More informationACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS
COURSE ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS Houston Marriott West Loop by The Galleria is authorized by IACET to offer 0.7 CEUs for the course. Media Sponsor 1 OVERVIEW There is seldom
More informationPROJECT PORTFOLIO MANAGEMENT
COURSE PROJECT PORTFOLIO MANAGEMENT Hyatt Regency Louisville EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Many organizations struggle with limited resources and too many projects
More informationDERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:
DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: AN ACCOUNTING COURSE ON DERIVATIVE INSTRUMENTS, HEDGING ACTIVITIES, AND FAIR VALUE Hyatt Regency Miami COURSE is authorized by IACET to offer 1.0
More informationLearn About the Billing and Collection Process Through an Onlineinar
WEBINAR THE BASICS OF COLLECTIONS & BANKRUPTCY IN THE OIL & GAS INDUSTRY: GETTING PAID IN HARD TIMES Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW The purpose of this webinar
More informationImproving Utility Call Centers
CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street Featuring Georgia Power Call Center Tour Friday, December 6, 2013 Sponsor
More informationPOWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING
COURSE POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING October 27-28, 2015 Houston Marriott West Loop by The Galleria Houston, TX is authorized by IACET
More informationELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS
COURSE ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS Denver Marriott City Center is authorized by IACET to offer 1.0 CEUs for the course. This course has been approved for 12.0 CPEs. 1 OVERVIEW This course
More informationSeptember 22-23, 2014 JW Marriott Houston Houston, TX
COurse Energy Joint Ventures JW Marriott Houston is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 12.0 credits for this program. 1 Overview This course will provide
More informationMANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS
WEBINAR MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY November 19, 2015 1:00 2:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW Insurance
More information5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE:
CONFERENCE 5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: Houston Marriott West Loop by the Galleria Pre-Conference Workshop All Hazards Emergency Predicting, Planning and Response: An Evolving
More informationNATURAL GAS UTILITY BASICS
COURSE NATURAL GAS UTILITY BASICS Hilton Houston Southwest EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW This training is targeted at participants in the natural gas industry
More informationMidstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the details
More informationIN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS
WEBINAR IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW In recent years regulatory authorities have placed increased
More informationINLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING
COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center EUCI is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW
More informationData Centers and Utilities: Planning, Incentives, Audits & Trends
CONFERENCE Data Centers and Utilities: Planning, Incentives, Audits & Trends September 29-30, 2014 Denver Marriott Tech Center Denver, CO Photo Credit: Wikimedia User123net is authorized by IACET to offer
More informationLEADERSHIP CONFERENCE FOR WOMEN IN ENERGY
CONFERENCE LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY Sheraton Indianapolis City Centre Hotel PRESENTATIONS FROM Keynote Presentations from: Department Of Energy - The Honorable Patricia Hoffman, Assistant
More informationFundamentals of Oil and Gas Taxation
COurse Fundamentals of Oil and Gas Taxation Houston Marriott West Loop by The Galleria EUCI is authorized by IACET to offer 1.0 CEUs for the course. EUCI is authorized by CPE to offer 12 credits for this
More informationCOurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse Midstream Oil & Gas Contracts for Non-lawyers The Westin Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts
More informationMinimizing Disputes in Energy Project Development
COurse Minimizing Disputes in Energy Project Development Hilton Charlotte University is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Energy development projects are fraught with potential
More informationHow To Learn Workforce Analytics
COurse Workforce Analytics Marina del Rey Marriott is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Within the last 5 years, we have moved from an environment where HR reporting and
More informationEstimation and Cost Control Fundamentals for Oil & Gas
COurse Estimation and Cost Control Fundamentals for Oil & Gas Capital Projects Denver Marriott City Center EUCI is authorized by IACET to offer 1.1 CEUs for the course. 1 Overview Managing the complexity
More informationFERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse FERC Natural Gas 101 Renaissance Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview FERC Natural Gas 101 provides a comprehensive overview of the agency s impact
More informationWEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES
EUCI presents a conference on: WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES National Arts Centre Ottawa, Ontario TESTIMONIALS FROM PAST ATTENDEES "Exceeded my expectations. It was great
More informationMidstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the
More informationADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS Millennium Knickerbocker Hotel Chicago Instructed by COURSE Baltimore
More informationSOUTHEAST CLEAN POWER SUMMIT
CONFERENCE 4 TH ANNUAL SOUTHEAST CLEAN POWER SUMMIT Hyatt Regency Atlanta Post Conference Workshop Pricing the Purchase of Renewable Energy Tuesday, March 31, 2015 Studies and Presentations from Entergy
More informationWritten Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
More information(IN)CONDUIT HYDRO-ELECTRIC GENERATION
COURSE (IN)CONDUIT HYDRO-ELECTRIC GENERATION Royal Sonesta Harbor Court Baltimore is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Adding renewable energy like solar and wind to the
More informationStorm Planning and Response
EUCI presents a conference on: Best Practices in Storm Planning and Response Hyatt Regency New Orleans New Orleans, LA Pre-conference workshop Storm Planning 101 February 25, 2013 Platinum Sponsor Gold
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationHOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE
CONFERENCE HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE Hyatt Regency Orange County Pre-Conference Workshop THE CLOUD: A VIABLE OPTION FOR UTILITIES Wednesday, January 27, 2016 Sponsor Media Partner is
More informationCyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
More informationVoluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
More informationWhy you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
More informationOnline Course Design. August 2 4, 2010 Denver, CO
Online Course Design August 2 4, 2010 Denver, CO An excellent study of the elements that must be considered when conceptualizing, executing, and revising course content. Thomas Friedmann, Instructional
More informationCREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES
13 TH ANNUAL CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES Millenium Knickerbocker CONFERENCE Host Utility Sponsors is authorized by IACET to offer 1.0 CEUs for the conference.
More informationSponsorship Opportunities
2015 THE INTERNATIONAL ASSOCIATION OF Conference on Philanthropy April 27-29 Loews Chicago O Hare, Rosemont, IL AiP 216 W. Jackson Blvd. Suite 625 Chicago, IL 60606 312.252.2501 The International Association
More informationWRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA
WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT May 24-25, 2012 Atlanta, GA OVERVIEW Clean and simple content based on the top tasks your visitors want to accomplish online
More information10 th Annual API Cybersecurity Conference for the Oil and Gas Industry
10 th Annual API Cybersecurity Conference for the Oil and Gas Industry July 7, 2015 Dear Sponsor/Exhibitor, Thank you for your interest in the 10 th Annual API Cybersecurity Conference for the Oil and
More informationKey Accounts Certificate Program
Key Accounts Certificate Program Sept. 29 Oct. 3, 2014 n Fall Education Institute n Scottsdale, Ariz. Visit us at www.appaacademy.org Certificate Requirements To earn this certificate, participants must
More informationJuly 22-25, 2016 Washington, DC Marriott Wardman Park Hotel
Partner with NASW to Reach Social Workers and Other Health and Human Service Professionals at the 2016 NASW National Conference Leading Change Transforming Lives July 22-25, 2016 Washington, DC Marriott
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationLEGAL UPDATE FOR OIL & GAS ENTITIES:
COURSE LEGAL UPDATE FOR OIL & GAS ENTITIES: CONTRACTS TO LIABILITY, PERMITS TO INDEMNITY, STRATEGIES TO AVOID RISK, AND CYBERSECURITY CHALLENGES Houston Marriott West Loop by The Galleria is authorized
More informationRE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
More informationEMERGING LEADERS PROGRAM
SFA e rs Memb d Atten Free! October 25-27, 2015 Georgetown University, Washington, D.C. REGISTRATION DEADLINE: September 25, 2015 Designed for the Future Leaders of the Snack Food Industry Overview A two-and-a-half
More informationPLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA
PLANNING & GROWING ONLINE LEARNING INITIATIVES October 25 26, 2010 Atlanta, GA OVERVIEW Many institutions wanting to improve student access and increase degree completion rates are looking to online programs
More informationAN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS
CONFERENCE AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 0.8 CEUs for the course. is authorized by CPE to offer
More informationEXHIBITOR, ADVERTISING, & SPONSORSHIP OPPORTUNITIES
EXHIBITOR, ADVERTISING, & SPONSORSHIP OPPORTUNITIES 2014 ASHE Conference Washington D.C. November 19-22, 2014 EXHIBITOR & SPONSORSHIP OPPORTUNITIES Thank you for your interest in the 2014 ASHE Conference
More informationUNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION
UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION As an institution trying to bring both its online course offerings and the support services to distance education students up to the next level, it was
More informationCONTEMPORARY APPROACHES TO INTEGRATED RESOURCE, DEMAND & TRANSMISSION PLANNING
15 TH ANNUAL CONTEMPORARY APPROACHES TO INTEGRATED RESOURCE, DEMAND & TRANSMISSION PLANNING Hyatt Regency Atlanta CONFERENCE Pre-Conference Workshop IRP PLANNING CHALLENGES AND CRITICAL ANALYSIS FOR THE
More informationExecutive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
More informationSept. 30 - Oct. 2, 2012 ENCORE LAS VEGAS
Navigating the Road to the Future: Transforming the Way Hospitals, Physicians & Health Plans Conduct Business Sept. 30 - Oct. 2, 2012 ENCORE LAS VEGAS LEARN FROM INDUSTRY LEADERS ABOUT THESE EMERGING &
More informationJanuary IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
More informationCUNA Human Resources and Development Council Sponsor Information
CUNA Human Resources, Training & Development Council Sponsor Information We appreciate your interest in sponsoring. You can decide which level fits your needs and budget. Use these links to jump directly
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
More informationTHE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
More information2015 AESC 3rd Annual Oilfield Trucking Conference. Hilton Hotel Downtown Fort Worth, Texas. November 17-19, 2015
2015 AESC 3rd Annual Oilfield Trucking Conference Hilton Hotel Downtown Fort Worth, Texas REGISTER NOW November 17-19, 2015 Association of Energy Service Companies 14531 FM 529, Suite 250 Houston, TX 77095
More informationJOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
More information2015 NAGC COMMUNICATIONS SCHOOL June 2-4, 2015
Good Communication Good Government 2015 NAGC COMMUNICATIONS SCHOOL June 2-4, 2015 Sheraton Memphis Downtown 250 N. Main Street Memphis, TN 38103 Maximize your exposure to federal, state, tribal, and local
More informationNGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
More informationCybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
More informationInstructIonal strategies for Blended & online. December 9 11, 2009 Scottsdale, AZ
InstructIonal strategies for Blended & online learning December 9 11, 2009 Scottsdale, AZ overview To teach well in the online environment, instructors need to explore new pedagogical options and craft
More informationWe look forward to working with you to make the GSASC & SCASCA February 2016 Semi-Annual Conference and Trade Show a success!
Dear Potential Exhibitor: The Georgia Society of Ambulatory Surgery Centers and the South Carolina Ambulatory Surgery Center Association are pleased to invite your company to participate in the GSASC/SCASCA
More informationCyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
More informationCharlotte, NC. smartcities.energycentral.com. Contact your Energy Central Marketing Services Representative 800.459.2233 sales@energycentral.
May 12-13, Charlotte, NC Sponsoring an event with Energy Central offers your company a wide range of benefits and a tailored level of exposure to conference attendees. Energy Central has created a number
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationEXHIBITOR AND SPONSOR PROSPECTUS. http://spring.afssociety.org/ Oil, Gas and Chemicals Filtration & Separations Conference Expo
Oil, Gas and Chemicals Filtration & Separations Conference Expo May 9-11, 2016 Houston Marriott Westchase, Houston, TX EXHIBITOR AND SPONSOR PROSPECTUS http://spring.afssociety.org/ About the AFS and Why
More informationNIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
More informationSITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
More information2008-2014 The Sales Management Association. All rights reserved. Version 2.0
2008-2014 The Sales Management Association. All rights reserved. Version 2.0 Alpha Bravo Distribution (B) Sales Compensation Plan Policies Join Us Dec 2010 At The YEAR S BEST SALES FORCE EFFECTIVENESS
More informationCenter for Advanced Medical Learning and Simulation October 20-22, 2015 Tampa, FL. Sponsorship & Exhibit Opportunities
Center for Advanced Medical Learning and Simulation October 20-22, 2015 Tampa, FL Sponsorship & Exhibit Opportunities Our New Tradition The second annual IDSA Medical Design Conference will continue to
More informationAdvanced Performance Measures
Advanced Performance Measures Establish a performance measurement system to guide decision making Presented By: Developing and utilizing: performance measures, data, & reporting for organization results
More informationSecurity Management Program Development:
Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are
More informationThe Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School
The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School MARCH 31, 2014 2013 Venable LLP 1 EO 13636: Improving Critical Infrastructure Cybersecurity Directs to NIST to develop
More informationSPONSORSHIP AND EXHIBITOR OPPORTUNITIES
SPONSORSHIP AND EXHIBITOR OPPORTUNITIES OTTAWA MAY 1-3, 2013 INK+BEYOND The annual INK+BEYOND conference and trade show is the only event in Canada that brings together professionals from all facets of
More informationCybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards
More informationFebruary 24-26, 2016 Westin Hotel Ottawa, ON
February 24-26, 2016 Westin Hotel Ottawa, ON SPONSORSHIP OPPORTUNITIES available sold LEVEL OPPORTUNITY MEMBER VALUE SPONSOR URANIUM Opening Reception $100,000 sold PLATINUM Thursday Lunch $50,000 available
More information2015 EMERGING LEADERS INSTITUTE
2015 EMERGING LEADERS INSTITUTE LEADERSHIP // INVOLVEMENT // DEVELOPMENT Sponsored by Victor O. Schinnerer & Company, Inc., the CNA Insurance Companies, and The AIA Trust, providers of the AIA Trust Professional
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationCorporate Membership and Sponsorship Opportunities
2015 Corporate Membership and Sponsorship Opportunities 2015 Membership and Sponsorship Dates Corporate Membership January 1 December 31 Mid-Year Meeting January 23-25 Loews Madison Hotel Washington, DC
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationMissouri Association of School Administrators. Missouri School Public Relations Association. Spring Conference
Missouri Association of School Administrators & Missouri School Public Relations Association Spring Conference NEW! The Lodge of Four Seasons March 20, 21 and 22, 2013 Wednesday, Thursday, Friday Pre-Conference
More informationUtility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
More informationNIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
More informationIndustrial Control Security
Industrial Control Security Holiday Inn, Sacramento, California www.industrialcontrolsecurityusa.com www.cybersenate.com The Effective Approach for Protecting Oil and Gas Critical Infrastructures from
More informationLearn the essential components of designing effective online courses.
MAKING THE SHIFT FROM CLASSROOM TO ONLINE COURSE DESIGN Session 1: (Re)Mapping Course Design Wednesday, September 7, 2011 :: 1:00 2:45 p.m. EDT Session 2: Course Organization Monday, September 12, 2011
More informationBECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity
Working together, Blank Rome LLP and Good Harbor Security Risk Management LLC, haved teamed to provide a comprehensive solution for protecting your company s property and reputation from the unprecedented
More information