Oil & Gas Cybersecurity

Size: px
Start display at page:

Download "Oil & Gas Cybersecurity"

Transcription

1 COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1

2 Overview The energy industry has witnessed an increase in the number of cyber-attacks in recent years. Cybersecurity is critical to the infrastructure of the oil and natural gas industry. Advanced attacks have redefined security reality for the energy sector in a multitude of ways. This event will discuss the knowledge and strategies required to proactively address and to prevent these increasing attacks. Attendees will learn to describe cyber events, the nature and proliferation of cyber-attacks, and emerging cyber threats in the oil & gas industry. The instructor will discuss the trends in industrial control system threats. Attendees will evaluate best practices for asset integrity and secure information management for the oil & gas industry. They will learn to assess cyber incident recovery plans and employ risk analysis and management strategies. Attendees will leave with an understanding of endpoint security management. At the end of the day, attendees will engage in a conversation about the future of cybersecurity in oil & gas and participate in a Q&A discussion. Who Should Attend Oil & gas IT management Oil & gas IT security professionals System administrators Database administrators Data privacy specialists Application support personnel Corporate security professionals Learning Outcomes Describe cyber vulnerabilities, the nature and proliferation of cyber-attacks, and emerging cyber threats in the oil & gas industry Discuss the trends in industrial control system threats Evaluate best practices for asset integrity and secure information management for the oil & gas industry Assess cyber damage recovery plans Employ risk analysis and management strategies to combat the prolonged effects of malicious entities that are accessing your systems Describe the importance of endpoint security management Discuss the future of cybersecurity in oil & gas Participate in a Q&A and hot topics session REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 2

3 Agenda Monday, 8:00-8:30 a.m. Registration and Continental Breakfast 8:30-9:30 a.m. Cyber Vulnerabilities and Risks: An Introduction A brief history of cyber conflict Discussing the nature and proliferation of ransomware/crypto-locker type cyberattacks on the oil & gas industry State of oil & gas cybersecurity threats Emerging cyber threats in the oil & gas industry Identifying cyber espionage and cyber warfare 9:30-10:00 a.m. Networking Break 10:00-11:00 a.m. The Trends in Industrial Control System Threats The effect of cyber damage on big data and cloud computing systems Managing supply chain risk in field operations through improved ICS security Cyber threat intelligence & information sharing Oil & Natural Gas Information Sharing and Analysis Center (ONG-ISAC) Advanced persistent threats/next generation/advanced evasive techniques 11:00 a.m. - 12:00 p.m. Protecting the Data vs. Protecting the Network Best practices for asset integrity and secure information management for the oil & gas industry Hacking critical infrastructure: A summary from cyber mythology to cyber realityseparating fact from fiction Application security and information process technologies/drm/dlp Protecting against advanced persistent threat (APT) malware and increasingly complex hacker abilities Utilizing traffic capture analyses to identify, in real time, when and how malicious entities are gaining access to your systems Advanced persistent threats/advanced evasive techniques Rapidly responding after a cyber-attack and implementing a disaster recovery plan 12:00-1:00 p.m. Group Luncheon 3

4 Agenda Monday, (Continued) 1:00-2:00 p.m. Institutionalizing Cybersecurity Development of system architecture as a means to mitigate the risk of cyber intrusion and as a defense of critical network data Identity & access management and establishing true data privacy Integrating the increasingly automated SCADA and ICS controls with IT and cyber security measures Employing risk analysis and management strategies for combating the prolonged effects of malicious entities that are accessing your systems Designing incident response management plans Developing information protection programs and risk management Integrating operators in the field with the cybersecurity plans of the IT and cybersecurity departments The importance of endpoint security management How to determine if and when third party software and companies should be used 2:00-2:30 p.m. Networking Break 2:30-3:30 p.m. The Future of Cybersecurity in Oil & Gas Future cyber threat trends in both domestic and international arenas The impact of cyber threats on industry network integrity and social engineering Discussing the increasing importance of mobility/mobile device and service management The emergence of endpoint security management Addressing the necessity of mitigating the risk of data leaks and security incidents with industry partners and joint ventures The emerging face of cyber actors and their objectives 3:30-4:30 p.m. Q&A and Hot Topics This session will be an opportunity to ask questions of the expert and discuss hot topics within oil & gas cybersecurity 4

5 INSTRUCTORs Hans Holmer / Senior Strategist / Technical Intelligence Center at Intelligent Decisions / US Government Hans Holmer is a Senior Strategist with over 25 years of government, human intelligence and private industry experience. Mr. Holmer is the recipient of a host of awards for his work and contributions, including: CIA Intelligence Star, CIA Career Commendation Medal, 2 CIA Meritorious Unit Awards, 11 CIA Exceptional Performance Awards, Director of National Intelligence Meritorious Unit Award, National Intelligence Certificate, National Intelligence Award, and the U.S. Army Commendation Medal. A successful strategist and planner, performing complex analyses and briefing at the highest levels and an accomplished public speaker in demand, Hans is a leader and developer of multidisciplinary teams. Rick Wilson / Director / Enterprise Cyber Defense Rick Wilson has been instrumental in developing and deploying cyber defense programs throughout the nation. He was responsible for developing and deploying the DoD s first enterprise-wide cyber intrusion detection system. In 2009 and 2010 Rick was detailed to the Department of Homeland Security as the Technical Director for the National Cybersecurity Center where he developed and deployed the current national intrusion protection system. As Technical Director for the NSA Technical Counterintelligence Center he led a diverse team of analysts, technologists and investigators to identify and neutralize penetrations and compromises of NSA and national equities. He later became the NSA Director s Special Assistant for Cyber responsible for overseeing and representing NSA cyber programs and policies. Rick s accomplishments have been recognized with numerous national level awards and commendations. 5

6 Instructional Methods Case studies, PowerPoint presentations and group discussion will be used for in this event. Requirements for Successful Completion of Program Participants must sign in/out each day and be in attendance for the entirety of the course to be eligible for continuing education credit. iacet Credits has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, has demonstrated that it complies with the ANSI/IACET Standard which is recognized internationally as a standard of good practice. As a result of their Authorized Provider status, is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standard. is authorized by IACET to offer 0.6 CEUs for the course. EVENT LOCATION A room block has been reserved at the Sheraton Pentagon City Hotel, 900 S. Orme Street, Arlington, VA 22204, for the night of February Room rates are $109, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is January 11, 2015, but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. PROCEEDINGS The proceedings of the course will be published, and one copy will be distributed to each registrant at the course. 6

7 REGISTRATION INFORMATION EVENT LOCATION Mail Directly To: Electric Utility Consultants, Inc. () 4601 DTC Blvd., Ste. 800 OR, scan and to: please register the following Oil & Gas Cybersecurity Course : US $995 Early bird on or before January 30, 2015: US $895 A room block has been reserved at the Sheraton Pentagon City Hotel, 900 S. Orme Street, Arlington, VA 22204, for the night of February Room rates are $109, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is January 11, 2015, but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. ENERG ZE WEEKLY s Energize Weekly newsletter compiles and reports on the latest news and trends in the energy industry. Newsletter recipients also receive a different, complimentary conference presentation every week on a relevant industry topic. The presentations are selected from a massive library of more than 1,000 current presentations that has gathered during its 26 years organizing conferences. Sign me up for Energize Weekly. How did you hear about this event? (direct , colleague, speaker(s), etc.) Print Name Job Title Company What name do you prefer on your name badge? Address City State/Province Zip/Postal Code Country Telephone List any dietary or accessibility needs here CREDIT CARD Name on Card Account Number Billing Address Billing City Billing State Billing Zip Code/Postal Code exp. Date Security Code (last 3 digits on the back of Visa and MC or 4 digits on front of AmEx) OR Enclosed is a check for $ to cover registrations. All cancellations received on or before January 9, 2015, will be subject to a US $195 processing fee. Written cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other event or publication. This credit will be good for six months. In case of event cancellation, s liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at reserves the right to alter this program without prior notice. 7

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW This

More information

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW

More information

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS COURSE ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS Houston Marriott West Loop by The Galleria is authorized by IACET to offer 0.7 CEUs for the course. Media Sponsor 1 OVERVIEW There is seldom

More information

Strengthening Utility Critical

Strengthening Utility Critical WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White

More information

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS COURSE AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS Hilton Houston Southwest is authorized by IACET to offer 1.1 CEUs for the course. is authorized by CPE to offer 13.5 credits for this

More information

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS COURSE ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS Denver Marriott City Center is authorized by IACET to offer 1.0 CEUs for the course. This course has been approved for 12.0 CPEs. 1 OVERVIEW This course

More information

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: AN ACCOUNTING COURSE ON DERIVATIVE INSTRUMENTS, HEDGING ACTIVITIES, AND FAIR VALUE Hyatt Regency Miami COURSE is authorized by IACET to offer 1.0

More information

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center EUCI is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW

More information

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING COURSE POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING October 27-28, 2015 Houston Marriott West Loop by The Galleria Houston, TX is authorized by IACET

More information

Project Prioritization and Utility Project Portfolio Management

Project Prioritization and Utility Project Portfolio Management COurse Project Prioritization and Utility Project Portfolio Management Denver Marriott Tech Center EUCI is authorized by IACET to offer 1.2 CEUs for the course. 1 Overview As utilities face increasing

More information

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers The Westin Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts

More information

Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures

Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures COurse Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 1.0

More information

Fundamentals of Oil and Gas Taxation

Fundamentals of Oil and Gas Taxation COurse Fundamentals of Oil and Gas Taxation Houston Marriott West Loop by The Galleria EUCI is authorized by IACET to offer 1.0 CEUs for the course. EUCI is authorized by CPE to offer 12 credits for this

More information

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS WEBINAR IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW In recent years regulatory authorities have placed increased

More information

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS WEBINAR MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY November 19, 2015 1:00 2:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW Insurance

More information

Estimation and Cost Control Fundamentals for Oil & Gas

Estimation and Cost Control Fundamentals for Oil & Gas COurse Estimation and Cost Control Fundamentals for Oil & Gas Capital Projects Denver Marriott City Center EUCI is authorized by IACET to offer 1.1 CEUs for the course. 1 Overview Managing the complexity

More information

in Ontario and Key Canadian

in Ontario and Key Canadian CONFERENCE The Future of Electricity Prices in Ontario and Key Canadian Markets Toronto Don Valley Hotel & Suites Supporting Organizations is authorized by IACET to offer 0.9 CEUs for the conference. 1

More information

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse FERC Natural Gas 101 Renaissance Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview FERC Natural Gas 101 provides a comprehensive overview of the agency s impact

More information

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE:

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: CONFERENCE 5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: Houston Marriott West Loop by the Galleria Pre-Conference Workshop All Hazards Emergency Predicting, Planning and Response: An Evolving

More information

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS Millennium Knickerbocker Hotel Chicago Instructed by COURSE Baltimore

More information

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY CONFERENCE LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY Sheraton Indianapolis City Centre Hotel PRESENTATIONS FROM Keynote Presentations from: Department Of Energy - The Honorable Patricia Hoffman, Assistant

More information

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS CONFERENCE AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 0.8 CEUs for the course. is authorized by CPE to offer

More information

SOUTHEAST CLEAN POWER SUMMIT

SOUTHEAST CLEAN POWER SUMMIT CONFERENCE 4 TH ANNUAL SOUTHEAST CLEAN POWER SUMMIT Hyatt Regency Atlanta Post Conference Workshop Pricing the Purchase of Renewable Energy Tuesday, March 31, 2015 Studies and Presentations from Entergy

More information

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES EUCI presents a conference on: WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES National Arts Centre Ottawa, Ontario TESTIMONIALS FROM PAST ATTENDEES "Exceeded my expectations. It was great

More information

Online Course Design. August 2 4, 2010 Denver, CO

Online Course Design. August 2 4, 2010 Denver, CO Online Course Design August 2 4, 2010 Denver, CO An excellent study of the elements that must be considered when conceptualizing, executing, and revising course content. Thomas Friedmann, Instructional

More information

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES 13 TH ANNUAL CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES Millenium Knickerbocker CONFERENCE Host Utility Sponsors is authorized by IACET to offer 1.0 CEUs for the conference.

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE CONFERENCE HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE Hyatt Regency Orange County Pre-Conference Workshop THE CLOUD: A VIABLE OPTION FOR UTILITIES Wednesday, January 27, 2016 Sponsor Media Partner is

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

OIL & GAS CYBERSECURITY

OIL & GAS CYBERSECURITY CONFERENCE OIL & GAS CYBERSECURITY Houston Marriott West Loop by The Galleria Post-Conference Workshop CYBERSECURITY AND INDUSTRIAL CONTROL SYSTEMS August 11, 2015 Speakers Include: Paul Brager, Lead Associate

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

Storm Planning and Response

Storm Planning and Response EUCI presents a conference on: Best Practices in Storm Planning and Response Hyatt Regency New Orleans New Orleans, LA Pre-conference workshop Storm Planning 101 February 25, 2013 Platinum Sponsor Gold

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

Cyber Risk to Help Shape Industry Trends in 2014

Cyber Risk to Help Shape Industry Trends in 2014 Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Learn the essential components of designing effective online courses.

Learn the essential components of designing effective online courses. MAKING THE SHIFT FROM CLASSROOM TO ONLINE COURSE DESIGN Session 1: (Re)Mapping Course Design Wednesday, September 7, 2011 :: 1:00 2:45 p.m. EDT Session 2: Course Organization Monday, September 12, 2011

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Redefining SIEM to Real Time Security Intelligence

Redefining SIEM to Real Time Security Intelligence Redefining SIEM to Real Time Security Intelligence David Osborne Security Architect September 18, 2012 Its not paranoia if they really are out to get you Malware Malicious Insiders Exploited Vulnerabilities

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually

More information

N-Dimension Solutions Cyber Security for Utilities

N-Dimension Solutions Cyber Security for Utilities AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

EMERGING LEADERS PROGRAM

EMERGING LEADERS PROGRAM SFA e rs Memb d Atten Free! October 25-27, 2015 Georgetown University, Washington, D.C. REGISTRATION DEADLINE: September 25, 2015 Designed for the Future Leaders of the Snack Food Industry Overview A two-and-a-half

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3 GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

Persistence Mechanisms as Indicators of Compromise

Persistence Mechanisms as Indicators of Compromise Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information