Oil & Gas Cybersecurity



Similar documents
INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS

Strengthening Utility Critical

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING

Project Prioritization and Utility Project Portfolio Management

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures

Fundamentals of Oil and Gas Taxation

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS

Estimation and Cost Control Fundamentals for Oil & Gas

in Ontario and Key Canadian

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE:

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS

SOUTHEAST CLEAN POWER SUMMIT

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES

Online Course Design. August 2 4, 2010 Denver, CO

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES

Bellevue University Cybersecurity Programs & Courses

Cybersecurity and internal audit. August 15, 2014

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Middle Class Economics: Cybersecurity Updated August 7, 2015

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Protecting against cyber threats and security breaches

Big 4 Information Security Forum

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

OIL & GAS CYBERSECURITY

CYBER SECURITY TRAINING SAFE AND SECURE

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Introduction to Cybersecurity Overview. October 2014

Storm Planning and Response

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Reliable, Repeatable, Measurable, Affordable

Cyber Risk to Help Shape Industry Trends in 2014

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Defending Against Data Beaches: Internal Controls for Cybersecurity

Learn the essential components of designing effective online courses.

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

The Comprehensive National Cybersecurity Initiative

The Importance of Cybersecurity Monitoring for Utilities

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Cybersecurity: Mission integration to protect your assets

Redefining SIEM to Real Time Security Intelligence

Advanced Threat Protection with Dell SecureWorks Security Services

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

N-Dimension Solutions Cyber Security for Utilities

Microsoft s cybersecurity commitment

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

EMERGING LEADERS PROGRAM

Confrontation or Collaboration?

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Persistence Mechanisms as Indicators of Compromise

Combating a new generation of cybercriminal with in-depth security monitoring

Cybersecurity Delivering Confidence in the Cyber Domain

Transcription:

COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1

Overview The energy industry has witnessed an increase in the number of cyber-attacks in recent years. Cybersecurity is critical to the infrastructure of the oil and natural gas industry. Advanced attacks have redefined security reality for the energy sector in a multitude of ways. This event will discuss the knowledge and strategies required to proactively address and to prevent these increasing attacks. Attendees will learn to describe cyber events, the nature and proliferation of cyber-attacks, and emerging cyber threats in the oil & gas industry. The instructor will discuss the trends in industrial control system threats. Attendees will evaluate best practices for asset integrity and secure information management for the oil & gas industry. They will learn to assess cyber incident recovery plans and employ risk analysis and management strategies. Attendees will leave with an understanding of endpoint security management. At the end of the day, attendees will engage in a conversation about the future of cybersecurity in oil & gas and participate in a Q&A discussion. Who Should Attend Oil & gas IT management Oil & gas IT security professionals System administrators Database administrators Data privacy specialists Application support personnel Corporate security professionals Learning Outcomes Describe cyber vulnerabilities, the nature and proliferation of cyber-attacks, and emerging cyber threats in the oil & gas industry Discuss the trends in industrial control system threats Evaluate best practices for asset integrity and secure information management for the oil & gas industry Assess cyber damage recovery plans Employ risk analysis and management strategies to combat the prolonged effects of malicious entities that are accessing your systems Describe the importance of endpoint security management Discuss the future of cybersecurity in oil & gas Participate in a Q&A and hot topics session REGISTER 4601 TODAY! DTC Blvd., CALL Suite 800 303-770-8800 OR VISIT 2

Agenda Monday, 8:00-8:30 a.m. Registration and Continental Breakfast 8:30-9:30 a.m. Cyber Vulnerabilities and Risks: An Introduction A brief history of cyber conflict Discussing the nature and proliferation of ransomware/crypto-locker type cyberattacks on the oil & gas industry State of oil & gas cybersecurity threats Emerging cyber threats in the oil & gas industry Identifying cyber espionage and cyber warfare 9:30-10:00 a.m. Networking Break 10:00-11:00 a.m. The Trends in Industrial Control System Threats The effect of cyber damage on big data and cloud computing systems Managing supply chain risk in field operations through improved ICS security Cyber threat intelligence & information sharing Oil & Natural Gas Information Sharing and Analysis Center (ONG-ISAC) Advanced persistent threats/next generation/advanced evasive techniques 11:00 a.m. - 12:00 p.m. Protecting the Data vs. Protecting the Network Best practices for asset integrity and secure information management for the oil & gas industry Hacking critical infrastructure: A summary from cyber mythology to cyber realityseparating fact from fiction Application security and information process technologies/drm/dlp Protecting against advanced persistent threat (APT) malware and increasingly complex hacker abilities Utilizing traffic capture analyses to identify, in real time, when and how malicious entities are gaining access to your systems Advanced persistent threats/advanced evasive techniques Rapidly responding after a cyber-attack and implementing a disaster recovery plan 12:00-1:00 p.m. Group Luncheon 3

Agenda Monday, (Continued) 1:00-2:00 p.m. Institutionalizing Cybersecurity Development of system architecture as a means to mitigate the risk of cyber intrusion and as a defense of critical network data Identity & access management and establishing true data privacy Integrating the increasingly automated SCADA and ICS controls with IT and cyber security measures Employing risk analysis and management strategies for combating the prolonged effects of malicious entities that are accessing your systems Designing incident response management plans Developing information protection programs and risk management Integrating operators in the field with the cybersecurity plans of the IT and cybersecurity departments The importance of endpoint security management How to determine if and when third party software and companies should be used 2:00-2:30 p.m. Networking Break 2:30-3:30 p.m. The Future of Cybersecurity in Oil & Gas Future cyber threat trends in both domestic and international arenas The impact of cyber threats on industry network integrity and social engineering Discussing the increasing importance of mobility/mobile device and service management The emergence of endpoint security management Addressing the necessity of mitigating the risk of data leaks and security incidents with industry partners and joint ventures The emerging face of cyber actors and their objectives 3:30-4:30 p.m. Q&A and Hot Topics This session will be an opportunity to ask questions of the expert and discuss hot topics within oil & gas cybersecurity 4

INSTRUCTORs Hans Holmer / Senior Strategist / Technical Intelligence Center at Intelligent Decisions / US Government Hans Holmer is a Senior Strategist with over 25 years of government, human intelligence and private industry experience. Mr. Holmer is the recipient of a host of awards for his work and contributions, including: CIA Intelligence Star, CIA Career Commendation Medal, 2 CIA Meritorious Unit Awards, 11 CIA Exceptional Performance Awards, Director of National Intelligence Meritorious Unit Award, National Intelligence Certificate, National Intelligence Award, and the U.S. Army Commendation Medal. A successful strategist and planner, performing complex analyses and briefing at the highest levels and an accomplished public speaker in demand, Hans is a leader and developer of multidisciplinary teams. Rick Wilson / Director / Enterprise Cyber Defense Rick Wilson has been instrumental in developing and deploying cyber defense programs throughout the nation. He was responsible for developing and deploying the DoD s first enterprise-wide cyber intrusion detection system. In 2009 and 2010 Rick was detailed to the Department of Homeland Security as the Technical Director for the National Cybersecurity Center where he developed and deployed the current national intrusion protection system. As Technical Director for the NSA Technical Counterintelligence Center he led a diverse team of analysts, technologists and investigators to identify and neutralize penetrations and compromises of NSA and national equities. He later became the NSA Director s Special Assistant for Cyber responsible for overseeing and representing NSA cyber programs and policies. Rick s accomplishments have been recognized with numerous national level awards and commendations. 5

Instructional Methods Case studies, PowerPoint presentations and group discussion will be used for in this event. Requirements for Successful Completion of Program Participants must sign in/out each day and be in attendance for the entirety of the course to be eligible for continuing education credit. iacet Credits has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, has demonstrated that it complies with the ANSI/IACET Standard which is recognized internationally as a standard of good practice. As a result of their Authorized Provider status, is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standard. is authorized by IACET to offer 0.6 CEUs for the course. EVENT LOCATION A room block has been reserved at the Sheraton Pentagon City Hotel, 900 S. Orme Street, Arlington, VA 22204, for the night of February 8-9 2015. Room rates are $109, plus applicable tax. Call 1-703-521-1900 for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is January 11, 2015, but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. PROCEEDINGS The proceedings of the course will be published, and one copy will be distributed to each registrant at the course. 6

REGISTRATION INFORMATION EVENT LOCATION Mail Directly To: Electric Utility Consultants, Inc. () 4601 DTC Blvd., Ste. 800 OR, scan and email to: conferences@euci.com please register the following Oil & Gas Cybersecurity Course : US $995 Early bird on or before January 30, 2015: US $895 A room block has been reserved at the Sheraton Pentagon City Hotel, 900 S. Orme Street, Arlington, VA 22204, for the night of February 8-9 2015. Room rates are $109, plus applicable tax. Call 1-703-521-1900 for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is January 11, 2015, but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. ENERG ZE WEEKLY s Energize Weekly e-mail newsletter compiles and reports on the latest news and trends in the energy industry. Newsletter recipients also receive a different, complimentary conference presentation every week on a relevant industry topic. The presentations are selected from a massive library of more than 1,000 current presentations that has gathered during its 26 years organizing conferences. Sign me up for Energize Weekly. How did you hear about this event? (direct e-mail, colleague, speaker(s), etc.) Print Name Job Title Company What name do you prefer on your name badge? Address City State/Province Zip/Postal Code Country Telephone Email List any dietary or accessibility needs here CREDIT CARD Name on Card Account Number Billing Address Billing City Billing State Billing Zip Code/Postal Code exp. Date Security Code (last 3 digits on the back of Visa and MC or 4 digits on front of AmEx) OR Enclosed is a check for $ to cover registrations. All cancellations received on or before January 9, 2015, will be subject to a US $195 processing fee. Written cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other event or publication. This credit will be good for six months. In case of event cancellation, s liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at 303-770-8800. reserves the right to alter this program without prior notice. 7