Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Enterprise cyber security
1. With the increasing number of regulations and threats As we navigate new and uncertain challenges in the digital
“
Researched & Organized by:
facing information assets the time to invest in this age, we must also address the growing threat cyberattacks
area has never been more critical. Especially when present to our transportation networks, electricity grid, financial
considering the cost of the breakdown of one critical systems and other assets and infrastructure.
infrastructure could top $230bn President Obama, 2011
”
ENTERPRISE CYBER SECURITY & save
INFORMATION ASSURANCE SUMMIT $400
register before
17th February
17-18 April, 2012, San Jose, California, USA
DEVELOP STRATEGIES TO UTILIZE PEOPLE,
PROCESS & TECHNOLOGY TO OPTIMIZE YOUR
GOVERNANCE, RISK & COMPLIANCE MANAGEMENT
PY
• Discover the emerging national and federal initiatives driving
Host Organization:
your industry forward and giving you the competitive edge
CO
• establish a clear governance policy to enhance awareness
through education generating confidence in the security of your
T
system
F
Expert Speakers
• learn to mitigate the risk through certification & prioritization to
End User Perspective
A
build resilience, improve response times and enhance system
robustness
D R
• Develop a clear process to efficiently manage the changing
regulatory landscape ensuring effective and efficient compliance
• builD a clear plan to navigate the rapidly evolving threat
landscape and guarantee the protection of your critical
information and operational assets
• realize how to certify the secure deployment of the latest
technologies to maximize the protection of your critical assets
and guarantee ROI
Government & Trade:
ExClUSIvE GAME-CHANGING INFORMATION
INCUlDING…
` Up-to-date case studies from key US industry end users including:Wells Fargo
& UTC
` Expert technical analysis on major industry challenges including integrated risk
management and ‘big data’ from BT Global & Verizon
` Case studies to build clear strategies for efficient and economic compliance Industry Insight From:
from Sempra & Enbridge
` Perspective from US government agencies including the FBI and NSTA on
initiatives to ensure the security and reliability of critical infrastructure
` Workshops and roundtables discussing the international threat and critical
infrastructure & key resource protection from GICSR industry ISACs
And many more…
For the latest speaker line up and agenda updates please visit:
www.cybersummits.com/enterprise
2. Welcome to the enterprise cyber security
& information assurance summit
Dear Reader, Enterprise Security Mangers –
In the past few years there have been land mark changes to the Protect Against Risk and Regulatory
Cyber Security industry; from the implementation of integrated
technology, to the game changing power of the countless publi- Violation
cized breaches and malware. This is all without mentioning the With the challenges and costs of securing the reliability of your
rapidly evolving regulatory and compliance landscape. infrastructure increasing rapidly it is essential to approach these complex
concerns with detailed planning. This focussed meeting will equip you with
To guarantee a secure and efficient enterprise system it is vital to consider the the foresight to economically ensure the resiliency of your assets.
three core disciplines of people, process and technology. The way to balance
these areas is through the concept of Governance, Risk & Compliance (GRC). ` Industry leading case studies on integrated risk management and
Enterprise GRC brings the matter of IT security to the board level, driving compliance solutions from Sempra & Enbridge
spending and investment in this sector. ` Federal and national initiatives driving change in standards and
` The GRC market is estimated to be worth over $32bn auditing
` By 2015 the US federal Cyber Security market will reach $15bn ` Government strategies to enhance resilience to cyber incidents and
manage the cyber threat including the FBI Infragard partnership
` The USA alone spends $14BN a year on IT-governance
Don’t get caught out the rapidly changing landscape and the cost of
The attacks of 2011 have taught us that the threat landscape is not just a breach. Discover clear proven strategies being implemented by your
evolving but rapidly mutating. This requires security managers to consider new information security peers by signing up today!
and creative techniques to detect, prevent and prepare for a breach scenario.
With the cost of the breakdown of one critical infrastructure topping $230bn
PY
and added complexity coming from the increasing number of regulations and Solution Providers – Cyber Security
the frequent dynamic changes this area is growing rapidly. Activity is on the Rise…
CO
No one wants to be the weak link in global infrastructure or have their As integrated and mobile devices become ubiquitous it is vital that the
reputation tarnished by a breach event but maintaining security and technology securing key information assets evolve with this. With the
compliance in a rapidly evolving industry is costly, time consuming and likely hood of a Pearl Harbor-scale intrusion in 2012 increasing military
information security spending by 50% to $9bn - the potential for huge
T
technically challenging. It is now more vital than ever for public and private
partnerships to rethink security strategies to minimize risk, maximize resiliency contracts has never been greater!
F
and ensure business continuity.
At this ground breaking ground breaking industry event you will hear…
A
The Enterprise Cyber Security & Information Assurance Summit will supply your • National risk management and security initiatives from international
trend setters including BT & Wells Fargo
R
business with:
• Enterprise end user need for industry wide co-operation and
D
The critical intelligence and tools you need to build a cost effective, time
standardization outlined by FBI and ISA
efficient cyber security strategy • Federal and national plans for regulations and enhancing security
Key lessons and tried and tested action plans to mitigate risk and save
Jon the premier Cyber Security forum to receive market forecast and insight
millions of USD in compliance and reliability into government lead industry drivers to accurately plan your business for
2012 and beyond.
The insight and connection you need to secure your place in this booming
industry We’ll put you in front of industry leading buyers from across North America
to fill your order books in 2 days!
The Enterprise Cyber Security & Information Assurance Summit will bring
together 150 cyber security subject matter and industry experts for two days of
business critical strategy, unrivalled networking and stimulating discussion. What We Are Going To Do for You…
I look forward to meeting you in San Jose in April. Practical real world strategies and sharing best practice are at the forefront
of the Enterprise Cyber Security & Information Assurance Summit.
We are committed to ensuring you go away with new contacts and the
most up-to-date information. Most importantly you will leave knowing your
Natasha Sheel Tel: +44 (0) 207 375 7537 business is going to move forward
Senior Industry Analyst Email: nsheel@FCBusinessIntelligence.com
www.cybersummits.com/enterprise ` REALIZE initiatives to ensure the security and reliability of critical
FC Business Intelligence
infrastructure
` ASCERTAIN how to ensure cost effective and efficient security and
“GICSR is proud to be collaborating with FC Business Intelligence on this compliance maintenance
project bringing together key senior level IT Security personnel to tackle the
key challenges facing North American critical enterprises. ` UNDERSTAND the persistent and evolving threats and how to
securely integrate new technology
The Enterprise Cyber Security & Information Assurance Summit will help ` LISTEN to case studies from leading end users and government
you to: bodies for how to successfully merge people, process & technology
` Develop strategies to utilize people, process & technology to ensure the reliability of your assets
` Optimizing your governance, risk & compliance management ` DISCOVER the innovative methods developed by global industry
leaders to enhance system robustness and resiliency
With the increasing number of regulations and threats facing information
register today today -www.cybersummits.com/enterprise or phone +44207375 7537
Register - visit visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459
assets the time to invest in this area has never been more critical especially
when considering the cost of the breakdown of one critical infrastructure
could top $230bn.” Richard Zaluski, Executive VP – International,
3. expert speakers at this year’s meeting include:
KEYNOTE SPEAKERS GOVERNMENT & TRADE BODIES:
Jay Bavisi,
President & CEO, Deborah Kobza, Executive Director / CEO,
EC Council Gicsr & nh-isac
John Chesson, Richard Zaluski, Executive Vice President -
Special Agent, International, Gicsr
FBI
Rob Duiven Larry Clifton, CEO / President,
Programme Director, National internet security alliance
PHOTO
Cyber Security Strategy,
Ministry of Security and (RET) General Mick Kicklighter, Director,
Department of cip & hs, George Mason
university
Steve Haynes, Director - Cyber Security &
END USER PERSPECTIVE information Assurance, Whitehouse national
security telecommunications advisory
Munillal Chatarpal, committee
Manager - Risk Management & Security,
PY
enbridge energy INDUSTRY EXPERTS INCLUDING:
Ola Lawal, Corporate Security Officer,
CO
enbridge energy Peter Allor, Senior Security Strategist, Cyber
Incident & Vulnerability Handling, ibM
Alexander Kunz,
T
Security Governance Manager, sempra Gene Fredriksen,
F
Global CISO,
Ken Baylor, VP / CISO of Security & Antifraud, tYco
A
Wells Fargo Ernie Rakaczky,
Principal Security Architect,
R
TBA, Director – Governance, Risk, invensys
D
Compliance, bt Global William Hagestad II,
Lieutenant Colonel US Marine Corps (RET), Chief
Catherine Lester, Solutions Architect, verizon Cyber Security Strategist, red-Dragon rising
Marci McCarthy, President CEO,
TBA, Director, raytheon tech exec networks
Our expert speaker line up will be discussing the issues critical to you. The
Christopher Leigh, Global IT Compliance &
FBI Computer Intrusion & Counter Intelligence along with IBM who will be
Risk Officer, utc
discussing the need for building a long term incident response plan.
David Gavilan, Executive Director & Assistant
General Counsel, Turnover to see the extensive agenda, established techniques and
Jp Morgan chase forward looking strategies our internationally renowned speakers will
be presenting and sharing at this premier industry meeting...
Conference at a glance
MORNING AFTERNOON EXTRAS
• Red Dragon Rising Workshop:
• Industry Drivers: latest on Whitehouse, • Mitigating the risk and Managing International cyber
Day 1 DoD and DHS initiatives understanding the threat Threat
April 17th • Looking at the standards and • Building incident response • CISO roundtable
their evolution to managing your plans and SIEM • Networking drinks reception
governance & compliance strategy
• Critical Infrastructure and Key
Day 2 • Maximizing security through merging • Managing regulation through Resource Protection workshop
April 18th people, process & technology integrated risk solutions • Red Dragon Rising Workshop:
• Ensuring an educated & aware • Breach scenario event Managing Chinese cyber Threat
workforce
register today - visit www.cybersummits.com//enterprise or phone +44 (0) 207 375 7537
4. November 8th - 9th, Movenpick, Amsterdam, Netherlands
Session 1: Industry Drivers Session 2: Managing the Threat Session 3: Mitigating the risk
Guide to EU and National Policies and Case Study: Defending the Triad - Energy and Building Multi-layer Security
Initiatives Critical Infrastructure • Discover how to effectively and dynamically
• Hear first the legislation and standards • Learn how energy infrastructure is a key part of prioritize between availability, integrity and
associated with the roll out of smart grid any national defensive cyber-security posture to confidentiality maximizing the efficiency of your
technology ensuring your knowledge is up-to- ensure effective protection operations
date • Discover a national security prospective to • Develop proven and effective strategies of
• Realize the true requirement for security as countering cyber-spies from National Cyber- protection merging IT and physical techniques to
intelligent and integrated technology becomes Entities compromising the electricity grid to enhance your system security
a reality allowing you stand out in a competitive ensure the security • Learn techniques to monitor what is happening
industry • Understand the cyber-threats and impact of an both inside and outside the office to mitigate risk
• Learn how to securely integrate smart technology attack to the Energy Critical Infrastructure so you • Master the art of educating personnel in how
throughout the industry to enhance your can be confident in your preparation to protect their industry ensuring security and
productivity and reliability • Expert lead case studies of past cyber-events to efficiency
• Discover the true potential for integrated the power infrastructure including the Aurora and Ernie Hayden, Managing Principal, Global Energy
operations to ensure the security of Europe’s Stuxnet vulnerabilities defining comprehensive and Utility Vertical, Verizon
energy future security precautions for the energy sector
Evangelos Ouzonis, Senior Expert, Network Richard Zaluski, Executive Vice President, Case Study: Shell and WurldTECH's
Security Policy, ENISA International, GICSR collaboration in Infrastructure Security
• Understand the scope of additional connectivity
Panel Session: Certifying Vendor Security and Panel Session: Vulnerability and Impact and the associated risks to maximise your
Utility Operations Analysis security
• Look the at co-operative efforts to establish • Learn how to utilize penetration testing and • Learn methods to protect against malware and
PY
testing and certification of vendor technology to look at realistic attack scenarios to study the social engineering targeting sensitive business
guarantee you work with trusted providers consequences and impacts identifying the information that you can implement
• Explore the development of cross-industry vulnerabilities so you can protect your system • Discover proven real world steps to secure
CO
partnerships to establish standards that will • Analyze your systems to identify high risk critical information infrastructure so you can be
produce results high impact areas to efficiently focus your confident in the strength of your system
• Discuss the logistics of ensuring that technology resources to enhance your resiliency and system • Gain an up-to-the minute understanding of where
and equipment are utilized securely through robustness the security needs, threats and solutions are
T
certifying the operators of critical infrastructure • Establish the best way to ascertain what is heading ensuring you stay competitive
F
ensuring overall system robustness connected guaranteeing the safe migration from Expert, Cyber Security Lead, Shell
• Uncover the need to verify the organizational an isolated system
Tyler Williams, President, WurldTECH
A
processes and internal security of the end user to • Understanding the scope of additional
improve resilience and drive enhanced security connectivity and the associated risks building Access Control
R
Moderator: Tyler Williams, President, WurldTECH comprehensive security precautions
• Discover real world techniques to authenticate
D
Moderator: David Spinks, Chairman, CSIRS users giving you confidence in the security of
End Users: Cyber Security Lead,
Shell, WIB members Vendor: Peter Wood, CEO, your system
First Base Technologies • learn proven methods to manage who has
Case Study: The Efforts of EuroSCSIE in authorization and access allowing you to
Standards and Guidelines Case Study: Establishing emergency response maximize the protection of your system
• An expert lead look at the standards and plans and CERT • Discover strategies to identify the individuals
guidelines available to boost your understanding • Understand the threats. vulnerabilities and being granted access to your system to
• Learn which standards are compatible and use consequences of a breach so you can build a strengthen your defenses
these to build an effective security program clear action plan • Hear a step by step guide to enforce user
• Hear about the efforts to build international • Establish a compute emergency response so accountability to enhance your security
industry-wide best practice guidelines and there is a clear action plan for system failures
requirements placing you ahead of the ensuring you are back on-line as quickly as
competition possible
• Discover the European wide efforts to increase • Learn how to improve your resiliency and GET THE MOST OUT OF THE
awareness through sharing and exchanging recovery to minimize your downtime if the system
information to build proven strategies fails CONFERENCE
• Discover the operational benefits of cyber
Annemarie Zielstra, Director, Attend one of our exclusive workshops
EuroSCSIE / CPNI.NL security and system robustness maximizing
productivity CSIRS and RUSI Closed Door Meeting:
Dimitrios Serpanos, Director, ISI Confidential discussion of the threats you are
facing, the steps being utilized to protect your
organization and guides to building response
plans to enhance overall system robustness
Red Dragon Rising Workshop: Expert lead
session covering the motivations for govern-
ment and commercially sponsored cyber-
attacks. Take away a clear step by step guide
3 SIMPlE STEPS TO REGISTER do this before August 19th to save $400 for you to implement in your organization
maximizing your resilience
Email nsheel@FCBusinessIntelligence.com with BOOKME in the subject line
Call me now on +44 207 375 7537 Visit www.cybersummits.com/EU to find
out more
Or register on line at: https://secure.eyeforenergy.com/cyber/register.shtml
register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
5. November 8th - 9th, Movenpick, Amsterdam, Netherlands
Session 4: People and Policy Session 5: Operational and Information Session 6: Securing Process
National Cyber Security Strategy: 'Success Technology Control Systems
through cooperation' Security Challenges for Information Technology The connection of SCADA and Corporate
• Discuss methods to secure the ICT infrastructure controlling Energy Systems networks
critical to ensure the strength of the national and • Realize the challenges to uniting the two different • Hear real world procedures for how SCADA and
European society and economy worlds to determine how to bridge the gap business networks can co-exist ensuring SCADA
• Hear plans for necessary cooperation between improving education and communication systems are compliant with business network
existing parties (public & private) in the digital • Uncover the requirements for smart security security requirements guaranteeing the security
society at an international level across the energy chain from smart appliances, of your system
• Discover methods to build security through grid and market operators building action plans • Learn clear strategies to manage SCADA system
Linking and reinforcing initiatives and that drive results inventory in and outside the industrial IT network
encouraging individual responsibility ensuring • Learn why someone may consider disrupting the allowing you to confident in the strength of your
you have the response capacity to withstand ICT energy chain and your operations guaranteeing system
disruptions and cyber attacks the protection of your system • Discover proven strategies to secure the
• Learn how establishing the Cyber Security Board • Hear plans for pathway to avoid security connections between process control and office
and National Cyber Security Centre will use becoming a show stopper for new energy IT networks that will produce results
to self-regulation, legislation and if necessary systems ensuring you stay productive and • Understand the types of firewalls available for
regulations increase the resilience of Critical profitable segregating the SCADA and corporate networks
Infrastructure maximizing the productivity of your systems
Eric Luiijf, C(I)IP Consultant, TNO / CPNI.NL
Rob Duiven, Programme Director, National Cyber Gitte Bergknut, MU Nordic Information Security
Security Strategy, Case Study: Alliander’s work in Uniting Process Manager, E.ON Sverige AB
Ministry of Security and Justice and IT Security
• Learn how to unite process control and ICT Case Study: Elia’s effort to integrate cyber
PY
Case Study: CPNI and Dutch Government Policy security in the migration from SDH to IP/MPLS
security in advance of implementing smart grid
and Training Initiatives infrastructure saving time frustration and money network
• Discover how public – private partnerships can • Hear proven strategies to secure the • Uncover tested strategies to overcome the
CO
be used to make your critical infrastructure more intersections of transmission, distribution and technical and organizational challenges of the
resilient generation which you can put to use immediately migration from SDH to IP/MPLS allowing you to
• Learn tested techniques to educate, raise • Discover how to successfully apply the expertise stay competitive
awareness and manage the latest technologies within IT to the operations problem turning
T
• Discuss the need for a the implementation of
and challenges from the Cybercrime Information wasted hours to productive ones a layered security solution to guarantee the
F
Exchange increasing your operational robustness
• Realize the need for co-ordination and efficiency of your operations
• Discover the process control and smart grid road collaboration across Europe to help you stay • Listen to the evolving business needs required
A
map outlining a step by step guide to guarantee competitive to handle the migration to a securely connected
security
Johan Rambi, Privacy and Security Officer, system giving you the edge
R
• Gain the latest insight into the planned Alliander • Hear real world methods to allow IT practices
Netherlands and European cyber technology
D
and operational engineering to harmonize helping
and training facility and learn how this fits into Building Security in Design drive your productivity
the Dutch NCSS and EU-US initiatives on cyber- • Learn how to plan long term security into the
security letting you gain the edge in a tough Kris Hallaert, IT Security Officer, Elia
purchasing and deployment process to saving
industry you time and money Viking Panel Session: Vital Infrastructure,
Auke Huistra, Project Manager Cybercrime • Discover methods to factor in the difference in NetworKs, INformation and Control System
Information Exchange, CPNI.NL life span and the realistic costs of upgrades to ManaGement
Rob Duiven, Programme Director, National Cyber legacy systems ensuring you stay profitable
• Expert lead guide to the vulnerabilities of SCADA
Security Strategy, • Hear real world strategies to build high systems and the cost of cyber-attacks on society
Ministry of Security and Justice security low latency solutions maximizing your resulting from different architecture solutions
productivity saving you time and money
People and Process • Develop proven methods to maintain security • Hear the tried and tested strategies and
• Realize that technology is necessary for security through patching, anti-virus and firewalls technologies used to mitigate and protect against
but people and process are of equal or greater guaranteeing the security of your system weaknesses
importance to guarantee complete security
• Discover the existing and innovative
• Understand that addressing people, process and communication solutions you can utilize to
technology together will give a greater chance of secure you power system
maintaining and protecting the integrity of your IP GROUP DISCOUNTS • Learn how employing simulations, modeling and
networks
More heads are better than one! Maximise testing to ensure the solutions you implement on
• Learn how to guarantee personnel (and families) your legacy system drive reliability and security
are fully educated, professional and competent the benefits to your business, and ensure
valuable lessons make it back to the office, Gunnar Bjoerkman, Project Co-ordinator, Viking
through utilizing governance and policy to build
by sending a team to this event.
awareness
• Hear strategies to train security and network Qualify for a group discount?
personnel to keep a vigilant eye on the traffic Contact nsheel@FCBusinessIntelligence.
patterns to discern the precursor anomalies to com or call on +44 (0) 207 375 7537
new and different levels of attack ensuring you
are prepared Register before August 19th to save $400
John Basset, Assosciate, RUSI You can do this in 3 easy steps:
Reply to this email with BOOKME in the
subject line
Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459 7537
register today - visit www.cybersummits.com/enterprise or phone +44207375
6. look at who you could be networking with in 2011
The Enterprise Cyber Security & Information Assurance Summit provides
outstanding networking opportunities for anyone involved with eGRC strategies The types of Organization this conference is
to secure Critical Infrastructure. This is the premier cyber security meeting – aimed at attracting:
attracting 150+ security & industry stakeholders. If security or compliance are
part of you job role – you simply can’t afford to miss out!
We will be providing: Government Agencies and Trade Associations
` Dedicated networking time across the conference
Department of Defence DHS CERT
` Fully interactive panel sessions for you to identify yourself to the entire GICSR ISACA ISA
delegate audience as a topic expert NICE NSA
FBI NIST
` Dedicated workshops, discussion groups, coffee breaks, lunches and
evening drinks for you to target key clients
You could have more face to face conversations at this conference than in INDUSTRY END USERS
a year. Leading industry end users will be attending this conference to meet
solution providers offering new technologies and strategies to reduce the cost ATT Paypal Northrop Grumman
and time of ensuring security and compliance. Sign up today and fill your order Verizon Bank of America Boeing
book! T Systems Well Fargo Lockheed Martin
BT Global PGE SAIC
VISA SCE
Take a look at the job titles this Ebay Sempra
conference will attract: JP Morgan Chase Raytheon
PY
Managing Directors Senior/Chief Security Officers Specialist Solution Providers
Presidents Compliance Specialist
Chief Executives Cyber Security Architect
CO
RSA SAP McAfee
Chief Security Officer (CSO) Security Lead.
Symantec Microsoft Tyco
Chief Information Security Officer Senior Security Consultant
HP CISCO
(CISO) Director, Network Security Practice
Chief Information Officer (CIO) Security Lead / Co-ordinator
T
Chief Technology officer (CTO) Director of Communications and
Break Down of Audience at Previous FC Cyber Summits
F
Senior security leads/Engineers Information System Security
Cyber Security Managers Chief Technologist
A
Reliability Managers Senior Security Analyst
Director of Compliance Director / VP / Manager of Risk
R
Technical Directors Director / VP / Manager Audit
Operational Security Director / VP / Manager Compliance
D
IT Security Director / VP / Manager Information
Standards Managers Security
Senior Information Protection Analyst Risk & compliance manager
Enterprise information Corporate information
Security Principle
Key Sponsorship and Exhibition Benefits Make a list of your most Work out your budget
important aims Speak with your marketing team
• This is the only Enterprise Cyber Security & Information
• Exhibition booth and decide your annual confer-
Assurance Summit with industry support covering the whole
of North America – meet over a 150 key industry colleagues in • Brand visibility ence investment – make sure
2days of intense business development. you assign the right budget to
• Private meetings
the right show. No matter what
• This is the exhibition that project managers and key decision • Breakfast briefings your budget is we will work
makers will attend to source the latest services and technologies.
• Speaking slots with you to build a package
Don’t get left behind by your competitors!
that achieves your aims and
• Conference material branding
• Build your own cyber security brand through high level exposure exceeds expectations.
on all our conference marketing, • Sponsor a session
on site and in person to fill your
sales book for 2012 and beyond Call me at EyeforEnergy to discuss your package now!
Coffee 1
• Unlike many other industry Exhibition space regularly sells out weeks in advance.
2
trade shows, exhibitions and
Conference Room 5 Don’t miss out – secure your place today!
conferences our packages are 6
3
not “one size fits all”. Tell us 4 CAll NOW
7
what you want to get out of the Coffee Ieuan Phillips
event, what your budget is and 8
we will build it for you …simple!
iphillips@fcbusinessintelligence.com
+44 207 375 4304
register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
7. Researched & Organized by:
I have been impressed with the level of understanding and research undertaken by the organisers, the quality of speakers will
“ surely make this an event no one will want to miss David Spinks, CSIRS
”
ENTERPRISE CYBER SECURITY & INFORMATION
ASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA
save
$400
4 Reasons why your company needs you here... register before
1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they 17th February
are putting in place and what solutions are leading the way in cyber security
2. Gain invaluable knowledge and insight into cost and time effective compliance, security and Date & Venue
strategies to ensure the successful integration of new technology November 17th - 18th, 2012
Hyatt Place, San Jose, CA, USA
3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas,
strategies and contacts that ensure your business leads the way when it comes to cyber security and Hotel Discount
smart grid deployment FC Business Intelligence has negotiated a
discounted rate for all conference attendees.
4. Save your department time and money by attending this one stop shop for all things regarding cyber SImily quote the name of the conference
security; give your company the chance to make 2012 the most profitable year ever! when booking your accommodation
REGISTER NOW IN 3 EASY STEPS
PY
1. Select Your Registration Package
Pass Features PLATINUM PASS GOLD PASS POST CONFERENCE MATERIALS
CO
` Full access to conference, workshops and exhibition
T
` Full access to all lunches, breaks
F
` Full access to all networking events
R A
` Full Post Conference Materials including audio recordings,
PDF presentation files and digital attendee list
D
Super Early Bird Price - Before 17th Februrary $1795 $1595
Early Bird Price - Before 16th March $1995 $1795 $495
Full price $2195 $1995
DIScOunT cODE:
2. Enter Attendee details
Mr/Mrs/Ms/Dr: First name: Last name: ONLINE100
Company: Position/Title: Enter the discount code when
you register to save $100
Telephone: Fax: Email:
Address: Zipcode: Country:
3. Payment Options
I enclose a check/draft for: Credit card number:
(Payable to First Conferences Ltd) Expiry date: Security number:
Please invoice my company: Name on card:
Purchase Order Number: Please
charge my credit card: Amex Visa Mastercard Signature:
Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before Feb
17th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to MORE CALL CALL (0) 207 375 7537
charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged
FAX: +44 (0) 207 375 7576
to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are WAYS TO
exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and EMAIL: nsheel@eyeforenergy.com
the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct REGISTER
at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. ONLINE: www.cybersummits.com/enterprise
Design by www.thecreativetree.co.uk
8. With the increasing number of regulations and threats As we navigate new and uncertain challenges in the digital
“
Researched & Organized by:
facing information assets the time to invest in this age, we must also address the growing threat cyberattacks
area has never been more critical. Especially when present to our transportation networks, electricity grid, financial
considering the cost of the breakdown of one critical systems and other assets and infrastructure.
infrastructure could top $230bn President Obama, 2011
”
ENTERPRISE CYBER SECURITY & save
INFORMATION ASSURANCE SUMMIT $400
register before
17-18 April, 2012, San Jose, California, USA 17th February
DEVELOP STRATEGIES TO UTILIZE PEOPLE,
PROCESS & TECHNOLOGY TO OPTIMIZE YOUR
GOVERNANCE, RISK & COMPLIANCE MANAGEMENT
PY
• Discover the emerging national and federal initiatives driving
Host Organization:
your industry forward and giving you the competitive edge
CO
• establish a clear governance policy to enhance awareness
through education generating confidence in the security of your
T
system
F
Expert Speakers
• learn to mitigate the risk through certification & prioritization to
End User Perspective
A
build resilience, improve response times and enhance system
robustness
D R
• Develop a clear process to efficiently manage the changing
regulatory landscape ensuring effective and efficient compliance
• builD a clear plan to navigate the rapidly evolving threat
landscape and guarantee the protection of your critical
information and operational assets
• realize how to certify the secure deployment of the latest
technologies to maximize the protection of your critical assets
and guarantee ROI
Government & Trade:
ExClUSIvE Case Studies from:
` SEMPRA ` BT Global ` JP Morgan Chase
` ENBRIDGE ` Wells Fargo ` UTC
` Raytheon ` Verizon ` FBI
Industry Insight From:
CALL CALL (0) 207 375 7537
4 EASY WAYS FAX: +44 (0) 207 375 7576
TO REGISTER EMAIL: nsheel@eyeforenergy.com
ONLINE: www.cybersummits.com/enterprise
And many more…
Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information sharing and Business
Development at the Premier Industry Gathering: www.cybersummits.com/enterprise