SlideShare a Scribd company logo
1 of 8
Download to read offline
With	the	increasing	number	of	regulations	and	threats	      As	we	navigate	new	and	uncertain	challenges	in	the	digital	

                                                                                            “
  Researched & Organized by:
                                   facing	information	assets	the	time	to	invest	in	this	    age,	we	must	also	address	the	growing	threat	cyberattacks	
                                   area	has	never	been	more	critical.	Especially	when	      present	to	our	transportation	networks,	electricity	grid,	financial	
                                   considering	the	cost	of	the	breakdown	of	one	critical	   systems	and	other	assets	and	infrastructure.
                                   infrastructure	could	top	$230bn	                         President Obama, 2011
                                                                                                                                            ”
ENTERPRISE CYBER SECURITY &                                                                                                                save
INFORMATION ASSURANCE SUMMIT                                                                                                               $400
                                                                                                                                          register before
                                                                                                                                           17th February
17-18 April, 2012, San Jose, California, USA

DEVELOP STRATEGIES TO UTILIZE PEOPLE,
PROCESS & TECHNOLOGY TO OPTIMIZE YOUR
GOVERNANCE, RISK & COMPLIANCE MANAGEMENT



                                                                                               PY
•	 Discover the	emerging	national	and	federal	initiatives	driving	
                                                                                                                     Host Organization:
   your	industry	forward	and	giving	you	the	competitive	edge




                                                                                            CO
•	 establish	a	clear	governance	policy	to	enhance	awareness	
   through	education	generating	confidence	in	the	security	of	your	




                                                                           T
   system




                                                                         F
                                                                                                                     Expert Speakers
•	 learn	to	mitigate	the	risk	through	certification	&	prioritization	to	
                                                                                                                   End User Perspective




                                                        A
   build	resilience,	improve	response	times	and	enhance	system	
   robustness




                                               D      R
•	 Develop	a	clear	process	to	efficiently	manage	the	changing	
   regulatory	landscape	ensuring	effective	and	efficient	compliance
•	 builD	a	clear	plan	to	navigate	the	rapidly	evolving	threat	
   landscape	and	guarantee	the	protection	of	your	critical	
   information	and	operational	assets	
•	 realize	how	to	certify	the	secure	deployment	of	the	latest	
   technologies	to		maximize	the	protection	of	your	critical	assets	
   and	guarantee	ROI
                                                                                                                   Government & Trade:
  ExClUSIvE GAME-CHANGING INFORMATION
  INCUlDING…
  ` Up-to-date case studies from key US industry end users including:Wells Fargo
    & UTC
  ` Expert technical analysis on major industry challenges including integrated risk
    management and ‘big data’ from BT Global & Verizon
  ` Case studies to build clear strategies for efficient and economic compliance                                   Industry Insight From:
    from Sempra & Enbridge
  ` Perspective from US government agencies including the FBI and NSTA on
    initiatives to ensure the security and reliability of critical infrastructure
  ` Workshops and roundtables discussing the international threat and critical
    infrastructure & key resource protection from GICSR industry ISACs
                                                                                                                                          And many more…

                               For the latest speaker line up and agenda updates please visit:
                                         www.cybersummits.com/enterprise
Welcome to the enterprise cyber security
& information assurance summit
Dear Reader,                                                                         Enterprise Security Mangers –
In the past few years there have been land mark changes to the                       Protect Against Risk and Regulatory
  Cyber Security industry; from the implementation of integrated
  technology, to the game changing power of the countless publi-                     Violation
  cized breaches and malware. This is all without mentioning the                     With	the	challenges	and	costs	of	securing	the	reliability	of	your	
  rapidly evolving regulatory and compliance landscape.                              infrastructure	increasing	rapidly	it	is	essential	to	approach	these	complex	
                                                                                     concerns	with	detailed	planning.	This	focussed	meeting	will	equip	you	with	
To	guarantee	a	secure	and	efficient	enterprise	system	it	is	vital	to	consider	the	   the	foresight	to	economically	ensure	the	resiliency	of	your	assets.	
three	core	disciplines	of	people,	process	and	technology.	The	way	to	balance	
these	areas	is	through	the	concept	of	Governance,	Risk	&	Compliance	(GRC).	          ` Industry leading case studies on integrated risk management and
Enterprise	GRC	brings	the	matter	of	IT	security	to	the	board	level,	driving	           compliance solutions from Sempra & Enbridge
spending	and	investment	in	this	sector.	                                             ` Federal and national initiatives driving change in standards and
` The GRC market is estimated to be worth over $32bn                                   auditing

` By 2015 the US federal Cyber Security market will reach $15bn                      ` Government strategies to enhance resilience to cyber incidents and
                                                                                       manage the cyber threat including the FBI Infragard partnership
` The USA alone spends $14BN a year on IT-governance
                                                                                     Don’t	get	caught	out	the	rapidly	changing	landscape	and	the	cost	of	
The	attacks	of	2011	have	taught	us	that	the	threat	landscape	is	not	just	            a	breach.	Discover	clear	proven	strategies	being	implemented	by	your	
evolving	but	rapidly	mutating.	This	requires	security	managers	to	consider	new	      information	security	peers	by	signing	up	today!
and	creative	techniques	to	detect,	prevent	and	prepare	for	a	breach	scenario.	
With	the	cost	of	the	breakdown	of	one	critical	infrastructure	topping	$230bn	




                                                                                              PY
and	added	complexity	coming	from	the	increasing	number	of	regulations	and	           Solution Providers – Cyber Security
the	frequent	dynamic	changes	this	area	is	growing	rapidly.                           Activity is on the Rise…




                                                                                           CO
No	one	wants	to	be	the	weak	link	in	global	infrastructure	or	have	their	             As	integrated	and	mobile	devices	become	ubiquitous	it	is	vital	that	the	
reputation	tarnished	by	a	breach	event	but	maintaining	security	and	                 technology	securing	key	information	assets	evolve	with	this.	With	the	
compliance	in	a	rapidly	evolving	industry	is	costly, time consuming and              likely	hood	of	a	Pearl	Harbor-scale	intrusion	in	2012	increasing	military	
                                                                                     information	security	spending	by	50%	to	$9bn	-	the	potential	for	huge	




                                                                            T
technically challenging.	It	is	now	more	vital	than	ever	for	public	and	private	
partnerships	to	rethink	security	strategies	to	minimize	risk,	maximize	resiliency	   contracts	has	never	been	greater!	




                                                                          F
and	ensure	business	continuity.
                                                                                     At	this	ground	breaking	ground	breaking	industry	event	you	will	hear…




                                                         A
The	Enterprise	Cyber	Security	&	Information	Assurance	Summit	will	supply	your	       •	 National risk management and security initiatives from international
                                                                                        trend setters including BT & Wells Fargo




                                                       R
business	with:
                                                                                     •	 Enterprise end user need for industry wide co-operation and




                                               D
	The	critical	intelligence	and	tools	you	need	to	build	a	cost	effective,	time	
 	                                                                                      standardization outlined by FBI and ISA
 efficient	cyber	security	strategy		                                                 •	 Federal and national plans for regulations and enhancing security

	Key	lessons	and	tried	and	tested	action	plans	to	mitigate	risk	and	save
 	                                                                                   Jon	the	premier	Cyber	Security	forum	to	receive	market	forecast	and	insight	
 millions of USD	in	compliance	and	reliability                                       into	government	lead	industry	drivers	to	accurately	plan	your	business	for	
                                                                                     2012	and	beyond.
	The	insight	and	connection	you	need	to	secure	your	place	in	this	booming	
 	
 industry                                                                            We’ll	put	you	in	front	of	industry	leading	buyers	from	across	North	America	
                                                                                     to	fill your order books in 2 days!
The	Enterprise	Cyber	Security	&	Information	Assurance	Summit	will	bring	
together	150	cyber	security	subject	matter	and	industry	experts	for	two	days	of	
business	critical	strategy,	unrivalled	networking	and	stimulating	discussion.		      What We Are Going To Do for You…

I	look	forward	to	meeting	you	in	San	Jose	in	April.                                  Practical	real	world	strategies	and	sharing	best	practice	are	at	the	forefront	
                                                                                     of	the	Enterprise Cyber Security & Information Assurance Summit.	
                                                                                     We	are	committed	to	ensuring	you	go	away	with	new	contacts	and	the	
                                                                                     most	up-to-date	information.	Most	importantly	you	will	leave	knowing	your	
Natasha Sheel	                    Tel:	+44	(0)	207	375	7537	                         business	is	going	to	move	forward
Senior	Industry	Analyst	          Email:	nsheel@FCBusinessIntelligence.com	
                                  www.cybersummits.com/enterprise                    ` REALIZE initiatives to ensure the security and reliability of critical
FC Business Intelligence
                                                                                       infrastructure
                                                                                     ` ASCERTAIN how to ensure cost effective and efficient security and
 “GICSR	is	proud	to	be	collaborating	with	FC	Business	Intelligence	on	this	            compliance maintenance
 project	bringing	together	key	senior	level	IT	Security	personnel	to	tackle	the	
 key	challenges	facing	North	American	critical	enterprises.	                         ` UNDERSTAND the persistent and evolving threats and how to
                                                                                       securely integrate new technology
 The	Enterprise	Cyber	Security	&	Information	Assurance	Summit	will	help	             ` LISTEN to case studies from leading end users and government
 you	to:                                                                               bodies for how to successfully merge people, process & technology
 ` Develop strategies to utilize people, process & technology                          to ensure the reliability of your assets
 ` Optimizing your governance, risk & compliance management                          ` DISCOVER the innovative methods developed by global industry
                                                                                       leaders to enhance system robustness and resiliency
 With	the	increasing	number	of	regulations	and	threats	facing	information	

          register today today -www.cybersummits.com/enterprise or phone +44207375 7537
                 Register - visit visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459
 assets	the	time	to	invest	in	this	area	has	never	been	more	critical	especially	
 when	considering	the	cost	of	the	breakdown	of	one	critical	infrastructure	
 could	top	$230bn.”		Richard Zaluski, Executive VP – International,
expert speakers at this year’s meeting include:

KEYNOTE SPEAKERS                                                         GOVERNMENT & TRADE BODIES:
                           Jay Bavisi,
                           President & CEO,                                                        Deborah Kobza, Executive Director / CEO,
                           EC Council                                                              Gicsr & nh-isac


                           John Chesson,                                                           Richard Zaluski, Executive Vice President -
                           Special Agent,                                                          International, Gicsr
                           FBI
                           Rob Duiven                                                              Larry Clifton, CEO / President,
                           Programme Director, National                                            internet security alliance
 PHOTO
                           Cyber Security Strategy,
                           Ministry of Security and                                                (RET) General Mick Kicklighter, Director,
                                                                                                   Department of cip & hs, George Mason
                                                                                                   university
                                                                                                   Steve Haynes, Director - Cyber Security &
END USER PERSPECTIVE                                                                               information Assurance, Whitehouse national
                                                                                                   security telecommunications advisory
                  Munillal Chatarpal,                                                              committee
                  Manager - Risk Management & Security,




                                                                                    PY
                  enbridge energy                                        INDUSTRY EXPERTS INCLUDING:
                  Ola Lawal, Corporate Security Officer,




                                                                                 CO
                  enbridge energy                                                                  Peter Allor, Senior Security Strategist, Cyber
                                                                                                   Incident & Vulnerability Handling, ibM
                  Alexander Kunz,




                                                                    T
                  Security Governance Manager, sempra                                              Gene Fredriksen,




                                                                  F
                                                                                                   Global CISO,
                  Ken Baylor, VP / CISO of Security & Antifraud,                                   tYco




                                                A
                  Wells Fargo                                                                      Ernie Rakaczky,
                                                                                                   Principal Security Architect,




                                              R
                  TBA, Director – Governance, Risk,                                                invensys




                                      D
                  Compliance, bt Global                                                            William Hagestad II,
                                                                                                   Lieutenant Colonel US Marine Corps (RET), Chief
                  Catherine Lester, Solutions Architect, verizon                                   Cyber Security Strategist, red-Dragon rising

                                                                                                   Marci McCarthy, President CEO,
                  TBA, Director, raytheon                                                          tech exec networks

                                                                         Our	expert	speaker	line	up	will	be	discussing	the	issues	critical	to	you.	The	
                  Christopher Leigh, Global IT Compliance &
                                                                         FBI	Computer	Intrusion	&	Counter	Intelligence	along	with	IBM	who	will	be	
                  Risk Officer, utc
                                                                         discussing	the	need	for	building	a	long	term	incident	response	plan.
                  David Gavilan, Executive Director & Assistant
                  General Counsel,                                       Turnover to see the extensive agenda, established techniques and
                  Jp Morgan chase                                        forward looking strategies our internationally renowned speakers will
                                                                         be presenting and sharing at this premier industry meeting...


   Conference at a glance
                                     MORNING                                 AFTERNOON                                      EXTRAS

                                                                                                             •	Red	Dragon	Rising	Workshop:	
                     •	Industry	Drivers:	latest	on	Whitehouse,	   •	Mitigating	the	risk	and		                  Managing	International	cyber		
         Day 1         DoD	and	DHS	initiatives                      understanding	the	threat                   Threat
     April 17th      •	Looking	at	the	standards	and	              •	Building	incident	response		             •	CISO	roundtable
                       their	evolution	to	managing	your	            plans	and	SIEM                           •	Networking	drinks	reception
                       governance	&	compliance	strategy

                                                                                                             •	Critical	Infrastructure	and	Key	
     Day 2           •	Maximizing	security	through	merging	       •	Managing	regulation	through	               Resource	Protection	workshop	
     April 18th        people,	process	&	technology                 integrated	risk	solutions                •	Red	Dragon	Rising	Workshop:	
                     •	Ensuring	an	educated	&	aware	              •	Breach	scenario	event                      Managing	Chinese	cyber	Threat
                       workforce


    register today - visit www.cybersummits.com//enterprise or phone +44 (0) 207 375 7537
November 8th - 9th, Movenpick, Amsterdam, Netherlands

        Session 1: Industry Drivers                            Session 2: Managing the Threat                              Session 3: Mitigating the risk
Guide to EU and National Policies and                     Case Study: Defending the Triad - Energy and              Building Multi-layer Security
Initiatives                                               Critical Infrastructure                                   •	 Discover	how	to	effectively	and	dynamically	
•	 Hear	first	the	legislation	and	standards	              •	 Learn	how	energy	infrastructure	is	a	key	part	of	         prioritize	between	availability,	integrity	and	
   associated	with	the	roll	out	of	smart	grid	               any	national	defensive	cyber-security	posture	to	         confidentiality	maximizing	the	efficiency	of	your	
   technology	ensuring	your	knowledge	is	up-to-              ensure	effective	protection		                             operations
   date                                                   •	 Discover	a	national	security	prospective	to	           •	 Develop	proven	and	effective	strategies	of	
•	 Realize	the	true	requirement	for	security	as	             countering	cyber-spies	from	National	Cyber-               protection	merging	IT	and	physical	techniques	to	
   intelligent	and	integrated	technology	becomes	            Entities	compromising	the	electricity	grid	to	            enhance	your	system	security	
   a	reality	allowing	you	stand	out	in	a	competitive	        ensure	the	security                                    •	 Learn	techniques	to		monitor	what	is	happening	
   industry	                                              •	 Understand	the	cyber-threats	and	impact	of	an	            both	inside	and	outside	the	office	to	mitigate	risk
•	 Learn	how	to	securely	integrate	smart	technology	         attack	to	the	Energy	Critical	Infrastructure	so	you	   •	 Master	the	art	of	educating	personnel	in	how	
   throughout	the	industry	to	enhance	your	                  can	be	confident	in	your	preparation                      to	protect	their	industry	ensuring	security	and	
   productivity	and	reliability                           •	 Expert	lead	case	studies	of	past	cyber-events	to	         efficiency
•	 Discover	the	true	potential	for	integrated	               the	power	infrastructure	including	the	Aurora	and	     Ernie	Hayden,	Managing Principal,	Global Energy
   operations	to	ensure	the	security	of	Europe’s	            Stuxnet	vulnerabilities	defining	comprehensive	        and Utility Vertical,	Verizon
   energy	future	                                            security	precautions	for	the	energy	sector
Evangelos	Ouzonis,	Senior Expert, Network                 Richard	Zaluski,	Executive Vice President,                Case Study: Shell and WurldTECH's
Security Policy,	ENISA                                    International,	GICSR                                      collaboration in Infrastructure Security
                                                                                                                    •	 Understand	the	scope	of	additional	connectivity	
Panel Session: Certifying Vendor Security and             Panel Session: Vulnerability and Impact                      and	the	associated	risks	to	maximise	your	
Utility Operations                                        Analysis                                                     security
•	 Look	the	at	co-operative	efforts	to	establish	         •	 Learn	how	to	utilize	penetration	testing	and	          •	 Learn	methods	to	protect	against	malware	and	




                                                                                                  PY
   testing	and	certification	of	vendor	technology	to	        look	at	realistic	attack	scenarios	to	study	the	          social	engineering	targeting	sensitive	business	
   guarantee	you	work	with	trusted	providers                 consequences	and	impacts	identifying	the	                 information	that	you	can	implement
•	 Explore	the	development	of	cross-industry	                vulnerabilities	so	you	can	protect	your	system         •	 Discover	proven	real	world	steps	to	secure	




                                                                                               CO
   partnerships	to	establish	standards	that	will	         •	 Analyze	your	systems	to	identify	high	risk	               critical	information	infrastructure	so	you	can	be	
   produce	results                                           high	impact	areas	to	efficiently	focus	your	              confident	in	the	strength	of	your	system
•	 Discuss	the	logistics	of		ensuring	that	technology	       resources	to	enhance	your	resiliency	and	system	       •	 Gain	an	up-to-the	minute	understanding	of	where	
   and	equipment	are	utilized	securely	through	              robustness                                                the	security	needs,	threats	and	solutions	are	




                                                                              T
   certifying	the	operators	of	critical	infrastructure	   •	 Establish	the	best	way	to	ascertain	what	is	              heading	ensuring	you	stay	competitive




                                                                            F
   ensuring	overall	system	robustness                        connected	guaranteeing	the	safe	migration	from	        Expert,	Cyber Security Lead, Shell
•	 Uncover	the	need	to	verify	the	organizational	            an	isolated	system
                                                                                                                    Tyler	Williams,	President,	WurldTECH




                                                            A
   processes	and	internal	security	of	the	end	user	to	    •	 Understanding	the	scope	of	additional	
   improve	resilience	and	drive	enhanced	security            connectivity	and	the	associated	risks	building	        Access Control




                                                          R
Moderator:	Tyler	Williams,	President,	WurldTECH              comprehensive	security	precautions
                                                                                                                    •	 Discover	real	world	techniques	to	authenticate	




                                                 D
                                                          Moderator:	David	Spinks,	Chairman,	CSIRS                     users	giving	you	confidence	in	the	security	of	
End	Users:	Cyber Security Lead,
Shell, WIB members	                                       Vendor:	Peter	Wood,	CEO,                                     your	system
                                                          First Base Technologies                                   •	 learn	proven	methods	to	manage	who	has	
Case Study: The Efforts of EuroSCSIE in                                                                                authorization	and	access	allowing	you	to	
Standards and Guidelines                                  Case Study: Establishing emergency response                  maximize	the	protection	of	your	system
•	 An	expert	lead	look	at	the	standards	and	              plans and CERT                                            •	 Discover	strategies	to	identify	the	individuals	
   guidelines	available	to	boost	your	understanding       •	 Understand	the	threats.	vulnerabilities	and	              being	granted	access	to	your	system	to	
•	 Learn	which	standards	are	compatible	and	use	             consequences	of	a	breach	so	you	can	build	a	              strengthen	your	defenses
   these	to	build	an	effective	security	program              clear	action	plan                                      •	 Hear	a	step	by	step	guide	to	enforce	user	
•	 Hear	about	the	efforts	to	build	international	         •	 Establish	a	compute	emergency	response	so	                accountability	to	enhance	your	security
   industry-wide	best	practice	guidelines	and	               there	is	a	clear	action	plan	for	system	failures	
   requirements	placing	you	ahead	of	the	                    ensuring	you	are	back	on-line	as	quickly	as	
   competition                                               possible
•	 Discover	the	European	wide	efforts	to	increase	        •	 Learn	how	to	improve	your	resiliency	and	                 GET THE MOST OUT OF THE
   awareness	through	sharing	and	exchanging	                 recovery	to	minimize	your	downtime	if	the	system	
   information	to	build	proven	strategies                    fails                                                     CONFERENCE
                                                          •	 Discover	the	operational	benefits	of	cyber	               	
Annemarie	Zielstra,	Director,                                                                                          Attend one of our exclusive workshops
EuroSCSIE / CPNI.NL                                          security	and	system	robustness	maximizing	
                                                             productivity                                              CSIRS and RUSI	Closed Door Meeting:	
                                                          Dimitrios	Serpanos,	Director, ISI                            Confidential	discussion	of	the	threats	you	are	
                                                                                                                       facing,	the	steps	being	utilized	to	protect	your	
                                                                                                                       organization	and	guides	to	building	response	
                                                                                                                       plans	to	enhance	overall	system	robustness
                                                                                                                       Red Dragon Rising Workshop:	Expert	lead	
                                                                                                                       session	covering	the	motivations	for	govern-
                                                                                                                       ment	and	commercially	sponsored	cyber-
                                                                                                                       attacks.	Take	away	a	clear	step	by	step	guide	
       3 SIMPlE STEPS TO REGISTER do this before August 19th to save $400                                              for	you	to	implement	in	your	organization	
       	                                                                                                               maximizing	your	resilience
       Email nsheel@FCBusinessIntelligence.com with BOOKME in the subject line
       Call me now on +44 207 375 7537                                                                                 Visit www.cybersummits.com/EU to find
                                                                                                                       out more
       Or register on line at: https://secure.eyeforenergy.com/cyber/register.shtml



            register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
November 8th - 9th, Movenpick, Amsterdam, Netherlands

       Session 4: People and Policy                       Session 5: Operational and Information                           Session 6: Securing Process
National Cyber Security Strategy: 'Success                             Technology                                               Control Systems
through cooperation'                                      Security Challenges for Information Technology            The connection of SCADA and Corporate
•	 Discuss	methods	to	secure	the	ICT	infrastructure	      controlling Energy Systems                                networks
   critical	to	ensure	the	strength	of	the	national	and	   •	 Realize	the	challenges	to	uniting	the	two	different	   •	 Hear	real	world	procedures	for	how	SCADA	and	
   European	society	and	economy                              worlds	to	determine	how	to	bridge	the	gap	                business	networks	can	co-exist	ensuring	SCADA	
•	 Hear	plans	for	necessary	cooperation	between	             improving	education	and	communication                     systems	are	compliant	with	business	network	
   existing	parties	(public	&	private)	in	the	digital	    •	 Uncover	the	requirements	for	smart	security	              security	requirements	guaranteeing	the	security	
   society	at	an	international	level                         across	the	energy	chain	from	smart	appliances,	           of	your	system
•	 Discover	methods	to	build	security	through	               grid	and	market	operators	building	action	plans	       •	 Learn	clear	strategies	to	manage	SCADA	system	
   Linking	and	reinforcing	initiatives	and	                  that	drive	results	                                       inventory	in	and	outside	the	industrial	IT	network	
   encouraging	individual	responsibility	ensuring	        •	 Learn	why	someone	may	consider	disrupting	the	            allowing	you	to	confident	in	the	strength	of	your	
   you	have	the	response	capacity	to	withstand	ICT	          energy	chain	and	your	operations	guaranteeing	            system
   disruptions	and	cyber	attacks                             the	protection	of	your	system	                         •	 Discover	proven	strategies	to	secure	the	
•	 Learn	how	establishing	the	Cyber	Security	Board	       •	 Hear	plans	for	pathway	to	avoid	security	                 connections	between	process	control	and	office	
   and	National	Cyber	Security	Centre	will	use	              becoming	a	show	stopper	for	new	energy	                   IT	networks	that	will	produce	results
   to	self-regulation,	legislation	and	if	necessary	         systems	ensuring	you	stay	productive	and	              •	 Understand	the	types	of	firewalls	available	for	
   regulations		increase	the	resilience	of	Critical	         profitable                                                segregating	the	SCADA	and	corporate	networks	
   Infrastructure                                                                                                      maximizing	the	productivity	of	your	systems	
                                                          Eric	Luiijf,	C(I)IP Consultant, TNO / CPNI.NL
Rob	Duiven,	Programme Director,	National Cyber                                                                      Gitte	Bergknut,	MU Nordic Information Security
Security Strategy,                                        Case Study: Alliander’s work in Uniting Process           Manager, E.ON Sverige AB
Ministry of Security and Justice                          and IT Security
                                                          •	 Learn	how		to	unite	process	control	and	ICT	           Case Study: Elia’s effort to integrate cyber




                                                                                                  PY
Case Study: CPNI and Dutch Government Policy                                                                        security in the migration from SDH to IP/MPLS
                                                             security	in	advance	of	implementing	smart	grid	
and Training Initiatives                                     infrastructure	saving	time	frustration	and	money       network
•	 Discover	how	public	–	private	partnerships	can	        •	 Hear	proven	strategies	to	secure	the	                  •	 Uncover	tested	strategies	to	overcome	the	




                                                                                               CO
   be	used	to	make	your	critical	infrastructure	more	        intersections	of	transmission,	distribution	and	          technical	and	organizational	challenges	of	the	
   resilient                                                 generation	which	you	can	put	to	use	immediately           migration	from	SDH	to	IP/MPLS	allowing	you	to	
•	 Learn	tested	techniques	to	educate,	raise	             •	 Discover	how	to	successfully	apply	the	expertise	         stay	competitive
   awareness	and	manage	the	latest	technologies	             within	IT	to	the	operations	problem	turning	




                                                                              T
                                                                                                                    •	 Discuss	the	need	for	a	the	implementation	of	
   and	challenges	from	the	Cybercrime	Information	           wasted	hours	to	productive	ones                           a	layered	security	solution	to	guarantee	the	




                                                                            F
   Exchange	increasing	your	operational	robustness
                                                          •	 Realize	the	need	for	co-ordination	and	                   efficiency	of	your	operations
•	 Discover	the	process	control	and	smart	grid	road	         collaboration	across	Europe	to	help	you	stay	          •	 Listen	to	the	evolving	business	needs	required	




                                                            A
   map	outlining	a	step	by	step	guide	to	guarantee	          competitive                                               to	handle	the	migration	to	a	securely	connected	
   security
                                                          Johan	Rambi, Privacy and Security Officer,                   system	giving	you	the	edge




                                                          R
•	 Gain	the	latest	insight	into	the	planned	              Alliander                                                 •	 Hear	real	world	methods	to	allow	IT	practices	
   Netherlands	and	European	cyber	technology	




                                                 D
                                                                                                                       and	operational	engineering	to	harmonize	helping		
   and	training	facility	and	learn	how	this	fits	into	    Building Security in Design                                  drive	your	productivity	
   the	Dutch	NCSS	and	EU-US	initiatives	on	cyber-         •	 Learn	how	to	plan	long	term	security	into	the	
   security	letting	you	gain	the	edge	in	a	tough	                                                                   Kris	Hallaert,	IT Security Officer,	Elia
                                                             purchasing	and	deployment	process	to	saving	
   industry	                                                 you	time	and	money                                     Viking Panel Session: Vital Infrastructure,
Auke	Huistra,	Project Manager Cybercrime                  •	 Discover	methods	to	factor	in	the	difference	in	       NetworKs, INformation and Control System
Information Exchange,	CPNI.NL                                life	span	and	the	realistic	costs	of	upgrades	to	      ManaGement
Rob	Duiven,	Programme Director, National	Cyber	              legacy	systems	ensuring	you	stay	profitable
                                                                                                                    •	 Expert	lead	guide	to	the	vulnerabilities	of	SCADA	
Security	Strategy,		                                      •	 Hear	real	world	strategies	to	build	high	                 systems	and	the	cost	of	cyber-attacks	on	society	
Ministry of Security and Justice                             security	low	latency	solutions	maximizing	your	           resulting	from	different	architecture	solutions	
                                                             productivity                                              saving	you	time	and	money
People and Process                                        •	 Develop	proven	methods	to	maintain	security	           •	 Hear	the	tried	and	tested	strategies	and	
•	 Realize	that	technology	is	necessary	for	security	        through	patching,	anti-virus	and	firewalls	               technologies	used	to	mitigate	and	protect	against	
   but	people	and	process	are	of	equal	or	greater	           guaranteeing	the	security	of	your	system                  weaknesses
   importance	to	guarantee	complete	security
                                                                                                                    •	 Discover	the	existing	and	innovative	
•	 Understand	that	addressing	people,	process	and	                                                                     communication	solutions	you	can	utilize	to	
   technology	together	will	give	a	greater	chance	of	                                                                  secure	you	power	system
   maintaining	and	protecting	the	integrity	of	your	IP	      GROUP DISCOUNTS                                        •	 Learn	how	employing	simulations,	modeling	and	
   networks
                                                             More	heads	are	better	than	one!	Maximise	                 testing	to	ensure	the	solutions	you	implement	on	
•	 Learn	how	to	guarantee	personnel	(and	families)	                                                                    your	legacy	system		drive	reliability	and	security
   are	fully	educated,	professional	and	competent	           the	benefits	to	your	business,	and	ensure	
                                                             valuable	lessons	make	it	back	to	the	office,	          Gunnar	Bjoerkman, Project Co-ordinator, Viking
   through	utilizing	governance	and	policy	to	build	
                                                             by	sending	a	team	to	this	event.
   awareness	
•	 Hear	strategies	to	train	security	and	network	            Qualify for a group discount?
   personnel	to	keep	a	vigilant	eye	on	the	traffic	          Contact	nsheel@FCBusinessIntelligence.
   patterns	to	discern	the	precursor	anomalies	to	           com	or	call	on	+44 (0) 207 375 7537
   new	and	different	levels	of	attack	ensuring	you	          	
   are	prepared                                              Register before August 19th to save $400
John	Basset,	Assosciate, RUSI                                You can do this in 3 easy steps:
                                                             Reply to this email with BOOKME in the
                                                             subject line




           Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459 7537
            register today - visit www.cybersummits.com/enterprise or phone +44207375
look at who you could be networking with in 2011
The	Enterprise	Cyber	Security	&	Information	Assurance	Summit	provides	
outstanding	networking	opportunities	for	anyone	involved	with	eGRC	strategies	      The types of Organization this conference is
to	secure	Critical	Infrastructure.	This	is	the	premier	cyber	security	meeting	–	    aimed at attracting:
attracting	150+	security	&	industry	stakeholders.	If	security	or	compliance	are	
part	of	you	job	role	–	you	simply	can’t	afford	to	miss	out!
We will be providing:                                                               Government Agencies and Trade Associations
` Dedicated networking time across the conference
                                                                                   Department	of	Defence    DHS                     CERT
` Fully interactive panel sessions for you to identify yourself to the entire      GICSR                    ISACA                   ISA
  delegate audience as a topic expert                                              NICE                     NSA
                                                                                   FBI                      NIST
` Dedicated workshops, discussion groups, coffee breaks, lunches and
  evening drinks for you to target key clients
You	could	have	more	face	to	face	conversations	at	this	conference	than		in	         INDUSTRY END USERS
a	year.	Leading	industry	end	users	will	be	attending	this	conference	to	meet	
solution	providers	offering	new	technologies	and	strategies	to	reduce	the	cost	    ATT                      Paypal                  Northrop	Grumman
and	time	of	ensuring	security	and	compliance.	Sign	up	today	and	fill	your	order	   Verizon                  Bank	of	America         Boeing
book!                                                                              T	Systems                Well	Fargo              Lockheed	Martin
                                                                                   BT	Global                PGE                     SAIC
                                                                                   VISA                     SCE
 Take a look at the job titles this                                                Ebay                     Sempra
 conference will attract:                                                          JP	Morgan	Chase          Raytheon
                                                                                                            	




                                                                                             PY
Managing	Directors	                      Senior/Chief	Security	Officers             Specialist Solution Providers
Presidents	                              Compliance	Specialist
Chief	Executives	                        Cyber	Security	Architect




                                                                                          CO
                                                                                   RSA                      SAP                     McAfee
Chief	Security	Officer	(CSO)             Security	Lead.
                                                                                   Symantec                 Microsoft               Tyco
Chief	Information	Security	Officer	      Senior	Security	Consultant
                                                                                   HP                       CISCO
(CISO)                                   Director,	Network	Security	Practice
Chief	Information	Officer	(CIO)          Security	Lead	/	Co-ordinator




                                                                               T
Chief	Technology	officer	(CTO)           Director	of	Communications	and	
                                                                                   Break Down of Audience at Previous FC Cyber Summits




                                                                             F
Senior	security	leads/Engineers          Information	System	Security
Cyber	Security		Managers	                Chief	Technologist




                                                           A
Reliability	Managers                     Senior	Security	Analyst
Director	of	Compliance                   Director	/	VP	/	Manager	of	Risk	




                                                         R
Technical	Directors	                     Director	/	VP	/	Manager	Audit
Operational	Security                     Director	/	VP	/	Manager	Compliance




                                               D
IT	Security                              Director	/	VP	/	Manager	Information	
Standards	Managers                       Security
Senior	Information	Protection	Analyst	   Risk	&	compliance	manager
Enterprise	information                   Corporate	information
Security	Principle




 Key Sponsorship and Exhibition Benefits                                           Make a list of your most             Work out your budget
                                                                                   important aims                       Speak	with	your	marketing	team	
 •	 This	is	the	only	Enterprise	Cyber	Security	&	Information	
                                                                                   •	Exhibition	booth                   and	decide	your	annual	confer-
    Assurance	Summit	with	industry	support	covering	the	whole	
    of	North	America	–	meet	over	a	150	key	industry	colleagues	in	                 •	Brand	visibility                   ence	investment	–	make	sure	
    2days	of	intense	business	development.                                                                              you	assign	the	right	budget	to	
                                                                                   •	Private	meetings
                                                                                                                        the	right	show.	No	matter	what	
 •	 This	is	the	exhibition	that	project	managers	and	key	decision	                 •	Breakfast	briefings                your	budget	is	we	will	work	
    makers	will	attend	to	source	the	latest	services	and	technologies.	
                                                                                   •	Speaking	slots                     with	you	to	build	a	package	
    Don’t	get	left	behind	by	your	competitors!
                                                                                                                        that	achieves	your	aims	and	
                                                                                   •	Conference	material	branding
 •	 Build	your	own	cyber	security	brand	through	high	level	exposure	                                                    exceeds	expectations.
    on	all	our	conference	marketing,	                                              •	Sponsor	a	session	
    on	site	and	in	person	to	fill	your	
    sales	book	for	2012	and	beyond                                                 Call me at EyeforEnergy to discuss your package now!
                                                                Coffee       1
 •	 Unlike	many	other	industry	                                                    Exhibition	space	regularly	sells	out	weeks	in	advance.		
                                                                             2
    trade	shows,	exhibitions	and	
                                              Conference Room     5                Don’t	miss	out	–	secure	your	place	today!
    conferences	our	packages	are	                                 6
                                                                             3

    not	“one	size	fits	all”.	Tell	us	                                        4     CAll NOW
                                                                  7
    what	you	want	to	get	out	of	the	                                      Coffee   Ieuan Phillips
    event,	what	your	budget	is	and	                               8

    we	will	build	it	for	you	…simple!	
                                                                                   iphillips@fcbusinessintelligence.com	
                                                                                   +44 207 375 4304

           register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
Researched & Organized by:
                                                    I	have	been	impressed	with	the	level	of	understanding	and	research	undertaken	by	the	organisers,	the	quality	of	speakers	will	

                                                “                       surely	make	this	an	event	no	one	will	want	to	miss    David Spinks, CSIRS
                                                                                                                                                       ”
ENTERPRISE CYBER SECURITY & INFORMATION
ASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA
                                                                                                                                                                                                  save
                                                                                                                                                                                                  $400
4 Reasons why your company needs you here...                                                                                                                                                     register before
1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they                                                                                          17th February
     are putting in place and what solutions are leading the way in cyber security
2. Gain invaluable knowledge and insight into cost and time effective compliance, security and                                                                               Date & Venue
     strategies to ensure the successful integration of new technology                                                                                                       November 17th - 18th, 2012
                                                                                                                                                                             Hyatt Place, San Jose, CA, USA
3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas,
     strategies and contacts that ensure your business leads the way when it comes to cyber security and                                                                     Hotel Discount
     smart grid deployment                                                                                                                                                   FC Business Intelligence has negotiated a
                                                                                                                                                                             discounted rate for all conference attendees.
4. Save your department time and money by attending this one stop shop for all things regarding cyber                                                                        SImily quote the name of the conference
     security; give your company the chance to make 2012 the most profitable year ever!                                                                                      when booking your accommodation


REGISTER NOW IN 3 EASY STEPS



                                                                                                                                                PY
   1. Select Your Registration Package

 Pass Features                                                                                                PLATINUM PASS                                   GOLD PASS                POST CONFERENCE MATERIALS




                                                                                                                                             CO
 ` Full access to conference, workshops and exhibition
                                                                                                                                                               


                                                                                                                   T
 ` Full access to all lunches, breaks
                                                                                                                                                               


                                                                                                                 F
 ` Full access to all networking events
                                                                                                                                                               


                                                                                     R A
 ` Full Post Conference Materials including audio recordings,
   PDF presentation files and digital attendee list                                                                                                                                                


                                                                           D
 Super Early Bird Price - Before 17th Februrary                                                                $1795                                         $1595

 Early Bird Price - Before 16th March                                                                          $1995                                         $1795                               $495

 Full price                                                                                                    $2195                                         $1995

                                                                                                                                                                                 DIScOunT cODE:
   2. Enter Attendee details
Mr/Mrs/Ms/Dr:                              First name:                                                                   Last name:                                                            ONLINE100
Company:                                                                                                                 Position/Title:                                              Enter the discount code when
                                                                                                                                                                                        you register to save $100
Telephone:                                                        Fax:                                                   Email:
Address:                                                                                                                 Zipcode:                                                    Country:



   3. Payment Options
      I enclose a check/draft for:                                                                                                     Credit card number:
      (Payable to First Conferences Ltd)                                                                                               Expiry date:                         Security number:
      Please invoice my company:                                                                                                       Name on card:
      Purchase Order Number:                                                                                               Please
      charge my credit card:                             Amex       Visa                Mastercard                                     Signature:


Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before Feb
17th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to            MORE              CALL      CALL (0) 207 375 7537
charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged
                                                                                                                                                                FAX:      +44 (0) 207 375 7576
to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are          WAYS TO
exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and                             EMAIL:    nsheel@eyeforenergy.com
the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct           REGISTER
at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website.                             ONLINE:   www.cybersummits.com/enterprise
Design by www.thecreativetree.co.uk
With	the	increasing	number	of	regulations	and	threats	      As	we	navigate	new	and	uncertain	challenges	in	the	digital	

                                                                                       “
 Researched & Organized by:
                              facing	information	assets	the	time	to	invest	in	this	    age,	we	must	also	address	the	growing	threat	cyberattacks	
                              area	has	never	been	more	critical.	Especially	when	      present	to	our	transportation	networks,	electricity	grid,	financial	
                              considering	the	cost	of	the	breakdown	of	one	critical	   systems	and	other	assets	and	infrastructure.
                              infrastructure	could	top	$230bn	                         President Obama, 2011
                                                                                                                                       ”
ENTERPRISE CYBER SECURITY &                                                                                                             save
INFORMATION ASSURANCE SUMMIT                                                                                                            $400
                                                                                                                                       register before
17-18 April, 2012, San Jose, California, USA                                                                                            17th February


DEVELOP STRATEGIES TO UTILIZE PEOPLE,
PROCESS & TECHNOLOGY TO OPTIMIZE YOUR
GOVERNANCE, RISK & COMPLIANCE MANAGEMENT



                                                                                          PY
•	 Discover the	emerging	national	and	federal	initiatives	driving	
                                                                                                                Host Organization:
   your	industry	forward	and	giving	you	the	competitive	edge




                                                                                       CO
•	 establish	a	clear	governance	policy	to	enhance	awareness	
   through	education	generating	confidence	in	the	security	of	your	




                                                                        T
   system




                                                                      F
                                                                                                                Expert Speakers
•	 learn	to	mitigate	the	risk	through	certification	&	prioritization	to	
                                                                                                              End User Perspective




                                                      A
   build	resilience,	improve	response	times	and	enhance	system	
   robustness




                                             D      R
•	 Develop	a	clear	process	to	efficiently	manage	the	changing	
   regulatory	landscape	ensuring	effective	and	efficient	compliance
•	 builD	a	clear	plan	to	navigate	the	rapidly	evolving	threat	
   landscape	and	guarantee	the	protection	of	your	critical	
   information	and	operational	assets	
•	 realize	how	to	certify	the	secure	deployment	of	the	latest	
   technologies	to		maximize	the	protection	of	your	critical	assets	
   and	guarantee	ROI
                                                                                                              Government & Trade:
   ExClUSIvE Case Studies from:
   ` SEMPRA                    ` BT Global                  ` JP Morgan Chase
   ` ENBRIDGE                  ` Wells Fargo                ` UTC
   ` Raytheon                  ` Verizon                    ` FBI


                                                                                                              Industry Insight From:
                                 CALL        CALL (0) 207 375 7537
   4 EASY WAYS                   FAX:        +44 (0) 207 375 7576
   TO REGISTER                   EMAIL:      nsheel@eyeforenergy.com
                                 ONLINE:     www.cybersummits.com/enterprise
                                                                                                                                     And many more…

Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information sharing and Business
                    Development at the Premier Industry Gathering: www.cybersummits.com/enterprise

More Related Content

What's hot

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsBrunswick Group
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsKyle Brown
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitolTechU
 
Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breachPatrick Florer
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsJon Bosco
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence MarketDatsun Arnold
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesOlivier Busolini
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 

What's hot (18)

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 
Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breach
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial Services
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 

Similar to Enterprise cyber security

Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Idc cost complexitycompliance
Idc cost complexitycomplianceIdc cost complexitycompliance
Idc cost complexitycomplianceReadWrite
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfdotco
 

Similar to Enterprise cyber security (20)

Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Idc cost complexitycompliance
Idc cost complexitycomplianceIdc cost complexitycompliance
Idc cost complexitycompliance
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
How Cyber Resilient are we?
How Cyber Resilient are we?How Cyber Resilient are we?
How Cyber Resilient are we?
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdf
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Enterprise cyber security

  • 1. With the increasing number of regulations and threats As we navigate new and uncertain challenges in the digital “ Researched & Organized by: facing information assets the time to invest in this age, we must also address the growing threat cyberattacks area has never been more critical. Especially when present to our transportation networks, electricity grid, financial considering the cost of the breakdown of one critical systems and other assets and infrastructure. infrastructure could top $230bn President Obama, 2011 ” ENTERPRISE CYBER SECURITY & save INFORMATION ASSURANCE SUMMIT $400 register before 17th February 17-18 April, 2012, San Jose, California, USA DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT PY • Discover the emerging national and federal initiatives driving Host Organization: your industry forward and giving you the competitive edge CO • establish a clear governance policy to enhance awareness through education generating confidence in the security of your T system F Expert Speakers • learn to mitigate the risk through certification & prioritization to End User Perspective A build resilience, improve response times and enhance system robustness D R • Develop a clear process to efficiently manage the changing regulatory landscape ensuring effective and efficient compliance • builD a clear plan to navigate the rapidly evolving threat landscape and guarantee the protection of your critical information and operational assets • realize how to certify the secure deployment of the latest technologies to maximize the protection of your critical assets and guarantee ROI Government & Trade: ExClUSIvE GAME-CHANGING INFORMATION INCUlDING… ` Up-to-date case studies from key US industry end users including:Wells Fargo & UTC ` Expert technical analysis on major industry challenges including integrated risk management and ‘big data’ from BT Global & Verizon ` Case studies to build clear strategies for efficient and economic compliance Industry Insight From: from Sempra & Enbridge ` Perspective from US government agencies including the FBI and NSTA on initiatives to ensure the security and reliability of critical infrastructure ` Workshops and roundtables discussing the international threat and critical infrastructure & key resource protection from GICSR industry ISACs And many more… For the latest speaker line up and agenda updates please visit: www.cybersummits.com/enterprise
  • 2. Welcome to the enterprise cyber security & information assurance summit Dear Reader, Enterprise Security Mangers – In the past few years there have been land mark changes to the Protect Against Risk and Regulatory Cyber Security industry; from the implementation of integrated technology, to the game changing power of the countless publi- Violation cized breaches and malware. This is all without mentioning the With the challenges and costs of securing the reliability of your rapidly evolving regulatory and compliance landscape. infrastructure increasing rapidly it is essential to approach these complex concerns with detailed planning. This focussed meeting will equip you with To guarantee a secure and efficient enterprise system it is vital to consider the the foresight to economically ensure the resiliency of your assets. three core disciplines of people, process and technology. The way to balance these areas is through the concept of Governance, Risk & Compliance (GRC). ` Industry leading case studies on integrated risk management and Enterprise GRC brings the matter of IT security to the board level, driving compliance solutions from Sempra & Enbridge spending and investment in this sector. ` Federal and national initiatives driving change in standards and ` The GRC market is estimated to be worth over $32bn auditing ` By 2015 the US federal Cyber Security market will reach $15bn ` Government strategies to enhance resilience to cyber incidents and manage the cyber threat including the FBI Infragard partnership ` The USA alone spends $14BN a year on IT-governance Don’t get caught out the rapidly changing landscape and the cost of The attacks of 2011 have taught us that the threat landscape is not just a breach. Discover clear proven strategies being implemented by your evolving but rapidly mutating. This requires security managers to consider new information security peers by signing up today! and creative techniques to detect, prevent and prepare for a breach scenario. With the cost of the breakdown of one critical infrastructure topping $230bn PY and added complexity coming from the increasing number of regulations and Solution Providers – Cyber Security the frequent dynamic changes this area is growing rapidly. Activity is on the Rise… CO No one wants to be the weak link in global infrastructure or have their As integrated and mobile devices become ubiquitous it is vital that the reputation tarnished by a breach event but maintaining security and technology securing key information assets evolve with this. With the compliance in a rapidly evolving industry is costly, time consuming and likely hood of a Pearl Harbor-scale intrusion in 2012 increasing military information security spending by 50% to $9bn - the potential for huge T technically challenging. It is now more vital than ever for public and private partnerships to rethink security strategies to minimize risk, maximize resiliency contracts has never been greater! F and ensure business continuity. At this ground breaking ground breaking industry event you will hear… A The Enterprise Cyber Security & Information Assurance Summit will supply your • National risk management and security initiatives from international trend setters including BT & Wells Fargo R business with: • Enterprise end user need for industry wide co-operation and D  The critical intelligence and tools you need to build a cost effective, time standardization outlined by FBI and ISA efficient cyber security strategy • Federal and national plans for regulations and enhancing security  Key lessons and tried and tested action plans to mitigate risk and save Jon the premier Cyber Security forum to receive market forecast and insight millions of USD in compliance and reliability into government lead industry drivers to accurately plan your business for 2012 and beyond.  The insight and connection you need to secure your place in this booming industry We’ll put you in front of industry leading buyers from across North America to fill your order books in 2 days! The Enterprise Cyber Security & Information Assurance Summit will bring together 150 cyber security subject matter and industry experts for two days of business critical strategy, unrivalled networking and stimulating discussion. What We Are Going To Do for You… I look forward to meeting you in San Jose in April. Practical real world strategies and sharing best practice are at the forefront of the Enterprise Cyber Security & Information Assurance Summit. We are committed to ensuring you go away with new contacts and the most up-to-date information. Most importantly you will leave knowing your Natasha Sheel Tel: +44 (0) 207 375 7537 business is going to move forward Senior Industry Analyst Email: nsheel@FCBusinessIntelligence.com www.cybersummits.com/enterprise ` REALIZE initiatives to ensure the security and reliability of critical FC Business Intelligence infrastructure ` ASCERTAIN how to ensure cost effective and efficient security and “GICSR is proud to be collaborating with FC Business Intelligence on this compliance maintenance project bringing together key senior level IT Security personnel to tackle the key challenges facing North American critical enterprises. ` UNDERSTAND the persistent and evolving threats and how to securely integrate new technology The Enterprise Cyber Security & Information Assurance Summit will help ` LISTEN to case studies from leading end users and government you to: bodies for how to successfully merge people, process & technology ` Develop strategies to utilize people, process & technology to ensure the reliability of your assets ` Optimizing your governance, risk & compliance management ` DISCOVER the innovative methods developed by global industry leaders to enhance system robustness and resiliency With the increasing number of regulations and threats facing information register today today -www.cybersummits.com/enterprise or phone +44207375 7537 Register - visit visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459 assets the time to invest in this area has never been more critical especially when considering the cost of the breakdown of one critical infrastructure could top $230bn.” Richard Zaluski, Executive VP – International,
  • 3. expert speakers at this year’s meeting include: KEYNOTE SPEAKERS GOVERNMENT & TRADE BODIES: Jay Bavisi, President & CEO, Deborah Kobza, Executive Director / CEO, EC Council Gicsr & nh-isac John Chesson, Richard Zaluski, Executive Vice President - Special Agent, International, Gicsr FBI Rob Duiven Larry Clifton, CEO / President, Programme Director, National internet security alliance PHOTO Cyber Security Strategy, Ministry of Security and (RET) General Mick Kicklighter, Director, Department of cip & hs, George Mason university Steve Haynes, Director - Cyber Security & END USER PERSPECTIVE information Assurance, Whitehouse national security telecommunications advisory Munillal Chatarpal, committee Manager - Risk Management & Security, PY enbridge energy INDUSTRY EXPERTS INCLUDING: Ola Lawal, Corporate Security Officer, CO enbridge energy Peter Allor, Senior Security Strategist, Cyber Incident & Vulnerability Handling, ibM Alexander Kunz, T Security Governance Manager, sempra Gene Fredriksen, F Global CISO, Ken Baylor, VP / CISO of Security & Antifraud, tYco A Wells Fargo Ernie Rakaczky, Principal Security Architect, R TBA, Director – Governance, Risk, invensys D Compliance, bt Global William Hagestad II, Lieutenant Colonel US Marine Corps (RET), Chief Catherine Lester, Solutions Architect, verizon Cyber Security Strategist, red-Dragon rising Marci McCarthy, President CEO, TBA, Director, raytheon tech exec networks Our expert speaker line up will be discussing the issues critical to you. The Christopher Leigh, Global IT Compliance & FBI Computer Intrusion & Counter Intelligence along with IBM who will be Risk Officer, utc discussing the need for building a long term incident response plan. David Gavilan, Executive Director & Assistant General Counsel, Turnover to see the extensive agenda, established techniques and Jp Morgan chase forward looking strategies our internationally renowned speakers will be presenting and sharing at this premier industry meeting... Conference at a glance MORNING AFTERNOON EXTRAS • Red Dragon Rising Workshop: • Industry Drivers: latest on Whitehouse, • Mitigating the risk and Managing International cyber Day 1 DoD and DHS initiatives understanding the threat Threat April 17th • Looking at the standards and • Building incident response • CISO roundtable their evolution to managing your plans and SIEM • Networking drinks reception governance & compliance strategy • Critical Infrastructure and Key Day 2 • Maximizing security through merging • Managing regulation through Resource Protection workshop April 18th people, process & technology integrated risk solutions • Red Dragon Rising Workshop: • Ensuring an educated & aware • Breach scenario event Managing Chinese cyber Threat workforce register today - visit www.cybersummits.com//enterprise or phone +44 (0) 207 375 7537
  • 4. November 8th - 9th, Movenpick, Amsterdam, Netherlands Session 1: Industry Drivers Session 2: Managing the Threat Session 3: Mitigating the risk Guide to EU and National Policies and Case Study: Defending the Triad - Energy and Building Multi-layer Security Initiatives Critical Infrastructure • Discover how to effectively and dynamically • Hear first the legislation and standards • Learn how energy infrastructure is a key part of prioritize between availability, integrity and associated with the roll out of smart grid any national defensive cyber-security posture to confidentiality maximizing the efficiency of your technology ensuring your knowledge is up-to- ensure effective protection operations date • Discover a national security prospective to • Develop proven and effective strategies of • Realize the true requirement for security as countering cyber-spies from National Cyber- protection merging IT and physical techniques to intelligent and integrated technology becomes Entities compromising the electricity grid to enhance your system security a reality allowing you stand out in a competitive ensure the security • Learn techniques to monitor what is happening industry • Understand the cyber-threats and impact of an both inside and outside the office to mitigate risk • Learn how to securely integrate smart technology attack to the Energy Critical Infrastructure so you • Master the art of educating personnel in how throughout the industry to enhance your can be confident in your preparation to protect their industry ensuring security and productivity and reliability • Expert lead case studies of past cyber-events to efficiency • Discover the true potential for integrated the power infrastructure including the Aurora and Ernie Hayden, Managing Principal, Global Energy operations to ensure the security of Europe’s Stuxnet vulnerabilities defining comprehensive and Utility Vertical, Verizon energy future security precautions for the energy sector Evangelos Ouzonis, Senior Expert, Network Richard Zaluski, Executive Vice President, Case Study: Shell and WurldTECH's Security Policy, ENISA International, GICSR collaboration in Infrastructure Security • Understand the scope of additional connectivity Panel Session: Certifying Vendor Security and Panel Session: Vulnerability and Impact and the associated risks to maximise your Utility Operations Analysis security • Look the at co-operative efforts to establish • Learn how to utilize penetration testing and • Learn methods to protect against malware and PY testing and certification of vendor technology to look at realistic attack scenarios to study the social engineering targeting sensitive business guarantee you work with trusted providers consequences and impacts identifying the information that you can implement • Explore the development of cross-industry vulnerabilities so you can protect your system • Discover proven real world steps to secure CO partnerships to establish standards that will • Analyze your systems to identify high risk critical information infrastructure so you can be produce results high impact areas to efficiently focus your confident in the strength of your system • Discuss the logistics of ensuring that technology resources to enhance your resiliency and system • Gain an up-to-the minute understanding of where and equipment are utilized securely through robustness the security needs, threats and solutions are T certifying the operators of critical infrastructure • Establish the best way to ascertain what is heading ensuring you stay competitive F ensuring overall system robustness connected guaranteeing the safe migration from Expert, Cyber Security Lead, Shell • Uncover the need to verify the organizational an isolated system Tyler Williams, President, WurldTECH A processes and internal security of the end user to • Understanding the scope of additional improve resilience and drive enhanced security connectivity and the associated risks building Access Control R Moderator: Tyler Williams, President, WurldTECH comprehensive security precautions • Discover real world techniques to authenticate D Moderator: David Spinks, Chairman, CSIRS users giving you confidence in the security of End Users: Cyber Security Lead, Shell, WIB members Vendor: Peter Wood, CEO, your system First Base Technologies • learn proven methods to manage who has Case Study: The Efforts of EuroSCSIE in authorization and access allowing you to Standards and Guidelines Case Study: Establishing emergency response maximize the protection of your system • An expert lead look at the standards and plans and CERT • Discover strategies to identify the individuals guidelines available to boost your understanding • Understand the threats. vulnerabilities and being granted access to your system to • Learn which standards are compatible and use consequences of a breach so you can build a strengthen your defenses these to build an effective security program clear action plan • Hear a step by step guide to enforce user • Hear about the efforts to build international • Establish a compute emergency response so accountability to enhance your security industry-wide best practice guidelines and there is a clear action plan for system failures requirements placing you ahead of the ensuring you are back on-line as quickly as competition possible • Discover the European wide efforts to increase • Learn how to improve your resiliency and GET THE MOST OUT OF THE awareness through sharing and exchanging recovery to minimize your downtime if the system information to build proven strategies fails CONFERENCE • Discover the operational benefits of cyber Annemarie Zielstra, Director, Attend one of our exclusive workshops EuroSCSIE / CPNI.NL security and system robustness maximizing productivity CSIRS and RUSI Closed Door Meeting: Dimitrios Serpanos, Director, ISI Confidential discussion of the threats you are facing, the steps being utilized to protect your organization and guides to building response plans to enhance overall system robustness Red Dragon Rising Workshop: Expert lead session covering the motivations for govern- ment and commercially sponsored cyber- attacks. Take away a clear step by step guide 3 SIMPlE STEPS TO REGISTER do this before August 19th to save $400 for you to implement in your organization maximizing your resilience Email nsheel@FCBusinessIntelligence.com with BOOKME in the subject line Call me now on +44 207 375 7537 Visit www.cybersummits.com/EU to find out more Or register on line at: https://secure.eyeforenergy.com/cyber/register.shtml register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
  • 5. November 8th - 9th, Movenpick, Amsterdam, Netherlands Session 4: People and Policy Session 5: Operational and Information Session 6: Securing Process National Cyber Security Strategy: 'Success Technology Control Systems through cooperation' Security Challenges for Information Technology The connection of SCADA and Corporate • Discuss methods to secure the ICT infrastructure controlling Energy Systems networks critical to ensure the strength of the national and • Realize the challenges to uniting the two different • Hear real world procedures for how SCADA and European society and economy worlds to determine how to bridge the gap business networks can co-exist ensuring SCADA • Hear plans for necessary cooperation between improving education and communication systems are compliant with business network existing parties (public & private) in the digital • Uncover the requirements for smart security security requirements guaranteeing the security society at an international level across the energy chain from smart appliances, of your system • Discover methods to build security through grid and market operators building action plans • Learn clear strategies to manage SCADA system Linking and reinforcing initiatives and that drive results inventory in and outside the industrial IT network encouraging individual responsibility ensuring • Learn why someone may consider disrupting the allowing you to confident in the strength of your you have the response capacity to withstand ICT energy chain and your operations guaranteeing system disruptions and cyber attacks the protection of your system • Discover proven strategies to secure the • Learn how establishing the Cyber Security Board • Hear plans for pathway to avoid security connections between process control and office and National Cyber Security Centre will use becoming a show stopper for new energy IT networks that will produce results to self-regulation, legislation and if necessary systems ensuring you stay productive and • Understand the types of firewalls available for regulations increase the resilience of Critical profitable segregating the SCADA and corporate networks Infrastructure maximizing the productivity of your systems Eric Luiijf, C(I)IP Consultant, TNO / CPNI.NL Rob Duiven, Programme Director, National Cyber Gitte Bergknut, MU Nordic Information Security Security Strategy, Case Study: Alliander’s work in Uniting Process Manager, E.ON Sverige AB Ministry of Security and Justice and IT Security • Learn how to unite process control and ICT Case Study: Elia’s effort to integrate cyber PY Case Study: CPNI and Dutch Government Policy security in the migration from SDH to IP/MPLS security in advance of implementing smart grid and Training Initiatives infrastructure saving time frustration and money network • Discover how public – private partnerships can • Hear proven strategies to secure the • Uncover tested strategies to overcome the CO be used to make your critical infrastructure more intersections of transmission, distribution and technical and organizational challenges of the resilient generation which you can put to use immediately migration from SDH to IP/MPLS allowing you to • Learn tested techniques to educate, raise • Discover how to successfully apply the expertise stay competitive awareness and manage the latest technologies within IT to the operations problem turning T • Discuss the need for a the implementation of and challenges from the Cybercrime Information wasted hours to productive ones a layered security solution to guarantee the F Exchange increasing your operational robustness • Realize the need for co-ordination and efficiency of your operations • Discover the process control and smart grid road collaboration across Europe to help you stay • Listen to the evolving business needs required A map outlining a step by step guide to guarantee competitive to handle the migration to a securely connected security Johan Rambi, Privacy and Security Officer, system giving you the edge R • Gain the latest insight into the planned Alliander • Hear real world methods to allow IT practices Netherlands and European cyber technology D and operational engineering to harmonize helping and training facility and learn how this fits into Building Security in Design drive your productivity the Dutch NCSS and EU-US initiatives on cyber- • Learn how to plan long term security into the security letting you gain the edge in a tough Kris Hallaert, IT Security Officer, Elia purchasing and deployment process to saving industry you time and money Viking Panel Session: Vital Infrastructure, Auke Huistra, Project Manager Cybercrime • Discover methods to factor in the difference in NetworKs, INformation and Control System Information Exchange, CPNI.NL life span and the realistic costs of upgrades to ManaGement Rob Duiven, Programme Director, National Cyber legacy systems ensuring you stay profitable • Expert lead guide to the vulnerabilities of SCADA Security Strategy, • Hear real world strategies to build high systems and the cost of cyber-attacks on society Ministry of Security and Justice security low latency solutions maximizing your resulting from different architecture solutions productivity saving you time and money People and Process • Develop proven methods to maintain security • Hear the tried and tested strategies and • Realize that technology is necessary for security through patching, anti-virus and firewalls technologies used to mitigate and protect against but people and process are of equal or greater guaranteeing the security of your system weaknesses importance to guarantee complete security • Discover the existing and innovative • Understand that addressing people, process and communication solutions you can utilize to technology together will give a greater chance of secure you power system maintaining and protecting the integrity of your IP GROUP DISCOUNTS • Learn how employing simulations, modeling and networks More heads are better than one! Maximise testing to ensure the solutions you implement on • Learn how to guarantee personnel (and families) your legacy system drive reliability and security are fully educated, professional and competent the benefits to your business, and ensure valuable lessons make it back to the office, Gunnar Bjoerkman, Project Co-ordinator, Viking through utilizing governance and policy to build by sending a team to this event. awareness • Hear strategies to train security and network Qualify for a group discount? personnel to keep a vigilant eye on the traffic Contact nsheel@FCBusinessIntelligence. patterns to discern the precursor anomalies to com or call on +44 (0) 207 375 7537 new and different levels of attack ensuring you are prepared Register before August 19th to save $400 John Basset, Assosciate, RUSI You can do this in 3 easy steps: Reply to this email with BOOKME in the subject line Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459 7537 register today - visit www.cybersummits.com/enterprise or phone +44207375
  • 6. look at who you could be networking with in 2011 The Enterprise Cyber Security & Information Assurance Summit provides outstanding networking opportunities for anyone involved with eGRC strategies The types of Organization this conference is to secure Critical Infrastructure. This is the premier cyber security meeting – aimed at attracting: attracting 150+ security & industry stakeholders. If security or compliance are part of you job role – you simply can’t afford to miss out! We will be providing: Government Agencies and Trade Associations ` Dedicated networking time across the conference Department of Defence DHS CERT ` Fully interactive panel sessions for you to identify yourself to the entire GICSR ISACA ISA delegate audience as a topic expert NICE NSA FBI NIST ` Dedicated workshops, discussion groups, coffee breaks, lunches and evening drinks for you to target key clients You could have more face to face conversations at this conference than in INDUSTRY END USERS a year. Leading industry end users will be attending this conference to meet solution providers offering new technologies and strategies to reduce the cost ATT Paypal Northrop Grumman and time of ensuring security and compliance. Sign up today and fill your order Verizon Bank of America Boeing book! T Systems Well Fargo Lockheed Martin BT Global PGE SAIC VISA SCE Take a look at the job titles this Ebay Sempra conference will attract: JP Morgan Chase Raytheon PY Managing Directors Senior/Chief Security Officers Specialist Solution Providers Presidents Compliance Specialist Chief Executives Cyber Security Architect CO RSA SAP McAfee Chief Security Officer (CSO) Security Lead. Symantec Microsoft Tyco Chief Information Security Officer Senior Security Consultant HP CISCO (CISO) Director, Network Security Practice Chief Information Officer (CIO) Security Lead / Co-ordinator T Chief Technology officer (CTO) Director of Communications and Break Down of Audience at Previous FC Cyber Summits F Senior security leads/Engineers Information System Security Cyber Security Managers Chief Technologist A Reliability Managers Senior Security Analyst Director of Compliance Director / VP / Manager of Risk R Technical Directors Director / VP / Manager Audit Operational Security Director / VP / Manager Compliance D IT Security Director / VP / Manager Information Standards Managers Security Senior Information Protection Analyst Risk & compliance manager Enterprise information Corporate information Security Principle Key Sponsorship and Exhibition Benefits Make a list of your most Work out your budget important aims Speak with your marketing team • This is the only Enterprise Cyber Security & Information • Exhibition booth and decide your annual confer- Assurance Summit with industry support covering the whole of North America – meet over a 150 key industry colleagues in • Brand visibility ence investment – make sure 2days of intense business development. you assign the right budget to • Private meetings the right show. No matter what • This is the exhibition that project managers and key decision • Breakfast briefings your budget is we will work makers will attend to source the latest services and technologies. • Speaking slots with you to build a package Don’t get left behind by your competitors! that achieves your aims and • Conference material branding • Build your own cyber security brand through high level exposure exceeds expectations. on all our conference marketing, • Sponsor a session on site and in person to fill your sales book for 2012 and beyond Call me at EyeforEnergy to discuss your package now! Coffee 1 • Unlike many other industry Exhibition space regularly sells out weeks in advance. 2 trade shows, exhibitions and Conference Room 5 Don’t miss out – secure your place today! conferences our packages are 6 3 not “one size fits all”. Tell us 4 CAll NOW 7 what you want to get out of the Coffee Ieuan Phillips event, what your budget is and 8 we will build it for you …simple! iphillips@fcbusinessintelligence.com +44 207 375 4304 register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
  • 7. Researched & Organized by: I have been impressed with the level of understanding and research undertaken by the organisers, the quality of speakers will “ surely make this an event no one will want to miss David Spinks, CSIRS ” ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA save $400 4 Reasons why your company needs you here... register before 1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they 17th February are putting in place and what solutions are leading the way in cyber security 2. Gain invaluable knowledge and insight into cost and time effective compliance, security and Date & Venue strategies to ensure the successful integration of new technology November 17th - 18th, 2012 Hyatt Place, San Jose, CA, USA 3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas, strategies and contacts that ensure your business leads the way when it comes to cyber security and Hotel Discount smart grid deployment FC Business Intelligence has negotiated a discounted rate for all conference attendees. 4. Save your department time and money by attending this one stop shop for all things regarding cyber SImily quote the name of the conference security; give your company the chance to make 2012 the most profitable year ever! when booking your accommodation REGISTER NOW IN 3 EASY STEPS PY 1. Select Your Registration Package Pass Features PLATINUM PASS GOLD PASS POST CONFERENCE MATERIALS CO ` Full access to conference, workshops and exhibition   T ` Full access to all lunches, breaks   F ` Full access to all networking events   R A ` Full Post Conference Materials including audio recordings, PDF presentation files and digital attendee list   D Super Early Bird Price - Before 17th Februrary $1795 $1595 Early Bird Price - Before 16th March $1995 $1795 $495 Full price $2195 $1995 DIScOunT cODE: 2. Enter Attendee details Mr/Mrs/Ms/Dr: First name: Last name: ONLINE100 Company: Position/Title: Enter the discount code when you register to save $100 Telephone: Fax: Email: Address: Zipcode: Country: 3. Payment Options I enclose a check/draft for: Credit card number: (Payable to First Conferences Ltd) Expiry date: Security number: Please invoice my company: Name on card: Purchase Order Number: Please charge my credit card: Amex Visa Mastercard Signature: Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before Feb 17th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to MORE CALL CALL (0) 207 375 7537 charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged FAX: +44 (0) 207 375 7576 to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are WAYS TO exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and EMAIL: nsheel@eyeforenergy.com the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct REGISTER at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. ONLINE: www.cybersummits.com/enterprise Design by www.thecreativetree.co.uk
  • 8. With the increasing number of regulations and threats As we navigate new and uncertain challenges in the digital “ Researched & Organized by: facing information assets the time to invest in this age, we must also address the growing threat cyberattacks area has never been more critical. Especially when present to our transportation networks, electricity grid, financial considering the cost of the breakdown of one critical systems and other assets and infrastructure. infrastructure could top $230bn President Obama, 2011 ” ENTERPRISE CYBER SECURITY & save INFORMATION ASSURANCE SUMMIT $400 register before 17-18 April, 2012, San Jose, California, USA 17th February DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT PY • Discover the emerging national and federal initiatives driving Host Organization: your industry forward and giving you the competitive edge CO • establish a clear governance policy to enhance awareness through education generating confidence in the security of your T system F Expert Speakers • learn to mitigate the risk through certification & prioritization to End User Perspective A build resilience, improve response times and enhance system robustness D R • Develop a clear process to efficiently manage the changing regulatory landscape ensuring effective and efficient compliance • builD a clear plan to navigate the rapidly evolving threat landscape and guarantee the protection of your critical information and operational assets • realize how to certify the secure deployment of the latest technologies to maximize the protection of your critical assets and guarantee ROI Government & Trade: ExClUSIvE Case Studies from: ` SEMPRA ` BT Global ` JP Morgan Chase ` ENBRIDGE ` Wells Fargo ` UTC ` Raytheon ` Verizon ` FBI Industry Insight From: CALL CALL (0) 207 375 7537 4 EASY WAYS FAX: +44 (0) 207 375 7576 TO REGISTER EMAIL: nsheel@eyeforenergy.com ONLINE: www.cybersummits.com/enterprise And many more… Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information sharing and Business Development at the Premier Industry Gathering: www.cybersummits.com/enterprise