Industrial Control Cybersecurity USA



All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy, Oil, Gas, Electric and Water Sector.

 

The Industrial Control Cybersecurity conference consists of presentations and debate from some of the energy industry's leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world's most influential solution providers.

 

Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture. Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.

 

2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies. We will introduce demonstrations on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.

 

Goals of the conference

The goal of the conference – to enhance dialogue and information sharing between public and private sectors, providing participants an opportunity to contribute and engage on some of our country’s most pressing security threats surrounding critical national infrastructure. Our vision as a collective to enhance resilience and the adoption of cybersecurity controls within the Energy, Water, Oil, Gas, Electric and Nuclear sector.

 

Why you cannot miss 2015

  • Gain further understanding convergence of operational and information technology transformation
  • Develop a better understanding of current areas of vulnerability, threat detection, mitigation, maturity capability models and risk management.
  • Take away tools to assist in developing organisational priorities, methodologies and how to effectively deploy defense in-depth strategies.
  • Hear how your industry counterparts are defining and benchmarking return on investment for cybersecurity procurement, supplier responsibilities and adapting new models for incident response.
  • Take part and contribute to the technological transformation IT/OT shift involving design, implementation and integration requiring the collaborative efforts of two unique but historically different skillsets.
PRECONFERENCE WORKSHOP - October 12, 2015

Overview of workshop

 

More than five years have passed after Suxnet and the world realized the need to protect critical infrastructures from the emerging threats. We live in the era of cyber war, hacktivism, and building electronic armies. While we talk a lot about industrial cyber problems there is a need to talk more about effective practical solutions. The workshop will highlight the importance of understanding the combination of the industrial cyber security, automation, and understanding plant production models in order to design the right cyber secure infrastructure and solutions. The session will also cover the important aspects that need to be addressed by the stakeholders to achieve the goals. Ayman will focus on covering a comprehensive overview of the practical approach for designing, injecting and implementing cyber security for the Industrial Control Systems from Front End Engineering Design (FEED) Stage to the EPC (Engineering, Procurement and Construction).

 

Why you should attend

  • Why do we have to properly understand the plan operation when designing cyber security models and solutions for control systems
  • Learn how to embed industrial cyber security technical assurance in project lifecycle
  • Discuss the different types of critical infrastructures (energy, utilities, etc.) and how the type of operation is related to cyber security
  • Develop ideas on how to move into cyber security by design for the new control systems.
  • understand how to enhance industrial cyber security within existing control systems
  • What do you need to address before implementing cyber security solutions in the existing ICS systems

Workshop main bullets

  • Understanding the emerging cyber threats
  • Discuss the latest ICS reports and incidents including the lessons that shall be learned
  • Need for different industrial cyber security models for the different critical infrastructure
  • Who are the stakeholders and what is the role of each?
  • What are the important three Cs for effective cyber security?
  • Why do we need to understand plant operation when planning to secure the plants from cyber threats?
  • What are the pre-requisites that you must consider before implementing industrial cyber security?
  • How to engineer and enhance cyber security for an old plant?
  • Implementing Industrial Cyber Security by Design for the new plant or new automation system upgrades
  • Understanding the ISA99/IEC62443, and understanding the SILs and SALs
  • Why the Security Operation Center is must?
  • Impeding cyber security within the automation system/project life cycle
 

Speaker and Presenter Information

Department of Homeland Security ICS CERT Director, NERC, PG&E, Codenomicon, Sempra Energy, Southern California Edison, Burbank Water and Power, Iberdrola USA, BAE Systems Applied Intelligence, Alameda Water and Power, Sempra Energy, State of California Information security office


When
Mon-Wed, Oct 12-14, 2015, 8:30am - 5:00pm


Where
Hyatt Regency Sacramento
1209 L Street
Sacramento, CA 95814
Get directions


Website
Click here to visit event website


Event Sponsors


Organizer
Cyber Senate



Return to search results