CS4CA Europe

2-3 October 2018

London

The 5th edition of the CS4CA European Summit comes at a critical juncture for European security leaders facing increasingly complex threats from multiple different attackers. We’ll be bringing together operational technology/process control and corporate IT departments from the chemical, power, energy & utilities sectors to share best practice, discuss policy implications and face threats together.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

CYBER SECURITY FOR CRITICAL ASSETS EUROPE

2-3 October 2018 London UK

The 5th CS4CA Europe Summit is set in a world where theft of intellectual property, WannaCry-style ransomware and malicious phising attacks are becoming the norm.

The CS4CA Europe will will arm you with the knowledge and tools to fight the 21st Century cyber security battle. Exclusive keynote sessions from top industry execs present new ideas and different perspectives, whilst interactive panel debates offer delegates the chance to benchmark and discuss differing approaches to today’s challenges. In-depth case studies showcase success stories with tangible and actionable insights into securing infrastructure and assets without affecting day-to-day operations.

Make the most of your 2 days:

  • The most advanced information and policies
  • Learn from individuals with first-hand experience
  • Recognise current and future threats
  • Be part of the discussion that will impact the industry
  • All attendees engaged in one discussion: single track event
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01  
2nd October 2018
08:00 Registration & Breakfast
08:50 Opening Address from the Chair
09:00 Opening Panel
The New Cyber Security Ecosystem

  • 5 months on from the Wannacry & BA disaster: the reality check or just the start?
  • Communicate and share – actioning against the problem
  • Do you think you are overspending or underspending on security, and if so, by how much?
  • What type of influence is AI and IoT playing on your framework?
09:40 Keynote Presentation
Could the security industry have it all wrong?

  • How shifting focus from perimeters to people is crucial
    for success in the new era of mobility and cloud
  • How people AND data are key to better security
  • How the ability to see and understand the context behind user actions can prevent damaging breaches(Intentional and unintentional)
10:20 Networking Break & Business Card Exchange
11:00 Case Study
Closing the Gap Between Planning and Action

  • Part 1: Aligning IT & OT Priorities
  • Part 2: Taking the steps to prevent, detect and take action
11:30 Keynote Presentation
NCSC Thread Landscape

  • Exploring the cyber reat to UK critical infrastructure
  • Key priorities for UK when working with EU on policy
12:00 Platform Presentation
New Threat Vectors for ICS/SCADA Networks

  • Sine a light on the dark web
12:10 Presentation
Managing OT Security Risk: Understand Your Estate, Understand Your Risk

  • OT Security risk is a business risk
  • You can’t protect what you don’t understand
  • Risk management is not static, but an ongoing pocess
12:40 Seated Lunch Hosted by Forcepoint
13:40 Case Study
NIS Directive – ENISA’s Contribution

  • EU Policy efforts in the area of Critical Assets
  • The NIS Directive
  • ENISA’s contribution to the implementation of the directive
14:10 Presentation
The Rise of the Machine. Using AI to Tackle Cyber Security

  • Description of the ICS Cybersecurity Kill Chain and how it differs from the IT Cybersecurity Kill Chain
  • Identify choke points that can disrupt an attack
  • How AI can be used to protect those choke points
14:40 Networking Break
15:10 Case Study
Self-Learning Cyber Defense for ICS/SCADA Environments

  • How machine learning and AI are automating advanced threat detection
  • Why 100% network visibility allows you to pre-empt emerging situations, in real-time, across both IT and OT environments
  • How smart prioritisation and visualisation of threats allows for better resource allocation and lower risk
  • Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers
15:40 Platform Presentation
Delivering End-to-End Platforms for Operational Reliability

  • Integrating modules for asset inventory and vulnerability to create a comprehensive solution for critical infrastructure
15:50 Case Study
Risk Management Becoming a Company-Wide Initative

  • How to prepare, protect, detect, respond and recover
  • Raising and maintaining awareness
  • Creating a culture of avoiding blind spots
16:20 Case Study
Moving the Security Needle: Protecting Industrial Endpoints Against a Connected World

  • How to prepare, protect, detect, respond and recover
  • Raising and maintaining awareness
  • Creating a culture of avoiding blind spots
16:50 Roundtables

  • Table 1: Building a reliable operations team
  • Table 2: What Does a Healthy Insider Threat Programme Look Like?
  • Table 3: See and Understand Where Your Most Critical Control Systems Are Vulnerable to Attack
  • Table 4: Supply Chain security
  • Table 5: Practical and Useable GDPR Guidelines
  • Table 6: How is the landscape for Maritime security evolving?
17:30 Chairman’s Closing Address
17:40 Networking Drinks
DAY 02  
3rd October 2018
08:00 Registration & Breakfast
08:50 Welcome Address from the Chair
09:00 Opening Panel
Creating Two Way Communication Channels and Education for IT & ICS to Work Together

  • This panel addresses a topic that has been around for a while now, but has it found its way or is it still a problem?
  • What have been the most effective channels for setting up communication for you?
  • How centralised should the cyber security function be?
  • Are you and if so how, are you treating operational priorities as business priorities?
09:40 Platform Presentation
Hurricanes and Earthquakes. Risks predicted and Risks Occurred

  • Vulnerabilities – Which ones to be considered first for industrial facility: ICS specific or general IT, 0-days or 1-days, backdoors or vendor mistakes (RCE’s)
  • Attacks – Foreign country backed, criminal targeted or random
10:10 Platform
Understanding the Industrial Cloud

  • Defining level of visability required to uncover advanced threats and malicious activity
  • Making use of real-time monitoring to detect human error and operational issues
10:20 Networking Break
10:50 Keynote Presentation
ICS2ICS – Introducing Cyber Security 2 Industrial Control Systems

  • History should be a lesson learned – OT can learn from IT mistakes
  • The biggest challenges are people & skills
  • What will the furture hold?
11:20 Presentation
Reboot Your Human Firewall

  • Understand why security awareness is the wrong goal and focus
  • Learn about a new way of thinking and creating content that changes the security culture across the company at all levels
  • See how that model enables the creation of cultural metrics and measurement, which can then drive follow-on actions
11:50 Platform
What is The First Step Before Engaging in a Costly Cyber-Security Projection Project?

  • Threats are known to exist, imminent and severe! They happen every day, more frequently and with harsh implications
  • Due to numerous recent attacks, everyone plans to migrate the risks using various security products and solutions
  • Find out how to select the right, optimal and most effective path to do it
12:00 Presentation
Identifying Cyber Exposure points on critical assets

  • With critical assets becoming part of the attack path and a target for threat actors, it’s more important than ever to identify and manage the cyber exposure of these devices to reduce the probability of a business impacting event
12:30 Seated Lunch
13:30 Case Study
Is OT in the cloud Still a “Dirty” Word?

  • Scotia Gas Networks experience of adopting the cloud services for our IT environment
  • The pull from business, the dream of real-time analytics and the discovery of big data was enough to take the plunge
  • Reviewing our steps and learning how to meet and realign our targets throughout the journey
14:00 Case Study
The Future Will Be Challenging, Be Proactive, Not Reactive

  • Digital innovation is disruptive, costly and difficult to integrate with legacy systems, this session will look at how we can transform and integrate it into our systems and framework
  • The importance of strategy, leadership and collaboration must stay at the centre of any integration
  • AI, VR, AR, big data and machine learning are all a dynamic resource base – exploring how best to utilise and act now
14:30 Networking Break
15:00 Presentation
People are the Problem as well as the Solution

  • The focus has been on technology, with humans sidelined
  • The biggest problem will always be the human, both inside and outside an organisation
15:30 Case Study
Blockchain the New Kid on the Process Control Block

  • Critical systems are being revolutionised by Blockchain as a weapon against security – Exploring what that means to ICS systems
16:00 Group Discussion
Is it Time for a Peer to Peer Community to Advise the Cyber Security Community?

  • The role of the CISO and equivalent has changed drastically over the last few years and continues to evolve. Cyber security leaders have transformed into executive positions but are still required to understand risk and technology from the ground up. How do we maintain, manage, implement and stay up to date?
16:40 Chairman’s Closing Address
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers (2017)

Sponsors (2017)

Official Sponsor (2017)

Forcepoint

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s behaviors and intent as they interact with critical data and IP wherever it resides. Their uncompromising systems enable companies to empower employees with unobstructed access to data while protecting intellectual property and simplifying compliance. Forcepoint’s people-centric vision also drives them to create intelligent systems that stop risky cyber behaviors and help organizations protect employees, critical data and IP wherever it resides.

Presenting Sponsor (2017)

Cylance

Cylance is revolutionizing cybersecurity with products and services that proactively prevent execution of advanced persistent threats and malware, enabling a level of security that far exceeds the effectiveness of current industry solutions deployed throughout enterprises, government and institutions worldwide. Cylance’s award-winning product, CylancePROTECT™ stops what others don’t, without requiring a cloud connection or frequent updates, all while using a fraction of the system resources associated with antivirus and endpoint security software.

Visit www.cylance.com

Presenting Sponsor (2017)

Airbus Defense & Space

Airbus CyberSecurity is a trusted partner of Governments, Military, Enterprise Organisations and Critical National Infrastructure across Europe. With locations in Newport, Paris and Munich Airbus CyberSecurity has vast experience and highly skilled experts developing market leading cyber security technologies. Including encryption, key management, security operating centres, threat intelligence, Industrial Control System solutions and cyber security consultancy. Through Cyber Defence Centres in the UK, France and Germany, Airbus CyberSecurity offer a range of services and solutions, dynamically combining monitoring, early detection and investigation of attacks, drastically reducing the incident response time. Providing a 24/7 service to ensure that the customers security is always at the forefront.’

Presenting Sponsor (2017)

PAS

PAS is a leading provider of software solutions for process safety, cybersecurity, and asset reliability to the energy, process, and power industries worldwide. PAS solutions include industrial control system cybersecurity, automation asset management, IPL assurance, alarm management, high performance HMI™, boundary management, and control loop performance optimization. PAS solutions are installed in over 1,100 facilities worldwide in more than 70 countries.

Presenting Sponsor (2017)

Darktrace

Darktrace is the world’s leading machine learning company for cyber security. Created by mathematicians from the University of Cambridge, the Enterprise Immune System uses AI algorithms to automatically detect and take action against cyber-threats within all types of networks, including physical, cloud and virtualized networks, as well as IoT and industrial control systems. A self-configuring platform, Darktrace requires no prior set-up, identifying advanced threats in real time, including zero-days, insiders and stealthy, silent attackers. Headquartered in San Francisco and Cambridge, UK, Darktrace has 24 offices worldwide.

Presenting Sponsor (2017)

Tenable

Tenable™ is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and midsized organizations across the private and public sectors. Learn more at tenable.com

Presenting Sponsor (2017)

Kaspersky

Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com

Presenting Sponsor (2017)

Tripwire

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprise and public sector organisations. Tripwire solutions are based on high-fidelity asset visability and endpoint intelligence combined with business context. tripwire’s solutions include configuration and policy management, file integrity monitoring, vulnerability management, log management reporting and analytics.

Associate Sponsor (2017)

Verve Industrial Protection

VERVE Industrial Protection was built off the 20+ year history of ICS systems design and cyber security management of its parent company, RKNEAL Engineering. The Verve team brings a unique combination of deep ICS expertise along with extensive cyber security knowledge to help bridge these two critical areas. Verve also offer control systems engineering using “design-for-defense” philosophy (e.g., secure design of upgrades and new builds and network segmentation of existing facilities). They also offer ongoing monitoring, remediation, and compliance management services.

Associate Sponsor (2017)

Honeywell

Honeywell Industrial Cyber Security is the leading provider of cyber security solutions that protect the availability, safety and reliability of industrial facilities and helps securely deploy IIoT technologies. We focus on reducing risk in industrial environments and help customers tackle cyber security challenges confidently with complete solutions, strong domain knowledge and advanced technology. Our complete portfolio leverages Honeywell’s industry-leading expertise and experience in process control and cyber security. Our customers all over the world partner with us to address cyber security holistically and stay ahead of threats with advanced technology, backed by continuous innovation and investment.

Platform Sponsor (2017)

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks, such as power utilities, oil & gas, water and others. Radiflow’s security tool-set validates the behavior of both M2M applications and H2M (Human to Machine) sessions in distributed operational networks. Radiflow was founded in 2009 as part of the RAD group, a family of ICT vendors with over $1Bn annual revenues. Radiflow solutions were launched at the end of 2011, validated by leading research labs and successfully deployed by major utilities world-wide.

Platform Sponsor (2017)

Claroty

Claroty’s mission is to protect industrial control networks from cyber-attacks; ensuring the safe and reliable operation of the world most critical infrastructures. Claroty enables customers to enjoy the substantial benefits of increasingly networked control systems without compromising operational resiliency, personnel safety or the security of core assets. The Claroty Platform is an integrated suite of cybersecurity products, providing unmatched threat protection, detection and response. The integrated platform is built on top of our CoreX technology which provides extreme visibility into the widest range of industrial control protocols, networks and devices. It combines safe, passive DPI with behavioral-based anomaly detection to provide unrivaled ICS risk management.

Platform Sponsor (2017)

CyberX

CyberX provides the most widely deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Deployed in the world’s largest environments and backed by military-grade cyber experts from the IDF, the CyberX platform uniquely combines M2M behavioral analytics with proprietary ICS-specific threat intelligence to predict advanced cyber attacks in real-time. Our purpose-built solution equips you to completely understand your OT environment assets and vulnerabilities, and identify potential exploit paths so you can proactively ensure that cyber attacks will not be successful.

VISIT: www.cyberx-lebs.com

Platform Sponsor (2017)

Nozomi Networks

Nozomi Networks is revolutionizing Industrial Control System (ICS) cybersecurity with the most comprehensive platform to deliver real-time cybersecurity and operational visibility. Since 2013 the company has innovated the use of machine learning and artificial intelligence to meet the unique challenges of securing critical infrastructure operations. Nozomi Networks delivers both cybersecurity and process anomaly detection along with industrial network visualization and monitoring, asset inventory, and vulnerability assessment. Deployed in the world’s largest industrial installations, customers benefit from enhanced cybersecurity and improved operational reliability with one end-to-end solution.

Roundtable Sponsor (2017)

Skybox

Skybox arms security leaders with the broadest set of solutions in security management to significantly reduce the risk of a breach. The Skybox® Security Suite integrates with more than 100 technologies and uses network modeling, attack vector analytics and multi-factor vulnerability prioritization to give unprecedented visibility of the attack surface and insight to key indicators of exposure (IOEs), such as exploitable vulnerability hot spots, unsecure device configurations and risky access rules. This gives security leaders the insight needed for effective, threat-centric vulnerability management and automated firewall and security policy management across hybrid and multi-cloud networks. Our award-winning solutions increase operational efficiency by as much as 90 percent and are used by the world’s most security-conscious enterprises and government agencies, including many Forbes Global 2000 companies.

Sponsorship Opportunities

Opportunities Available

Please contact info@qatalystglobal.com for all sponsorship opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners (2017)

Online Partner

International Comparative Legal Guides

The ICLG series provides current and practical comparative legal information on a range of practice areas. These comprehensive guides follow a question and answer format to ensure thorough coverage of each topic within different legal systems worldwide. Each guide draws together the collective expertise of our contributors to provide a valuable and convenient resource, updated annually. All guides are available free to access at www.iclg.com

VISIT: www.iclg.com

Online Partner

The International Society for Automation

Founded in 1945, the International Society of Automation is a leading, global, nonprofit organization with more than 40,000 members worldwide. ISA develops standards, certifies industry professionals, provides education and training, publishes books and technical articles, and hosts conferences and exhibitions for automation professionals. ISA’s 160 geographical sections connect members with technology, expert advice and world-class technical programming.

Online Partner

Infosec Conferences

Styled as 'The Web's Official Curators of Cybersecurity Conferences', InfoSec Conferences has published the leading directory of cyber security events across the globe since 2013. Join the community at http://www.infosec-conferences.com and get notified of cyber security events happening in your area today.

VISIT: www.infosec-conferences.com

Online Partner

Peerlyst

Peerlyst is building a community where information security pros can team up for a better future—for themselves and their enterprises. Home base for security leaders, Peerlyst is where you go to find knowledge and learn from experts, as well as to build your own professional reputation by sharing what you know. Whether you want to spread news, ask a question, create a resource, or share expertise and product insights, Peerlyst gives you an audience of more than half a million security professionals.

Supporting Partner

Information Security Forum (ISF)

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members. ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program.

Online Partner

Nuclear Industry Association

The NIA is the trade association for the civil nuclear industry in the UK. The NIA represents more than 260 companies across the supply chain. The diversity of NIA membership enables effective and constructive industry-wide interaction. Website: www.niauk.org

Online Partner

Technology Record

The online home of The Record magazine, technologyrecord.com provides news and industry thought leadership on Microsoft and partner technology in the communications and media, financial services, public sector, manufacturing, and retail and hospitality industries. The site covers industry trends, product launches, customer wins and event news, as well as commentary articles, case studies and in-depth features. For end customers, the site provides a wealth of information about how Microsoft and its partners are helping businesses in industry. For partners, the site provides a valuable channel to distribute product news, case studies and thought leadership.

VISIT:www.technologyrecord.com

Online Partner

EM360°

EM360°: Keeping busy executives with reports on the latest IT trends, presenting views from expert analysts and solution providers; EM360° offers specialist coverage making it the comprehensive guide for all aspects of organisational IT. With an established medium for editorial and online resources, we serve a global audience of C-level executives, management and IT practitioners, informing them of the latest developments in their industries

VISIT: www.em360tech.com

Online Partner

Embedded Computing Design

OpenSystems Media’s mission is to invest in connections to our readers that supply us the insight to provide relevant content for our audience. We have assembled a great content team that understands their purpose to ensure our properties are trusted brands that have credibility and add value. The content team ventures out seeking answers to questions and solutions to problems the engineering community is facing.

VISIT: www.embedded-computing.com

Online Partner

Cyber Security Review

The Cyber Security Review is uniquely positioned to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the international community’s development of coherent policies and robust capabilities to protect cyberspace, improve security and enhance confidence in the resilience of the cyber-enabled world. For more information please visit: www.cybersecurity-review.com

Online Partner

Cyber Security for Critical Assets

Formed off the back of the hugely successful CSCA series, the Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water) is a group for like-minded professionals within the Chemical and Petrochemical industry who are interested in connecting with people involved in prevention and protection against Cyber Attacks. The group, which is hosted on social networking site LinkedIn, promotes exclusive discussion regarding all aspects of Cyber Security from personal experiences to news stories as and when they happen.

Online Partner

Staysafeonline.org (NCSA)

NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets. In a climate of persistent threats, securing cyber space is a responsibility we all share. Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society capable of leveraging robust and widely available: content, community and communication.

Online Partner

Cyber Defense Magazine

Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.

Online Partner

Infosecurity Magazine

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Click here for the very best strategy, insight and latest news.

VISIT: www.infosecurity-magazine.com

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

History

 

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Testimonials

Register

Primary Market

Oil & Gas, Chemicals, Gov’t & Academia, Utilities

(Group discounts available)

Conference + Evening Reception

€999

Register Now

VENDOR / OTHER

Solution/Service Providers & Consultants

Conference + Evening Reception

€3,000

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now

Contact Us

GET IN TOUCH
Qatalyst Global
Dowgate Hill House
14 – 16 Dowgate Hill,
London, EC4R 2SU, UK
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

[contact-form-7 404 "Not Found"]

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: