CS4CA USA

8th – 9th March 2017

Houston, Texas

The tenth Summit in a successful series of Cyber Security for Critical Assets events, that bring together senior level IT and OT professionals to discuss innovative ideas and discuss best practice guidelines.

RegisterRead MoreGet Updates

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

5th CS4CA USA

8th – 9th March 2017 Houston, Texas

Cyber security is a core focus for governments and businesses in the US, especially within the Oil and Gas, Energy, Utility, Chemical and Petrochemical, Water and Aerospace industries.As cyber-attacks grow in sophistication, frequency and intensity, these industries are increasingly becoming high profile targets.
The CS4CA USA Summit will connect a wide range of senior level thought leaders across the Oil and Gas, Energy, Utility, Chemical and Petrochemical, Water and Aerospace industries, and allow them to discuss industry challenges, share experiences and investigate the best practice guidelines; moving from recovery-focused to proactive and forward-thinking discussions that will bridge the gap between government, IT and OT senior leaders.
It is in these discussions amongst the industry experts that will, in turn, inform Cyber Security Policies for years to come and protect the future of the USA’s critical assets.

Make the most of your 2 days

  • The most advanced information and policies
  • Learn from individuals with first hand experience
  • Recognise current and future threats
  • Be part of the discussion that will impact the industry
  • Single track event with all attendees engaged in one discussion
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01  

>

8 March 2017
08:00 Registration
08:50 Opening Address from the Chairman
09:00 Opening Panel
Perfecting The Enterprise-Wide Cyber Security Culture

  • Cyber Security begins and ends with human behaviour – how do you factor that into policies?
  • How can/do you minimize that error internally?
  • What is the right balance for mobilising employees vs protecting ICS systems?
09:40 Keynote
APTS: Defining and defeating Cyber Security’s greatest adversary

  • Why is it becoming increasingly more difficult to tell whether an attack is perpetrated by a national actor, organized crime or individual?
  • Understanding and improving an organisation’s foundational security to help protect themselves from attack vectors
10:10 Platform
Understanding the Industrial Cloud

  • Defining the level of visibility required to uncover advanced threats and malicious activity
  • Making use of real time monitoring to detect human error and potential operational issues
10:20 Break and Speed Networking
11:00 Keynote
Understanding Tomorrow’s Cyber – The Bigger Picture

  • Understanding how global cyber capabilities are growing
  • Tying cyber espionage and terrorism to the overall risk calculation
  • Comprehending not just what and how cyber events occur but also why they do
11:30 Keynote
Anatomy of an Industrial Cyber Security Attack

  • How do ICS cyberattacks really operate? Where are the security gaps that enable these attacks?
  • Different protocols used in configuration and production operations and how to secure each
12:00 Keynote
Turning Challenging into Thriving Working Conditions

  • Key threats: new interface and ecosystem
  • Hackers turning to physical methods
  • IoT changing the industrial landscape and creating new implementation methods
12:30 Seated Lunch hosted by Schneider Electric
13:30 Keynote
Why is Critical Infrastructure so easy to attack?

  • Understanding how global cyber capabilities are growing
  • Tying cyber espionage and terrorism to the overall risk calculation
  • Comprehending not just what and how cyber events occur but also why they do
14:10 Platform
Key Features for a Business Driven Identity & Access Management Strategy

  • Understand how data loss prevention can be enhanced when leveraged with IAM capabilities
  • Key considerations when transforming IAM
14:20 Keynote
Choosing a Cyber Threat Intelligence Provider

  • Evaluating vendors who complement and expand enterprise capabilities
  • How to focus on critical infrastructure protection to benefit and integrate with internal capabilities through proactive, actionable threat intelligence?
14:50 Afternoon Refreshments and Networking
15:20 Presentation
Framework Updates and Insights Using New Trends

  • Do not overlook lawyers, auditors and procurement officers when creating your policy
  • Benefits of a vulnerability assessor in your program
15:50 Roundtables
Moderated Discussions – Choice of Topics

  • Key Considerations for Safeguarding ICS Networks – What, Where, How?
  • Engaging the User in Awareness Training
16:30 Keynote
Using Disruptive Technologies for Oil and Gas Capital Projects

  • Case Study of Mad Dog 2 project
  • Using augmented reality and AR glasses
  • Using augmented reality and AR glasses
  • PCN and DSR assurance
17:10 Chairman’s Closing Address
17:30 Networking Drinks and Canapés
DAY 02  

10:20 Networking Break

>

9 March 2017
08:00 Registration
08:55 Welcome Address from the Chair
09:10 Opening Panel
Moving from Assessment to Acknowledgement: Attacks Are Going To Happen

  • Attacks will happen and do happen – what response plans are there?
  • Preparing the whole company, not just IT
  • Tools and training for a secure companywide culture
09:40 Platform
Applying Web Isolation to Protect Critical Infrastructure

  • What is web isolation?
  • How isolation eliminates malware & phising
  • Live Demo: Experience Isolation in Action
  • Case Study: Leading Oil and Gas Company deploys Isolation Globally
10:20 Morning Refreshments & Networking
11:00 Keynote
Protecting the Industrial IoT & Securing Industry 4.0

  • IIoT is the heart of production – case study on the steps taken to make it work whilst keeping ICS systems secure
11:30 Case Study
Cyber Mutual Assistance – Bridging Mutual Assistance To Electric Utility Operators

  • The cyber culture within the electric industry is a model for the rest of the energy grid.
  • History and Development of Cyber Mutual Assistance Program
  • Benefits of a Shared Culture When Tackling CyberAttacks
11:50 Live Hack
Advanced Phising Attacks

12:30 Seated Lunch hosted by Arbor Networks
13:30 Case Study
Managing the Operational Information Security Risks using the CERT-RMM and ONG-C2M2

  • Security controls and appropriate safeguards
  • Convergence challenges
  • Integrating enterprise privacy and information security
14:00 Case Study
Maintaining Asset Integration

  • Synchronising IT and Business Strategy
  • Placing both IT and OT on same side of the table to improve business operations
  • New techniques to protect legacy systems
14:30 Keynote
Harmonising Initiatives: The Role of Industry and End Users in reducing Cyber Crime

  • Creating a culture of sharing incident information
15:00 Networking Break
15:10 Case Study
How to increase safety when designing & implementing a resilient, flexible and future-proof SCADA environment

15:50 Presentation

Cyber Insurance – Legal Considerations for Establishing A Resilient Cyber Security Policy

  • An overview of current and future legislation
  • Who has jurisdiction over the data? National and international boundaries
16:30 Group Discussion: How To Justify Your Cyber Security Budget By Calculating ROI
17:10 Chairman’s Closing Remarks
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Sponsors

Official Sponsor

sch

Schneider Electric

At Schneider Electric we believe access to energy is a basic human right. We want everyone on our planet to have access to reliable, safe, efficient, and sustainable energy. We are committed to innovate solutions that address this energy paradox, balancing our planet’s carbon footprint and supporting the undisputable right of everyone to quality energy.

Hosting Sponsor

arbor-networks-388-x388

Arbor Networks

Arbor Networks  secures the world's most demanding and complex networks from DDoS attacks and advanced threats. Their customers gain a micro view of their own network, through Arbor Network's suite of products, combined with a macro view of global Internet traffic and emerging threats, through our ATLAS threat intelligence infrastructure.

Presenting Sponsor

Cylance

Cylance

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over 4 million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

Presenting Sponsor

PAS logo

PAS

PAS is a leading provider of software solutions for process safety, cybersecurity, and asset reliability to the energy, process, and power industries worldwide. PAS solutions include industrial control system cybersecurity, automation asset management, IPL assurance, alarm management, high performance HMI™, boundary management, and control loop performance optimization. PAS solutions are installed in over 1,100 facilities worldwide in more than 70 countries.

Presenting Sponsor

wombat-logo-for-website

Wombat Security

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security software education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules to reduce employee susceptibility to attack, even phising attacks, up to 90%

Presenting Sponsor

indegy---web

Indegy

Indegy improves operational safety and reliability by providing real-time situational awareness and security for industrial control networks. Our customers implement the Indegy platform to gain comprehensive visibility and control over the critical controllers that enable the automation of industrial processes. Indegy's core technologies monitor control-layer activities and identify in real-time changes to controller logic, configuration, firmware and state. Indegy applications for asset management, configuration control, comprehensive activity reports and backup and recovery capabilities enable quick response to cyber attacks, insider threats and human error.

Presenting Sponsor

VRSN_logo_vertical_RGB

Verisign

Verisign iDefense Security Intelligence Services provides relevant, actionable cyber threat intelligence in context around cyber crime, cyber espionage, hacktivism and vulnerabilities, delivered via a next-generation security intelligence platform and API. iDefense intelligence helps Web-reliant organizations stay ahead of threats, make better-informed security and business decisions, and move from a reactive to a proactive security posture. For more information about how Verisign iDefense Security Intelligence Services can help provide relevant, actionable intelligence in context.

Associate Sponsor

Kaspersky

Kaspersky

Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com

Associate Sponsor

darktrace-logo

Darktrace

Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance across many industries. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including 18 offices globally.

Platform Sponsor

fireglass-square

Fireglass

Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network. Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.

Platform Sponsor

logrhythm-logo

LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

Platform Sponsor

claroty

Claroty

Claroty’s mission is to secure and optimize the industrial control networks that run the world.  The Claroty Platform provides extreme visibility into our customer’s OT networks. Powered by the elite Claroty Research team, the platform delivers real-time anomaly detection using , high-fidelity models and advanced algorithms to detect anomalies and alert our customers to both cybersecurity and process integrity issues.

Roundtable Sponsor

opswat

OPSWAT

OPSWAT is a San Francisco based software company that provides solutions to secure and manage IT infrastructure. Our technologies provide unmatched protection & analysis of known and unknown threats, allowing organizations to control & secure their data flows as well as enhancing malware detection in third-party security applications. OPSWAT’s intuitive applications and comprehensive development kits are deployed by SMB, enterprise and OEM customers to more than 100 million endpoints worldwide

Networking Sponsor

bayshore-logo

Bayshore

Bayshore is an award-winning, patented IT/OT Gateway platform providing IT departments with unprecedented visibility into OT operations. It enables Fortune 1000 industrial and enterprise customers to rapidly build & execute policies for OT cybersecurity, secure M2M communications, manufacturing operations, & robotics automation. Bayshore is distinguished by its extremely deep content inspection, granular filtering of network flows (including files within files and archives), policy building and enforcement, and its ability to detect, parse and segment industrial protocols. Leveraging these capabilities, Bayshore delivers ROI in areas such as production zone cybersecurity, operational continuity, data protection/data loss prevention, and plant safety.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners

Online Partner

CIO Review

CIO Review

Online Partner

em360tech-logo-350x350

EM360°

Keeping busy executives up to date with reports on the latest IT trends, presenting views from expert analysts and solution providers; EM360° offers specialist coverage making it the comprehensive guide for all aspects of organisational IT. With an established medium for editorial and online resources, we serve a global audience of C-level executives, management and IT practitioners, informing them of the latest developments in their industries

Online Partner

linkedin pic for web

Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water)

Formed off the back of the hugely successful CSCA series, the Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water) is a group for like-minded professionals within the Chemical and Petrochemical industry who are interested in connecting with people involved in prevention and protection against Cyber Attacks. The group, which is hosted on social networking site LinkedIn, promotes exclusive discussion regarding all aspects of Cyber Security from personal experiences to news stories as and when they happen.

Online Partner

cr-logo

CrowdReviews.com

CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users which have experienced products and services first-hand and have an interest in letting other potential buyers their thoughts on their experience. CrowdReviews.com is driven by an algorithm allowing for both customers and providers of products and services to understand how the rankings are determined. The service can be used by potential buyers to learn more about their vendors prior to making a purchasing decision.

Online Partner

it-sec-guru-logo

IT Security Guru

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site! http://www.itsecurityguru.org/

Online Partner

oil-voice-web

Oil Voice

OilVoice is a valuable source of upstream oil industry reference, featuring a global selection of oil company profiles in one location, alongside continually updated industry news, operational data, focused regional information, contact details and key industry personnel.

Online Partner

cyber-defense-labs-logo

Cyber Defense Labs

Cyber Defense Labs is a cyber security and research organization focused on assisting corporate America, government, and community organizations with improving overall security effectiveness while educating and improving corporate and community awareness and value.

Online Partner

staysafeonline.org

Staysafeonline.org (NCSA)

NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets. In a climate of persistent threats, securing cyber space is a responsibility we all share. Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society capable of leveraging robust and widely available: content, community and communication.

Online Partner

cdm

Cyber Defense Magazine

Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.  

Online Partner

Untitled-10

Infosecurity Magazine

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Click here for the very best strategy, insight and latest news.

History

 

Testimonials

Register

Primary Market

Oil & Gas, Chemicals, Gov’t & Academia, Utilities

(Group discounts available)

$1,699

Register Now

VENDOR / OTHER

Solution/Service Providers & Consultants

(Group discounts available)

$3,000

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Contact Us

GET IN TOUCH
Dowgate Hill House, 14 – 16 Dowgate Hill
London EC4R 2SU, United Kingdom
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

23

WordPress Image Lightbox

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

Your Name (required)

Your Email (required)

Subject

Your Message

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: