CS4CA USA

6th – 8th March 2018

Houston, Texas

Now in its eleventh edition, the Cyber Security for Critical Assets Summit brings together senior level IT and OT professionals to discuss innovative ideas and discuss best practice guidelines.

RegisterRead MoreGet Updates

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

6th CS4CA USA

6th – 8th March 2018 Houston, Texas

Cyber security is a core focus for governments and businesses in the US, especially within the Oil and Gas, Pharma, Energy, Utility, Chemical and Petrochemical, Water and Aerospace industries.As cyber-attacks grow in sophistication, frequency and intensity, these industries are increasingly becoming high profile targets.
The CS4CA USA Summit will connect a wide range of senior level thought leaders across the Oil and Gas, Pharma, Energy, Utility, Chemical and Petrochemical, Water and Aerospace industries, and allow them to discuss industry challenges, share experiences and investigate the best practice guidelines; moving from recovery-focused to proactive and forward-thinking discussions that will bridge the gap between government, IT and OT senior leaders.
It is in these discussions amongst the industry experts that will, in turn, inform Cyber Security Policies for years to come and protect the future of the USA’s critical assets.

Make the most of your 3 days

  • The most advanced information and policies
  • Learn from individuals with first hand experience
  • Recognise current and future threats
  • Be part of the discussion that will impact the industry
  • Single track event with all attendees engaged in one discussion
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01  

>

6 March 2018
08:00 Registration and Seated Breakfast Hosted by Fortress Information Security
08:50 Opening Address from the Chairman
09:00 Opening Panel
Perfecting The Enterprise-Wide Cyber Security Culture

  • Cyber Security begins and ends with human behaviour – how do you factor that into policies?
  • How can/do you minimize that error internally?
  • What is the right balance for mobilising employees vs protecting ICS systems?
09:40 Keynote
APTs: Defining and defeating Cyber Security’s greatest adversary

  • Why is it becoming increasingly more difficult to tell whether an attack is perpetrated by a national actor, organized crime or individual?
  • Understanding and improving an organisation’s foundational security to help protect themselves from attack vectors
10:10 Platform
Understanding the Industrial Cloud

  • Defining the level of visibility required to uncover advanced threats and malicious activity
  • Making use of real time monitoring to detect human error and potential operational issues
10:20 Morning Refreshments and Speed Networking
11:00 Keynote
Understanding Tomorrow’s Cyber – The Bigger Picture

  • Understanding how global cyber capabilities are growing
  • Tying cyber espionage and terrorism to the overall risk calculation
  • Comprehending not just what and how cyber events occur but also why they do
11:30 Keynote
Anatomy of an Industrial Cyber Security Attack

  • How do ICS cyberattacks really operate? Where are the security gaps that enable these attacks?
  • Different protocols used in configuration and production operations and how to secure each
12:00 Keynote
Winning against the indefensible Attack

  • File-less Memory Attacks are rising rapidly
  • This topic will demonstrate how Control Flow Integrity may change the game
12:30 Seated Lunch hosted by Schneider Electric
13:30 Keynote
Can a person from the other side of the world disrupt and take out our infrastructure? If so, how long will humanity last?

  • The challenges in securing interconnected critical infrastructure assets, including the Internet, IP networks, telecommunications, banking and process control (SCADA) networks used in industry.
  • The importance of designing security solutions that integrate science, technology and policy
14:20 Platform
Key Features for a Business Driven Identity & Access Management Strategy

  • Understand how data loss prevention can be enhanced when leveraged with IAM capabilities
  • Key considerations when transforming IAM
14:30 Keynote
Combating the Ransomware Threat

  • Cyber extortion is an increasingly prevalent threat to the energy industry, and the most prominent tool at hackers’ disposal – ransomware is gaining momentum as one of the most feared malware types tracked by enterprise security teams
  • Analyzing the disruption to regular operations, financial losses incurred to restore systems and files and the potential harm to an organization’s reputation
15:00 Afternoon Refreshments and Networking
15:30 Presentation
Harmonising Initiatives: The Role of Industry and End-Users in Reducing Cyber Crime

  • Creating a culture of sharing incident information
16:00 Keynote
Using Disruptive Technologies for Oil and Gas Capital Projects

  • Using augmented reality and AR glasses
  • PCN and DSR assurance
16:30 Roundtables
Moderated Discussions – Choice of Topics

  • Key Considerations for Safeguarding ICS Networks
  • Preventing threats on portable media
  • Challenging conventional security architectures
  • Information classification and architecture
  • Cloud storage
  • Building a reliable operations team
17:10 Chairman’s Closing Address
17:30 Networking Drinks and Canapés hosted by CA Technologies
DAY 02  

>

7 March 2018
08:00 Registration and Seated Breakfast hosted by Synack
08:55 Welcome Address from the Chair
09:00 Opening Panel
Moving from Assessment to Acknowledgement: Attacks Are Going To Happen

  • Attacks will happen and do happen – what response plans are there?
  • Preparing the whole company, not just IT
  • Tools and training for a secure companywide culture
09:40 Platform
Applying Web Isolation to Protect Critical Infrastructure

  • What is web isolation?
  • How isolation eliminates malware and phising
  • Live Demo: Experience Isolation In Action
  • Case Study: Leading oil & gas company deploys isolation globally
09:50 Keynote
5-Point-Palm Exploding Heart Technique – The Difference and Benefits of SIEMS Vs Point Solutions   

  • Point solutions, end point solutions, or the network as your super power
  • Discussing the strengths and weaknesses of focused or centralized solutions and offers a different angle on how to secure your environment with a long term vendor agnostic strategy rather then any one product solution
  • Consolidation Vs point solution
10:20 Morning Refreshments & Networking
11:00 Keynote
Moving the Security Needle: Protecting Industrial Endpoints Against a Connected World

  • IIoT and today’s threat landscape have rendered traditional industrial control systems (ICS) security controls, such as air gapping and security by obscurity, unreliable. In this presentation, we will examine a next-generation approach to securing the process control network including:
  • IIoT challenges to cyber security
  • Automated Inventory of the Endpoints That Matter Most
  • Proprietary ICS Baselines and Breach Detection
  • Case Study
11:30 Case Study
Cyber Mutual Assistance – Bridging Mutual Assistance To Electric Utility Operators

  • Today, the electric industry’s culture of mutual assistance is a model for creating responses to cyber threats to the energy grid. Based on lessons learned from major destructive cyber incidents overseas, and from exercises in North America, the Cyber Mutual Assistance Program was developed. It is a natural extension of the electric power industry’s longstanding approach of sharing critical personnel and equipment when responding to emergencies.
12:10 Keynote
State Of The Phish: Understanding End User Behaviours Towards Phising

  • Despite having a solid security awareness and training program in place, today’s cybercriminals manage to evade even the savviest end users through carefully planned email phishing attacks that are only getting more advanced.
  • Hear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves.
  • Learn about the most devastating types of phishing emails used and how to thwart them.
12:40 Seated Lunch hosted by Arbor Networks
13:40 Case Study
Information Security: Careers, Crafts and Wizardry (People, Processes and Technology)

  • Overview of a strong InfoSec program
  • Discussion of skills gap between what is needed and what is available
  • Cyber Security skills: Broad understanding, Technical Knowledge, Analytical Capabilities
14:20 Case Study
Developing A Strategy to Fight Advanced Persistent Threats – How Best To Respond?

  • How to spot a campaign of Intellectual Property theft using cyber methods
  • The development of cyber cartels and the extent of international operations.
  • Protecting business intelligence and intellectual property for competitive advantage
  • The underground economy supporting espionage and fraud
  • The anatomy of an APT operation
15:00 Networking Break
15:30 Group Discussion: Cyber Risk As A Board-Level Issue

  • What are the major concerns the board will be interested in?
  • Vendor risk management – managing risk with interfacing operations.
  • How best to change the practice of IT being seen as a cost center to a core function which requires investment
  • Mobile technologies, social media and the general increase in electronic communication – what effect has this had?
16:20 Chairman’s Closing Remarks

 

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Sponsors

Presenting Sponsor

Indegy

Indegy improves operational safety and reliability by providing real-time situational awareness and security for industrial control networks. Our customers implement the Indegy platform to gain comprehensive visibility and control over the critical controllers that enable the automation of industrial processes. Indegy's core technologies monitor control-layer activities and identify in real-time changes to controller logic, configuration, firmware and state. Indegy applications for asset management, configuration control, comprehensive activity reports and backup and recovery capabilities enable quick response to cyber attacks, insider threats and human error.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners

Supporting Partner

Information Security Forum (ISF)

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members. ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program.

Online Partner

CIO Review

CIOReview is a technology magazine that talks about the enterprise solutions that can redefine the business goals of enterprises tomorrow. It is the leading source that shares innovative enterprise solutions developed by established solutions providers, upcoming hot enterprises and is a neutral source for technology decision makers. Published from Fremont, California, CIOReview is an excellent platform for the enterprise to showcase their innovative solutions.

Online Partner

EM360°

Keeping busy executives up to date with reports on the latest IT trends, presenting views from expert analysts and solution providers; EM360° offers specialist coverage making it the comprehensive guide for all aspects of organisational IT. With an established medium for editorial and online resources, we serve a global audience of C-level executives, management and IT practitioners, informing them of the latest developments in their industries

Online Partner

Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water)

Formed off the back of the hugely successful CSCA series, the Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water) is a group for like-minded professionals within the Chemical and Petrochemical industry who are interested in connecting with people involved in prevention and protection against Cyber Attacks. The group, which is hosted on social networking site LinkedIn, promotes exclusive discussion regarding all aspects of Cyber Security from personal experiences to news stories as and when they happen.

Online Partner

CrowdReviews.com

CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users which have experienced products and services first-hand and have an interest in letting other potential buyers their thoughts on their experience. CrowdReviews.com is driven by an algorithm allowing for both customers and providers of products and services to understand how the rankings are determined. The service can be used by potential buyers to learn more about their vendors prior to making a purchasing decision.

Online Partner

IT Security Guru

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site! http://www.itsecurityguru.org/

Online Partner

Oil Voice

OilVoice is a valuable source of upstream oil industry reference, featuring a global selection of oil company profiles in one location, alongside continually updated industry news, operational data, focused regional information, contact details and key industry personnel.

Online Partner

Cyber Defense Labs

Cyber Defense Labs is a cyber security and research organization focused on assisting corporate America, government, and community organizations with improving overall security effectiveness while educating and improving corporate and community awareness and value.

Online Partner

Staysafeonline.org (NCSA)

NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets. In a climate of persistent threats, securing cyber space is a responsibility we all share. Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society capable of leveraging robust and widely available: content, community and communication.

Online Partner

Cyber Defense Magazine

Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.  

Online Partner

Infosecurity Magazine

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Click here for the very best strategy, insight and latest news.

History

 

Testimonials

Register

Primary Market

Oil & Gas, Pharma, Chemicals, Gov’t & Academia, Utilities

(Group discounts available)

$1,699

Register Now

VENDOR / OTHER

Solution/Service Providers & Consultants

(Group discounts available)

$3,000

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now for 2018

Contact Us

GET IN TOUCH
Dowgate Hill House, 14 – 16 Dowgate Hill
London EC4R 2SU, United Kingdom
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

WordPress Image Lightbox

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

[contact-form-7 404 "Not Found"]

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: