6th – 8th March 2018

Houston, Texas

Now in its eleventh edition, the Cyber Security for Critical Assets Summit brings together senior level IT and OT professionals to discuss innovative ideas and discuss best practice guidelines.

RegisterRead MoreGet Updates

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event


6th – 8th March 2018 Houston, Texas

New for 2018, the 6th Annual Cyber Security for Critical Assets Summit (USA) boasts two dedicated streams for IT and OT, allowing delegates to hone in on their specialist areas of interest, as well as plenary sessions addressing the common issues that bind both groups of professionals. Each stream is curated by a group of industry-leading experts to be as relevant, as cutting-edge and as in-depth as possible over two days.

Expect to be challenged, learn new techniques from some of the world’s top cyber security innovators and network with your peers at Europe’s leading critical infrastructure security event. You’ll hear exclusive keynotes from leading industry execs, you’ll get the chance to take part in interactive panel debates to benchmark your approach with others, you’ll get in-depth case studies relevant to your sector with tangible, actionable insights and you’ll get platform presentations showcasing the best of tomorrow’s technology.

Make the most of your 2 days

  • The most advanced information and policies
  • Learn from individuals with first hand experience
  • Recognise current and future threats
  • Be part of the discussion that will impact the industry
  • Double-stream for 2018, with more focused sessions and attendees
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit


DAY 01  



6 March 2018
08:00 Registration
08:50 Opening Address from the Chairman
09:00 Opening Panel
Perfecting The Enterprise-Wide Cyber Security Culture

  • Cyber Security begins and ends with human behaviour – how do you factor that into policies?
  • How can/do you minimize that error internally?
  • What is the right balance for mobilising employees vs protecting ICS systems?
09:40 Keynote
APTs: Defining and defeating Cyber Security’s greatest adversary

  • Why is it becoming increasingly more difficult to tell whether an attack is perpetrated by a national actor, organized crime or individual?
  • Understanding and improving an organisation’s foundational security to help protect themselves from attack vectors
10:10 Platform
Understanding the Industrial Cloud

  • Defining the level of visibility required to uncover advanced threats and malicious activity
  • Making use of real time monitoring to detect human error and potential operational issues
10:20 Morning Refreshments and Speed Networking
11:00 Keynote
Understanding Tomorrow’s Cyber – The Bigger Picture

  • Understanding how global cyber capabilities are growing
  • Tying cyber espionage and terrorism to the overall risk calculation
  • Comprehending not just what and how cyber events occur but also why they do
11:30 Keynote
Anatomy of an Industrial Cyber Security Attack

  • How do ICS cyberattacks really operate? Where are the security gaps that enable these attacks?
  • Different protocols used in configuration and production operations and how to secure each
12:00 Keynote
Winning against the indefensible Attack

  • File-less Memory Attacks are rising rapidly
  • This topic will demonstrate how Control Flow Integrity may change the game
12:30 Seated Lunch
13:30 Keynote
Can a person from the other side of the world disrupt and take out our infrastructure? If so, how long will humanity last?

  • The challenges in securing interconnected critical infrastructure assets, including the Internet, IP networks, telecommunications, banking and process control (SCADA) networks used in industry.
  • The importance of designing security solutions that integrate science, technology and policy
14:20 Platform Presentation
Key Features for a Business Driven Identity & Access Management Strategy

  • Understand how data loss prevention can be enhanced when leveraged with IAM capabilities
  • Key considerations when transforming IAM
14:30 Keynote
Combating the Ransomware Threat

  • Cyber extortion is an increasingly prevalent threat to the energy industry, and the most prominent tool at hackers’ disposal – ransomware is gaining momentum as one of the most feared malware types tracked by enterprise security teams
  • Analyzing the disruption to regular operations, financial losses incurred to restore systems and files and the potential harm to an organization’s reputation
15:00 Afternoon Refreshments and Networking
15:30 Presentation
Harmonising Initiatives: The Role of Industry and End-Users in Reducing Cyber Crime

  • Creating a culture of sharing incident information
16:00 Keynote
Using Disruptive Technologies for Oil and Gas Capital Projects

  • Using augmented reality and AR glasses
  • PCN and DSR assurance
16:10 Roundtables

  • Key Considerations for Safeguarding ICS Networks
  • Preventing threats on portable media
  • Challenging conventional security architectures
  • Information classification and architecture
  • Cloud storage
  • Building a reliable operations team
16:30 Chairman’s Closing Remarks
17:30 Networking Drinks and Canapés
DAY 02  


7 March 2018
08:00 Registration and Seated Breakfast
08:55 Welcome Address from the Chair
09:00 Opening Panel
Moving from Assessment to Acknowledgement: Attacks Are Going To Happen

  • Attacks will happen and do happen – what response plans are there?
  • Preparing the whole company, not just IT
  • Tools and training for a secure companywide culture
09:40 Platform
Applying Web Isolation to Protect Critical Infrastructure

  • What is web isolation?
  • How isolation eliminates malware and phising
  • Live Demo: Experience Isolation In Action
  • Case Study: Leading oil & gas company deploys isolation globally
09:50 Keynote
5-Point-Palm Exploding Heart Technique – The Difference and Benefits of SIEMS Vs Point Solutions   

  • Point solutions, end point solutions, or the network as your super power
  • Discussing the strengths and weaknesses of focused or centralized solutions and offers a different angle on how to secure your environment with a long term vendor agnostic strategy rather then any one product solution
  • Consolidation Vs point solution
10:20 Morning Refreshments & Networking
11:00 Keynote
Moving the Security Needle: Protecting Industrial Endpoints Against a Connected World

  • IIoT and today’s threat landscape have rendered traditional industrial control systems (ICS) security controls, such as air gapping and security by obscurity, unreliable. In this presentation, we will examine a next-generation approach to securing the process control network including:
  • IIoT challenges to cyber security
  • Automated Inventory of the Endpoints That Matter Most
  • Proprietary ICS Baselines and Breach Detection
  • Case Study
11:30 Case Study
Cyber Mutual Assistance – Bridging Mutual Assistance To Electric Utility Operators

  • Today, the electric industry’s culture of mutual assistance is a model for creating responses to cyber threats to the energy grid. Based on lessons learned from major destructive cyber incidents overseas, and from exercises in North America, the Cyber Mutual Assistance Program was developed. It is a natural extension of the electric power industry’s longstanding approach of sharing critical personnel and equipment when responding to emergencies.
12:10 Keynote
State Of The Phish: Understanding End User Behaviours Towards Phising

  • Despite having a solid security awareness and training program in place, today’s cybercriminals manage to evade even the savviest end users through carefully planned email phishing attacks that are only getting more advanced.
  • Hear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves.
  • Learn about the most devastating types of phishing emails used and how to thwart them.
12:40 Seated Lunch
13:40 Case Study
Information Security: Careers, Crafts and Wizardry (People, Processes and Technology)

  • Overview of a strong InfoSec program
  • Discussion of skills gap between what is needed and what is available
  • Cyber Security skills: Broad understanding, Technical Knowledge, Analytical Capabilities
14:20 Case Study
Developing A Strategy to Fight Advanced Persistent Threats – How Best To Respond?

  • How to spot a campaign of Intellectual Property theft using cyber methods
  • The development of cyber cartels and the extent of international operations.
  • Protecting business intelligence and intellectual property for competitive advantage
  • The underground economy supporting espionage and fraud
  • The anatomy of an APT operation
15:00 Networking Break
15:30 Group Discussion: Cyber Risk Board-Level Issue

  • What are the major concerns the board will be interested in?
  • Vendor risk management – managing risk with interfacing operations.
  • How best to change the practice of IT being seen as a cost center to a core function which requires investment
  • Mobile technologies, social media and the general increase in electronic communication – what effect has this had?
16:30 Chairman’s Closing Remarks
17:10 Networking Drinks and Canapés


Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit


Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit


Hosting Sponsor

Arbor Networks

For fifteen years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on Arbor Networks for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with Arbor Networks.

Plenary Sponsor


Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over 4 million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

Presenting Sponsor - OT Stream


Indegy improves operational safety and reliability by providing real-time situational awareness and security for industrial control networks. Our customers implement the Indegy platform to gain comprehensive visibility and control over the critical controllers that enable the automation of industrial processes. Indegy's core technologies monitor control-layer activities and identify in real-time changes to controller logic, configuration, firmware and state. Indegy applications for asset management, configuration control, comprehensive activity reports and backup and recovery capabilities enable quick response to cyber attacks, insider threats and human error.

Presenting Sponsor - OT Stream


PAS is a leading provider of software solutions for process safety, cybersecurity, and asset reliability to the energy, process, and power industries worldwide. PAS solutions include industrial control system cybersecurity, automation asset management, IPL assurance, alarm management, high performance HMI™, boundary management, and control loop performance optimization. PAS solutions are installed in over 1,100 facilities worldwide in more than 70 countries.

Presenting Sponsor - OT Stream


Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance across many industries. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including 18 offices globally.

Networking Sponsor


Bayshore is an award-winning, patented IT/OT Gateway platform providing IT departments with unprecedented visibility into OT operations. It enables Fortune 1000 industrial and enterprise customers to rapidly build & execute policies for OT cybersecurity, secure M2M communications, manufacturing operations, & robotics automation. Bayshore is distinguished by its extremely deep content inspection, granular filtering of network flows (including files within files and archives), policy building and enforcement, and its ability to detect, parse and segment industrial protocols. Leveraging these capabilities, Bayshore delivers ROI in areas such as production zone cybersecurity, operational continuity, data protection/data loss prevention, and plant safety.

Opportunities Available

Opportunities Available

Please contact info@qatalystglobal.com for all sponsorship opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit


Online Partner

Infosec Conferences

Styled as 'The Web's Official Curators of Cybersecurity Conferences', InfoSec Conferences has published the leading directory of cyber security events across the globe since 2013. Join the community at http://www.infosec-conferences.com and get notified of cyber security events happening in your area today.

Online Partner

Cyber Security for Critical Assets

Formed off the back of the hugely successful CSCA series, the Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water) is a group for like-minded professionals within the Chemical and Petrochemical industry who are interested in connecting with people involved in prevention and protection against Cyber Attacks. The group, which is hosted on social networking site LinkedIn, promotes exclusive discussion regarding all aspects of Cyber Security from personal experiences to news stories as and when they happen.





Primary Market

Oil & Gas, Pharma, Chemicals, Gov’t & Academia, Utilities

Conference + Evening Reception

Regular price $1,699 – Save $600 until 12th January 2018


Register Now


Solution/Service Providers & Consultants

Conference + Evening Reception

Regular price $3,000 – Save $500 until 12th January 2018


Register Now


Interested in Sponsorship?

Enquire Now for 2018

Contact Us

Dowgate Hill House, 14 – 16 Dowgate Hill
London EC4R 2SU, United Kingdom
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on

Send a Message

WordPress Image Lightbox

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:


Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:





Please fill in your details below to receive regular updates from Qatalyst Global.



Please fill in your details below to download the brochure.


Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:


[contact-form-7 404 "Not Found"]

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:


ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: