CS4CA Europe

4-5 October 2017

London

This innovative Summit comes at a critical juncture for European security leaders facing increasingly complex threats from multiple different attackers. We’ll be bringing together operational technology/process control and corporate IT departments from the chemical, power, energy & utilities sectors to share best practice, discuss policy implications and face threats together.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

CYBER SECURITY FOR CRITICAL ASSETS EUROPE

4-5 October 2017 London UK

The 4th CS4CA Europe Summit is set in a world where theft of intellectual property, WannaCry-style ransomware and malicious phising attacks are becoming the norm.

The CS4CA Europe will will arm you with the knowledge and tools to fight the 21st Century cyber security battle. Exclusive keynote sessions from top industry execs present new ideas and different perspectives, whilst interactive panel debates offer delegates the chance to benchmark and discuss differing approaches to today’s challenges. In-depth case studies showcase success stories with tangible and actionable insights into securing infrastructure and assets without affecting day-to-day operations.

Make the most of your 2 days:

  • The most advanced information and policies
  • Learn from individuals with first-hand experience
  • Recognise current and future threats
  • Be part of the discussion that will impact the industry
  • All attendees engaged in one discussion: single track event
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01  
4th October 2017
08:15 Registration
08:50 Opening Address from the Chair
09:00 Opening Panel
The New Cyber Security Ecosystem

  • 5 months on from the Wannacry & BA disaster: the reality check or just the start?
  • Communicate and share – actioning against the problem
  • Some welcome AI and some steer clear: what’s your position?
  • Do you think you are overspending or underspending on security, and if so, by how much?
09:40 Keynote Presentation
Could the security industry have it all wrong?

  • How shifting focus from perimeters to people is crucial
    for success in the new era of mobility and cloud
  • How people AND data are key to better security
  • How the ability to see and understand the context behind user actions can prevent damaging breaches(Intentional and unintentional)
10:20 Networking Break & Business Card Exchange
11:00 Case Study
Closing the Gap Between Planning and Action

  • Part 1: Aligning IT & OT Priorities
  • Part 2: Taking the steps to prevent, detect and take action
11:30 Keynote Presentation
NCSC Thread Landscape

  • You have most likely been compromised – lets understand how and explore steps to mitigate and prevent
12:00 Platform Presentation
New Threat Vectors for ICS/SCADA Networks

  • Sine a light on the dark web
12:10 Presentation
Managing OT Security Risk: Understand Your Estate, Understand Your Risk

  • OT Security risk is a business risk
  • You can’t protect what you don’t understand
  • Risk management is not static, but an ongoing pocess
12:40 Seated Lunch Hosted by Forcepoint
13:40 Case Study
NIS Directive – ENISA’s Contribution

  • EU Policy efforts in the area of Critical Assets
  • The NIS Directive
  • ENISA’s contribution to the implementation of the directive
14:10 Presentation
The Rise of the Machine. Using AI to Tackle Cyber Security

  • Description of the ICS Cybersecurity Kill Chain and how it differs from the IT Cybersecurity Kill Chain
  • Identify choke points that can disrupt an attack
  • How AI can be used to protect those choke points
14:40 Networking Break
15:10 Case Study
Self-Learning Cyber Defense for ICS/SCADA Environments

  • How machine learning and AI are automating advanced threat detection
  • Why 100% network visibility allows you to pre-empt emerging situations, in real-time, across both IT and OT environments
  • How smart prioritisation and visualisation of threats allows for better resource allocation and lower risk
  • Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers
15:40 Platform Presentation
Delivering End-to-End Platforms for Operational Reliability
15:50 Case Study
Risk Management Becoming a Company-Wide Initative

  • How to prepare, protect, detect, respond and recover
  • Raising and maintaining awareness
  • Creating a culture of avoiding blind spots
16:20 Case Study
Moving the Security Needle: Protecting Industrial Endpoints Against a Connected World

  • How to prepare, protect, detect, respond and recover
  • Raising and maintaining awareness
  • Creating a culture of avoiding blind spots
16:50 Roundtables

  • Table 1: Building a reliable operations team
  • Table 2: What Does a Healthy Insider Threat Programme Look Like?
  • Table 3: See and Understand Where Your Most Critical Control Systems Are Vulnerable to Attack
  • Table 4: Supply Chain security
  • Table 5: Practical and Useable GDPR Guidelines
  • Table 6: How is the landscape for Maritime security evolving?
  • Table 7: NIS Directive and its impact
  • Table 8: Addressing the Skills Gap
17:30 Chairman’s Closing Address
17:40 Networking Drinks and Canapés
DAY 02  
5th October 2017
08:30 Registration
08:50 Welcome Address from the Chair
09:00 Opening Panel
Creating Resiliency throughout the Company in your Workforce and Framework

  • Designing training processes to address the needs of the future and differences between Millenials and GenY
  • What does resiliency mean to you
  • How do you protect critical communication infrastructure
  • Assessing Risk to Anticipate Attacks – Lets Face Reality/li>
09:40 Platform Presentation
Threat Intelligence to deal with Hurricanes and Earthquakes

  • Hurricanes: Attacks you see coming that you can prepare for
  • Earthquakes: Threats you do not see and need to respond to efficiently and quickly
10:10 Networking Break
10:50 Keynote Presentation
ICS2ICS – Introducing Cyber Security 2 Industrial Control Systems

  • History should be a lesson learned – OT can learn from IT mistakes
  • The biggest challenges are people & skills
  • What will the furture hold?
11:20 Presentation
What a Holistic, Integrated and Compliant Approach Should Look Like and how to Achieve It

  • Prioritising concerns
  • Using human and financial capital efficiently
11:50 Platform
What is The First Step Before Engaging in a Costly Cyber-Security Projection Project?

  • Threats are known to exist, imminent and severe! They happen every day, more frequently and with harsh implications
  • Due to numerous recent attacks, everyone plans to migrate the risks using various security products and solutions
  • Find out how to select the right, optimal and most effective path to do it
12:00 Presentation
Identifying Cyber Exposure points on critical assets

  • With critical assets becoming part of the attack path and a target for threat actors, it’s more important than ever to identify and manage the cyber exposure of these devices to reduce the probability of a business impacting event
12:30 Seated Lunch
13:30 Presentation
The Rise in DDoS Attacks

  • Stopping your systems tiring out
  • Complex approach to infrastructures are being used including through firewalls, web applications servers and other infrastructure components
14:00 Case Study
Using Disruptive Technologies to Test Weaknesses

  • How we used augmented reality to assess and determine our weaknesses when systems are vulnerable
14:30 Networking Break
15:00 Presentation
People are the Problem as well as the Solution

  • The focus has been on technology, with humans sidelined
  • The biggest problem will always be the human, both inside and outside an organisation
15:30 Case Study
A Marriage Between IT & OT

  • How TFL is working collaboratively while still maintaining clear delineation between the roles
16:00 Group Discussion
Do Current Guidelines do Enough and are They Being Effective?

  • Creating a culture of cyber awareness throughout the organisation horizontally and vertically – How?
16:40 Chairman’s Closing Address
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers

Sponsors

Official Sponsor

Forcepoint

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s behaviors and intent as they interact with critical data and IP wherever it resides. Their uncompromising systems enable companies to empower employees with unobstructed access to data while protecting intellectual property and simplifying compliance. Forcepoint’s people-centric vision also drives them to create intelligent systems that stop risky cyber behaviors and help organizations protect employees, critical data and IP wherever it resides.

Presenting Sponsor

Cylance

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over 4 million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

Presenting Sponsor

Airbus Defense & Space

Airbus CyberSecurity is a trusted partner of Governments, Military, Enterprise Organisations and Critical National Infrastructure across Europe. With locations in Newport, Paris and Munich Airbus CyberSecurity has vast experience and highly skilled experts developing market leading cyber security technologies. Including encryption, key management, security operating centres, threat intelligence, Industrial Control System solutions and cyber security consultancy. Through Cyber Defence Centres in the UK, France and Germany, Airbus CyberSecurity offer a range of services and solutions, dynamically combining monitoring, early detection and investigation of attacks, drastically reducing the incident response time. Providing a 24/7 service to ensure that the customers security is always at the forefront.’

Presenting Sponsor

PAS

PAS is a leading provider of software solutions for process safety, cybersecurity, and asset reliability to the energy, process, and power industries worldwide. PAS solutions include industrial control system cybersecurity, automation asset management, IPL assurance, alarm management, high performance HMI™, boundary management, and control loop performance optimization. PAS solutions are installed in over 1,100 facilities worldwide in more than 70 countries.

Presenting Sponsor

Darktrace

Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance across many industries. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including 18 offices globally.

Presenting Sponsor

Tenable

Tenable™ is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and midsized organizations across the private and public sectors. Learn more at tenable.com

Presenting Sponsor

Kaspersky

Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com

Presenting Sponsor

Tripwire

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprise and public sector organisations. Tripwire solutions are based on high-fidelity asset visability and endpoint intelligence combined with business context. tripwire’s solutions include configuration and policy management, file integrity monitoring, vulnerability management, log management reporting and analytics.

Associate Sponsor

Verve Industrial Protection

VERVE Industrial Protection was built off the 20+ year history of ICS systems design and cyber security management of its parent company, RKNEAL Engineering. The Verve team brings a unique combination of deep ICS expertise along with extensive cyber security knowledge to help bridge these two critical areas. Verve also offer control systems engineering using “design-for-defense” philosophy (e.g., secure design of upgrades and new builds and network segmentation of existing facilities). They also offer ongoing monitoring, remediation, and compliance management services.

Associate Sponsor

Honeywell

Honeywell Industrial Cyber Security is the leading provider of cyber security solutions that protect the availability, safety and reliability of industrial facilities and helps securely deploy IIoT technologies. We focus on reducing risk in industrial environments and help customers tackle cyber security challenges confidently with complete solutions, strong domain knowledge and advanced technology. Our complete portfolio leverages Honeywell’s industry-leading expertise and experience in process control and cyber security. Our customers all over the world partner with us to address cyber security holistically and stay ahead of threats with advanced technology, backed by continuous innovation and investment.

Platform Sponsor

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks, such as power utilities, oil & gas, water and others. Radiflow’s security tool-set validates the behavior of both M2M applications and H2M (Human to Machine) sessions in distributed operational networks. Radiflow was founded in 2009 as part of the RAD group, a family of ICT vendors with over $1Bn annual revenues. Radiflow solutions were launched at the end of 2011, validated by leading research labs and successfully deployed by major utilities world-wide.

Platform Sponsor

Claroty

Claroty’s mission is to secure and optimize the industrial control networks that run the world. The Claroty Platform provides extreme visibility into our customer’s OT networks. Powered by the elite Claroty Research team, the platform delivers real-time anomaly detection using , high-fidelity models and advanced algorithms to detect anomalies and alert our customers to both cybersecurity and process integrity issues.

Platform Sponsor

CyberX

CyberX provides the most widely deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Deployed in the world’s largest environments and backed by military-grade cyber experts from the IDF, the CyberX platform uniquely combines M2M behavioural analytics with proprietary ICS-specific threat intelligence to identify advanced cyberattacks in real-time.

Platform Sponsor

Nozomi Networks

Nozomi Networks is revolutionizing Industrial Control System (ICS) cybersecurity with the most comprehensive platform to deliver real-time cybersecurity and operational visibility. Since 2013 the company has innovated the use of machine learning and artificial intelligence to meet the unique challenges of securing critical infrastructure operations. Nozomi Networks delivers both cybersecurity and process anomaly detection along with industrial network visualization and monitoring, asset inventory, and vulnerability assessment. Deployed in the world’s largest industrial installations, customers benefit from enhanced cybersecurity and improved operational reliability with one end-to-end solution.

Roundtable Sponsor

Skybox

Skybox arms security leaders with the broadest set of solutions in security management to significantly reduce the risk of a breach. The Skybox® Security Suite integrates with more than 100 technologies and uses network modeling, attack vector analytics and multi-factor vulnerability prioritization to give unprecedented visibility of the attack surface and insight to key indicators of exposure (IOEs), such as exploitable vulnerability hot spots, unsecure device configurations and risky access rules. This gives security leaders the insight needed for effective, threat-centric vulnerability management and automated firewall and security policy management across hybrid and multi-cloud networks. Our award-winning solutions increase operational efficiency by as much as 90 percent and are used by the world’s most security-conscious enterprises and government agencies, including many Forbes Global 2000 companies.

Sponsorship Opportunities

Opportunities Available

Please contact info@qatalystglobal.com for all sponsorship opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners

Online Partner

International Comparative Legal Guides

The ICLG series provides current and practical comparative legal information on a range of practice areas. These comprehensive guides follow a question and answer format to ensure thorough coverage of each topic within different legal systems worldwide. Each guide draws together the collective expertise of our contributors to provide a valuable and convenient resource, updated annually. All guides are available free to access at www.iclg.com

VISIT: www.iclg.com

Online Partner

The International Society for Automation

Founded in 1945, the International Society of Automation is a leading, global, nonprofit organization with more than 40,000 members worldwide. ISA develops standards, certifies industry professionals, provides education and training, publishes books and technical articles, and hosts conferences and exhibitions for automation professionals. ISA’s 160 geographical sections connect members with technology, expert advice and world-class technical programming.

Online Partner

Infosec Conferences

Styled as 'The Web's Official Curators of Cybersecurity Conferences', InfoSec Conferences has published the leading directory of cyber security events across the globe since 2013. Join the community at http://www.infosec-conferences.com and get notified of cyber security events happening in your area today.

Online Partner

Peerlyst

Peerlyst is building a community where information security pros can team up for a better future—for themselves and their enterprises. Home base for security leaders, Peerlyst is where you go to find knowledge and learn from experts, as well as to build your own professional reputation by sharing what you know. Whether you want to spread news, ask a question, create a resource, or share expertise and product insights, Peerlyst gives you an audience of more than half a million security professionals.

Supporting Partner

Information Security Forum (ISF)

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members. ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program.

Online Partner

Nuclear Industry Association

The NIA is the trade association for the civil nuclear industry in the UK. The NIA represents more than 260 companies across the supply chain. The diversity of NIA membership enables effective and constructive industry-wide interaction. Website: www.niauk.org

Online Partner

Technology Record

The online home of The Record magazine, technologyrecord.com provides news and industry thought leadership on Microsoft and partner technology in the communications and media, financial services, public sector, manufacturing, and retail and hospitality industries. The site covers industry trends, product launches, customer wins and event news, as well as commentary articles, case studies and in-depth features. For end customers, the site provides a wealth of information about how Microsoft and its partners are helping businesses in industry. For partners, the site provides a valuable channel to distribute product news, case studies and thought leadership.

VISIT:www.technologyrecord.com

Online Partner

EM360°

EM360°: Keeping busy executives with reports on the latest IT trends, presenting views from expert analysts and solution providers; EM360° offers specialist coverage making it the comprehensive guide for all aspects of organisational IT. With an established medium for editorial and online resources, we serve a global audience of C-level executives, management and IT practitioners, informing them of the latest developments in their industries

VISIT: www.em360tech.com

Online Partner

Embedded Computing Design

OpenSystems Media’s mission is to invest in connections to our readers that supply us the insight to provide relevant content for our audience. We have assembled a great content team that understands their purpose to ensure our properties are trusted brands that have credibility and add value. The content team ventures out seeking answers to questions and solutions to problems the engineering community is facing.

VISIT: www.embedded-computing.com

Online Partner

Cyber Security Review

The Cyber Security Review is uniquely positioned to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the international community’s development of coherent policies and robust capabilities to protect cyberspace, improve security and enhance confidence in the resilience of the cyber-enabled world. For more information please visit: www.cybersecurity-review.com

Online Partner

Cyber Security for Critical Assets

Formed off the back of the hugely successful CSCA series, the Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water) is a group for like-minded professionals within the Chemical and Petrochemical industry who are interested in connecting with people involved in prevention and protection against Cyber Attacks. The group, which is hosted on social networking site LinkedIn, promotes exclusive discussion regarding all aspects of Cyber Security from personal experiences to news stories as and when they happen.

Online Partner

Staysafeonline.org (NCSA)

NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets. In a climate of persistent threats, securing cyber space is a responsibility we all share. Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society capable of leveraging robust and widely available: content, community and communication.

Online Partner

Cyber Defense Magazine

Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.

Online Partner

Infosecurity Magazine

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Click here for the very best strategy, insight and latest news.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

History

 

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Testimonials

Register

Primary Market

Oil & Gas, Chemicals, Gov’t & Academia, Utilities

(Group discounts available)

Conference + Evening Reception

€999

Register Now

VENDOR / OTHER

Solution/Service Providers & Consultants

Conference + Evening Reception

€3,000

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now

Contact Us

GET IN TOUCH
Qatalyst Global
Dowgate Hill House
14 – 16 Dowgate Hill,
London, EC4R 2SU, UK
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

WordPress Image Lightbox

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

[contact-form-7 404 "Not Found"]

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: