CS4CA Europe

2-3 October 2018

London

The 5th edition of the CS4CA European Summit comes at a critical juncture for European security leaders facing increasingly complex threats from multiple different attackers. We’ll be bringing together operational technology/process control and corporate IT departments from the chemical, power, energy & utilities sectors to share best practice, discuss policy implications and face threats together.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

CYBER SECURITY FOR CRITICAL ASSETS EUROPE

2-3 October 2018 London UK

The 5th CS4CA Europe Summit is set in a world where theft of intellectual property, WannaCry-style ransomware and malicious phising attacks are becoming the norm.

The CS4CA Europe will will arm you with the knowledge and tools to fight the 21st Century cyber security battle. Exclusive keynote sessions from top industry execs present new ideas and different perspectives, whilst interactive panel debates offer delegates the chance to benchmark and discuss differing approaches to today’s challenges. In-depth case studies showcase success stories with tangible and actionable insights into securing infrastructure and assets without affecting day-to-day operations.

Make the most of your 2 days:

  • The most advanced information and policies
  • Learn from individuals with first-hand experience
  • Recognise current and future threats
  • Be part of the discussion that will impact the industry
  • All attendees engaged in one discussion: single track event
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01  
2nd October 2018
08:00 Registration & Breakfast
08:50 Opening Address from the Chair
09:00 Opening Panel
The New Cyber Security Ecosystem

  • 5 months on from the Wannacry & BA disaster: the reality check or just the start?
  • Communicate and share – actioning against the problem
  • Do you think you are overspending or underspending on security, and if so, by how much?
  • What type of influence is AI and IoT playing on your framework?
09:40 Keynote Presentation
Could the security industry have it all wrong?

  • How shifting focus from perimeters to people is crucial
    for success in the new era of mobility and cloud
  • How people AND data are key to better security
  • How the ability to see and understand the context behind user actions can prevent damaging breaches(Intentional and unintentional)
10:20 Networking Break & Business Card Exchange
11:00 Case Study
Closing the Gap Between Planning and Action

  • Part 1: Aligning IT & OT Priorities
  • Part 2: Taking the steps to prevent, detect and take action
11:30 Keynote Presentation
NCSC Thread Landscape

  • Exploring the cyber reat to UK critical infrastructure
  • Key priorities for UK when working with EU on policy
12:00 Platform Presentation
New Threat Vectors for ICS/SCADA Networks

  • Sine a light on the dark web
12:10 Presentation
Managing OT Security Risk: Understand Your Estate, Understand Your Risk

  • OT Security risk is a business risk
  • You can’t protect what you don’t understand
  • Risk management is not static, but an ongoing pocess
12:40 Seated Lunch Hosted by Forcepoint
13:40 Case Study
NIS Directive – ENISA’s Contribution

  • EU Policy efforts in the area of Critical Assets
  • The NIS Directive
  • ENISA’s contribution to the implementation of the directive
14:10 Presentation
The Rise of the Machine. Using AI to Tackle Cyber Security

  • Description of the ICS Cybersecurity Kill Chain and how it differs from the IT Cybersecurity Kill Chain
  • Identify choke points that can disrupt an attack
  • How AI can be used to protect those choke points
14:40 Networking Break
15:10 Case Study
Self-Learning Cyber Defense for ICS/SCADA Environments

  • How machine learning and AI are automating advanced threat detection
  • Why 100% network visibility allows you to pre-empt emerging situations, in real-time, across both IT and OT environments
  • How smart prioritisation and visualisation of threats allows for better resource allocation and lower risk
  • Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers
15:40 Platform Presentation
Delivering End-to-End Platforms for Operational Reliability

  • Integrating modules for asset inventory and vulnerability to create a comprehensive solution for critical infrastructure
15:50 Case Study
Risk Management Becoming a Company-Wide Initative

  • How to prepare, protect, detect, respond and recover
  • Raising and maintaining awareness
  • Creating a culture of avoiding blind spots
16:20 Case Study
Moving the Security Needle: Protecting Industrial Endpoints Against a Connected World

  • How to prepare, protect, detect, respond and recover
  • Raising and maintaining awareness
  • Creating a culture of avoiding blind spots
16:50 Roundtables

  • Table 1: Building a reliable operations team
  • Table 2: What Does a Healthy Insider Threat Programme Look Like?
  • Table 3: See and Understand Where Your Most Critical Control Systems Are Vulnerable to Attack
  • Table 4: Supply Chain security
  • Table 5: Practical and Useable GDPR Guidelines
  • Table 6: How is the landscape for Maritime security evolving?
17:30 Chairman’s Closing Address
17:40 Networking Drinks
DAY 02  
3rd October 2018
08:00 Registration & Breakfast
08:50 Welcome Address from the Chair
09:00 Opening Panel
Creating Two Way Communication Channels and Education for IT & ICS to Work Together

  • This panel addresses a topic that has been around for a while now, but has it found its way or is it still a problem?
  • What have been the most effective channels for setting up communication for you?
  • How centralised should the cyber security function be?
  • Are you and if so how, are you treating operational priorities as business priorities?
09:40 Platform Presentation
Hurricanes and Earthquakes. Risks predicted and Risks Occurred

  • Vulnerabilities – Which ones to be considered first for industrial facility: ICS specific or general IT, 0-days or 1-days, backdoors or vendor mistakes (RCE’s)
  • Attacks – Foreign country backed, criminal targeted or random
10:10 Platform
Understanding the Industrial Cloud

  • Defining level of visability required to uncover advanced threats and malicious activity
  • Making use of real-time monitoring to detect human error and operational issues
10:20 Networking Break
10:50 Keynote Presentation
ICS2ICS – Introducing Cyber Security 2 Industrial Control Systems

  • History should be a lesson learned – OT can learn from IT mistakes
  • The biggest challenges are people & skills
  • What will the furture hold?
11:20 Presentation
Reboot Your Human Firewall

  • Understand why security awareness is the wrong goal and focus
  • Learn about a new way of thinking and creating content that changes the security culture across the company at all levels
  • See how that model enables the creation of cultural metrics and measurement, which can then drive follow-on actions
11:50 Platform
What is The First Step Before Engaging in a Costly Cyber-Security Projection Project?

  • Threats are known to exist, imminent and severe! They happen every day, more frequently and with harsh implications
  • Due to numerous recent attacks, everyone plans to migrate the risks using various security products and solutions
  • Find out how to select the right, optimal and most effective path to do it
12:00 Presentation
Identifying Cyber Exposure points on critical assets

  • With critical assets becoming part of the attack path and a target for threat actors, it’s more important than ever to identify and manage the cyber exposure of these devices to reduce the probability of a business impacting event
12:30 Seated Lunch
13:30 Case Study
Is OT in the cloud Still a “Dirty” Word?

  • Scotia Gas Networks experience of adopting the cloud services for our IT environment
  • The pull from business, the dream of real-time analytics and the discovery of big data was enough to take the plunge
  • Reviewing our steps and learning how to meet and realign our targets throughout the journey
14:00 Case Study
The Future Will Be Challenging, Be Proactive, Not Reactive

  • Digital innovation is disruptive, costly and difficult to integrate with legacy systems, this session will look at how we can transform and integrate it into our systems and framework
  • The importance of strategy, leadership and collaboration must stay at the centre of any integration
  • AI, VR, AR, big data and machine learning are all a dynamic resource base – exploring how best to utilise and act now
14:30 Networking Break
15:00 Presentation
People are the Problem as well as the Solution

  • The focus has been on technology, with humans sidelined
  • The biggest problem will always be the human, both inside and outside an organisation
15:30 Case Study
Blockchain the New Kid on the Process Control Block

  • Critical systems are being revolutionised by Blockchain as a weapon against security – Exploring what that means to ICS systems
16:00 Group Discussion
Is it Time for a Peer to Peer Community to Advise the Cyber Security Community?

  • The role of the CISO and equivalent has changed drastically over the last few years and continues to evolve. Cyber security leaders have transformed into executive positions but are still required to understand risk and technology from the ground up. How do we maintain, manage, implement and stay up to date?
16:40 Chairman’s Closing Address
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers (2017)

Sponsors

Presenting Sponsor

Indegy

Indegy improves operational safety and reliability by providing real-time situational awareness and security for industrial control networks. Our customers implement the Indegy platform to gain comprehensive visibility and control over the critical controllers that enable the automation of industrial processes. Indegy's core technologies monitor control-layer activities and identify in real-time changes to controller logic, configuration, firmware and state. Indegy applications for asset management, configuration control, comprehensive activity reports and backup and recovery capabilities enable quick response to cyber attacks, insider threats and human error.

VISIT: www.indegy.com

Presenting Sponsor

Claroty

Claroty’s mission is to protect industrial control networks from cyber-attacks; ensuring the safe and reliable operation of the world most critical infrastructures. Claroty enables customers to enjoy the substantial benefits of increasingly networked control systems without compromising operational resiliency, personnel safety or the security of core assets. The Claroty Platform is an integrated suite of cybersecurity products, providing unmatched threat protection, detection and response. The integrated platform is built on top of our CoreX technology which provides extreme visibility into the widest range of industrial control protocols, networks and devices.

Sponsorship Opportunities

Opportunities Available

Please contact info@qatalystglobal.com for all sponsorship opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners (2017)

Online Partner

seQure world_

The global magazine for Industrial Cyber Security Prcationers - Packed full of features, interviews and the latest on cyber security issues across our world.

Subscribe: info@qatalystglobal.com

Download: seQure world_

Online Partner

International Comparative Legal Guides

The ICLG series provides current and practical comparative legal information on a range of practice areas. These comprehensive guides follow a question and answer format to ensure thorough coverage of each topic within different legal systems worldwide. Each guide draws together the collective expertise of our contributors to provide a valuable and convenient resource, updated annually. All guides are available free to access at www.iclg.com

VISIT: www.iclg.com

Online Partner

The International Society for Automation

Founded in 1945, the International Society of Automation is a leading, global, nonprofit organization with more than 40,000 members worldwide. ISA develops standards, certifies industry professionals, provides education and training, publishes books and technical articles, and hosts conferences and exhibitions for automation professionals. ISA’s 160 geographical sections connect members with technology, expert advice and world-class technical programming.

Online Partner

Infosec Conferences

Styled as 'The Web's Official Curators of Cybersecurity Conferences', InfoSec Conferences has published the leading directory of cyber security events across the globe since 2013. Join the community at http://www.infosec-conferences.com and get notified of cyber security events happening in your area today.

VISIT: www.infosec-conferences.com

Online Partner

Peerlyst

Peerlyst is building a community where information security pros can team up for a better future—for themselves and their enterprises. Home base for security leaders, Peerlyst is where you go to find knowledge and learn from experts, as well as to build your own professional reputation by sharing what you know. Whether you want to spread news, ask a question, create a resource, or share expertise and product insights, Peerlyst gives you an audience of more than half a million security professionals.

Supporting Partner

Information Security Forum (ISF)

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members. ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program.

Online Partner

Nuclear Industry Association

The NIA is the trade association for the civil nuclear industry in the UK. The NIA represents more than 260 companies across the supply chain. The diversity of NIA membership enables effective and constructive industry-wide interaction. Website: www.niauk.org

Online Partner

Technology Record

The online home of The Record magazine, technologyrecord.com provides news and industry thought leadership on Microsoft and partner technology in the communications and media, financial services, public sector, manufacturing, and retail and hospitality industries. The site covers industry trends, product launches, customer wins and event news, as well as commentary articles, case studies and in-depth features. For end customers, the site provides a wealth of information about how Microsoft and its partners are helping businesses in industry. For partners, the site provides a valuable channel to distribute product news, case studies and thought leadership.

VISIT:www.technologyrecord.com

Online Partner

EM360°

EM360°: Keeping busy executives with reports on the latest IT trends, presenting views from expert analysts and solution providers; EM360° offers specialist coverage making it the comprehensive guide for all aspects of organisational IT. With an established medium for editorial and online resources, we serve a global audience of C-level executives, management and IT practitioners, informing them of the latest developments in their industries

VISIT: www.em360tech.com

Online Partner

Embedded Computing Design

OpenSystems Media’s mission is to invest in connections to our readers that supply us the insight to provide relevant content for our audience. We have assembled a great content team that understands their purpose to ensure our properties are trusted brands that have credibility and add value. The content team ventures out seeking answers to questions and solutions to problems the engineering community is facing.

VISIT: www.embedded-computing.com

Online Partner

Cyber Security Review

The Cyber Security Review is uniquely positioned to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the international community’s development of coherent policies and robust capabilities to protect cyberspace, improve security and enhance confidence in the resilience of the cyber-enabled world. For more information please visit: www.cybersecurity-review.com

Online Partner

Cyber Security for Critical Assets

Formed off the back of the hugely successful CSCA series, the Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water) is a group for like-minded professionals within the Chemical and Petrochemical industry who are interested in connecting with people involved in prevention and protection against Cyber Attacks. The group, which is hosted on social networking site LinkedIn, promotes exclusive discussion regarding all aspects of Cyber Security from personal experiences to news stories as and when they happen.

Online Partner

Staysafeonline.org (NCSA)

NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets. In a climate of persistent threats, securing cyber space is a responsibility we all share. Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society capable of leveraging robust and widely available: content, community and communication.

VISIT: www.staysafeonline.org

Online Partner

Cyber Defense Magazine

Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.

Online Partner

Infosecurity Magazine

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Click here for the very best strategy, insight and latest news.

VISIT: www.infosecurity-magazine.com

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

History

 

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Testimonials

Register

Primary Market

Oil & Gas, Chemicals, Gov’t & Academia, Utilities

(Group discounts available)

Conference + Evening Reception

€999

Register Now

VENDOR / OTHER

Solution/Service Providers & Consultants

Conference + Evening Reception

€3,000

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now

Contact Us

GET IN TOUCH
Qatalyst Global
Dowgate Hill House
14 – 16 Dowgate Hill,
London, EC4R 2SU, UK
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

[contact-form-7 404 "Not Found"]

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: