CS4CA USA

8th – 9th March 2017

Houston, Texas

The tenth Summit in a successful series of Cyber Security for Critical Assets events that bring together senior level IT and OT professionals to discuss innovative ideas and discuss best practice guidelines.

RegisterRead MoreGet Updates

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

5th CS4CA USA

8th – 9th March 2017 Houston, Texas

Cyber security is a core focus for governments and businesses in the US, especially within the Oil and Gas, Pharma, Energy, Utility, Chemical and Petrochemical, Water and Aerospace industries.As cyber-attacks grow in sophistication, frequency and intensity, these industries are increasingly becoming high profile targets.
The CS4CA USA Summit will connect a wide range of senior level thought leaders across the Oil and Gas, Pharma, Energy, Utility, Chemical and Petrochemical, Water and Aerospace industries, and allow them to discuss industry challenges, share experiences and investigate the best practice guidelines; moving from recovery-focused to proactive and forward-thinking discussions that will bridge the gap between government, IT and OT senior leaders.
It is in these discussions amongst the industry experts that will, in turn, inform Cyber Security Policies for years to come and protect the future of the USA’s critical assets.

Make the most of your 2 days

  • The most advanced information and policies
  • Learn from individuals with first hand experience
  • Recognise current and future threats
  • Be part of the discussion that will impact the industry
  • Single track event with all attendees engaged in one discussion
Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01  

>

8 March 2017
08:00 Registration and Seated Breakfast Hosted by Fortress Information Security
08:50 Opening Address from the Chairman
09:00 Opening Panel
Perfecting The Enterprise-Wide Cyber Security Culture

  • Cyber Security begins and ends with human behaviour – how do you factor that into policies?
  • How can/do you minimize that error internally?
  • What is the right balance for mobilising employees vs protecting ICS systems?
09:40 Keynote
APTs: Defining and defeating Cyber Security’s greatest adversary

  • Why is it becoming increasingly more difficult to tell whether an attack is perpetrated by a national actor, organized crime or individual?
  • Understanding and improving an organisation’s foundational security to help protect themselves from attack vectors
10:10 Platform
Understanding the Industrial Cloud

  • Defining the level of visibility required to uncover advanced threats and malicious activity
  • Making use of real time monitoring to detect human error and potential operational issues
10:20 Morning Refreshments and Speed Networking
11:00 Keynote
Understanding Tomorrow’s Cyber – The Bigger Picture

  • Understanding how global cyber capabilities are growing
  • Tying cyber espionage and terrorism to the overall risk calculation
  • Comprehending not just what and how cyber events occur but also why they do
11:30 Keynote
Anatomy of an Industrial Cyber Security Attack

  • How do ICS cyberattacks really operate? Where are the security gaps that enable these attacks?
  • Different protocols used in configuration and production operations and how to secure each
12:00 Keynote
Turning Challenging into Thriving Working Conditions

  • Key threats: new interface and ecosystem
  • Hackers turning to physical methods
  • IoT changing the industrial landscape and creating new implementation methods
12:30 Seated Lunch hosted by Schneider Electric
13:30 Keynote
Why are Critical Infrastructure Assets so easy to attack?

  • Understanding how global cyber capabilities are growing
  • Tying cyber espionage and terrorism to the overall risk calculation
  • Comprehending not just what and how cyber events occur but also why they do
14:20 Platform
Key Features for a Business Driven Identity & Access Management Strategy

  • Understand how data loss prevention can be enhanced when leveraged with IAM capabilities
  • Key considerations when transforming IAM
14:30 Keynote
Combating the Ransomware Threat

  • Cyber extortion is an increasingly prevalent threat to the energy industry, and the most prominent tool at hackers’ disposal – ransomware is gaining momentum as one of the most feared malware types tracked by enterprise security teams
  • Analyzing the disruption to regular operations, financial losses incurred to restore systems and files and the potential harm to an organization’s reputation
15:00 Afternoon Refreshments and Networking
15:30 Presentation
Harmonising Initiatives: The Role of Industry and End-Users in Reducing Cyber Crime

  • Creating a culture of sharing incident information
16:00 Keynote
Using Disruptive Technologies for Oil and Gas Capital Projects

  • Case Study of Mad Dog 2 project
  • Using augmented reality and AR glasses
  • PCN and DSR assurance
16:30 Roundtables
Moderated Discussions – Choice of Topics

  • Key Considerations for Safeguarding ICS Networks
  • Preventing threats on portable media
  • Challenging conventional security architectures
  • Information classification and architecture
  • Cloud storage
  • Building a reliable operations team
17:10 Chairman’s Closing Address
17:30 Networking Drinks and Canapés
DAY 02  

>

9 March 2017
08:00 Registration and Seated Breakfast hosted by Synack
08:55 Welcome Address from the Chair
09:10 Opening Panel
Moving from Assessment to Acknowledgement: Attacks Are Going To Happen

  • Attacks will happen and do happen – what response plans are there?
  • Preparing the whole company, not just IT
  • Tools and training for a secure companywide culture
09:40 Platform
Applying Web Isolation to Protect Critical Infrastructure

  • What is web isolation?
  • How isolation eliminates malware & phising
  • Live Demo: Experience Isolation in Action
  • Case Study: Leading O&G company deploys isolation globally
09:50 Keynote
How does the Internet of Things apply to Industry?

  • Synchronising IT and business strategy
  • Cloud as a means to increase competitiveness and improve operations
  • Reassessing the way companies handle data
  • New techniques to protect systems
  • New space travel technique and ROI considerations
10:20 Morning Refreshments & Networking
11:00 Keynote
Protecting the Industrial IoT & Securing Industry 4.0

  • IIoT is the heart of production – case study on the steps taken to make it work whilst keeping ICS systems secure
11:30 Case Study
Cyber Mutual Assistance – Bridging Mutual Assistance To Electric Utility Operators

  • The cyber culture within the electric industry is a model for the rest of the energy grid.
  • History and Development of Cyber Mutual Assistance Program
  • Benefits of a Shared Culture When Tackling CyberAttacks
12:00 Keynote
State Of The Phish: Understanding End User Behaviours Towards Phising

  • Despite having a solid security awareness and training program in place, today’s cybercriminals manage to evade even the savviest end users through carefully planned email phishing attacks that are only getting more advanced.
  • Hear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves.
  • Learn about the most devastating types of phishing emails used and how to thwart them.
12:30 Seated Lunch hosted by Arbor Networks
13:30 Case Study
Bridging the Gap Between Corporate IT Security and Process Control Departments

  • Leveraging business processes
  • Risk Management for IT/OT
  • Change control processes and performance standards
  • Information sharing and design
  • Details for IT and OT to define
14:00 Case Study
Information Security: Careers, Crafts & Wizardry (People, Processes & Technology)

  • Overview of a strong InfoSec program
  • Discussion of skills gap between what is needed and what is available
  • Cyber Security skills: broad understanding, technical knowledge, analytical capabilities
14:30 Keynote
Framework Updates and Insights Using New Trends

  • Do not overlook lawyers, auditors and procurement officers when creating your policy
  • Benefits of a vulnerability assessor in your program
15:00 Networking Break
15:30 Case Study
Developing A Strategy to Fight Advanced Persistent Threats – How Best To Respond?

  • How to spot a campaign of Intellectual Property theft using cyber methods
  • The development of cyber cartels and the extent of international operations.
  • Protecting business intelligence and intellectual property for competitive advantage
  • The underground economy supporting espionage and fraud
  • The anatomy of an APT operation
16:30 Group Discussion: Cyber Risk As A Board-Level Issue

  • What are the major concerns the board will be interested in?
  • Vendor risk management – managing risk with interfacing operations.
  • How best to change the practice of IT being seen as a cost center to a core function which requires investment
  • Mobile technologies, social media and the general increase in electronic communication – what effect has this had?
17:10 Chairman’s Closing Remarks

 

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Sponsors

Official Sponsor

Schneider Electric

At Schneider Electric we believe access to energy is a basic human right. We want everyone on our planet to have access to reliable, safe, efficient, and sustainable energy. We are committed to innovate solutions that address this energy paradox, balancing our planet’s carbon footprint and supporting the undisputable right of everyone to quality energy.

Hosting Sponsor

Arbor Networks

Arbor Networks  secures the world's most demanding and complex networks from DDoS attacks and advanced threats. Their customers gain a micro view of their own network, through Arbor Network's suite of products, combined with a macro view of global Internet traffic and emerging threats, through our ATLAS threat intelligence infrastructure.

Presenting Sponsor

Cylance

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over 4 million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

Presenting Sponsor

PAS

PAS is a leading provider of software solutions for process safety, cybersecurity, and asset reliability to the energy, process, and power industries worldwide. PAS solutions include industrial control system cybersecurity, automation asset management, IPL assurance, alarm management, high performance HMI™, boundary management, and control loop performance optimization. PAS solutions are installed in over 1,100 facilities worldwide in more than 70 countries.

Presenting Sponsor

Wombat Security

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber-security software education solution includes an integrated platform containing broad assessments, a library of simulated attacks and brief interactive training modules to reduce employee susceptibility to attack, even phising attacks, up to 90%

Presenting Sponsor

Indegy

Indegy improves operational safety and reliability by providing real-time situational awareness and security for industrial control networks. Our customers implement the Indegy platform to gain comprehensive visibility and control over the critical controllers that enable the automation of industrial processes. Indegy's core technologies monitor control-layer activities and identify in real-time changes to controller logic, configuration, firmware and state. Indegy applications for asset management, configuration control, comprehensive activity reports and backup and recovery capabilities enable quick response to cyber attacks, insider threats and human error.

Presenting Sponsor

Verisign

Verisign iDefense Security Intelligence Services provides relevant, actionable cyber threat intelligence in context around cyber crime, cyber espionage, hacktivism and vulnerabilities, delivered via a next-generation security intelligence platform and API. iDefense intelligence helps Web-reliant organizations stay ahead of threats, make better-informed security and business decisions, and move from a reactive to a proactive security posture. For more information about how Verisign iDefense Security Intelligence Services can help provide relevant, actionable intelligence in context.

Associate Sponsor

Darktrace

Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance across many industries. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including 18 offices globally.

Associate Sponsor

Kaspersky

Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions like Kaspersky Industrial CyberSecurity to fight sophisticated and evolving cyber threats. Over 400 million users are protected by KasperskyLab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com

Platform Sponsor

Fireglass

Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network. Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.

Platform Sponsor

LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

Platform Sponsor

Claroty

Claroty’s mission is to secure and optimize the industrial control networks that run the world.  The Claroty Platform provides extreme visibility into our customer’s OT networks. Powered by the elite Claroty Research team, the platform delivers real-time anomaly detection using , high-fidelity models and advanced algorithms to detect anomalies and alert our customers to both cybersecurity and process integrity issues.

Roundtable Sponsor

OPSWAT

OPSWAT is a San Francisco based software company that provides solutions to secure and manage IT infrastructure. Our technologies provide unmatched protection & analysis of known and unknown threats, allowing organizations to control & secure their data flows as well as enhancing malware detection in third-party security applications. OPSWAT’s intuitive applications and comprehensive development kits are deployed by SMB, enterprise and OEM customers to more than 100 million endpoints worldwide

Roundtable Sponsor

Tenable

Bio coming soon

Roundtable Sponsor

Fortress Information Security

Fortress Information Security LLC provides third-party risk management, cloud/mobile risk management, legal support, threat monitoring, incident response, analytics, and operational intelligence services.

Networking Sponsor

Bayshore

Bayshore is an award-winning, patented IT/OT Gateway platform providing IT departments with unprecedented visibility into OT operations. It enables Fortune 1000 industrial and enterprise customers to rapidly build & execute policies for OT cybersecurity, secure M2M communications, manufacturing operations, & robotics automation. Bayshore is distinguished by its extremely deep content inspection, granular filtering of network flows (including files within files and archives), policy building and enforcement, and its ability to detect, parse and segment industrial protocols. Leveraging these capabilities, Bayshore delivers ROI in areas such as production zone cybersecurity, operational continuity, data protection/data loss prevention, and plant safety.

Networking Sponsor

SparkCognition

SparkCognition is a global leader in cognitive computing analytics. A highly awarded company recognized for cutting-edge technology, SparkCognition is successfully deploying a cognitive, data-driven analytics platform for clouds, devices, and the Internet of Things industrial and security markets by applying patented algorithms that deliver out-of-band, symptom-sensitive analytics, insights, and security. For more information on the company, its technology and team, please visit www.sparkcognition.com.

Breakfast Sponsor

Synack

Founded by former NSA security experts Jay Kaplan (CEO) and Dr. Mark Kuhr (CTO) in 2013, Synack brings together hundreds of the most sought-after, skilled, and trusted security researchers (or white hat/ethical hackers) from over 40 countries across the globe and empowers them with proprietary vulnerability technologies to create a groundbreaking security solution for today’s massive and rapidly evolving cybersecurity demands. We call it Crowd Security Intelligence™, and it’s now keeping some of the largest governments, organizations and brands in the world secure.

Drinks Sponsor

CA

CA Technologies makes software for businesses that are development-driven, because we believe those who build the apps will own the future. We help our customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners

Supporting Partner

Information Security Forum (ISF)

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members. ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program.

Online Partner

CIO Review

Online Partner

EM360°

Keeping busy executives up to date with reports on the latest IT trends, presenting views from expert analysts and solution providers; EM360° offers specialist coverage making it the comprehensive guide for all aspects of organisational IT. With an established medium for editorial and online resources, we serve a global audience of C-level executives, management and IT practitioners, informing them of the latest developments in their industries

Online Partner

Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water)

Formed off the back of the hugely successful CSCA series, the Cyber Security for Critical Assets (Chemical, Energy, Oil & Gas, Water) is a group for like-minded professionals within the Chemical and Petrochemical industry who are interested in connecting with people involved in prevention and protection against Cyber Attacks. The group, which is hosted on social networking site LinkedIn, promotes exclusive discussion regarding all aspects of Cyber Security from personal experiences to news stories as and when they happen.

Online Partner

CrowdReviews.com

CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users which have experienced products and services first-hand and have an interest in letting other potential buyers their thoughts on their experience. CrowdReviews.com is driven by an algorithm allowing for both customers and providers of products and services to understand how the rankings are determined. The service can be used by potential buyers to learn more about their vendors prior to making a purchasing decision.

Online Partner

IT Security Guru

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site! http://www.itsecurityguru.org/

Online Partner

Oil Voice

OilVoice is a valuable source of upstream oil industry reference, featuring a global selection of oil company profiles in one location, alongside continually updated industry news, operational data, focused regional information, contact details and key industry personnel.

Online Partner

Cyber Defense Labs

Cyber Defense Labs is a cyber security and research organization focused on assisting corporate America, government, and community organizations with improving overall security effectiveness while educating and improving corporate and community awareness and value.

Online Partner

Staysafeonline.org (NCSA)

NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets. In a climate of persistent threats, securing cyber space is a responsibility we all share. Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society capable of leveraging robust and widely available: content, community and communication.

Online Partner

Cyber Defense Magazine

Cyber Defense Magazine is by ethical, honest, passionate information security professionals for IT Security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry.  

Online Partner

Infosecurity Magazine

Infosecurity Magazine has almost ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts. Click here for the very best strategy, insight and latest news.

History

 

Testimonials

Register

Primary Market

Oil & Gas, Pharma, Chemicals, Gov’t & Academia, Utilities

(Group discounts available)

$1,699

Register Now

VENDOR / OTHER

Solution/Service Providers & Consultants

(Group discounts available)

$3,000

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now for 2018

Contact Us

GET IN TOUCH
Dowgate Hill House, 14 – 16 Dowgate Hill
London EC4R 2SU, United Kingdom
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

WordPress Image Lightbox

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

[contact-form-7 404 "Not Found"]

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship:

 

ITALIASEC Interested in Sponsorship?

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: