SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
11th & 12th April, Doha, Qatar 2018
“The Changing Face of Industrial Control Systems”
Speakers & Panelist
MOHAMED MASOOD DAWOOD
Regional Manager - Digital Transformation
Software AG
HENI KARAA
Technology Product Manager
Qatar Mobility Innovations Center
HATEM ELSAFTY
Partner , Mazars
FADI ADLOUNI
Senior Security Systems engineer
Palo Alto Networks.
MUSTAFA GHARAIBEH
Country Manager
Darktrace
SAMUEL LINARES
Partner - iHacklabs
NILANGSHU DEY
Senior Automation Engineer - Qatar
Petroleum, Vice President - ISA (International
Society Of Automation) - EMEA
SULTAN SALIM HUMAID AL-YAHYAI
Manager Information Technology
GOPI KRISHNA DURBHAKA
Technology Evangelist
Senior Member, IEEE fellow of ISECE
JAVIER DIÉGUEZ BARRIOCANAL
Director – Basque Cybersecurity Centre
OMAR SHERIN
Director -Cyber Security Advisory -
Africa, India & Middle East (AIM)
Ernst & Young
MALIKE BOUAOUD
Director/Lead, ICT and CS Strategy Research
& Development , QATAR FOUNDATION
ORGANIZED BYBRONZE SPONSERSTRATEGIC KNOWLEDGE ADVISOR GOLD SPONSOR SILVER SPONSOR SUPPORTING ORGANIZATION
11th & 12th April, Doha, Qatar 2018
“The Changing Face of Industrial Control Systems”
CICS Introduction
Who Should AttendWe are in the throes of witnessing an Industrial Revolution, The Industrial Revolution
4.0! A revolution that will completely change the way we live, work, and relate to one
another. In its scale, scope, and complexity, the transformation will be unlike anything
humankind has experienced before and with it will change the Industrial Control
Systems (ICS).
The boundaries delineating the ICS world from the civil world are denigrating, we are
now looking at future where residences will be connected the Power Grids, supplying
back rather than receiving energy (Renewable Energy – Reverse Metering), Smart Cities
which will enable its residents and allow them to interact with the cities control
systems and more.
In this exciting times, we have created a unique conference where we will hear from the
experts from the industry in ICS Domain, on what new is happening? We will endeavor
to build a 360° view on the subject and understand the happenings, the challenges, the
innovations that is changing the face of Industrial Control systems.
Why to Attend CICS
A unique conference for all professionals (OT, Instrumentation, Cyber Security, Techni-
cal etc.) related to the ICS domain, to come together under a single umbrella of the
CICS conference to understand holistically the advancements, the challenges and the
needs of the Industrial Control Systems.
Attending this forum will enable participant to understand
• Identify the advances and automation in Industrial Control Systems.
Learn from Industry peers examples of breakthrough technology deployed in ICS
Learn how new technology can solve Industry challenges to improve safety and reliability
• Identify how the Industrial IoT revolution is changing and re-shaping the ICS Domain.
• Identify the Cyber Security Threats and Risks to an Industrial Control System.
Understand the Regulatory landscape that is impacting the ICSs
Understand the Best practices and Best of breed solutions
How to protect your control systems from malicious intrusions
• Learn the importance and need to innovate in the ICS Domain
• A platform to network with your peers and share knowledge.
• Understand how technology integrates with ICS, a unique opportunity for the technical teams, control
technology (OT) teams and the cyber security teams to come together and learn the advancements in the
domain.
BY POSITION
• Heads of IT Security
• Heads of Data Management
Centre
• Head of Network Security
• Heads of Planning, Governance
& Risk Management
• CIO, CTO, CISO & CSO
• Process Control & Automation
• Network Engineers,
• Head of Corporate Security,
• Industrial Security Managers
• Instruments & Controls
• IT Applications Manager,
• IT Security Specialist
• Application Infrastructure
Managers
• Information Systems Analyst
• Smart Grid & DOF Advisors
• Enterprise Security,
• Automation & Process Control
Engineering,
• System Designers & Engineers,
• Heads of SCADA/ICS/DCS
BY INDUSTRY
• Oil & Gas
• Petrochemicals
• Chemical Manufactures
• EPC Contractors
• Water & wastewater
• Electricity
• Nuclear Energy etc.
08:00 Registrations & Networking
08:50 Welcome Speach
10:30 Coffee Break & Networking
12:15 Lunch Break
14:45 Coffee Breaks
15:45 Closing Remarks by Chair for Day 1
13:15 LabeebIoT, Enabling Smarter Factories
• Introduction about the platform,
• How IoT is helping in the Digital
Transformation for the industrial sector,
• Challenges, possible scenarios and strategies
• IoT and AI applied to industries: use case of
Predictive Maintenance
Heni Karaa, Technology Product Manager - Qatar
Mobility Innovations Center
14:00 Intelligent Smart Warehouses
• Challenges in Warehouse Management
• Innovative Technology Evolutions in
Warehouse Management
• Industrial IoT
• Smart Shelves and Smart Labels
• Indoor Localization for Smart
Warehouses
• Analytics challenging IoT
Gopi Krishna Durbhaka, Technology
Evangelist, Sr. Member IEEE, India
15:00 The Industrial Immune System: Using Machine
Learning & AI for OT Cyber Defense
• How new machine learning and mathemat
ics are automating advanced threat detection
• Why 100% network visibility allows you to
preempt emerging situations, in real time,
across both IT and OT environments
• How smart prioritization and visualization
of threats allows for better resource
allocation and lower risk
• Real-world examples of detected OT threats,
from non-malicious insiders to sophisticated
cyber-attackers
Mustafa Gharaibeh, Darktrace
09:45 Use of Drones in Logistic Operations
Malike Bouaoud, Director/Lead, ICT and
CS Strategy – Qatar Foundation
10:45 Operation and maintenance of Industrial
embedded devices (IIoT): Where Cybersecu-
rity meets Big Data, AI and ICS
Javier DiéguezBarriocanal, Director -
Basque Cybersecurity Centre, Spain
11:30 Major Changes in ICS System architecture
for meeting current challenges in Oil & Gas
industry
Nilangshu Dey, Executive Board Member ,
International Society of Automation ( ISA),
Qatar
THEME 1 - Industrial Automation
THEME 2 - Industrial IoT
DAY 1 - 11th April 2018
09:00 Auditing Industrial Control Systems
• The Audit process, its importance
and the value it brings
• Challenges auditors face during
execution
Hatem ElSafaty, Partner –
Mazars International.
10:45 Integrated Cyber Security Architecture
Initiatives such as “Industry 4.0”, “Industrial IoT”
and “Smart OT” drive operational efficiencies and
bring competitive advantages. However, they also
presents new sets of cybersecurity risks. Cyber-
threats to Industrial Control Systems (ICS) has now
become a boardroom agenda due to the severe
consequences to uptime and safety of the people
and assets.
• Security in SCADA/ICS
• Palo Alto Networks Security Platform -
Integrated Cyber Security Architecture
Fadi Adlouni, Senior Systems Engineer, Palo Alto
Networks, Qatar
DAY 2 - 12th April 2018
08:00 Registrations & Networking
10:30 Coffee Break
11:15 Industry 4.0: The Journey & Monetization
Mohamed Masood , SoftwareAG
12:00 Big Data, How it became Big and whether it’s
Obesity is useful for today’s business?
• Trend of world’s data production
• Sources of BigData
• Data waste
• From data recording to data analytics, how
it works?
• Big Data utilization challenges
• How Big Data changes data science
job profiles
Sultan Salim Humaid Al-Yahyai, Manager IT,
Mazoon Electricity, Oman
12:45 Closing Remarks & Networking Lunch
08:45 Welcome Speach
09:00 When standards and regulations are not
enough: why industrial cyber security is
different in the protection of critical
infrastructures
• Challenges of existing standards,
approaches, methodologies and solutions
for critical infrastructure protection
• Differences in the critical infrastructure’s
threat landscape, actors and objectives
• The myth of likelihood in the risk
management methodologies
• Real examples and numbers of injecting
cyber security in critical infrastructures
protection mega-projects.
• Proposed approaches and key takeaways to
improve the industrial cyber security
posture in critical infrastructures
Samuel Linares, Partner, iHackLabs, Spain
09:45 Hacking the OT Process and affecting the
SIL levels
Explain how in a sophisticated OT attack,
the attacker can actually use the industrial
processes to achieve their malicious intent,
leaving behind a very limited digital
footprint for detection, and how by using
processes like HAZOP we can prove that
Cyber can impact the safety levels of assets
and expose industrial process flaws that
can be exploited.
Omar Sherin, Director, Ernst & Young, Qatar
THEME 3 - Cyber Security in the
ICS Environment
11th & 12th April, Doha, Qatar 2018
“The Changing Face of Industrial Control Systems”
Registration Details
Company Details
Name: ________________________________________________
Job Title: ______________________________________________
Email: ______________________ Mobile: ___________________
Tel: _________________________Fax: ______________________
Name: ________________________________________________
Job Title: ______________________________________________
Email: ______________________ Mobile: ___________________
Tel: _________________________Fax: ______________________
Name: ________________________________________________
Job Title: ______________________________________________
Email: ______________________ Mobile: ___________________
Tel: _________________________Fax: ______________________
Terms & Conditions
1 - ANFICON Standard Terms & Conditions
By signing the Registration Form, the contracting organization (herein
after referred to as “the client”) acknowledges that it has read, understood
and accepted the Terms and Conditions outlined hereunder.
2 - PAYMENT
The client is liable to make payment in full to ANFICON within 7 working
days from the date of issue on the invoice . Payment is due in full at the
time of registration and includes lunches, refreshments and detailed
conference materials. Payment or PO reference prior to Training /confer-
ence is mandatory for attendance. Your registration will not be confirmed
until payment is received or a PO reference issued and may be subject to
cancellation. If a booking is received 10 working days before the Training/
Conference a credit card number or a PO reference will be required to
confirm your place, likewise if full payment has not been received before
the conference date.
3 - DISCOUNTS
All ‘Early Bird’ Discounts require payment at time of registration and
before the cut-off date in order to receive any discount. Any other
discounts offered by ANFICON (including team discounts) require
payment at the time of registration. Discounts cannot be combined with
any other offer.
4 - CANCELLATION, POSTPONEMENT AND SUBSTITUTION POLICY
You may substitute delegates at any time by providing reasonable
advance notice to ANFICON. For any cancellations received in writing not
less than eight (15) working days prior to the Training / Conference, you
will receive a 100 %credit to be used at another ANFICON Training/ Confer-
ence which must occur within one year from the date of issuance of such
credit. No credit will be issued for any cancellations occurring within
seven (7) days (inclusive) of the training / conference. In the event that
ANFICON cancels an event for any reason, you will receive a credit for
100% of the contract fee paid. You may use this credit for another ANFICON
event to be mutually agreed with ANFICON, which must occur within one
year from the date of cancellation..In the event that ANFICON postpones
an event for any reason and the delegate is unable or unwilling to attend
on the rescheduled date, you will receive a credit for 100% of the contract
fee paid. You may use this credit for another ANFICON event to be mutual-
ly agreed with ANFICON, which must occur within one year from the date
of postponement except as specified above, no credits will be issued for
cancellations. There are no refunds given under any circumstances.
ANFICON reserves the right to modify the content, timing or venue of the
workshop should circumstance dictate. The training / conference may be
postponed or cancelled due to acts of terrorism, war , extreme weather
conditions, industrial action, force majeure or any event beyond the
control of ANFICON. Should such a situation arise, ANFICON endeavors to
reschedule the Training / Conference . However, ANFICON cannot be held
responsible for any cost, damage or expenses incurred by the client as a
consequence of the Training / Conference being postponed or cancel. The
workshop / fee does not include travel costs, hotel accommodation,
transfers or insurance. Any dispute arising under or by virtue of this
Registration Form shall be settled before the competent Court in the
Kerala, India.
5 - PROGRAMME CHANGES
Please note that speakers and topics were confirmed at the time of
publishing; however, circumstances beyond the control of the organisers
may necessitate substitutions, alterations or cancellations of the speakers
and/or topics. As such, ANFICON reserves the right to alter or modify the
advertised speakers and/or topics if necessary. Any substitutions or
alterations will be updated on our web page as soon as possible. *The
Workshop Fee includes, and is limited to : Workshop Documents,
Workshop Sessions , Lunches and refreshments and Networking
Reception
Company: _____________________________________________
Contact Person: ________________________________________
Department Name: _____________________________________
Email: __________________ Mobile: _______________________
Tel: _____________________ Fax: __________________________
Website: _________________ Country: _____________________
Postcode: _______________ Address: ______________________
______________________________________________________
No. Of Employee: 0-49 50-199 200-499
500-999 1000+
Nature of your company business: ________________________
Pricing Per Delegates
CONFERENCE DAY $ 799
ADMINISTRATIVE CHARGES $ 20
*Registration fees includes documentation,
lunch and refreshment. They do not Include travel
and accommodation
Conference code: CICS/001

Contenu connexe

Tendances

Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension Inc.
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_DeckEtheralabs
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT StackPubNub
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & ChallengesDr. Mazlan Abbas
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPTMultisoft Virtual Academy
 
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...Bernard Marr
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerUSA Firmware, LLC
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deckEtheralabs
 
IoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardwareIoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardwarepaul young cpa, cga
 
CYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATIONCYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATION3.com
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Matthew Bailey
 
The Journey Towards IR 4.0
The Journey Towards IR 4.0The Journey Towards IR 4.0
The Journey Towards IR 4.0Dr. Mazlan Abbas
 

Tendances (20)

Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
 
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the Manufacturer
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
Technology Q&A - IIOT
Technology Q&A - IIOTTechnology Q&A - IIOT
Technology Q&A - IIOT
 
IoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardwareIoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardware
 
CyCron 2016
CyCron 2016CyCron 2016
CyCron 2016
 
CYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATIONCYBERSECURITY LEGISLATION
CYBERSECURITY LEGISLATION
 
Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017Introduction to the IIoT - Nevada - Sept 2017
Introduction to the IIoT - Nevada - Sept 2017
 
The Journey Towards IR 4.0
The Journey Towards IR 4.0The Journey Towards IR 4.0
The Journey Towards IR 4.0
 

Similaire à iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda

Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityA. V. Rajabahadur
 
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Considermeet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to ConsiderRoberto Siagri
 
Reshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to ConsiderReshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to ConsiderEurotech
 
Industrial revolution4
Industrial revolution4Industrial revolution4
Industrial revolution4sonalijagtap15
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Industry 4.0 and applications
Industry 4.0 and applicationsIndustry 4.0 and applications
Industry 4.0 and applicationsUmang Tuladhar
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulKellton Tech Solutions Ltd
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君CHENHuiMei
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?sohailAhmad304
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRockwell Automation
 
Industry 4.0 : Relevance to your industry
Industry 4.0 : Relevance to your industryIndustry 4.0 : Relevance to your industry
Industry 4.0 : Relevance to your industrySadatulla Zishan
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0
Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0
Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0Utah Tech Labs
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 

Similaire à iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda (20)

Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
 
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Considermeet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
 
Reshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to ConsiderReshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to Consider
 
Industrial revolution4
Industrial revolution4Industrial revolution4
Industrial revolution4
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Industry 4.0 and applications
Industry 4.0 and applicationsIndustry 4.0 and applications
Industry 4.0 and applications
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
Industry 4.0 : Relevance to your industry
Industry 4.0 : Relevance to your industryIndustry 4.0 : Relevance to your industry
Industry 4.0 : Relevance to your industry
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0
Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0
Digital Transformation with IoT in Manufacturing. The Future of Industry 4.0
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 

Plus de John Kingsley

Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfJohn Kingsley
 
MODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDING
MODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDINGMODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDING
MODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDINGJohn Kingsley
 
Reliability, availability, maintainability (RAM) study, on reciprocating comp...
Reliability, availability, maintainability (RAM) study, on reciprocating comp...Reliability, availability, maintainability (RAM) study, on reciprocating comp...
Reliability, availability, maintainability (RAM) study, on reciprocating comp...John Kingsley
 
Introduction to oil and gas exploration and processing
Introduction to oil and gas exploration and processingIntroduction to oil and gas exploration and processing
Introduction to oil and gas exploration and processingJohn Kingsley
 
iFluids Engineering Introduction
iFluids Engineering IntroductioniFluids Engineering Introduction
iFluids Engineering IntroductionJohn Kingsley
 
iFluids Engineering Brochure
iFluids Engineering BrochureiFluids Engineering Brochure
iFluids Engineering BrochureJohn Kingsley
 
iFluids Engienering Capability Presentation
iFluids Engienering Capability PresentationiFluids Engienering Capability Presentation
iFluids Engienering Capability PresentationJohn Kingsley
 
Hazop Training - Intermediate Level Course iFluids
Hazop Training  -  Intermediate Level Course iFluidsHazop Training  -  Intermediate Level Course iFluids
Hazop Training - Intermediate Level Course iFluidsJohn Kingsley
 
Introduction to PSM Online Interactive Training
Introduction to PSM Online Interactive TrainingIntroduction to PSM Online Interactive Training
Introduction to PSM Online Interactive TrainingJohn Kingsley
 
Sil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsSil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsJohn Kingsley
 
Hazop Fundamentals Online Training iFluids
Hazop Fundamentals Online Training iFluidsHazop Fundamentals Online Training iFluids
Hazop Fundamentals Online Training iFluidsJohn Kingsley
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
iFluids Lean Six Sigma Case Study oil & gas
iFluids Lean Six Sigma Case Study oil & gasiFluids Lean Six Sigma Case Study oil & gas
iFluids Lean Six Sigma Case Study oil & gasJohn Kingsley
 
iFluids Behaviour based safety services and training
iFluids Behaviour based safety services and trainingiFluids Behaviour based safety services and training
iFluids Behaviour based safety services and trainingJohn Kingsley
 
iFluids Tank Inspection services
iFluids Tank Inspection servicesiFluids Tank Inspection services
iFluids Tank Inspection servicesJohn Kingsley
 
How to write a plant operating manual
How to write a plant operating manualHow to write a plant operating manual
How to write a plant operating manualJohn Kingsley
 
Case study of dcs upgrade how to reduce stress during execution
Case study of dcs upgrade how to reduce stress during executionCase study of dcs upgrade how to reduce stress during execution
Case study of dcs upgrade how to reduce stress during executionJohn Kingsley
 
Hydrocarbon leak detection in tank farms
Hydrocarbon leak detection in tank farmsHydrocarbon leak detection in tank farms
Hydrocarbon leak detection in tank farmsJohn Kingsley
 
Guide to specifying visual signals
Guide to specifying visual signalsGuide to specifying visual signals
Guide to specifying visual signalsJohn Kingsley
 
Introduction to bowtie : A barrier-based approach to risk
Introduction to bowtie : A barrier-based approach to riskIntroduction to bowtie : A barrier-based approach to risk
Introduction to bowtie : A barrier-based approach to riskJohn Kingsley
 

Plus de John Kingsley (20)

Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
 
MODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDING
MODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDINGMODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDING
MODIFICATION OF EXISTING FACILITIES FOR 20% ETHANOL BLENDING
 
Reliability, availability, maintainability (RAM) study, on reciprocating comp...
Reliability, availability, maintainability (RAM) study, on reciprocating comp...Reliability, availability, maintainability (RAM) study, on reciprocating comp...
Reliability, availability, maintainability (RAM) study, on reciprocating comp...
 
Introduction to oil and gas exploration and processing
Introduction to oil and gas exploration and processingIntroduction to oil and gas exploration and processing
Introduction to oil and gas exploration and processing
 
iFluids Engineering Introduction
iFluids Engineering IntroductioniFluids Engineering Introduction
iFluids Engineering Introduction
 
iFluids Engineering Brochure
iFluids Engineering BrochureiFluids Engineering Brochure
iFluids Engineering Brochure
 
iFluids Engienering Capability Presentation
iFluids Engienering Capability PresentationiFluids Engienering Capability Presentation
iFluids Engienering Capability Presentation
 
Hazop Training - Intermediate Level Course iFluids
Hazop Training  -  Intermediate Level Course iFluidsHazop Training  -  Intermediate Level Course iFluids
Hazop Training - Intermediate Level Course iFluids
 
Introduction to PSM Online Interactive Training
Introduction to PSM Online Interactive TrainingIntroduction to PSM Online Interactive Training
Introduction to PSM Online Interactive Training
 
Sil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsSil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluids
 
Hazop Fundamentals Online Training iFluids
Hazop Fundamentals Online Training iFluidsHazop Fundamentals Online Training iFluids
Hazop Fundamentals Online Training iFluids
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
iFluids Lean Six Sigma Case Study oil & gas
iFluids Lean Six Sigma Case Study oil & gasiFluids Lean Six Sigma Case Study oil & gas
iFluids Lean Six Sigma Case Study oil & gas
 
iFluids Behaviour based safety services and training
iFluids Behaviour based safety services and trainingiFluids Behaviour based safety services and training
iFluids Behaviour based safety services and training
 
iFluids Tank Inspection services
iFluids Tank Inspection servicesiFluids Tank Inspection services
iFluids Tank Inspection services
 
How to write a plant operating manual
How to write a plant operating manualHow to write a plant operating manual
How to write a plant operating manual
 
Case study of dcs upgrade how to reduce stress during execution
Case study of dcs upgrade how to reduce stress during executionCase study of dcs upgrade how to reduce stress during execution
Case study of dcs upgrade how to reduce stress during execution
 
Hydrocarbon leak detection in tank farms
Hydrocarbon leak detection in tank farmsHydrocarbon leak detection in tank farms
Hydrocarbon leak detection in tank farms
 
Guide to specifying visual signals
Guide to specifying visual signalsGuide to specifying visual signals
Guide to specifying visual signals
 
Introduction to bowtie : A barrier-based approach to risk
Introduction to bowtie : A barrier-based approach to riskIntroduction to bowtie : A barrier-based approach to risk
Introduction to bowtie : A barrier-based approach to risk
 

Dernier

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 

Dernier (20)

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda

  • 1. 11th & 12th April, Doha, Qatar 2018 “The Changing Face of Industrial Control Systems” Speakers & Panelist MOHAMED MASOOD DAWOOD Regional Manager - Digital Transformation Software AG HENI KARAA Technology Product Manager Qatar Mobility Innovations Center HATEM ELSAFTY Partner , Mazars FADI ADLOUNI Senior Security Systems engineer Palo Alto Networks. MUSTAFA GHARAIBEH Country Manager Darktrace SAMUEL LINARES Partner - iHacklabs NILANGSHU DEY Senior Automation Engineer - Qatar Petroleum, Vice President - ISA (International Society Of Automation) - EMEA SULTAN SALIM HUMAID AL-YAHYAI Manager Information Technology GOPI KRISHNA DURBHAKA Technology Evangelist Senior Member, IEEE fellow of ISECE JAVIER DIÉGUEZ BARRIOCANAL Director – Basque Cybersecurity Centre OMAR SHERIN Director -Cyber Security Advisory - Africa, India & Middle East (AIM) Ernst & Young MALIKE BOUAOUD Director/Lead, ICT and CS Strategy Research & Development , QATAR FOUNDATION ORGANIZED BYBRONZE SPONSERSTRATEGIC KNOWLEDGE ADVISOR GOLD SPONSOR SILVER SPONSOR SUPPORTING ORGANIZATION
  • 2. 11th & 12th April, Doha, Qatar 2018 “The Changing Face of Industrial Control Systems” CICS Introduction Who Should AttendWe are in the throes of witnessing an Industrial Revolution, The Industrial Revolution 4.0! A revolution that will completely change the way we live, work, and relate to one another. In its scale, scope, and complexity, the transformation will be unlike anything humankind has experienced before and with it will change the Industrial Control Systems (ICS). The boundaries delineating the ICS world from the civil world are denigrating, we are now looking at future where residences will be connected the Power Grids, supplying back rather than receiving energy (Renewable Energy – Reverse Metering), Smart Cities which will enable its residents and allow them to interact with the cities control systems and more. In this exciting times, we have created a unique conference where we will hear from the experts from the industry in ICS Domain, on what new is happening? We will endeavor to build a 360° view on the subject and understand the happenings, the challenges, the innovations that is changing the face of Industrial Control systems. Why to Attend CICS A unique conference for all professionals (OT, Instrumentation, Cyber Security, Techni- cal etc.) related to the ICS domain, to come together under a single umbrella of the CICS conference to understand holistically the advancements, the challenges and the needs of the Industrial Control Systems. Attending this forum will enable participant to understand • Identify the advances and automation in Industrial Control Systems. Learn from Industry peers examples of breakthrough technology deployed in ICS Learn how new technology can solve Industry challenges to improve safety and reliability • Identify how the Industrial IoT revolution is changing and re-shaping the ICS Domain. • Identify the Cyber Security Threats and Risks to an Industrial Control System. Understand the Regulatory landscape that is impacting the ICSs Understand the Best practices and Best of breed solutions How to protect your control systems from malicious intrusions • Learn the importance and need to innovate in the ICS Domain • A platform to network with your peers and share knowledge. • Understand how technology integrates with ICS, a unique opportunity for the technical teams, control technology (OT) teams and the cyber security teams to come together and learn the advancements in the domain. BY POSITION • Heads of IT Security • Heads of Data Management Centre • Head of Network Security • Heads of Planning, Governance & Risk Management • CIO, CTO, CISO & CSO • Process Control & Automation • Network Engineers, • Head of Corporate Security, • Industrial Security Managers • Instruments & Controls • IT Applications Manager, • IT Security Specialist • Application Infrastructure Managers • Information Systems Analyst • Smart Grid & DOF Advisors • Enterprise Security, • Automation & Process Control Engineering, • System Designers & Engineers, • Heads of SCADA/ICS/DCS BY INDUSTRY • Oil & Gas • Petrochemicals • Chemical Manufactures • EPC Contractors • Water & wastewater • Electricity • Nuclear Energy etc.
  • 3. 08:00 Registrations & Networking 08:50 Welcome Speach 10:30 Coffee Break & Networking 12:15 Lunch Break 14:45 Coffee Breaks 15:45 Closing Remarks by Chair for Day 1 13:15 LabeebIoT, Enabling Smarter Factories • Introduction about the platform, • How IoT is helping in the Digital Transformation for the industrial sector, • Challenges, possible scenarios and strategies • IoT and AI applied to industries: use case of Predictive Maintenance Heni Karaa, Technology Product Manager - Qatar Mobility Innovations Center 14:00 Intelligent Smart Warehouses • Challenges in Warehouse Management • Innovative Technology Evolutions in Warehouse Management • Industrial IoT • Smart Shelves and Smart Labels • Indoor Localization for Smart Warehouses • Analytics challenging IoT Gopi Krishna Durbhaka, Technology Evangelist, Sr. Member IEEE, India 15:00 The Industrial Immune System: Using Machine Learning & AI for OT Cyber Defense • How new machine learning and mathemat ics are automating advanced threat detection • Why 100% network visibility allows you to preempt emerging situations, in real time, across both IT and OT environments • How smart prioritization and visualization of threats allows for better resource allocation and lower risk • Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers Mustafa Gharaibeh, Darktrace 09:45 Use of Drones in Logistic Operations Malike Bouaoud, Director/Lead, ICT and CS Strategy – Qatar Foundation 10:45 Operation and maintenance of Industrial embedded devices (IIoT): Where Cybersecu- rity meets Big Data, AI and ICS Javier DiéguezBarriocanal, Director - Basque Cybersecurity Centre, Spain 11:30 Major Changes in ICS System architecture for meeting current challenges in Oil & Gas industry Nilangshu Dey, Executive Board Member , International Society of Automation ( ISA), Qatar THEME 1 - Industrial Automation THEME 2 - Industrial IoT DAY 1 - 11th April 2018 09:00 Auditing Industrial Control Systems • The Audit process, its importance and the value it brings • Challenges auditors face during execution Hatem ElSafaty, Partner – Mazars International.
  • 4. 10:45 Integrated Cyber Security Architecture Initiatives such as “Industry 4.0”, “Industrial IoT” and “Smart OT” drive operational efficiencies and bring competitive advantages. However, they also presents new sets of cybersecurity risks. Cyber- threats to Industrial Control Systems (ICS) has now become a boardroom agenda due to the severe consequences to uptime and safety of the people and assets. • Security in SCADA/ICS • Palo Alto Networks Security Platform - Integrated Cyber Security Architecture Fadi Adlouni, Senior Systems Engineer, Palo Alto Networks, Qatar DAY 2 - 12th April 2018 08:00 Registrations & Networking 10:30 Coffee Break 11:15 Industry 4.0: The Journey & Monetization Mohamed Masood , SoftwareAG 12:00 Big Data, How it became Big and whether it’s Obesity is useful for today’s business? • Trend of world’s data production • Sources of BigData • Data waste • From data recording to data analytics, how it works? • Big Data utilization challenges • How Big Data changes data science job profiles Sultan Salim Humaid Al-Yahyai, Manager IT, Mazoon Electricity, Oman 12:45 Closing Remarks & Networking Lunch 08:45 Welcome Speach 09:00 When standards and regulations are not enough: why industrial cyber security is different in the protection of critical infrastructures • Challenges of existing standards, approaches, methodologies and solutions for critical infrastructure protection • Differences in the critical infrastructure’s threat landscape, actors and objectives • The myth of likelihood in the risk management methodologies • Real examples and numbers of injecting cyber security in critical infrastructures protection mega-projects. • Proposed approaches and key takeaways to improve the industrial cyber security posture in critical infrastructures Samuel Linares, Partner, iHackLabs, Spain 09:45 Hacking the OT Process and affecting the SIL levels Explain how in a sophisticated OT attack, the attacker can actually use the industrial processes to achieve their malicious intent, leaving behind a very limited digital footprint for detection, and how by using processes like HAZOP we can prove that Cyber can impact the safety levels of assets and expose industrial process flaws that can be exploited. Omar Sherin, Director, Ernst & Young, Qatar THEME 3 - Cyber Security in the ICS Environment
  • 5. 11th & 12th April, Doha, Qatar 2018 “The Changing Face of Industrial Control Systems” Registration Details Company Details Name: ________________________________________________ Job Title: ______________________________________________ Email: ______________________ Mobile: ___________________ Tel: _________________________Fax: ______________________ Name: ________________________________________________ Job Title: ______________________________________________ Email: ______________________ Mobile: ___________________ Tel: _________________________Fax: ______________________ Name: ________________________________________________ Job Title: ______________________________________________ Email: ______________________ Mobile: ___________________ Tel: _________________________Fax: ______________________ Terms & Conditions 1 - ANFICON Standard Terms & Conditions By signing the Registration Form, the contracting organization (herein after referred to as “the client”) acknowledges that it has read, understood and accepted the Terms and Conditions outlined hereunder. 2 - PAYMENT The client is liable to make payment in full to ANFICON within 7 working days from the date of issue on the invoice . Payment is due in full at the time of registration and includes lunches, refreshments and detailed conference materials. Payment or PO reference prior to Training /confer- ence is mandatory for attendance. Your registration will not be confirmed until payment is received or a PO reference issued and may be subject to cancellation. If a booking is received 10 working days before the Training/ Conference a credit card number or a PO reference will be required to confirm your place, likewise if full payment has not been received before the conference date. 3 - DISCOUNTS All ‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order to receive any discount. Any other discounts offered by ANFICON (including team discounts) require payment at the time of registration. Discounts cannot be combined with any other offer. 4 - CANCELLATION, POSTPONEMENT AND SUBSTITUTION POLICY You may substitute delegates at any time by providing reasonable advance notice to ANFICON. For any cancellations received in writing not less than eight (15) working days prior to the Training / Conference, you will receive a 100 %credit to be used at another ANFICON Training/ Confer- ence which must occur within one year from the date of issuance of such credit. No credit will be issued for any cancellations occurring within seven (7) days (inclusive) of the training / conference. In the event that ANFICON cancels an event for any reason, you will receive a credit for 100% of the contract fee paid. You may use this credit for another ANFICON event to be mutually agreed with ANFICON, which must occur within one year from the date of cancellation..In the event that ANFICON postpones an event for any reason and the delegate is unable or unwilling to attend on the rescheduled date, you will receive a credit for 100% of the contract fee paid. You may use this credit for another ANFICON event to be mutual- ly agreed with ANFICON, which must occur within one year from the date of postponement except as specified above, no credits will be issued for cancellations. There are no refunds given under any circumstances. ANFICON reserves the right to modify the content, timing or venue of the workshop should circumstance dictate. The training / conference may be postponed or cancelled due to acts of terrorism, war , extreme weather conditions, industrial action, force majeure or any event beyond the control of ANFICON. Should such a situation arise, ANFICON endeavors to reschedule the Training / Conference . However, ANFICON cannot be held responsible for any cost, damage or expenses incurred by the client as a consequence of the Training / Conference being postponed or cancel. The workshop / fee does not include travel costs, hotel accommodation, transfers or insurance. Any dispute arising under or by virtue of this Registration Form shall be settled before the competent Court in the Kerala, India. 5 - PROGRAMME CHANGES Please note that speakers and topics were confirmed at the time of publishing; however, circumstances beyond the control of the organisers may necessitate substitutions, alterations or cancellations of the speakers and/or topics. As such, ANFICON reserves the right to alter or modify the advertised speakers and/or topics if necessary. Any substitutions or alterations will be updated on our web page as soon as possible. *The Workshop Fee includes, and is limited to : Workshop Documents, Workshop Sessions , Lunches and refreshments and Networking Reception Company: _____________________________________________ Contact Person: ________________________________________ Department Name: _____________________________________ Email: __________________ Mobile: _______________________ Tel: _____________________ Fax: __________________________ Website: _________________ Country: _____________________ Postcode: _______________ Address: ______________________ ______________________________________________________ No. Of Employee: 0-49 50-199 200-499 500-999 1000+ Nature of your company business: ________________________ Pricing Per Delegates CONFERENCE DAY $ 799 ADMINISTRATIVE CHARGES $ 20 *Registration fees includes documentation, lunch and refreshment. They do not Include travel and accommodation Conference code: CICS/001