SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Sponsored by
Gold Sponsor
www.oilandgas-cybersecurity.co.uk
Register online or fax your registration to +44 (0) 20 870 9090 712 or call +44 (0) 870 9090 711
CHAIRMEN FOR 2015:
• Dr Jules Pagna-Disso, Head of Research, Nettitude Ltd
• Martin Smith MBE, Chairman and Founder, The Security Company (International) Ltd and The Security Awareness
Special Interest Group (SASIG)
EXPERT PANEL INCLUDES:
• Graham Wright, CISO & Global Head of Digital Risk and Security, National Grid
• Stephanie Daman, CEO, The Cyber Security Challenge
• Rod Forsythe, IT Forensics Investigator, Chevron
• Henry Carver, Assistant Director, CNI and Physical Cyber, UK Trade & Investment
• Chris Patten, Enterprise Architect, British Gas
• Thom Langford, CISO, Publicis Groupe
BENEFITS OF ATTENDING:
• Discuss best practice in supply chain management, threat mitigation, evaluating framework standards, practices and guidelines
• Understand the need for greater awareness and acknowledgment of risk, prioritising assets and allowing for timely mitigation
• Learn about the latest strategic activities used to protect ICS and critical infrastructure
• Examine ramifications of emerging technologies on threat landscape
• Gain awareness of current government activities in building national and international cyber resilience
BOOK BY JULY 17TH AND SAVE £400 • BOOK BY SEPTEMBER 30TH AND SAVE £200 • BOOK BY OCTOBER 30TH AND SAVE £100
Oil and Gas
Cyber Security
Defend assets, ensure compliance and secure systems
to build cyber resilience and minimise business impact
Holiday Inn Kensington Forum, London, UK
30th NOV
1st DEC
2015
LONDON
SMi present their 5th annual conference on…
#OilCyberSMi
PLUS AN INTERACTIVE HALF-DAY
POST-CONFERENCE WORKSHOP
Wednesday 2nd December 2015, Holiday Inn Kensington Forum,
London UK
The Shiny Objects Are Great
But What About The People?
Hosted by: Tim Harwood, Managing Director,
Harwood Security and Training Consultancy Limited
8.30am – 12.30pm
Register online at: www.oilandgas-cybersecurity.co.uk • Alternatively
Oil and Gas Cyber Security www.oilandgas-cy
8.30 Registration & Coffee
9.00 Chairman's Opening Remarks
Dr Jules Pagna-Disso, Head of Research, Nettitude Ltd
RISK MANAGEMENT
OPENING ADDRESS
9.10 Flushing Away Preconceptions of Risk
Risk is often seen as a dirty word in business. It is a thing that needs to
be reduced to nothing, and has no possible good use in an
organisation, especially a security programme. This couldn’t be more
wrong! Risk is an inherent part of any business, and yet it is often
poorly recognised and leveraged in the security organisation.
• The initial interpretation of risk and how it is often misunderstood
• The measurement of risk and how some systems work and other
don’t
• The effective treatment of risk, and how sometimes the obvious
thing to do can be the wrong thing to do
Thom Langford, Chief Information Security Officer, Publicis Groupe
9.50 Cyber Risk - on the Right Path?
• You must assume the 'bad folks' are inside already,
so how do you minimise business impact?
• How do you convince the CFO and CEO to invest in mitigating this
seemingly nebulous risk?
• Nothing is new – are there lessons from our Medieval ancestors?
Andy Powell MA MSc BSc CEng FIET RAF, Director and Regional
General Manager for Cyber Security, CSC
10.30 Morning Coffee
THREATS TO CRITICAL INFRASTRUCTURE
KEYNOTE ADDRESS
11.00 Challenges of Cyber Security in the Critical National Infrastructure
• CNI – gas and electricity
• Network dependencies and security
• Threat and responses
• Risk Management versus compliance
Graham Wright, CISO & Global Head of Digital Risk and Security,
National Grid
11.40 How Exposed are Our Critical Control Systems? Understanding
the Limitations of Software Security Technologies
• A brief overview of the current threat landscape and a breakdown
of today’s advanced malware
• Why software-based security solutions alone are no longer effective
• How enforcing security through a hardware-based solution, an
emerging best practice, allows for absolute protection against
online network-based attacks
• Common real-world use cases on ‘how’ this is implemented
Andrew Ginter, VP of Industrial Security, Waterfall Security
12.20 Networking Lunch
13.20 Analysing Frameworks for Improving Industrial Control Systems
• Understanding the current industry recognised frameworks and
analysing the gaps
• Evaluating the key controls and their effectiveness on ICS as a
whole
• Case study to show the compromise of ICS systems due to poor
access control
Jonny Kapacee, ICS and Operational IT- Senior Consultant, PwC*
RESEARCH UPDATES ON ICS SECURITY
14.00 Research in Security of ICS
• Assessing the emerging threat to ICS that has arisen from the
convergence of IT and OT
• Communicating cyber threat as business risk
• Resolving the sometimes conflicting demands of safety and security
• New results from the Research Institute in Trustworthy Industrial
Control Systems
Chris Hankin, Director of the Institute for Security Science and
Technology and a Professor of Computing Science,
Imperial College London
14.40 Afternoon Tea
15.10 Understanding Cyber Risk as Business Risk in Industrial Control
Environments
• Complexity of cyber risk decision making in ICS settings
• Limitations of security metrics with regards to ICS risk decision-
making
• Role of perception in understanding and articulating cyber risks
• Latent flawed designs emerging from poor understanding of cyber
risk
Professor Awais Rashid, Director, Lancaster University
CYBER INTELLIGENCE & FORENSICS
15.50 Scaling a Standardised Forensics Team Into An Integrated
Cyber Intelligence Center (CIC)
• Considerations when scaling a standardised forensics team into a
fully-fledged, 24x7 capable cyber intelligence center (CIC)
• Generating buy-in from decision executives on the desired and
anticipated return on investment
• Lessons learned from Chevron’s experience in componentizing the
CIC’s functions
Rod Forsythe, IT Forensics Investigator  Information Risk Strategy and
Management, Chevron
PANEL DISCUSSION
16.30 Best practices in Securing Control Systems and Network
• Discussing the most effective measures in
securing your supply chain?
• Whose responsibility? With so many vendors, companies and
contractors whose responsibility is it to ensure the protection of
those networks involved?
• Identifying vulnerabilities and overcoming the challenges involved
• What are the latest threats and methods of penetration?
• Corporate security versus corporate responsibility
Chris Hankin, Director of the Institute for Security Science and
Technology and a Professor of Computing Science, Imperial College
London
Graham Wright, CISO & Global Head of Digital Risk and Security,
National Grid
Dr Jules Pagna Disso, Head of Research, Nettitude Ltd
Jonny Kapacee, ICS and Operational IT- Senior Consultant, PWC*
17.10 Chairman's Closing Remarks and Close of Day One
19.00 Evening Dinner at the Bombay Brasserie Sponsored by CSC
Limited Availability. Attendance Subject to Final Confirmation
Supported by
DayOneIMonday30thNovember2015
ppoo ppoo
ee WWnana
uutt
ll r
nnnn
iiWW
tintin
r
aapupu dd
d
anan
orr
ngng
inin
d Nd NC
h
ompompC
T
C
h
C ikkororwwnn
o
t
i
C
e
oo dd
oW idr
aann
l W
tt
W
pp
h
CCoo
h
CC
iseprererttiiddr nin En
ingingnd Netnd NetNN
r
ddnn
rddWooW
aaanannnaa
WWWWW
ng ang agg
WW
nnpp
aalinall
ttuuputput
WW
utinutinutut
eT e FFT eeheheheT
oo ppmm
ii
ompompoo
T
oo
TT
CCCC kkororwwtt
iiee alal WWWWllinalinal rr iirrdddd iinnWWoooror in Ein Eiiee FF
CCCC
iseisehhhhhehe prprererttnnrrWWalallle Fe FFFTTTTTT
*Subject to final confirmation
fax your registration to +44 (0)870 9090 712 or call +44 (0)870 9090 711
Oil and Gas Cyber Securityybersecurity.co.uk
Want to know how you can
get involved? Interested in
promoting your services to
this market?
Vinh Trinh, SMi Marketing on
+44 (0)20 7827 6140 or email:
vtrinh@smi-online.co.uk
8.30 Registration & Coffee
9.00 Chairman's Opening Remarks
Martin Smith MBE, Chairman and Founder, The Security Company
(International) Ltd and The Security Awareness Special Interest
Group (SASIG)
POLICY & GOVERNMENT PERSPECTIVE
OPENING KEYNOTE ADDRESS
9.10 Why The Widening Skills Gap Imperils Our Prosperity
• Are the nation’s lack of cyber security skills a myth?
• Why is cyber security so vital?
• What is the impact if we don’t address the skills shortages?
Stephanie Daman, CEO, Cyber Security Challenge UK
9.50 The Role of Government in Supporting Cyber Security Exports to
the CNI Sectors
• HMGs approach to cyber security exports
• Government, industry and academia working together through the
Cyber Growth Partnership
• Raising cyber security awareness in global markets
• The increasing global demand for cyber security capability in
critical infrastructure
Henry Carver, Assistant Director, CNI and Physical Cyber, Cyber
Security Team, UK Trade & Investment
10.30 Morning Coffee
HUMAN DIMENSION & THE INSIDER THREAT
11.00 The Insider Threat
• What is an Insider?
• How do you define ‘Insider Threat’?
• Reducing the threat - people, process and technology
• Whistleblowing
• The importance of awareness
Martin Smith MBE, Chairman and Founder, The Security Company
(International) Ltd and The Security Awareness Special Interest Group
(SASIG)
11.40 Security Awareness and Behavioural Change - Why are we Bothering?
• What are the driving factors?
• How does the enterprise buy into this and why should they?
• Understanding WIIFM
• How do you measure change?
Tim Harwood, Managing Director, HS and T Consultancy
12.20 Networking Lunch
PANEL DISCUSSION
13.20 Evaluating the Human Dimension of Cyber Security
• Understanding the importance of the human factor in
preventing, detecting and overcoming a breach
• Debating the best practices in evaluating your corporate network
and your staff’s level of awareness and competency
• Evaluating IT versus OT and influences on security and risk
management within the realm of the corporate structure
• Discussing the “insider threat” and what it truly means – this may
not always be malicious
Tim Harwood, Managing Director, HS and TC
Stephanie Daman, CEO, The Cyber Security Challenge
Professor John Walker, Visiting Professor School of Science &
Technology NTU, CEO, HEXFORENSICS Ltd
FUTURE OF CYBER SECURITY
14.20 Threat Intelligence for ICS Security
• Defining threat intelligence and the importance of it in relation to
ICS security
• Examining the various stages in gathering intelligence in order to
bolster security
• Assessing the best practices
• Presenting how threat intelligence can aid informed tactical and
operational and strategic decision making
Dr Jules Pagna-Disso, Head of Research, Nettitude Ltd
15.00 Afternoon Tea
15.30 The Digitalisation of the Oil & Gas Sector – Internet of Things
With the digital evolution of oil and gas information technology (IT),
operational technology (OT) systems, networks and processes has
resulted in a slew of new vulnerabilities:
• Cloud and mobile have had massive ramifications on network
security, how does the oil & gas sector adapt to this?
• Examining the new threat landscape and future capabilities
• Developing strategies to secure your network from cyber hacks
• The importance of strengthening collaboration with third party
vendors and security
Chris Patten, Enterprise Architect, Technologist, British Gas
16.10 The Importance of Digital Forensics to the Security Mission - Just How
Serious Is This Aspect of Security Being Taken by The Energy Sector?
• Aspiration vs Reality
• ‘Are we nearly there yet?’
• Is there a tendency to ‘Tick-the-Box’ to satisfy the
compliance programmes?
• The new age of cyber/digital threats implicate is there a need to
implement a proactive next generation response?
• The question is, is this imposition fully appreciated, or are
we still in a mind the gap state of suspension focused on
the reactive only?
• It’s not just about applications & tools
• The importance of applying robust processes, run-books,
and continuity of engagement
• Building the first responder capabilities at low cost – it does not
have to cost a fortune
• Working as ‘one’
• Supporting law enforcement, and agencies such as the
Digital-Trust to fight back against the epidemic of Cyber Crime
Professor John Walker, Visiting Professor School of Science &
Technology NTU, CEO, HEXFORENSICS Ltd
16.50 Chairman’s Closing Remarks and Close of Day Two
Supported by
DayTwoITuesday1stDecember2015
AGENDA:
8.30 Registration and Coffee
9.00 Overview of the Human Risk Factors (the Why)
• Presenting the vulnerabilities in poor human
management and awareness of cyber security
• Evaluating the impact on business
• Examining the factors which increase risk 
9.40 What is it they all need to know (the What)
• Defining a topic list that satisfies the business and
the requirements?
• Defining the quick wins?
• Is there anything defined by the Compliance
factor?
10.30 Coffee break
11.00 Which teams get what (the Who)
• What are your target groups?
• Are there any that are more ‘risky’ than others?
• Who needs more than others
11.40 How do they best receive all of this (the How)
• Defining the delivery approach
• How do your target groups best receive the
information?
• Establishing a network of champions
12.30 Close of Workshop
Overview of Workshop:
It is well known that, when questioned, most ICS staff and security
people consider the biggest vulnerability in their ICS environment to
be the People themselves. Yet, companies persist on spending vast
amounts of their budgets on quick-fix technology rather than going
to the root of the problem and educating their staff. This workshop
will explore the steps needed to help companies take that first step.
Why You Should Attend:
The workshop itself will explore the different ways that good security
education can help defend the enterprise and how to transform
your control room operators into your first line of defence.
Understanding the ‘Why’ will ultimately help to drive your
interpretation of the ‘What’, ‘Who’ and ‘How’ and from that pull
together the roadmap for ongoing awareness. After all, it will be one
of your staff, not the trained security staff, which is most likely to
encounter the cyber issues first.
About The Workshop Leader:
Tim Harwood is a veteran of the security world and has been
providing information security guidance and expertise to
corporate clients, the UK Government and the UK military for
over 30 years. As Managing Director of Harwood Security
and Training Consultancy, he provides strategic direction for
the company that he founded in 2013.
Tim’s professional background includes security capability strategy
planning and development, information security capability framework
design and implementation and security awareness strategy design
and implementation. He has developed a security professional
development framework for a global top ten oil and gas company,
delivers training as a member of the SANS and Firebrand faculties and,
as a thought leader, regularly presents at summits and conferences.
In 2013, he participated as a Subject Matter Expert and Steering
Committee member for the design of the new GIAC certification, the
GICSP certification. As part of his work he contributed questions for the
certification exam and worked on the skills and competency
framework for the certification. In addition, he is an Assessor and
Interviewer for the IISP for potential new members.
Additionally, Tim has recently designed and delivered ICS security
training and awareness for CPNI (as part of the UK National Cyber
Security Strategy) as well as ENISA and other National governments and
global companies.
Tim is a Full member of the Institute of Information Security Professionals
(IISP), a Fellow of the Chartered Management Institute (FCMI) and is the
holder of the GIAC Security Leadership (GSLC) and GIAC Security
Essentials (GSEC) Certifications. Tim is an elected member of the Board
of Directors for the Institute of Information Security Professionals with the
Board portfolio of IS skills and competencies.
About HS and TC:
HS and TC was established in 2013 with the main objective of providing
high-quality and cutting edge professional services and will leverage
known existing and cutting edge research and other industry expertise
to include a more comprehensive awareness/training suite to be usable
by all industries. They also bring a unique blend of benefits to any
project based on an Industry Security Awareness Maturity Model that
Tim Harwood (Co-Founder and CEO) co-developed. Their highly
qualified team share a common purpose in their passionate approach
for information security and their IS and Risk Management services
include:· Their approach to Security Awareness: Rather than focusing
on emerging trends, vendor recommendations, product comparisons,
etc HS and TC’s approach is based on an industry awareness maturity
model and focuses on the Behavioural Risk from the people, skills and
management.· Independence and objectivity: Working with a
completely technology and vendor neutral consultancy will ensure that
the advice and deliverables provided are wholly based on the best
interests of the client and their partners without undue influence form the
outside.
One of their key successes has been the development and delivery of
industry-leading ICS training for the UK CNI industries as part of the UK
Cyber Security Strategy.
The Shiny Objects Are Great But What About The People?
HALF-DAY POST-CONFERENCE WORKSHOP WEDNESDAY 2ND DECEMBER 2015 I 8.30AM – 12.30PM I HOLIDAY INN KENSINGTON FORUM, LONDON UK
Workshop Leader:
Tim Harwood M.Inst.ISP, GSLC, FCMI Managing Director, HS and TC
Oil and Gas Cyber Security Dinner Sponsored by CSC
Following on from day 1 of the conference CSC will be sponsoring a dinner which will be held at the Bombay Brasserie
where you will have the extended opportunity to network with industry professionals in a relaxing environment.
Delegates will leave Oil and Gas Cyber Security having acquired valuable new relationships with senior figures in the
industry. There are limited places available with attendance subject to final confirmation.
Ever since 1982, when its doors first opened in fashionable Kensington, London SW7, Bombay
Brasserie has been an iconic restaurant destination, famed for its authentic, eclectic Bombay and
Indian cuisine.
Limited Availability. Attendance Subject to Final Confirmation.
Oil and Gas Cyber Security Sponsors
Waterfall Security is the leading provider of network cyber security
products enabling safe and secure IT/OT integration for critical
infrastructures, industrial sites and manufacturing facilities. The
company develops products which provide stronger-than-firewall
protection for industrial control networks. Waterfall Security’s
Unidirectional Security Gateways™, Flip™ and Application Data
Control technologies are deployed worldwide in almost every industrial
and critical infrastructure sector. www.waterfall-security.com
CSC offers a full end to end service from consulting through to
fully managed service delivery plus specialist identity
management and business continuity capability. The CSC
Managed Security Service, which won the prestigious SC
Magazine Awards Europe category for best Managed Security
Service this year, is delivered primarily through the cloud. The
service has already proven to reduce clients’ costs by 30%
compared to an in-house solution, helping clients gain buy-in
and justify budgets. For one major client, CSC reduced false
positive alarms by 80% and increased detection of real threats
by 30%. By utilising CSC’s privileged threat intelligence,
correlation engines and rule sets the company can significantly
reduce the costs of unnecessary remediation and therefore
drive efficiencies. www.csc.com/cybersecurity
Gold Sponsor
Sponsor
OCTOBER 2015
Gas to Liquids
12 - 13 October
Holiday Inn Kensington Forum, London, UK
Shale Gas Environmental Summit
26 - 27 October
Holiday Inn Kensington Forum, London, UK
NOVEMBER 2015
Project Financing in Oil & Gas
23 - 24 November
Holiday Inn Regents Park, London, UK
Oil & Gas Cyber Security
30 November - 1 December 2015
Holiday Inn Kensington Forum, London, UK
DECEMBER 2015
Energy from Waste
7 - 8 December
Holiday Inn Regents Park, London, UK
FEBRUARY 2016
E&P Information & Data Management
3 - 4 February
Holiday Inn Kensington Forum, London, UK
FLNG
17 - 18 February
Holiday Inn Kensington Forum, London, UK
MARCH 2016
European Smart Grid Cyber Security
7 - 8 March
Holiday Inn Kensington Forum, London, UK
Gas to Liquids North America
9 - 10 March
Houston Marriott, USA
Oil & Gas Communications
14 - 15 March
Holiday Inn Kensington Forum, London, UK
APRIL 2016
Social Media in the Utilities Sector
11 - 12 April
Holiday Inn Kensington Forum, London, UK
Smart Water Systems
25 - 26 April
Holiday Inn Kensington Forum, London, UK
MAY 2016
Oil & Gas Cyber Security North America
25 - 26 May
Houston Marriott, USA
JUNE 2016
Gas Storage and Transmissions
15 - 16 June
Holiday Inn Kensington Forum, London, UK
Meter Asset Management
20 - 21 June
Holiday Inn Regents Park, London, UK
SMI ENERGY AND UTILITIES EVENT PLANNER
BENEFITS OF SPONSORING OIL AND GAS
CYBER SECURITY 2015
1. Elevate your company profile with senior
executives, board level attendees and key decision
makers
2. Inform the market on your company’s current and
future activities making the business case for
how you can solve your potential customer’s critical
challenges
3. Drive brand awareness by exposing your solutions to
the decision makers that matter
4. Interact and network with those with purchasing
power to influence their decisions at inception
5. Generate fresh prospects and sales, by bringing the
customers to you
6. Establish yourself as the leading solutions providers
SPONSORSHIP AND EXHIBITION OPPORTUNITIES
SMi offer sponsorship, exhibition, advertising
and branding packages, uniquely tailored to
complement your company’s marketing
strategy. Prime networking opportunities exist
to entertain, enhance and expand your client
base within the context of an independent
discussion specific to your industry. Should you
wish to join the increasing number of
companies benefiting from sponsoring our
conferences please call: Alia Malick, Director
on +44 (0) 20 7827 6168 or email:
amalick@smi-online.co.uk
FAX your booking form to +44 (0) 870 9090 712
PHONE on +44 (0) 870 9090 711
POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor
South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS, UK
If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk
OIL AND GAS CYBER SECURITY 2015
Conference: 30th November - 1st December 2015, Holiday Inn Kensington Forum, London, UK
4 WAYS TO REGISTER
ONLINE www.oilandgas-cybersecurity.co.uk
Payment must be made to SMi Group Ltd, and received before the event, by one of
the following methods quoting reference E-063 and the delegate’s name. Bookings
made within 7 days of the event require payment on booking, methods of payment are
below. Please indicate method of payment:
□ UK BACS Sort Code 300009, Account 00936418
□ Wire Transfer Lloyds TSB Bank plc, 39 Threadneedle Street, London, EC2R 8AU
Swift (BIC): LOYDGB21013, Account 00936418
IBAN GB48 LOYD 3000 0900 9364 18
□ Cheque We can only accept Sterling cheques drawn on a UK bank.
□ Credit Card □ Visa □ MasterCard □ American Express
All credit card payments will be subject to standard credit card charges.
Card No: □□□□ □□□□ □□□□ □□□□
Valid From □□/□□ Expiry Date □□/□□
CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card
Cardholder’s Name:
Signature: Date:
I agree to be bound by SMi's Terms and Conditions of Booking.
Card Billing Address (If different from above):
DOCUMENTATION (Shipped 10-14 days after the event)
I cannot attend but would like to purchase access to the following Document
Portal/paper copy documentation: Price Total
□ Access to the conference documentation
on the Document Portal £499.00 + VAT £598.80
□ The Conference Presentations - paper copy £499.00 - £499.00
(or only £300 if ordered with the Document Portal)
VAT
VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on Document
portal and literature distribution for all UK customers and for those EU Customers not supplying a
registration number for their own country here
PAYMENT
Payment: If payment is not made at the time of booking, then an invoice will be issued and must
be paid immediately and prior to the start of the event. If payment has not been received then
credit card details will be requested and payment taken before entry to the event. Bookings within
7 days of event require payment on booking. Access to the Document Portal will not be given until
payment has been received.
Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates may
not ‘share’ a place at an event. Please make separate bookings for each delegate.
Cancellation: If you wish to cancel your attendance at an event and you are unable to send a
substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing
that cancellation is made in writing and received at least 28 days prior to the start of the event.
Regretfully cancellation after this time cannot be accepted. We will however provide the
conferences documentation via the Document Portal to any delegate who has paid but is unable
to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to
provide documentation in these circumstances. We cannot accept cancellations of orders
placed for Documentation or the Document Portal as these are reproduced specifically to order.
If we have to cancel the event for any reason, then we will make a full refund immediately, but
disclaim any further liability.
Alterations: It may become necessary for us to make alterations to the content, speakers, timing,
venue or date of the event compared to the advertised programme.
Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection
Act 1998 and we may use this to contact you by telephone, fax, post or email to tell you about
other products and services. Unless you tick here □ we may also share your data with third parties
offering complementary products or services. If you have any queries or want to update any of
the data that we hold then please contact our Database Manager databasemanager@smi-
online.co.uk or visit our website www.smi-online.co.uk/updates quoting the URN as detailed above
your address on the attached letter.
Unique Reference Number
Our Reference E-063
Terms and Conditions of Booking
DELEGATE DETAILS
Please complete fully and clearly in capital letters. Please photocopy for additional delegates.
Title: Forename:
Surname:
Job Title:
Department/Division:
Company/Organisation:
Email:
Company VAT Number:
Address:
Town/City:
Post/Zip Code: Country:
Direct Tel: Direct Fax:
Mobile:
Switchboard:
Signature: Date:
I agree to be bound by SMi's Terms and Conditions of Booking.
ACCOUNTS DEPT
Title: Forename:
Surname:
Email:
Address (if different from above):
Town/City:
Post/Zip Code: Country:
Direct Tel: Direct Fax:
□ Book by 17th July and save £400 off conference price
□ Book by 30th September and save £200 off conference price
□ Book by 30th October and save £100 off conference price
CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE
I would like to attend: (Please tick as appropriate) Fee TOTAL
OIL AND GAS & PUBLIC SECTOR
□ Conference & Workshop £1498.00 +VAT £1797.60
□ Conference only £899.00 +VAT £1078.80
□ Workshop only £599.00 +VAT £718.80
COMMERCIAL COMPANIES
□ Conference & Workshop £1898.00 +VAT £2277.60
□ Conference only £1299.00 +VAT £1558.80
□ Workshop only £599.00 +VAT £718.80
POST-CONFERENCE DINNER SPONSORED BY CSC
□ End of Day 1 Evening Reception and Dinner at Bombay Brasserie Sponsored by
CSC (30th Novmber) (Limited Availability Subject To Final Confirmation)
PROMOTIONAL LITERATURE DISTRIBUTION
□ Distribution of your company’s promotional
literature to all conference attendees £999.00 + VAT £1198.80
The conference fee includes refreshments, lunch, conference papers, and access to the Document
Portal. Presentations that are available for download will be subject to distribution rights by speakers.
Please note that some presentations may not be available for download. Access information for the
document portal will be sent to the e-mail address provided during registration. Details are sent within
24 hours post conference.
EARLY BIRD
DISCOUNT
VENUE Holiday Inn Kensington Forum, London, UK
□ Please contact me to book my hotel
Alternatively call us on +44 (0) 870 9090 711,
email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712

Contenu connexe

Tendances

Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Dale Butler
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...Citrin Cooperman
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsUlf Mattsson
 
Cybersecurity-2013
Cybersecurity-2013Cybersecurity-2013
Cybersecurity-2013Jennie Hwang
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Building The Framework For A Culture Of Security
Building The Framework For A Culture Of SecurityBuilding The Framework For A Culture Of Security
Building The Framework For A Culture Of Securitymguenther
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research CSSaunders
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
 
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...Citrin Cooperman
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 

Tendances (20)

Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013
 
16231
1623116231
16231
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
Cybersecurity-2013
Cybersecurity-2013Cybersecurity-2013
Cybersecurity-2013
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Building The Framework For A Culture Of Security
Building The Framework For A Culture Of SecurityBuilding The Framework For A Culture Of Security
Building The Framework For A Culture Of Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 

En vedette

SMi Group's 9th annual Border Security 2016
SMi Group's 9th annual Border Security 2016SMi Group's 9th annual Border Security 2016
SMi Group's 9th annual Border Security 2016Dale Butler
 
SMi Group's MilSatCom Latin America 2015
SMi Group's MilSatCom Latin America 2015SMi Group's MilSatCom Latin America 2015
SMi Group's MilSatCom Latin America 2015Dale Butler
 
SMi Group's 6th annual Joint Forces Simulation & Training conference
SMi Group's 6th annual Joint Forces Simulation & Training conferenceSMi Group's 6th annual Joint Forces Simulation & Training conference
SMi Group's 6th annual Joint Forces Simulation & Training conferenceDale Butler
 
SMi Group's 8th annual Advances in Cell Based Assays
SMi Group's 8th annual Advances in Cell Based AssaysSMi Group's 8th annual Advances in Cell Based Assays
SMi Group's 8th annual Advances in Cell Based AssaysDale Butler
 
SMi Group's Defence Exports Asia Pacific 2015 conference
SMi Group's Defence Exports Asia Pacific 2015 conferenceSMi Group's Defence Exports Asia Pacific 2015 conference
SMi Group's Defence Exports Asia Pacific 2015 conferenceDale Butler
 
SMi Group's Social Media in the Telecoms Sector conference
SMi Group's Social Media in the Telecoms Sector conferenceSMi Group's Social Media in the Telecoms Sector conference
SMi Group's Social Media in the Telecoms Sector conferenceDale Butler
 
Shaping the role_of_hr_127
Shaping the role_of_hr_127Shaping the role_of_hr_127
Shaping the role_of_hr_127Naresh Trainer
 
DROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICA
DROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICADROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICA
DROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICAguidomell56
 

En vedette (9)

SMi Group's 9th annual Border Security 2016
SMi Group's 9th annual Border Security 2016SMi Group's 9th annual Border Security 2016
SMi Group's 9th annual Border Security 2016
 
SMi Group's MilSatCom Latin America 2015
SMi Group's MilSatCom Latin America 2015SMi Group's MilSatCom Latin America 2015
SMi Group's MilSatCom Latin America 2015
 
SMi Group's 6th annual Joint Forces Simulation & Training conference
SMi Group's 6th annual Joint Forces Simulation & Training conferenceSMi Group's 6th annual Joint Forces Simulation & Training conference
SMi Group's 6th annual Joint Forces Simulation & Training conference
 
SMi Group's 8th annual Advances in Cell Based Assays
SMi Group's 8th annual Advances in Cell Based AssaysSMi Group's 8th annual Advances in Cell Based Assays
SMi Group's 8th annual Advances in Cell Based Assays
 
SMi Group's Defence Exports Asia Pacific 2015 conference
SMi Group's Defence Exports Asia Pacific 2015 conferenceSMi Group's Defence Exports Asia Pacific 2015 conference
SMi Group's Defence Exports Asia Pacific 2015 conference
 
Cells
CellsCells
Cells
 
SMi Group's Social Media in the Telecoms Sector conference
SMi Group's Social Media in the Telecoms Sector conferenceSMi Group's Social Media in the Telecoms Sector conference
SMi Group's Social Media in the Telecoms Sector conference
 
Shaping the role_of_hr_127
Shaping the role_of_hr_127Shaping the role_of_hr_127
Shaping the role_of_hr_127
 
DROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICA
DROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICADROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICA
DROGAS;COMPOSICION ; EFECTOS;ESTRUCTURA QUIMICA
 

Similaire à SMi Group's 5th annual Oil & Gas Cyber Security 2015

E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityLucy Nicholas
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016Dale Butler
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsDale Butler
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsPeteAndersen
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumDavid Crozier
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"OCTF Industry Engagement
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 

Similaire à SMi Group's 5th annual Oil & Gas Cyber Security 2015 (20)

E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 

Plus de Dale Butler

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceDale Butler
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceDale Butler
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceDale Butler
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conferenceDale Butler
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceDale Butler
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceDale Butler
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceDale Butler
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceDale Butler
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020Dale Butler
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 Dale Butler
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020Dale Butler
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 Dale Butler
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 Dale Butler
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceDale Butler
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020Dale Butler
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceDale Butler
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceDale Butler
 

Plus de Dale Butler (20)

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conference
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conference
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conference
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conference
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conference
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conference
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conference
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conference
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020
 
Space Week 2020
Space Week 2020Space Week 2020
Space Week 2020
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conference
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conference
 

Dernier

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Dernier (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

SMi Group's 5th annual Oil & Gas Cyber Security 2015

  • 1. Sponsored by Gold Sponsor www.oilandgas-cybersecurity.co.uk Register online or fax your registration to +44 (0) 20 870 9090 712 or call +44 (0) 870 9090 711 CHAIRMEN FOR 2015: • Dr Jules Pagna-Disso, Head of Research, Nettitude Ltd • Martin Smith MBE, Chairman and Founder, The Security Company (International) Ltd and The Security Awareness Special Interest Group (SASIG) EXPERT PANEL INCLUDES: • Graham Wright, CISO & Global Head of Digital Risk and Security, National Grid • Stephanie Daman, CEO, The Cyber Security Challenge • Rod Forsythe, IT Forensics Investigator, Chevron • Henry Carver, Assistant Director, CNI and Physical Cyber, UK Trade & Investment • Chris Patten, Enterprise Architect, British Gas • Thom Langford, CISO, Publicis Groupe BENEFITS OF ATTENDING: • Discuss best practice in supply chain management, threat mitigation, evaluating framework standards, practices and guidelines • Understand the need for greater awareness and acknowledgment of risk, prioritising assets and allowing for timely mitigation • Learn about the latest strategic activities used to protect ICS and critical infrastructure • Examine ramifications of emerging technologies on threat landscape • Gain awareness of current government activities in building national and international cyber resilience BOOK BY JULY 17TH AND SAVE £400 • BOOK BY SEPTEMBER 30TH AND SAVE £200 • BOOK BY OCTOBER 30TH AND SAVE £100 Oil and Gas Cyber Security Defend assets, ensure compliance and secure systems to build cyber resilience and minimise business impact Holiday Inn Kensington Forum, London, UK 30th NOV 1st DEC 2015 LONDON SMi present their 5th annual conference on… #OilCyberSMi PLUS AN INTERACTIVE HALF-DAY POST-CONFERENCE WORKSHOP Wednesday 2nd December 2015, Holiday Inn Kensington Forum, London UK The Shiny Objects Are Great But What About The People? Hosted by: Tim Harwood, Managing Director, Harwood Security and Training Consultancy Limited 8.30am – 12.30pm
  • 2. Register online at: www.oilandgas-cybersecurity.co.uk • Alternatively Oil and Gas Cyber Security www.oilandgas-cy 8.30 Registration & Coffee 9.00 Chairman's Opening Remarks Dr Jules Pagna-Disso, Head of Research, Nettitude Ltd RISK MANAGEMENT OPENING ADDRESS 9.10 Flushing Away Preconceptions of Risk Risk is often seen as a dirty word in business. It is a thing that needs to be reduced to nothing, and has no possible good use in an organisation, especially a security programme. This couldn’t be more wrong! Risk is an inherent part of any business, and yet it is often poorly recognised and leveraged in the security organisation. • The initial interpretation of risk and how it is often misunderstood • The measurement of risk and how some systems work and other don’t • The effective treatment of risk, and how sometimes the obvious thing to do can be the wrong thing to do Thom Langford, Chief Information Security Officer, Publicis Groupe 9.50 Cyber Risk - on the Right Path? • You must assume the 'bad folks' are inside already, so how do you minimise business impact? • How do you convince the CFO and CEO to invest in mitigating this seemingly nebulous risk? • Nothing is new – are there lessons from our Medieval ancestors? Andy Powell MA MSc BSc CEng FIET RAF, Director and Regional General Manager for Cyber Security, CSC 10.30 Morning Coffee THREATS TO CRITICAL INFRASTRUCTURE KEYNOTE ADDRESS 11.00 Challenges of Cyber Security in the Critical National Infrastructure • CNI – gas and electricity • Network dependencies and security • Threat and responses • Risk Management versus compliance Graham Wright, CISO & Global Head of Digital Risk and Security, National Grid 11.40 How Exposed are Our Critical Control Systems? Understanding the Limitations of Software Security Technologies • A brief overview of the current threat landscape and a breakdown of today’s advanced malware • Why software-based security solutions alone are no longer effective • How enforcing security through a hardware-based solution, an emerging best practice, allows for absolute protection against online network-based attacks • Common real-world use cases on ‘how’ this is implemented Andrew Ginter, VP of Industrial Security, Waterfall Security 12.20 Networking Lunch 13.20 Analysing Frameworks for Improving Industrial Control Systems • Understanding the current industry recognised frameworks and analysing the gaps • Evaluating the key controls and their effectiveness on ICS as a whole • Case study to show the compromise of ICS systems due to poor access control Jonny Kapacee, ICS and Operational IT- Senior Consultant, PwC* RESEARCH UPDATES ON ICS SECURITY 14.00 Research in Security of ICS • Assessing the emerging threat to ICS that has arisen from the convergence of IT and OT • Communicating cyber threat as business risk • Resolving the sometimes conflicting demands of safety and security • New results from the Research Institute in Trustworthy Industrial Control Systems Chris Hankin, Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London 14.40 Afternoon Tea 15.10 Understanding Cyber Risk as Business Risk in Industrial Control Environments • Complexity of cyber risk decision making in ICS settings • Limitations of security metrics with regards to ICS risk decision- making • Role of perception in understanding and articulating cyber risks • Latent flawed designs emerging from poor understanding of cyber risk Professor Awais Rashid, Director, Lancaster University CYBER INTELLIGENCE & FORENSICS 15.50 Scaling a Standardised Forensics Team Into An Integrated Cyber Intelligence Center (CIC) • Considerations when scaling a standardised forensics team into a fully-fledged, 24x7 capable cyber intelligence center (CIC) • Generating buy-in from decision executives on the desired and anticipated return on investment • Lessons learned from Chevron’s experience in componentizing the CIC’s functions Rod Forsythe, IT Forensics Investigator  Information Risk Strategy and Management, Chevron PANEL DISCUSSION 16.30 Best practices in Securing Control Systems and Network • Discussing the most effective measures in securing your supply chain? • Whose responsibility? With so many vendors, companies and contractors whose responsibility is it to ensure the protection of those networks involved? • Identifying vulnerabilities and overcoming the challenges involved • What are the latest threats and methods of penetration? • Corporate security versus corporate responsibility Chris Hankin, Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London Graham Wright, CISO & Global Head of Digital Risk and Security, National Grid Dr Jules Pagna Disso, Head of Research, Nettitude Ltd Jonny Kapacee, ICS and Operational IT- Senior Consultant, PWC* 17.10 Chairman's Closing Remarks and Close of Day One 19.00 Evening Dinner at the Bombay Brasserie Sponsored by CSC Limited Availability. Attendance Subject to Final Confirmation Supported by DayOneIMonday30thNovember2015 ppoo ppoo ee WWnana uutt ll r nnnn iiWW tintin r aapupu dd d anan orr ngng inin d Nd NC h ompompC T C h C ikkororwwnn o t i C e oo dd oW idr aann l W tt W pp h CCoo h CC iseprererttiiddr nin En ingingnd Netnd NetNN r ddnn rddWooW aaanannnaa WWWWW ng ang agg WW nnpp aalinall ttuuputput WW utinutinutut eT e FFT eeheheheT oo ppmm ii ompompoo T oo TT CCCC kkororwwtt iiee alal WWWWllinalinal rr iirrdddd iinnWWoooror in Ein Eiiee FF CCCC iseisehhhhhehe prprererttnnrrWWalallle Fe FFFTTTTTT *Subject to final confirmation
  • 3. fax your registration to +44 (0)870 9090 712 or call +44 (0)870 9090 711 Oil and Gas Cyber Securityybersecurity.co.uk Want to know how you can get involved? Interested in promoting your services to this market? Vinh Trinh, SMi Marketing on +44 (0)20 7827 6140 or email: vtrinh@smi-online.co.uk 8.30 Registration & Coffee 9.00 Chairman's Opening Remarks Martin Smith MBE, Chairman and Founder, The Security Company (International) Ltd and The Security Awareness Special Interest Group (SASIG) POLICY & GOVERNMENT PERSPECTIVE OPENING KEYNOTE ADDRESS 9.10 Why The Widening Skills Gap Imperils Our Prosperity • Are the nation’s lack of cyber security skills a myth? • Why is cyber security so vital? • What is the impact if we don’t address the skills shortages? Stephanie Daman, CEO, Cyber Security Challenge UK 9.50 The Role of Government in Supporting Cyber Security Exports to the CNI Sectors • HMGs approach to cyber security exports • Government, industry and academia working together through the Cyber Growth Partnership • Raising cyber security awareness in global markets • The increasing global demand for cyber security capability in critical infrastructure Henry Carver, Assistant Director, CNI and Physical Cyber, Cyber Security Team, UK Trade & Investment 10.30 Morning Coffee HUMAN DIMENSION & THE INSIDER THREAT 11.00 The Insider Threat • What is an Insider? • How do you define ‘Insider Threat’? • Reducing the threat - people, process and technology • Whistleblowing • The importance of awareness Martin Smith MBE, Chairman and Founder, The Security Company (International) Ltd and The Security Awareness Special Interest Group (SASIG) 11.40 Security Awareness and Behavioural Change - Why are we Bothering? • What are the driving factors? • How does the enterprise buy into this and why should they? • Understanding WIIFM • How do you measure change? Tim Harwood, Managing Director, HS and T Consultancy 12.20 Networking Lunch PANEL DISCUSSION 13.20 Evaluating the Human Dimension of Cyber Security • Understanding the importance of the human factor in preventing, detecting and overcoming a breach • Debating the best practices in evaluating your corporate network and your staff’s level of awareness and competency • Evaluating IT versus OT and influences on security and risk management within the realm of the corporate structure • Discussing the “insider threat” and what it truly means – this may not always be malicious Tim Harwood, Managing Director, HS and TC Stephanie Daman, CEO, The Cyber Security Challenge Professor John Walker, Visiting Professor School of Science & Technology NTU, CEO, HEXFORENSICS Ltd FUTURE OF CYBER SECURITY 14.20 Threat Intelligence for ICS Security • Defining threat intelligence and the importance of it in relation to ICS security • Examining the various stages in gathering intelligence in order to bolster security • Assessing the best practices • Presenting how threat intelligence can aid informed tactical and operational and strategic decision making Dr Jules Pagna-Disso, Head of Research, Nettitude Ltd 15.00 Afternoon Tea 15.30 The Digitalisation of the Oil & Gas Sector – Internet of Things With the digital evolution of oil and gas information technology (IT), operational technology (OT) systems, networks and processes has resulted in a slew of new vulnerabilities: • Cloud and mobile have had massive ramifications on network security, how does the oil & gas sector adapt to this? • Examining the new threat landscape and future capabilities • Developing strategies to secure your network from cyber hacks • The importance of strengthening collaboration with third party vendors and security Chris Patten, Enterprise Architect, Technologist, British Gas 16.10 The Importance of Digital Forensics to the Security Mission - Just How Serious Is This Aspect of Security Being Taken by The Energy Sector? • Aspiration vs Reality • ‘Are we nearly there yet?’ • Is there a tendency to ‘Tick-the-Box’ to satisfy the compliance programmes? • The new age of cyber/digital threats implicate is there a need to implement a proactive next generation response? • The question is, is this imposition fully appreciated, or are we still in a mind the gap state of suspension focused on the reactive only? • It’s not just about applications & tools • The importance of applying robust processes, run-books, and continuity of engagement • Building the first responder capabilities at low cost – it does not have to cost a fortune • Working as ‘one’ • Supporting law enforcement, and agencies such as the Digital-Trust to fight back against the epidemic of Cyber Crime Professor John Walker, Visiting Professor School of Science & Technology NTU, CEO, HEXFORENSICS Ltd 16.50 Chairman’s Closing Remarks and Close of Day Two Supported by DayTwoITuesday1stDecember2015
  • 4. AGENDA: 8.30 Registration and Coffee 9.00 Overview of the Human Risk Factors (the Why) • Presenting the vulnerabilities in poor human management and awareness of cyber security • Evaluating the impact on business • Examining the factors which increase risk  9.40 What is it they all need to know (the What) • Defining a topic list that satisfies the business and the requirements? • Defining the quick wins? • Is there anything defined by the Compliance factor? 10.30 Coffee break 11.00 Which teams get what (the Who) • What are your target groups? • Are there any that are more ‘risky’ than others? • Who needs more than others 11.40 How do they best receive all of this (the How) • Defining the delivery approach • How do your target groups best receive the information? • Establishing a network of champions 12.30 Close of Workshop Overview of Workshop: It is well known that, when questioned, most ICS staff and security people consider the biggest vulnerability in their ICS environment to be the People themselves. Yet, companies persist on spending vast amounts of their budgets on quick-fix technology rather than going to the root of the problem and educating their staff. This workshop will explore the steps needed to help companies take that first step. Why You Should Attend: The workshop itself will explore the different ways that good security education can help defend the enterprise and how to transform your control room operators into your first line of defence. Understanding the ‘Why’ will ultimately help to drive your interpretation of the ‘What’, ‘Who’ and ‘How’ and from that pull together the roadmap for ongoing awareness. After all, it will be one of your staff, not the trained security staff, which is most likely to encounter the cyber issues first. About The Workshop Leader: Tim Harwood is a veteran of the security world and has been providing information security guidance and expertise to corporate clients, the UK Government and the UK military for over 30 years. As Managing Director of Harwood Security and Training Consultancy, he provides strategic direction for the company that he founded in 2013. Tim’s professional background includes security capability strategy planning and development, information security capability framework design and implementation and security awareness strategy design and implementation. He has developed a security professional development framework for a global top ten oil and gas company, delivers training as a member of the SANS and Firebrand faculties and, as a thought leader, regularly presents at summits and conferences. In 2013, he participated as a Subject Matter Expert and Steering Committee member for the design of the new GIAC certification, the GICSP certification. As part of his work he contributed questions for the certification exam and worked on the skills and competency framework for the certification. In addition, he is an Assessor and Interviewer for the IISP for potential new members. Additionally, Tim has recently designed and delivered ICS security training and awareness for CPNI (as part of the UK National Cyber Security Strategy) as well as ENISA and other National governments and global companies. Tim is a Full member of the Institute of Information Security Professionals (IISP), a Fellow of the Chartered Management Institute (FCMI) and is the holder of the GIAC Security Leadership (GSLC) and GIAC Security Essentials (GSEC) Certifications. Tim is an elected member of the Board of Directors for the Institute of Information Security Professionals with the Board portfolio of IS skills and competencies. About HS and TC: HS and TC was established in 2013 with the main objective of providing high-quality and cutting edge professional services and will leverage known existing and cutting edge research and other industry expertise to include a more comprehensive awareness/training suite to be usable by all industries. They also bring a unique blend of benefits to any project based on an Industry Security Awareness Maturity Model that Tim Harwood (Co-Founder and CEO) co-developed. Their highly qualified team share a common purpose in their passionate approach for information security and their IS and Risk Management services include:· Their approach to Security Awareness: Rather than focusing on emerging trends, vendor recommendations, product comparisons, etc HS and TC’s approach is based on an industry awareness maturity model and focuses on the Behavioural Risk from the people, skills and management.· Independence and objectivity: Working with a completely technology and vendor neutral consultancy will ensure that the advice and deliverables provided are wholly based on the best interests of the client and their partners without undue influence form the outside. One of their key successes has been the development and delivery of industry-leading ICS training for the UK CNI industries as part of the UK Cyber Security Strategy. The Shiny Objects Are Great But What About The People? HALF-DAY POST-CONFERENCE WORKSHOP WEDNESDAY 2ND DECEMBER 2015 I 8.30AM – 12.30PM I HOLIDAY INN KENSINGTON FORUM, LONDON UK Workshop Leader: Tim Harwood M.Inst.ISP, GSLC, FCMI Managing Director, HS and TC Oil and Gas Cyber Security Dinner Sponsored by CSC Following on from day 1 of the conference CSC will be sponsoring a dinner which will be held at the Bombay Brasserie where you will have the extended opportunity to network with industry professionals in a relaxing environment. Delegates will leave Oil and Gas Cyber Security having acquired valuable new relationships with senior figures in the industry. There are limited places available with attendance subject to final confirmation. Ever since 1982, when its doors first opened in fashionable Kensington, London SW7, Bombay Brasserie has been an iconic restaurant destination, famed for its authentic, eclectic Bombay and Indian cuisine. Limited Availability. Attendance Subject to Final Confirmation.
  • 5. Oil and Gas Cyber Security Sponsors Waterfall Security is the leading provider of network cyber security products enabling safe and secure IT/OT integration for critical infrastructures, industrial sites and manufacturing facilities. The company develops products which provide stronger-than-firewall protection for industrial control networks. Waterfall Security’s Unidirectional Security Gateways™, Flip™ and Application Data Control technologies are deployed worldwide in almost every industrial and critical infrastructure sector. www.waterfall-security.com CSC offers a full end to end service from consulting through to fully managed service delivery plus specialist identity management and business continuity capability. The CSC Managed Security Service, which won the prestigious SC Magazine Awards Europe category for best Managed Security Service this year, is delivered primarily through the cloud. The service has already proven to reduce clients’ costs by 30% compared to an in-house solution, helping clients gain buy-in and justify budgets. For one major client, CSC reduced false positive alarms by 80% and increased detection of real threats by 30%. By utilising CSC’s privileged threat intelligence, correlation engines and rule sets the company can significantly reduce the costs of unnecessary remediation and therefore drive efficiencies. www.csc.com/cybersecurity Gold Sponsor Sponsor OCTOBER 2015 Gas to Liquids 12 - 13 October Holiday Inn Kensington Forum, London, UK Shale Gas Environmental Summit 26 - 27 October Holiday Inn Kensington Forum, London, UK NOVEMBER 2015 Project Financing in Oil & Gas 23 - 24 November Holiday Inn Regents Park, London, UK Oil & Gas Cyber Security 30 November - 1 December 2015 Holiday Inn Kensington Forum, London, UK DECEMBER 2015 Energy from Waste 7 - 8 December Holiday Inn Regents Park, London, UK FEBRUARY 2016 E&P Information & Data Management 3 - 4 February Holiday Inn Kensington Forum, London, UK FLNG 17 - 18 February Holiday Inn Kensington Forum, London, UK MARCH 2016 European Smart Grid Cyber Security 7 - 8 March Holiday Inn Kensington Forum, London, UK Gas to Liquids North America 9 - 10 March Houston Marriott, USA Oil & Gas Communications 14 - 15 March Holiday Inn Kensington Forum, London, UK APRIL 2016 Social Media in the Utilities Sector 11 - 12 April Holiday Inn Kensington Forum, London, UK Smart Water Systems 25 - 26 April Holiday Inn Kensington Forum, London, UK MAY 2016 Oil & Gas Cyber Security North America 25 - 26 May Houston Marriott, USA JUNE 2016 Gas Storage and Transmissions 15 - 16 June Holiday Inn Kensington Forum, London, UK Meter Asset Management 20 - 21 June Holiday Inn Regents Park, London, UK SMI ENERGY AND UTILITIES EVENT PLANNER BENEFITS OF SPONSORING OIL AND GAS CYBER SECURITY 2015 1. Elevate your company profile with senior executives, board level attendees and key decision makers 2. Inform the market on your company’s current and future activities making the business case for how you can solve your potential customer’s critical challenges 3. Drive brand awareness by exposing your solutions to the decision makers that matter 4. Interact and network with those with purchasing power to influence their decisions at inception 5. Generate fresh prospects and sales, by bringing the customers to you 6. Establish yourself as the leading solutions providers SPONSORSHIP AND EXHIBITION OPPORTUNITIES SMi offer sponsorship, exhibition, advertising and branding packages, uniquely tailored to complement your company’s marketing strategy. Prime networking opportunities exist to entertain, enhance and expand your client base within the context of an independent discussion specific to your industry. Should you wish to join the increasing number of companies benefiting from sponsoring our conferences please call: Alia Malick, Director on +44 (0) 20 7827 6168 or email: amalick@smi-online.co.uk
  • 6. FAX your booking form to +44 (0) 870 9090 712 PHONE on +44 (0) 870 9090 711 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS, UK If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk OIL AND GAS CYBER SECURITY 2015 Conference: 30th November - 1st December 2015, Holiday Inn Kensington Forum, London, UK 4 WAYS TO REGISTER ONLINE www.oilandgas-cybersecurity.co.uk Payment must be made to SMi Group Ltd, and received before the event, by one of the following methods quoting reference E-063 and the delegate’s name. Bookings made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment: □ UK BACS Sort Code 300009, Account 00936418 □ Wire Transfer Lloyds TSB Bank plc, 39 Threadneedle Street, London, EC2R 8AU Swift (BIC): LOYDGB21013, Account 00936418 IBAN GB48 LOYD 3000 0900 9364 18 □ Cheque We can only accept Sterling cheques drawn on a UK bank. □ Credit Card □ Visa □ MasterCard □ American Express All credit card payments will be subject to standard credit card charges. Card No: □□□□ □□□□ □□□□ □□□□ Valid From □□/□□ Expiry Date □□/□□ CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card Cardholder’s Name: Signature: Date: I agree to be bound by SMi's Terms and Conditions of Booking. Card Billing Address (If different from above): DOCUMENTATION (Shipped 10-14 days after the event) I cannot attend but would like to purchase access to the following Document Portal/paper copy documentation: Price Total □ Access to the conference documentation on the Document Portal £499.00 + VAT £598.80 □ The Conference Presentations - paper copy £499.00 - £499.00 (or only £300 if ordered with the Document Portal) VAT VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on Document portal and literature distribution for all UK customers and for those EU Customers not supplying a registration number for their own country here PAYMENT Payment: If payment is not made at the time of booking, then an invoice will be issued and must be paid immediately and prior to the start of the event. If payment has not been received then credit card details will be requested and payment taken before entry to the event. Bookings within 7 days of event require payment on booking. Access to the Document Portal will not be given until payment has been received. Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates may not ‘share’ a place at an event. Please make separate bookings for each delegate. Cancellation: If you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept cancellations of orders placed for Documentation or the Document Portal as these are reproduced specifically to order. If we have to cancel the event for any reason, then we will make a full refund immediately, but disclaim any further liability. Alterations: It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme. Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to tell you about other products and services. Unless you tick here □ we may also share your data with third parties offering complementary products or services. If you have any queries or want to update any of the data that we hold then please contact our Database Manager databasemanager@smi- online.co.uk or visit our website www.smi-online.co.uk/updates quoting the URN as detailed above your address on the attached letter. Unique Reference Number Our Reference E-063 Terms and Conditions of Booking DELEGATE DETAILS Please complete fully and clearly in capital letters. Please photocopy for additional delegates. Title: Forename: Surname: Job Title: Department/Division: Company/Organisation: Email: Company VAT Number: Address: Town/City: Post/Zip Code: Country: Direct Tel: Direct Fax: Mobile: Switchboard: Signature: Date: I agree to be bound by SMi's Terms and Conditions of Booking. ACCOUNTS DEPT Title: Forename: Surname: Email: Address (if different from above): Town/City: Post/Zip Code: Country: Direct Tel: Direct Fax: □ Book by 17th July and save £400 off conference price □ Book by 30th September and save £200 off conference price □ Book by 30th October and save £100 off conference price CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE I would like to attend: (Please tick as appropriate) Fee TOTAL OIL AND GAS & PUBLIC SECTOR □ Conference & Workshop £1498.00 +VAT £1797.60 □ Conference only £899.00 +VAT £1078.80 □ Workshop only £599.00 +VAT £718.80 COMMERCIAL COMPANIES □ Conference & Workshop £1898.00 +VAT £2277.60 □ Conference only £1299.00 +VAT £1558.80 □ Workshop only £599.00 +VAT £718.80 POST-CONFERENCE DINNER SPONSORED BY CSC □ End of Day 1 Evening Reception and Dinner at Bombay Brasserie Sponsored by CSC (30th Novmber) (Limited Availability Subject To Final Confirmation) PROMOTIONAL LITERATURE DISTRIBUTION □ Distribution of your company’s promotional literature to all conference attendees £999.00 + VAT £1198.80 The conference fee includes refreshments, lunch, conference papers, and access to the Document Portal. Presentations that are available for download will be subject to distribution rights by speakers. Please note that some presentations may not be available for download. Access information for the document portal will be sent to the e-mail address provided during registration. Details are sent within 24 hours post conference. EARLY BIRD DISCOUNT VENUE Holiday Inn Kensington Forum, London, UK □ Please contact me to book my hotel Alternatively call us on +44 (0) 870 9090 711, email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712