Monday, 3 November 2014

Industrial Control Cybersecurity USA 2nd annual conference October 6th and 7th 2015

Industrial Control Cybersecurity USA October 6th and 7th 2015

Sacramento California USA
Identify, protect, detect, respond and recover. 
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy and Water Sector. 


The second annual Industrial Control Cybersecurity USA conference will take place in Sacramento California on October 6th and 7th 2015 following an outstanding launch event in 2014 supported by the Department of Energy, NERC and many authoritative Energy companies and cybersecurity leaders.
The conference consists of presentations and debate from some of the energy industrys leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world's most influential solution providers.
Key topics of discussion will include the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.
We will dive deeper into the convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.
2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.
We will introduce demonstrations on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.


No comments:

Post a Comment