Tuesday, 4 November 2014

Reliability and stability of our Critical National Infrastructure

Industrial Control Cybersecurity
USA and Europe 2015

The Industrial Control Cybersecurity 2015 dates have been announced! 
We are now accepting abstracts from Key Operators, Government and international cybersecurity leaders.
Industrial Control Cybersecurity Europe
September 29th and 30th 2015 
 London United Kingdom
www.industrialcontrolsecurityeurope.com
Industrial Control Cybersecurity USA
October 6th and 7th 2015 
Sacramento California
www.industrialcontrolsecurityusa.com 
To present on either conference, or to become a media partner contact James Nesbitt, james.nesbitt@cybersenate.com
We are also reviewing roadshow potential for additional regions if you are interested please reach out.

Sponsors act now to ensure you do not miss out on a sell out event packed with strategic content and invaluable networking opportunities. Over %50 of the stand space is now sold.
Wish to register to attend in advance? We have Early Bird registration rates saving 30% off the regular rates. Block bookings discounts for your team are available 4 for the price 3 discounts for your team
To sponsor or attend contact Stephan McKay at Smckay@sagacity-media.com

Overview:
Identify, protect, detect, respond and recover. 
All stakeholders have a new responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Public and Private partnerships are paramount and information sharing on an international level a priority. We will be addressing key areas of vulnerability, threat detection, mitigation, and planning for the Energy, Oil, Gas, Electric and Water Sector.
The Indudstrial Control Cybersecurity conference consists of presentations and debate from some of the energy industry's leading end users from Operational and IT backgrounds, Government influencers, leading cybersecurity authorities and some of the world’s most influential solution providers.
Key topics of discussion will pivot on convergence of operational and information technology transformation, design, implementation, integration and risks associated with enterprise facing architecture.
Further review includes the development of policy, operational and cultural considerations, maturity models, public and private information sharing and the adoption of cybersecurity controls.
2015 will provide further insight into how industry can further develop organisational priorities, effective methodologies, benchmark return on investment for cybersecurity procurement, supplier relationships and how to effectively deploy defense in-depth strategies.
We will introduce demonstrations on the latest attacks and hear from those who are responsible for identifying them. The conference will further address penetration testing, the art of detection and threat monitoring, incident response and recovery.
The Cyber Senate
Newsletter sign up

No comments:

Post a Comment