6
CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS www.qatalystglobal.com CYBER SECURITY FOR CRITICAL ASSETS | EUROPE FOCUS OF THE EVENT WHY ATTEND? EVENT SPONSORS Critical assets are the foundation of Europe’s infrastructure. As innovation in technology continues to be adopted, the vulnerabilities of cyber-attacks increase. This evolving digital landscape takes pride of place in frantic boardroom meetings as attacks wreak havoc around the world. CS4CA Europe will arm you with the knowledge and tools to fight the 21st Century cyber security battle. Exclusive keynote sessions from top industry execs present new ideas and different perspectives, whilst interactive panel debates offer delegates the chance to benchmark and discuss differing approaches to today’s challenges. In-depth case studies showcase success stories with tangible and actionable insights into securing infrastructure and assets without affecting day-to-day operations. Assess and compare consequences of integrating Industrial Control Systems and Corporate Systems Benchmark your GDPR plans with peers Review case studies demonstrating how key players are combatting and recovering from cyber attacks Examine IAM future proofing requirements and predictions Analyse risks posed by human error and cyber instance Compare how connected industry applications will impact upon cyber security measures 4 - 5 OCTOBER 2017 Venue: Grange City Hotel London, UK www.cs4ca.com/europe TM

CYBER - Radiflow...analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBER - Radiflow...analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of

CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS

www.qatalystglobal.com

CYBER SECURITYFOR CRITICAL ASSETS | EUROPE

FOCUS OF THE EVENT WHY ATTEND?

EVENT SPONSORS

Critical assets are the foundation of Europe’s infrastructure. As innovation in technology continues to be adopted, the vulnerabilities of cyber-attacks increase. This evolving digital landscape takes pride of place in frantic boardroom meetings as attacks wreak havoc around the world. CS4CA Europe will arm you with the knowledge and tools to fight the 21st Century cyber security battle. Exclusive keynote sessions from top industry execs present new ideas and different perspectives, whilst interactive panel debates offer delegates the chance to benchmark and discuss differing approaches to today’s challenges. In-depth case studies showcase success stories with tangible and actionable insights into securing infrastructure and assets without affecting day-to-day operations.

Assess and compare consequences of integrating Industrial Control Systems and Corporate Systems

Benchmark your GDPR plans with peers

Review case studies demonstrating how key players are combatting and recovering from cyber attacks

Examine IAM future proofing requirements and predictions

Analyse risks posed by human error and cyber instance

Compare how connected industry applications will impact upon cyber security measures

4 - 5 OCTOBER 2017Venue: Grange City HotelLondon, UK

www.cs4ca.com/europe

TM

Page 2: CYBER - Radiflow...analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of

OFFICIAL SPONSOR:

Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s behaviours and intent as they interact with critical data and IP wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to data whilst protecting intellectual property and simplifying compliance.

Forcepoint was formed in 2016 as a result of the combination of the Raytheon Cyber Products, Websense and Stonesoft organisations, integrating the user protection, data security and cloud expertise of Websense with the insider threat and analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of front-line exoerience across many domains of cybersecurity, from Fortine 100 enterprise to mid-sized businesses in every industry, to the world’s most highly secure defense, intelligent and law enforcement agencies. Cloud application protection and visibility was also enabled in 2017 with Forcepoint’s acquisition of Skyfence CASB (cloud application security broker). More than 20,000 organisations around the world rely on Forcepoint to enable better decision-making and more efficient security.

NICOLAS FISCHBACHCTO Cloud, Forcepoint

Nicolas (Nico) Fischbach is leading Forcepoint’s cloud-first transformation as the CTO for the company’s cloud security business, where he oversees technical direction and innovation. Before joining Forcepoint, he spent 17 years at Colt, a global B2B service provider, and was responsible for company-wide strategy, architecture and innovation.

PRESENTING SPONSORS:

PLATFORM SPONSORS:

ROUND TABLE SPONSOR:

ASSOCIATE SPONSORS:

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com

CYBER SECURITY FOR CRITICAL ASSETS EUROPE4 - 5 October 2017 | London, UK | www.cs4ca.com/europe02 03

Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect business, critical infrastructure, governments, and consumers around the global. The company’s comprehensive security portfolio includes endpoint protection and several specialised security solutions and services to find sophisticated and evolving digital threats.

Nozomi Networks is dedicated to protecting the availability of ICS/ SCADA networks from cyber security incidents and process anomalies with our advanced real-time visibility solution. Our innovative SCADA guardian appliances inspect industrial networks non-intrusively and apply machine-learning technology to provide unique insights. These include the detection of suspicious cyber activities and abnormal process control indicators.

Verve Industrial Protection’s mission is to protect the world’s critical infrastructure. For over twenty years, we have helped our clients simplify and reduce the cost of building and maintaining secure, reliable, and compliant industrial control systems - DCS, PLC and SCADA.

Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance across many industries.

Tenable™ is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io to deliver the world’s first platform to provide live visibility into any asset on any computing platform.

Radiflow is a leading provider of cyber security for critical infrastructure networks. The Radiflow solution provides operators the visibility and control of their OT network; including both nonintrusive industrial IDS to monitor real-time networks and security gateways to secure access to devices in critical zones.

CyberX provides the most widely deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Deployed in the world’s largest environments and backed by military-grade cyber experts from the IDF, the CyberX platform uniquely combines M2M behavioural analytics with proprietary ICS-specific threat intelligence to identify advanced cyberattacks in real-time.

Skybox arms security leaders with the broadest set of solutions in security management to significantly reduce the risk of a breach. The Skybox® Security Suite integrates with more than 100 technologies and uses network modeling, attack vector analytics and multi-factor vulnerability prioritization to give unprecedented visibility of the attack surface and insight to key indicators of exposure (IOEs), such as exploitable vulnerability hot spots, unsecure device configurations and risky access rules.

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over 4 million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

TM

PAS is a leading provider of software solutions for process safety, cybersecurity, and asset reliability to the energy, process, and power industries worldwide. PAS solutions include industrial control system cybersecurity, automation asset management, IPL assurance, alarm management, high performance HMI™, boundary management, and control loop performance optimization. PAS solutions are installed in over 1,100 facilities worldwide in more than 70 countries.

Honeywell Industrial Cyber Security is the leading provider of cyber security solutions that protect the availability, safety and reliability of industrial facilities and helps securely deploy IIoT technologies. We focus on reducing risk in industrial environments and help customers tackle cyber security challenges confidently with complete solutions, strong domain knowledge and advanced technology.

Airbus CyberSecurity is a trusted partner of Governments, Military, Enterprise Organisations and Critical National Infrastructure across Europe. With locations in Newport, Paris and Munich Airbus CyberSecurity has vast experience and highly skilled experts developing market leading cyber security technologies. Including encryption, key management, security operating centres, threat intelligence, Industrial Control System solutions and cyber security consultancy. Through Cyber Defence Centres in the UK, France and Germany, Airbus CyberSecurity offer a range of services and solutions, dynamically combining monitoring, early detection and investigation of attacks, drastically reducing the incident response time.

PRESENTING SPONSORS:

Claroty’s mission is to secure and optimize the industrial control networks that run the world. The Claroty Platform provides extreme visibility into our customer’s OT networks. Powered by the elite Claroty Research team, the platform delivers real-time anomaly detection using , high-fidelity models and advanced algorithms to detect anomalies and alert our customers to both cybersecurity and process integrity issues.

Tripwire is a leading provider of security, compliance and IT operations solutions for enterprise and public sector organisations. Tripwire solutions are based on high-fidelity asset visability and endpoint intelligence combined with business context. tripwire’s solutions include configuration and policy management, file integrity monitoring, vulnerability management, log management reporting and analytics.

Page 3: CYBER - Radiflow...analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com

CYBER SECURITY FOR CRITICAL ASSETS EUROPE4 - 5 October 2017 | London, UK | www.cs4ca.com/europe04 05

SPEAKERS

MO AHDDOUDCISOScotia Gas Networks

RAKESH BURGULCISOInternational Nuclear Services

ALISON DYERDirector, Office of the CISOGSK

DAVID CARVALHOHead of Global Security OperationsOCS Group

AD KRIKKECISODSM

GILAD BANDELVP ProductsRadiflow

RON YOSEFIInternational Sales & Business Development ManagerCyberX Labs

CONFIDENTIALAdviser, Corporate SecurityNCSC

CHRIS ROBINSONPrincipal Consultant, Industrial Control SystemsCylance

TM

BEN KAINTOCHManaging Director EMEAVerve

JON SHAWSales Director Northern EuropeSkybox

JASON HAWARD-GRAUCISOPAS

GAVIN MILLARDEMEA Technical DirectorTenable

ANDREW ROSECISO & Head of Cyber SecurityNATS

ANDREY NIKISHINFuture Technologies Projects DirectorKaspersky Lab

DAVID NORDELLSVPCSCSS

JOHN PATTERSONCISO & Head of Business TechnologyMerck KGaA

DR. CHRISTOPHER RICHARDSONHead of BU Cyber Security UnitBournemouth University

EVANGELIS OUZOUNISHead of Unit- Secure Infrastructures and ServicesENISA

NICHOLAS FISCHBACHCTO CloudForcepoint

JEFF CORNELIUSEVP ICS SolutionsDarktrace

SAFDAR AKHTARBusiness Development DirectorHoneywell

DAVID METCALFICSS EngineerBechtel Oil, Gas & Chemicals

PADDY FRANCISCTOAirbus CyberSecurity

TONY ATKINSEuropean Sales DirectorNozomi Networks

STEERING COMMITTEE

PROF. TIM WATSONDirector, Cyber Security Centre, University of Warwick

ROBERT ORRPrincipal Consultant, Contect Information Security

ROB HAYESDirector, Risk Advisory, Deloitte

DR ALEX TARTERHead of Cyber Security, Thales

SIMON BRADLEYVP, Head of Innovation, Cyber Security Program Director, Airbus

JONNI TALSIChief Engineer Cyber Security, Poyry

AMRISH JAISWLHead of Global Security Operations, The Linde Group

NICOLAS FISCHBACHCTO Cloud, Forcepoint

ANDREW WADSWORTHManaging Consultant, PA Consulting

ROBERTO MINICUCCIProduct Security Leader, GE Oil & Gas

MUHITTIN HASANCIOGLUEx CISO & VP Information Risk Managementat Shell

SPEAKER TBCSenior Level ExecutiveClaroty

PAUL EDONDirector of International Professional ServicesTripwire

Page 4: CYBER - Radiflow...analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of

08:15

08:50

09:00

11:30

12:00

12:10

14:10

12:40

REGISTRATION

OPENING ADDRESS FROM THE CHAIRMAN

OPENING PANEL

PRESENTATION

PLATFORM

PRESENTATION

PRESENTATION

SEATED LUNCH HOSTED BY FORCEPOINT

06 07

CONFERENCE DAY ONEWEDNESDAY 4th OCTOBER 2017

• 5 months on from WannaCry and BA disaster: the reality check or just the start?• Communicate & share – actioning against the problem• What type of influence is AI and IoT playing on your framework?• Do you think you are overspending or underspending on risk and security and if so by how much? • You have most likely been compromised - lets

understand how and explore steps to mitigate and prevent

• Shine a light on the dark web

• OT security risk is a business risk• You can’t protect what you don’t understand• Risk Management is not static, but an ongoing process

• Description of the ICS Cybersecurity Kill Chain and how it differs from the IT Cybersecurity Kill Chain• Identify choke points that can disrupt an attack• How AI can be used to protect those choke points

The New Cyber Security Ecosystem

NCSC Thread Landscape

New Threat Vectors for ICS/SCADA Networks

Managing OT Security Risk: Understand Your Estate, Understand Your Risk

The Rise of the Machine. Using AI to Tackle Cyber Security

- Moderator: David Nordell, SVP Strategy, Policy & Law, CSCSS- Alison Dyer, Director, Office of the CISO, GSK- Ben Kaintoch, Managing Director EMEA, Verve Industrial- Senior Expert, TBC, Honeywell.- Amrish Jaiswal, Head of global Security Operations, The Linde Group.

- Senior Expert, NCSC.

- Ron Yosefi, International Sales & Business Development Manager, CyberX Labs.

- Paddy Francis, CTO, Airbus CyberSecurity.

- Chris Robinson, Principal Consultant, Industrial Control Systems, Cylance.

- Tony Atkins, European Sales Director, Nozomi Networks.

15:40

PLATFORM

Delivering End-to-End Platforms for Operational Reliability

09:40

KEYNOTE

Over the past few years, record cybersecurity investments have been met with an onslaught of data breaches led by a dramatic rise in insider-related incidents. Needing to protect their organisations and unsatisfied with current security tools, cyber professionals have admitted their most exposed weakness: an industry-wide inability to understand how their employees interact with critical data and IP. In this presentation, Nico Fischbach looks at:

• How shifting focus from perimeters to people is crucial for success in the new era of mobility and cloud• How people AND data are key to a better security• How the ability to see and understand the context behind user actions can prevent damaging breaches (Intentional and unintentional)

Could the security industry have it all wrong?

- Nicholas Fischbach, CTO Cloud, Forcepoint.

15:10

CASE STUDY

Self-Learning Cyber Defense for ICS/SCADA Environments

- Jeff Cornelius, EVP ICS Solutions, Darktrace.

• How machine learning and AI are automating advanced threat detection• Why 100% network visibility allows you to pre-empt emerging situations, in real-time, across both IT and OT environments• How smart prioritisation and visualisation of threats allows for better resource allocation and lower risk• Real-world examples of detected OT threats, from non-malicious insiders to sophisticated cyber-attackers

10:20 NETWORKING BREAK & BUSINESS CARD EXCHANGE

16:50

17:30

17:40

CHAIRMAN’S CLOSING REMARKS

NETWORKING DRINKS

Table 1: Building a Reliable Operations TeamTable 2: What Does a Healthy Insider Threat Programme Look Like?Table 3: See and Understand Where Your Most Critical Control Systems Are Vulnerable to AttackTable 4: Supply Chain SecurityTable 5: Practical and Useable GDPR Guidelines Table 6: How is the Landscape for Maritime Security EvolvingTable 7: Addressing the Skills Gap

Moderated Discussions - Choice of Topics

Moderated by:- Table 1: John Patterson, CISO & Head of Business Technology, Merck KGaA.

- Table 2: Nicolas Fischbach, CTO Cloud, Forecpoint.

- Table 3: Jon Shaw, Sales Director Northern Europe, Skybox Security.

- Table 4: David Metcalf, ICSS Engineer, Bechtel Oil, Gas & Chemicals.

- Table 5: Evangelis Ouzounis, Head of Infrastructure and services, ENISA.

- Table 6: David Nordell, SVP Strategy, Policy & Law, CSCSS.

14:40 NETWORKING BREAK

ROUNDTABLE

16:20

CASE STUDY

• How to prepare, protect, detect, respond, and recover• Raising and maintaining awareness• Creating a culture of avoiding blind spots

Moving the Security Needle: Protecting Industrial Endpoints Against a Connected World

- Jason Haward-Grau, CISO, PAS

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com

CYBER SECURITY FOR CRITICAL ASSETS EUROPE4 - 5 October 2017 | London, UK | www.cs4ca.com/europe

13:40

PRESENTATION

• EU policy efforts in the area of Critical Assets• The NIS Directive• ENISA’s contribution to the implementation of the Directive

NIS Directive - ENISA’s Contribution

- Evangelis Ouzounis, Head of Unit- Secure Infrastructures and Services, ENISA .

- John Patterson, CISO & Head of Business Technology, Merck KGaA.

15:50

CASE STUDY

• How to prepare, protect, detect, respond, and recover• Raising and maintaining awareness• Creating a culture of avoiding blind spots

Risk Management Becoming a Company Wide Initative

11:00

CASE STUDY

• Part 1 is aligning IT and OT priorities• Part 2 is taking the steps to prevent, detect and take action

Closing the Gap Between Planning and Action

- Ad Krikke, CISO, DSM.

Page 5: CYBER - Radiflow...analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of

What is The First Step Before Engaging in a Costly Cyber-Security Protection Project?

08 09

09:00

09:40

10:10

OPENING PANEL

PRESENTATION

NETWORKING BREAK

CONFERENCE DAY TWOTHURSDAY 5th OCTOBER 2017

• How often is your security reviewed and who is involved in this review? Is that review often enough?• What does resiliency mean to you?• How do you ensure critical communication infrastructure runs effectively? • Accessing Risk to Anticipate Attacks - Let’s Face Reality

• Hurricanes- Attacks you see coming that you can prepare for• Earthquakes- Threats you do not see and need to respond to efficiently and quickly

Creating Resiliency Throughout theCompany in your Workforce and Framework

Threat Intelligence to deal with “Hurricanes and Earthquakes”

- Moderator: David Metcalf, ICSS Engineer, Bechtel Oil, Gas & Chemcials- John Patterson, CISO & Head of Business Technology, Merck KGaA- Ad Krikke, CISO, DSM- Rakesh Burgul, CISO, International Nuclear Services- Nicholas Fischbach, CTO Cloud, Forcepoint

- Andrey Nikishin, Future Technologies Projects Director, Kaspersky Lab.

11:20

CASE STUDY

• Prioritising concerns• Using human and financial capital efficiently

What a Holistic, Integrated and Compliant Approach Should Look Like and Howto Achieve It

- Andrew Rose, CISO & Head of Cyber Security, NATS.

08:30

08:50

REGISTRATION

WELCOME ADDRESS FROM THE CHAIRMAN

A CONFERENCE BY QATALYST GLOBAL T: +44 203 740 9106 | E: [email protected] | www.qatalystglobal.com

CYBER SECURITY FOR CRITICAL ASSETS EUROPE4 - 5 October 2017 | London, UK | www.cs4ca.com/europe

14:00

15:00

16:00

13:30

14:3016:40

16:50

CASE STUDY

PRESENTATION

GROUP DISCUSSION

PRESENTATION

NETWORKING BREAKCHAIRMAN’S CLOSING REMARKS

END OF CONFERENCE

• How we used augmented reality to assess, and determine our weaknesses when systems are vulnerable

• The focus has been on technology being the solution with humans side-lined• The biggest problem will always be the human both inside and outside an organisation

• Creating a culture of cyber awareness throughout the organisation horizontally and vertically – How?

• Stopping your systems tiring out• Complex approach to infrastructures are being used including through firewalls, web applications servers and other infrastructure components

Using Disruptive Technologies to Test Weaknesses

People are the Problem as well as the Solution

Do Current Guidelines do Enough and are They Being Effective?

The Rise in DDoS Attacks

- Muhittin Hasancioglu, ExCISO & VP Information Risk Management, Shell.

- Rakesh Burgul, CISO, International Nuclear Services.

- Mo Ahddoud, CISO, Scotia Gas Networks.

15:30

CASE STUDY

• How TFL is working collaboratively while still maintaining clear delineation between the roles

A Marriage Between IT & OT

- David Carvalho, Group CISO, OCS Group.

PRESENTATION

• With critical assets becoming part of the attack path and a target for threat actors, it’s more important than ever to identify and manage the cyber exposure of these devices to reduce the probability of a business impacting event.

Identifying Cyber Exposure Points on Critical Assets

- Gavin Millard, EMEA Technical Director, Tenable.

11:50

PLATFORM

- Gilad Bandel, VP Products, Radiflow.

SEATED LUNCH

• Threats are known to exist, imminent and severe! They happen every day, more frequently and with harsh implications• Due to numerous recent attacks, everyone plans to mitigate the risks using various security products and solutions• Find out how to select the right, optimal and most effective path to do it

12:00

12:3010:50

KEYNOTE

• History should be a lesson learned - OT can learn from IT mistakes• The biggest challenges are people & skills• What will the furture hold?

- Paul Edon, Director of International Professional Services, Tripwire.

ICS2ICS - Introducing Cyber Security 2 Industrial Control Systems

- Dr Christopher J Richardson, Bournemouth University.

Page 6: CYBER - Radiflow...analytics of technology of Raytheon, along with the next-generation network protection capabilities of Stonesoft. The three businesses brought together decades of

CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS

www.qatalystglobal.com

UPCOMING EVENTSMEDIA PARTNERS

www.cs4ca.com/europe

6th - 7th March 2018USA - HOUSTON

18th - 19th April 2018

8th - 9th November 2017

24th - 25th January 2018

15th - 16th May 2018

USA - CHICAGO

EUROPE - MUNICH

JOHANNESBURG - SOUTH AFRICA

ITALY - ROME

MENA - DUBAI22nd - 23rd May 2018

7th - 8th February 2018

11th - 12th October 2017

EUROPE - MUNICH

USA - CHICAGO