6
www.OilandGasCyberSecurity.com September 16-18, 2013 Houston, TX Metro Area Richard A. Clarke Chairman Good Harbor Security Risk Management Michael W. Locatis Former Assistant Secretary of Cyber Security and Communications, DHS Dmitri Alperovitch Co-Founder & CTO Crowdstrike Jonathan Pollet Founder, Principal Consultant Red Tiger Security Ian McCredie Former Head of Global Security Services, Shell Mischel Kwon Former Director, US-CERT Bob Stasio Former Chief of Operations, NSA Network Operations Center Paul Williams Executive Director of Security Services, White Badger Group Steven Elwart Director of Systems Engineering, Ergon Refining Enhancing Mitigation Capabilities for Network Cyber Threats Featured Speakers

Cyber Security for Oil and Gas

  • View
    686

  • Download
    1

Embed Size (px)

DESCRIPTION

Oil and Gas iQ’s Cyber Security for Oil and Gas event will bring together relevant stakeholders to discuss the most pressing cyber security issues facing the oil and gas sector. Presentations will examine threat trends, identify immediate and long-term needs, and reveal up-and-coming technologies for use in evolving threat environments. Security managers, IT strategy implementers, and industry partners will gather in Houston, TX to network, share best practices and explore potential paths to mitigate the threat of energy-focused attacks from cyber adversaries. For more information visit http://bit.ly/1cwasCO

Citation preview

Page 1: Cyber Security for Oil and Gas

www.OilandGasCyberSecurity.com

September 16-18, 2013 • Houston, TX Metro Area

Richard A. ClarkeChairmanGood Harbor Security Risk Management

Michael W. LocatisFormer Assistant Secretaryof Cyber Security andCommunications, DHS

Dmitri AlperovitchCo-Founder & CTOCrowdstrike

Jonathan PolletFounder, PrincipalConsultantRed Tiger Security

Ian McCredieFormer Head ofGlobal SecurityServices, Shell

Mischel KwonFormer Director, US-CERT

Bob StasioFormer Chief ofOperations, NSA NetworkOperations Center

Paul WilliamsExecutive Director ofSecurity Services, WhiteBadger Group

Steven ElwartDirector of SystemsEngineering, ErgonRefining

Enhancing Mitigation Capabilities for Network Cyber Threats

Featured Speakers

Page 2: Cyber Security for Oil and Gas

Who you will meet: Security managers, IT strategy implementers,and industry partners will gather to network,share best practices and explore potentialpaths to mitigate the threat of energy-focused attacks from cyber adversaries.

Dear Colleague,

As the Obama administration and other key figures in the government continue tostress the critical nature of cyber security and the dangers/implications of cyberattacks, critical industries like energy are seeking to update their cyber threatmitigation efforts in regards to network security. With the range and breadth of cyberthreats on the rise, many of which are specifically targeting energy facilities,operations and companies, this urgent issue must be addressed at the highest levels.

Because recent attacks ranging from Operation Night Dragon to Shamoon haveredefined the security reality for the energy sector, Oil & Gas iQ’s Cyber Securityfor Oil and Gas conference serves as the central meeting point for oil and gasnetwork security personnel who strive to significantly impact the landscape of cybersecurity in their organizations and sector at-large. At this event you will have theunique opportunity to interact and network with senior-level professionals with thefollowing expertise:

• Tactical Cyber Security Planning

• Data Management and Security

• Information Analysis and Dissemination

• Critical Infrastructure Network Operations

• Information Technology and Sharing

• Assessing Adversary Capability and Intentions

• Interagency Cooperation

• Information Security

• National Security

• Training and Doctrine

In-depth briefings and presentations from Washington insiders including RichardClarke, Michael Locatis and Mischel Kwon will give you the latest on currentgovernment initiatives targeting cybersecurity. Understand the evolving nature of thiscyber threat as it pertains to the oil and gas industry and operations specificallythrough comprehensive analysis of attacks and adversaries by leading cybersecurityexperts such as Dmitri Alperovitch, Adam Meyers, Bob Stasio and Jonathan Pollet.These cybersecurity specialists will address the rise of cyber attacks against the energysector, the evolution of the cyber threat from random hacking to advanced persistentthreats, the issues associated with fighting a nation-state adversary with unlimitedfunding and resources, and the future of cyber security for energy networkinfrastructures. You will also be briefed on sector-wide outreach and partnershipinitiatives by your peers who are working to promote the energy sector’s cybersecurityinterests and raise awareness on this key issue at the sector level.

Don’t miss the chance to take part in this exclusive discussion with key leaders andexperts from the oil and gas sector, policy administration, and cyber securitytechnology and innovations community. Reserve your place as a part of thisunique event by calling 1.800.882.8684 or visitingwww.OilandGasCyberSecurity.com!

I look forward to welcoming you to this exciting event,

Saxon H. BurkeLead Producer, Oil & Gas iQ

2

Creating Cyber ‘Surgeons’:Thinking Like the Adversary

September 16-18, 2013Houston, TX Metro Area

‘Cyber Warriors’ are unique, highly-trainedindividuals, who’s skill set is honed on howcyber adversaries operate. Like surgeons, ittakes an immense amount of work andtraining to master the cyber profession.

The following interview with Bob Stasio, FormerChief of Operations at the NSA NetworkOperations Center, explores the development ofAmerican ‘Cyber Soldiers’, personal experiences in‘Ethical Hacking’, and a discussion on the need fordrastic action and increased cyber security in lightof ever-present and destructive threats (includingApril’s ‘Spamhaus’ attack).

Interview questions include:

• Tell us about the development of American‘Cyber Soldiers’ – what are the goals, theaims, and the reality?

• Tell us about your work as a ‘EthicalHacker’. What does this mean, how is theintelligence applied for cyber advantage?

• How easy it for hackers to bypass ‘securednetworks’ in order to extract critical andconfidential information? In your opinion,do enough organizations have wellequipped cyber security measures in place?

• With Cyber so heavily on the agenda of thefederal government, we are seeing dailynews alerts of cyber attacks (including the‘Spamhaus’ Dutch attack this week) – whatdo cases like this highlight about the everpresent and evolving nature of cyberattacks, and the need for drastic action andincreased cyber security?

• Software vs. human intelligence – what isyour take on the value and role of each forcyber security?

To read the complete interview visitwww.OilandGasCyberSecurity.com

www.OilandGasCyberSecurity.com • 1-800-882-8684

Why attend: Oil and Gas iQ’s Cyber Security for Oil and Gasevent will bring together relevant stakeholdersto discuss the most pressing cyber securityissues facing the oil and gas sector.

What you will hear: Presentations will examine threat trends,identify immediate and long-term needs,and reveal up-and-coming technologies foruse in evolving threat environments.

P.S. Don’t miss the full-day workshop

on September 16 by Dmitri Alperovitch

on the targeted energy sector attack,

Operation Night Dragon!

Page 3: Cyber Security for Oil and Gas

ESPIONAGE AND ENERGY FOCUS DAY Monday, September 16, 2013

3www.OilandGasCyberSecurity.com • 1-800-882-8684

FACILITATOR: Dmitri Alperovitch,Co-Founder and CTO,Crowdstrike

Dmitri Alperovitch is the Co-Founderand CTO of CrowdStrike Inc., leading itsIntelligence, Research and Engineeringteams. A renowned computer securityresearcher, he is a thought-leader oncybersecurity policies and state tradecraft.Prior to founding CrowdStrike, Dmitri wasa Vice President of Threat Research atMcAfee, where he led the company’sglobal Internet threat intelligence analysis.

With more than a decade of experience inthe field of information security,Alperovitch is an inventor of ten patentedand sixteen patent-pending technologiesand has conducted extensive research onreputation systems, spam detection, websecurity, public-key and identity-basedcryptography, malware and intrusiondetection and prevention.

“The Obama administration plans to boost U.S. spending on computer network security,including a 21 percent increase at the Pentagon, after reports of rising cyber attacks and

electronic theft of secrets linked to China.” -Bloomberg News, April 2013

Did You Know? The energy sector was the target of more than 40 percent of all reported cyberattacks on critical infrastructurenetworks last year, according to the Department of Homeland Security (DHS).

According to cybersecurity professionals, malicious software unintentionally downloaded by offshore oil workers hasincapacitated computer networks on some rigs and platforms, exposing gaps in security that could pose serious risksto people and the environment.

As the number of cyber-attacks increase, realization of the financial implications of persistent cyber threats will boostcybersecurity spending in this field during the forecasted period. Spending is set to pick up considerably from 2014onwards. ABI Research calculates that cybersecurity spending on the oil & gas critical infrastructure will reach $1.87billion by 2018. This includes spending on IT networks, industrial control systems and data security; counter measures;and policies and procedures.

9:30 Registration and Breakfast

10:00 Uncovering Operation Night Dragon: Lessons Learned forthe Energy Sector

• Attack discovery methodology and process • Key exploits and hallmarks of the attack that inform the future • Why energy companies? The importance of the energy sector tohackers and nation-state adversaries

11:30 BREAK

11:45 Watching You: Espionage Intentions and AdversaryCapabilities

• Detecting unsophisticated but dangerous compromises• Knowing your information’s value: what is it worth to the adversary?• Once a target, always a target: waiting for the right time to attack

1:00 LUNCH

1:45 Avoiding Transfers of Wealth and Loss of Proprietary Datafrom Cyber Intrusions

• Configuring intrusion detection systems to discover backdoors • Trojan components: what types of information they are seeking• Avoiding being compromised by the use of Remote AdministrationTools (RATs)

3:00 END OF ESPIONAGE AND ENERGY FOCUS DAY

12

3

Page 4: Cyber Security for Oil and Gas

4www.OilandGasCyberSecurity.com • 1-800-882-8684

7:30 Registration and Coffee

8:15 Chairperson’s Welcome & Opening Remarks

8:30 Addressing the Evolving Cyber Threat • Bridging the transition between cyber national securitypriorities

• Threat vectors and motivations affecting global businessoperations

• Conducting multi-discipline, all-source intelligencecollections on cyber adversaries

9:15 Situational Awareness for the Energy Sector onthe President’s Cyber Security Agenda• Understanding the Cyber Security Executive Orderramifications for the energy sector

• Increasing situational awareness for future implementationrequirements

• Working with public-private coalitions on incidentmanagement and information sharing

Michael Locatis Former Assistant Secretary of Cyber Securityand CommunicationsDHS

10:00 Networking Break

10:45 Identifying New Trends in Warfare: Cyber v.Kinetic • Examining homeland security in light of new warfare trends• Countering nation-state threats against private sectorentities

• Developing a risk profile for an energy company and theenergy sector

Richard A. ClarkeChairmanGood Harbor Security Risk Management

11:30 Working With Washington – Cooperation andImplementation• Ensuring a flexible response via informal and informalgroups from government and the private sector

• How can private sector cooperation enhance ICcapabilities?

• Secure and effective information sharing between thegovernment and the private sector

Mischel Kwon Former Director, US-CERTMischel Kwon & Associates

12:15 Lunch

1:15 Informing Your Organization: Key Takeaways forEducating your Boss• Preparing senior management for the effects ofWashington cybersecurity focus

• Strategizing the road ahead for merging known threatswith your valuable Intellectual Property

• Developing a way-ahead for resource allocation in terms ofstrategic intelligence

John FelkerVice President, Cyber ProgramsSCI Consulting

2:00 Thinking Like the Adversary: Hacker Techniquesand Tools• Extracting critical and confidential information via socialengineering

• Implementing back doors for long-term data acquisition• Targeting outsourced service providers for network accessthrough trusted connections

Bob StasioFormer Chief of Operations, NSA Network Operations Center

2:45 Networking Break

3:30 Understanding the Human Factor: Insider Threatsand Vulnerabilities• The realities of your insider threat and the human elementin securing your information

• Understanding and qualifying threats and vulnerabilitiesfrom within your organization

• Evaluating and designing proactive defense strategies toeffectively counter the Insider Threat

Michelle MooreFounderMyM Solutions

4:15 Situational Awareness: the Importance of Oil andGas Network Monitoring Systems in CyberspaceDomains• Next generation intruder detection through more thansimple scans

• Benefits of monitoring systems and pitfalls to be aware of • What now? Incident management following the discoveryof an extant threat

Jonathan PolletFounder/Principal ConsultantRed Tiger Security

5:00 End of Main Conference Day One

MAIN CONFERENCE DAY ONETuesday, September 17, 2013

Page 5: Cyber Security for Oil and Gas

5www.OilandGasCyberSecurity.com • 1-800-882-8684

7:30 Registration and Coffee

8:15 Chairperson’s Opening Remarks

8:30 Hallmarks and Lessons Learned from Energy-Specific Attacks• Shamoon: intrusions directed at energy companies • Duku: Control operating systems as key focus areas forintruders

• Stuxnet: Facts and lessons learned for energy systemsoperations managers and implementers

Adam MeyersDirector of IntelligenceCrowdstrike

9:15 Evaluating Legal Implications of System Intrusionsfor Energy Companies • Post incident liability mitigation for BCP • Reasonable steps to prevent attacks and which technologiesare best to document incidents

• Strategizing the best approach to mitigate companyexposures after an incident

Scott WeberPartnerPatton Boggs LLP

10:00 Networking Break

10:45 Optimizing Business Success in a Hostile CyberEnvironment• Strategies for high-value target companies sharinginformation in an assumed compromised environment

• Implementing strong policies to counterbalance weaknessesin systems and behaviors

• Strategies for knowledge sharing with non-securityemployees involved in business negotiations

Ian McCredie Former Head of Global Security ServicesShell

11:30 Case Study for Energy Targeting: Operation ShadyRAT and Operation Aurora• Training and doctrine for enhanced data protection throughsuccessful monitoring of common operating networks

• Emerging technologies for enhanced system resilience• Leveraging Cloud technology without sacrificing networksecurity fundamentals

Dmitri AlperovitchCo-Founder and CTOCrowdstrike

12:15 Lunch

1:15 Resolving Back Doors Between Business Networksand SCADA Systems • Prioritizing network common elements and operations networkssimultaneously

• Supporting system security holistically through criticalinfrastructure tie-ins

• Resolving IT priorities with the realities of operations networksto foster security measure effectiveness

Sponsorship Opportunities Available Contact Marc Zamarin IDGA 1-877-886-0722 [email protected]

2:00 Enhancing SmartDevice Security: Protecting CriticalInformation in the Field• Cybercriminal capabilities and your exposure to data theft fromlost mobile devices

• How to build an app store that ensures a quality brand • Guidelines for building more secure smartphones using onlycommercial software and hardware

Jeff VoasComputer ScientistUS National Institute for Standards andTechnology

2:45 Networking Break

3:30 Panel Session: Producing Actionable IntelligenceThrough Knowledge Sharing• Cyber security awareness lessons learned for avoidingoperational hazards across industry

• Best practices in system monitoring for same-day attack dataassessment

• Leveraging knowledge transfer through information sharing tobetter support IT security personnel

Steven ElwartDirector of Systems EngineeringErgon Refining

Denise AndersonVice President, Government and Cross-Sector ProgramsFinancial Services Information Sharing and AnalysisCenter (FS-ISAC)

4:15 Maintaining Critical Information Fidelity in a VenturePartnership Environment• Strategizing information exchange for security-consciousbusiness enterprises

• Developing effective countermeasures against information leaksand loss

• Addressing security breaches with partner companies

Paul WilliamsExecutive Director of Security ServicesWhite Badger Group

5:00 End of Main Conference Day Two

MAIN CONFERENCE DAY TWOWednesday, September 18, 2013

Page 6: Cyber Security for Oil and Gas

Web: www.OilandGasCyberSecurity.com

Email: [email protected]

Phone: 1-800-882-8684 or 1-646-378-6026

Fax: 646-378-6025, 24 hours a day

Mail: IDGA535 5th Avenue, 8th FloorNew York, NY 10017

Ways to Register1

2

3

4

5

Register & Pay Register & Pay Standardby 06/28/13 by 07/26/13 Price

All-Access Pass (Save $400) (Save $200) $1,252 $1,452 $1,652

Main Conference (Save $400) (Save $200) $890 $1,090 $1,290

Focus Day $775 each

Dress Code: Business casual

MAKE CHECKS PAYABLE TO: IDGA

A $99 processing charge will be assessed to all registrations not accompanied by credit cardpayment at the time of registration.

* CT residents or people employed in the state of CT must add 6.35% sales tax.

Details for making payment via EFT or wire transfer:JPMorgan ChasePenton Learning Systems LLC dba IDGA: 162525760ABA/Routing #: 021000021Reference: Please include the name of the attendee(s) and the event number: 22785.001

Payment Policy: Payment is due in full at the time of registration and includes lunches andrefreshments. Your registration will not be confirmed until payment is received and may be subjectto cancellation. Please refer to www.idga.org/cancellation for cancellation, postponement andsubstitution policy

Special Dietary Needs: If you have a dietary restriction, please contact

Customer Service at 1-800-882-8684 to discuss your specific needs.

©2013 IDGA. All Rights Reserved. The format, design, content and arrangement of this brochureconstitute a trademark of IDGA.

Unauthorized reproduction will be actionable under the Lanham Act and common law principles.

Location & LodgingThis event will be held in the Houston, TX. As soon as aspecific venue is confirmed we will post the informationonline. If you would like to be notified via email as soon asthe information becomes available please [email protected] with the following in the subjectline: "Cyber Security for Oil and Gas Venue Request".

Sponsorship and ExhibitionOpportunities Sponsorships and Exhibits are excellent opportunities for yourcompany to showcase its products and services to high-level,targeted decision makers attending the Cyber Security for Oiland Gas event.

For sponsorship opportunities, please contact MarcZamarin at 1-877-886-0722 or [email protected].

* Discounts apply to registrations submitted together, at the same time. Cannot be combined with any other discount.

Team Discounts+

Number of Attendees Savings of: 3 to 4 15% 5 to 6 20% 7 or more 25%

6www.OilandGasCyberSecurity.com • 1-800-882-8684

Name _____________________________________________________________________________________________________________________

Job Title ____________________________________________________________________________________________________________________

Organization ________________________________________________________________________________________________________________

Address _____________________________________________________________________________________________________________________

City _____________________________________________ State _________________ County _____________________ Zip Code ______________

Phone __________________________________________________________ Fax _________________________________________

E-Mail _____________________________________________________________________________________________________________________

Approving Manager ___________________________________________________________________________________________________________

Please register me for: � All Access � Two Day Main Conference � Workshop Only Day

�Please keep me informed via email about this and other related events.

�Check enclosed for $______________(Payable in U.S. Dollars to IDGA)

�AmEx �Visa �Master Card �Discover �Discover

Card #_______________________________________________________________________________ Exp Date:_______/________CVM Code:______

* GROUP DISCOUNTS AVAILABLE! Contact Customer Service at 1-800-882-8684 *

PLEASE PHOTOCOPY THIS FORM FOR TEAM REGISTRATIONS 22785.001/MG

Yes! Please register me:

REGISTRATION & VENUE