Home
overview

Dont miss this opportunity to network with attendees from BP, BG, Dong Energy, Chevron, Shell and more..  


SMI
is proud to announce the launch of the inaugural Oil and Gas Cyber Security Conference 2011.

Taking place in London on the 21st and 22nd November this conference will bring together cyber security professionals from across the world to discuss, network and analyse the key cyber security issues facing the oil and gas industry today. The conference will include presentations from leading global oil and gas companies, hackers, consultants and other experts and arm delegates with the knowledge to combat cyber threats to oil both global and national energy infrastructures.

Hear Keynote Presentations from Department for Homeland Security through to Saudi Aramco and McAfee!

View and hear presentations, live hacking demonstrations and security threat insights from some of the key global players in the cyber security world today.

 

 

Oil and Gas Cyber Security 2011 is Sponsored by:

    Waterfall Security Solutions

What will be Discussed?

  • Current threats to existing cyber security systems  - Current threats to infrastructure and security systems
  • Protection of national infrastructure
  • Financial Implications of a cyber attack
  • Mitigating risk
  • Real time monitoring, Detection techniques
  • Collaboration and partnerships across all key industry stakeholders
  • Hacking demonstrations
  • Vetting staff- understanding the threat of human resource
  • What have we learned from Stuxnet?
  • Night Dragon- Global Energy Attack
  • Existing and future concerns, what is the reality
  • Network Communications
  • Scada Security
  • Integrating operations and IT
  • Data resilience & security
  • Lessons learned from vertical markets

 

Who Should Attend

Industry Profile Includes:


Presidents, CEOs, Vice Presidents, Directors, Managers, Analysts and Officers for:
 

  • Information Assurance Experts
  • Information Technology Experts
  • Cyber Security Coordinators
  • CISO's 
  • CIO's
  • Security Researchers
  • System Architecture and System Design
  • Heads of Security
  • Project and Programme Management
  • Sales and Marketing
  • Business Development
 

 

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Joel Langill

Joel Langill, Chief Security Officer, SCADAhacker / CSFI

9:10 The Future of Information Security: New Priorities, New Skills and New Solutions

David  Lacey

David Lacey, Director of Research, ISSA (Information Systems Security Association)

·          Why today’s security approach is failing

·          Emerging trends in security threats, exposures and technologies 

·          Responding to the new business and technology landscape

·          New priorities, skills and solutions

9:50 In the Dark - Confronting Crucial Cyber Attacks

Raj Samani

Raj Samani, VP & Chief Technology Officer, EMEA, McAfee

  • The threats?
  • The acceleration of threats and system vulnerabilities
  • Review of security procedures to suport incremental response to cyber threats
  • 10:30 Morning Coffee

    11:30 Supply chains and security: challenges and solutions

    Adrian Davis

    Adrian Davis, Principal Research, Information Security Forum

    ·          Looking at the world from an information risk perspective

    ·          Understand the information risk and security perspective in the supply chain

    ·          Addressing the challenges

    12:10 Networking Lunch

    13:10 Case Study: Collaboration Amongst Key Industry Stakeholders

    Dimitrios Sarris

    Dimitrios Sarris, Gas Flow Management Department Manager, DESFA S.A.

    ·          Securing the national infrastructure; effective  cooperation with government, security and the military

    ·          Integration of resources, human capital and technology

    ·          Case study: Greek Cyber Security Exercise 2011

    13:50 Interactive Session and Group Debate: Mitigating the Risk of a Cyber Attack - What are the Fundamental Lines of Defence?

    ·       Analysing and quantifying the threat; where, what and by whom does the threat come?

    ·       Security measures: testing, testing, 1,2,3

    ·       Active network and cyber security measures

    ·       Case Studies

    Adam Laurie

    Adam Laurie, Director, Aperture Laboratories

    Andy Ritchie

    Andy Ritchie, Director, Aperture Laboratories

    14:10 Securing Industrial Control Systems Against Cyber Threats

    David Alexander

    David Alexander , Principal Consultant, Regency IT Consulting

    ·            The technical challenges in securing industrial control systems

    ·            Approaches to effective defence and security architectures

    ·            Integration of industrial control system defenses into security information and event monitoring systems (SIEMS)

    14:30 Situational Awareness in a Cyber Environment: Understanding the Battle Picture

    Tom Fairfax

    Tom Fairfax, Managing Director, Security Risk Management

  • Situational awareness in the cyber world
  • Mitigating the threats
  • Understanding the battle picture
  • 15:00 The New Normal: Managing Cyber-Risk in a Global Environment

    Mike Maddison

    Mike Maddison, Partner Deloitte Security & Privacy Services, Deloitte

  • New landscape of Cyber-Risk
  • Connecting Cyber-Risk globally
  • Enabling Cyber-risk Innovation 
  • 15:40 Afternoon Tea

    16:00 Live Hacking Demonstration!

    Justin Searle

    Justin Searle, Managing Partner , Utilisec

    Delegates will experience an interactive and live hacking demonstration.

    16:40 Countering Oil and Gas Cyber Security Threats – the Aramco Experience

    Salem Elwi

    Salem Elwi, Head of Central Engineering, Saudi Aramco

  • Threats to the Oil Supply Chain
  • The Aramco experience
  • Safe Oil & Gas Network Overview
  • Pending Oil Industry Security Challenges
  • 17:20 Chairman’s Closing Remarks and Close of Day One

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Tim Holman

    Tim Holman, UK President, ISSA (Information Systems Security Association)

    9:10 Advanced Persistent Threats

    Tim Holman

    Tim Holman, UK President, ISSA (Information Systems Security Association)

      ·         Positive learning from public data breaches

    ·         Learn about 2012 threats - what's the next big thing?

    ·         How to steer through market FUD

    ·         The role of crimeware and malware in APTs

    9:50 From 0.5 out of 10 - The GDF Suez Experience

    Phil Jones

    Phil Jones, IS Security Officer, GDF SUEZ E&P UK

    ·         Governance and Ownership

    ·         Key areas in initial approach

    ·         Stakeholder engagement

    10:30 Morning Coffee

    10:50 Live Hacking Demonstration: Hacking a SCADA System

    Joel Langill

    Joel Langill, Chief Security Officer, SCADAhacker / CSFI

    Delegates will see a live hacking demonstration courtesy of SCADA Hacker

    11:30 Enabling business processes with strong industrial security

    Lior Frenkel

    Lior Frenkel , Co-Founder and CEO, Waterfall Security Solutions

  • Business functions essential to profitability rely on access to operations data.
  • Every connection from a business network to an operations network is a
  • risk to security, safety and reliability.
  • Unidirectional network gateways permit data to flow to essential business systems without introducing safety or reliability risks.
  • Gateways provide protections equivalent to network isolation, while still supporting business functions.
  • 12:10 Networking Lunch

    13:30 Scada Security Strategies

    Christian Probst

    Christian Probst, Language-based Technology, Technical University of Denmark

    ·          SCADA and Cyber-Physical Systems

    ·          What are the threats and vulnerabilities of SCADA

    ·          Physical-Cyber security procedures

    ·          Addressing design, deployment, and operations in SCADA networking

    14:10 Looking Ahead: The Future of Cyberspace

    Dave Clemente

    Dave Clemente, Research Analyst, Chatham House

    ·          Forward trends of cyber attacks

    ·          Future threats

    ·          Managing the unknown

    ·          Opportunities in cyberspace

    14:50 PANEL DEBATE:Was Stuxnet an Inside Job? Managing the Internal Threat

    Joel Langill

    Joel Langill, Chief Security Officer, SCADAhacker / CSFI

    Tim Holman

    Tim Holman, UK President, ISSA (Information Systems Security Association)

    William Hagestad II

    William Hagestad II, CEO and President, Red-Dragonrising

    15:30 Afternoon Tea

    15:50 China: A Comparative Analysis of Government, Economic & Nationalistic Cyber Threat Vectors

    William Hagestad II

    William Hagestad II, CEO and President, Red-Dragonrising

    ·          Fundamental statistics of the Chinese Cyber Threat

    ·          Chinese Government Cyber Initiatives

    ·          People’s Liberation Army (PLA)Information Warfare (IW)

    ·          Commercial Enterprises as a Cyber Threat Vector

    ·          Nationalistic Threads of Hackers and Threats to Oil and Gas Infrastructures

    ·          Conclusions & Recommendations

    16:30 Information Security in the Cyber Age: What does this mean for you?

    William Beer

    William Beer, Director OneSecurity, PricewaterhouseCoopers LLP

    ·          Perception and reality – data loss and brand reputation

    ·          Mitigating information loss and theft

    ·          Technological factors and information security

    ·          Human, cultural and organisational processes in mitigation in information security

    17:10 Chairman’s Closing Remarks and Close of Day Two

    +

    Workshops

    Copthorne Tara Hotel

    Scarsdale Place
    Kensington
    London W8 5SR
    United Kingdom

    Copthorne Tara Hotel

    The Copthorne Tara Hotel London Kensington is an elegant contemporary four-star hotel in prestigious Kensington, located just a two minutes walk from High Street Kensington underground station, making exploring easy. The hotel offers well-appointed and comfortable guest rooms combining Standard, Superior and Club accommodation. Club rooms offer iconic views over the city and include Club Lounge access for complimentary breakfast and refreshments. Guests can sample the authentic Singaporean, Malaysian and Chinese cuisine at Bugis Street, traditional pub fare at the Brasserie Restaurant & Bar or relax with a delicious drink at West8 Cocktail Lounge & Bar.

    The Copthorne Tara Hotel boasts 745 square meters of flexible meeting space, consisting of the Shannon Suite and the Liffey Suite, ideal for hosting conferences, weddings and social events. Facilities include access to the business centre 24 hours a day, fully equipped fitness room, gift shop, theatre desk and Bureau de Change. With ample onsite parking outside the London congestion charge zone and excellent transport links via Heathrow Airport, the hotel is the perfect location for business or leisure stays. The hotel is within close proximity to the shops of High Street Kensington, Knightsbridge and Westfield London, Olympia Conference Centre, Royal Albert Hall, Kensington Palace and Hyde Park.

     

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.