CYBER SECURITY

Report 25 Downloads 670 Views
www.criticalcybersecurity.com Ve Ke ns Hi nue: ing lto ton n , Lo nd on

London, UK

CYBER SECURITY

FOR CRITICAL ASSETS | EUROPE 17 - 18 November 2015

Recent attacks on critical automation systems prove that cyber-attacks can have significant impact on critical infrastructures and essential national services. Penetration of these ICT capabilities may have disastrous consequences for the safety and functioning of EU Member States. The need to ensure ICT robustness against cyber-attacks is thus a key challenge at a national and pan-European level.

FOCUS OF THE CONFERENCE As risks increase and spending on cyber security soars, the 7th Cyber Security for Critical Assets Summit, brings together security thought leaders with the aim of encouraging discussion and sharing amongst the key asset owning companies in Europe. Process control and corporate IT professionals from the Chemicals, Utilities and Oil & Energy sectors will come together to bridge the gap between their departments through meaningful security-focused conversation and debate. This in turn will allow them to build the robust security policies that will protect Europe’s critical assets tomorrow.

EVENT SPONSORS

CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS www.qatalystglobal.com

www.criticalcybersecurity.com

Cyber Security For Critical Assets | EUROPE | 17-18 November 2015

PRESENTING SPONSORS

Lockheed Martin www.civil.lockheedmartin.co.uk

At Lockheed Martin UK Information Systems & Global Solutions we put business first, providing business technology solutions to make our customers’ operations smarter, more efficient, and more profitable. We offer a full spectrum of support to all aspects of managing Process Security, Process Safety, Information Management and IT. Our industry experts have decades of experience in the Energy sector, meaning we know your business today, and have ingenious technology solutions for the challenges of tomorrow. Our energy customers are all about optimising production.

PhishMe www.phishme.com

PhishMe® is the leading provider of threat management for organisations concerned about human susceptibility to advanced targeted attacks. PhishMe’s intelligence-driven solutions empower employees to be an active line of defence by enabling them to identify, report, and mitigate phishing, malware, and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, delivering measurable results to help inform and adapt an organisation’s security programs.

Restrata www.restrata.com

Restrata is multi-disciplinary security Front End Engineering Design consultancy with the capability to implement integrated security solutions in the built environment and with specific expertise in critical infrastructure domain in the UK, Middle East and Africa. We take a risk based approach to security design and are now specifically focused on helping our clients improve their capability to manage their Governance Risk and Compliance in the cyber domain and in helping them deliver active cyber defence measures in depth. Nozomi Networks SA provides an innovative, dedicated security solution for SCADA/ICS systems. Our in-field experience in SCADA systems and industry-proven quality software engineering skills provide a best-in-class solution for Critical Infrastructure security needs.

Nozomi www.nozominetworks.com

PLATFORM SPONSORS

02

Darktrace www.darktrace.com

Resilient www.resilientsystems.com

Named ‘Best Security Company of the Year’ in the Info Security Products Guide 2015, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning & mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization.

Resilient Systems (formerly Co3 Systems) empowers organizations to thrive in the face of cyberattacks and business crises. Resilient’s leading Incident Response Platform (IRP) arms response teams with workflows, intelligence, and deep-data analytics to react faster, coordinate better, and respond smarter. Resilient’s security, privacy, and action modules provide organizations with agile, collaborative, and comprehensive action plans.

ASSOCIATE SPONSORS Cyberbit www.cyberbitc.com

CYBERBIT as a global leader in the Cyber arena, offers high end, end-to-end solutions and products for both the emerging markets of Cyber Security and the Cyber Intelligence. CYBERBIT provides comprehensive solutions and exclusive capabilities with worldwide large scale deployment experience as well as global support services on both technological and operational aspects.

NETWORKING SPONSORS

BAE Systems www.baesystems.com

SCADAfence www.scadafence.com

At BAE, we help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes - often collecting and analysing huge volumes of data.

SPEAKERS Oren Aspir CTO Cyberbit

MEDIA PARTNERS

Burim Bivolaku Global Chief Information Security Officer Noble Group Andrea Carcano CEO Nozomi Networks

Shash Patel Director, Information Risk Management & Privacy Air Products

Barry Coatesworth Cyber Security Transformation Consultant

Alasdair Rodgers Director Consulting and CTO Restrata

Joe Dauncey Head of Information Risk and Security SSE Plc

Randi Røisli Joint Venture IT Technical Security Lead Shell

John Dickinson Cybersecurity Control Systems Manager Sellafield Ltd

Prof. M. Angela Sasse Professor of Human-Centred Technology University College London

Eduardo Di Monte Director of Business Continuity AGBAR

Andy Sceats Managing Director Phishme

George Eapen CISO GE Middle East

Mark Swift CISO Trafigura

Dirk Fleischer CSO LANXESS

Steven Trippier Head of Cybersecurity Anglian Water Services

Chris Hankin Director of the Institute for Security Science and Technology Imperial College London Gerhard Heusinkveld Global Expert Process Control DSM Engineering DSM

Johan Vandendriessche Partner - Visiting Professor in ICT Law” at the University of Ghent Crosslaw Scott Keenon Process Security Commercial Lead Lockheed Martin

Erwin Kooi Lead Security Architect Alliander

Graham Wright CISO & Global Head of Digital Risk and Security National Grid

Ad Krikke CISO & DBS Security Manager DSM

Peter Armstrong Executive Director – Cyber Willis Steven Bailey Head of Cyber Security Research Cassidian Cyber Security Greg Day VP & CSO, EMEA Palo Alto Networks Howard Eakin Information Protection Leader EMEA ConocoPhillips

T: +44 203 740 9106 | E: [email protected] | A Conference by Qatalyst Global | www.qatalystglobal.com

Jean-Dominique Nollet Head of Forensic Laboratory, European Cybercrime Centre EC3 Europol Rob Orr Head of Information & Cyber Security Regulation, Civil Nuclear Security Office for Nuclear Regulation

David Atkinson Cyber Security Specialist Darktrace

STEERING COMMITTEE SCADAfence offers cutting edge cyber security solutions, designed to protect the manufacturing industries and critical infrastructure. Traditional IT Security technologies are inadequate due to the different requirements, technologies and components which are found in industrial networks. SCADAfence’s first solution is a non-intrusive network monitoring solution designed to ensure the operational availability of ICS/SCADA networks.

Chris Neely Director of Sales Engineering Resilient Systems

For further information and for speaker profiles please visit:

www.criticalcybersecurity.com Florian Haacke CSO RWE AG

Mark Swift CISO Trafigura

Chris Hankin Professor Imperial College

Andrew Wadsworth Head of Process Control Security Lockheed Martin

Dr. Jean-Marc Rickli Senior Lecturer, Department of Defence Studies King’s College London Christos Sgaras Senior Information Security Specialist Europol

For further information and for Steering Committee profiles please visit: www.criticalcybersecurity.com

03

www.criticalcybersecurity.com

Cyber Security For Critical Assets | EUROPE | 17-18 November 2015

CONFERENCE DAY ONE Tuesday 17th November 2015 08:00 Registration 08:30

Opening Address from the Chair, Shash Patel, Air Products

08:40 Opening Panel: New Threats in a New World: What Are You Doing in Response to the Changing Threat Landscape?

11:10 Platform Presentation: The Industrial Immune System:  Using Machine Learning For Real-Time Threat Detection Across OT and IT

The opening panel will examine what new threats are arriving on the cyber scene and how the threat landscape is changing for companies working within the critical infrastructure sector. We will also take a brief look at novel detection tools, as well as how we can mitigate threat without sacrificing flexibility for employees and most importantly the business.

• Learn why ‘immune system’ technologies represent a fundamental innovation for cyber defence • Discover how to apply machine learning and mathematics to detect advanced, internal threats  • Understand how to gain 100% network visibility to investigate emerging anomalies in real time • Hear real-world Industrial Immune System case studies  

Moderator: Mark Swift, CISO, Trafigura Rob Orr

Head of Information & Cyber Security Regulation, Civil Nuclear Security

David Atkinson Cyber Security Specialist, Darktrace

Office for Nuclear Regulation Barry Coatesworth Cyber Security Transformation Consultant John Dickinson Cybersecurity Control Systems Manager, Sellafield Ltd

04

Oren Aspir CTO, Cyberbit

09:20

Presentation: Why Standard IT technology Fails in Protecting SCADA System: a Real Case

• How to build a real SCADA malware: difference between IT and OT security • Prevent tailored attacks targeting Critical Infrastructure • Real case study on protecting a National Critical Infrastructure Andrea Carcano CEO, Nozomi Networks

10:00

Speed Networking Break

10:40

Presentation: Best Practice for Incident Reporting

How do we: • Convince employees to change behavior? • Ensure criminals get caught? • Not let incidents affect direct partners • Cyber-crime is not just an IT issue - Sharing cyber incidents inside DSM helped enormously to raise awareness and improve culture and behavior

11:20

13:40

Case Study: How Did Anglian Water Create a Culture of Cyber Security Awareness?

• What caused us to shift to a security focused organisation? • How did we translate the reality of cyber-threat to the executive board? • What steps were taken to get the entire company into a “security first” mind-set? • What challenges have we faced so far as an organisation and how are we working to overcome them? • Lessons learned & looking towards the future Steven Trippier Head of Cybersecurity, Anglian Water Services

Presentation: The Unique Cyber Security Challenges Facing Critical National Infrastructure 14:20

• What makes protecting CNI a significantly more complex challenge? • Network dependencies and security • Risk assessment and responses to the threat • Creating an appropriate risk management framework and applying it to mitigate threat Graham Wright CISO & Global Head of Digital Risk and Security, National Grid

Case Study: Combatting the Enemy in Your Network

• What is the scope and organisation of corporate security at LANXESS • Current threat Scenarios facing our organisation • Criminological explanations for deviant and delinquent behaviour focusing on internal offenders • Comprehensive countermeasures undertaken by LANXESS to combat the threat Dirk Fleischer CSO, LANXESS

12:00 Presentation: Exploring the security evolution and Intelligence driven defence including: • A look at the rapidly changing Threat Landscape • Top threats and the top impacts • Would you know if your system was compromised? Scott Keenon Process Security Commercial Lead, Lockheed Martin

12:40

Seated Lunch

Ad Krikke CISO & DBS Security Manager DSM Business Services

T: +44 203 740 9106 | E: [email protected] | A Conference by Qatalyst Global | www.qatalystglobal.com

16:10

Case-Study: Managing Information Sharing with Joint Ventures

• Risks when working with Joint Ventures, where does IT fit in and why use energy in this space? • What are the potential information risks when partnering with an external organisation? • How do we protect our IT infrastructure, which controls are relevant? • A look at our “joint-venture story” Randi Røisli Joint Venture IT Technical Security Lead, Shell

16:50

Presentation: Strategies for Effective Integration of Business IT and Process Control Systems

• How did DSM handle a global roll-out of a MES in our Business Group • How was departmental cooperation achieved from architecture to handover to Managed Operations • Examining a mutual learning process whereby: - Process Control and Automation engineers had to learn to lessen their attention to technical designs of architecture etc. and focus on UX - IT needed to learn to deal with specific plant automation requirements Gerhard Heusinkveld Global Expert Process Control DSM Engineering, DSM

15:00

Presentation: Staying Afloat: Response Plans That Allow Business Continuity in the Face of Attack

• Arguably too much attention is given to preventing an emergency which may be inevitable • How can we construct a solid incident and crisis management plan • How does crisis management fit into a broader cybersecurity strategy and defence of critical assets • How do you mix both worlds? • Case study example of response to an attack or major event Eduardo Di Monte Director of Business Continuity, AGBAR

15:40 Networking Break

17:30

Chairman’s Closing Address

17:40

Networking Drinks & Canapés

05

www.criticalcybersecurity.com

Cyber Security For Critical Assets | EUROPE | 17-18 November 2015

CONFERENCE DAY TWO Wednesday 18th November 2015 08:00 Registration 08:30

Welcome Address from the Chair, Shash Patel, Air Products

08:40

Opening Panel: Let’s Examine the Role of International Governing & Regulatory Bodies in the Cyber Scene

10:50

Presentation: Present and Future Legal Considerations for Constructing a Cyber Security Policy

We will open day two by bringing to light questions relating to the accepted role of international governing bodies and law-enforcement agencies in cybercrime. The session will include speakers from governing bodies, as well as ones from industry. It will look at how we can work at increasing collaboration and making the most of the support given by law enforcement.

• An overview of current and planned relevant EU legislation • What are the data protection principles and how can you stay on the right side of data protection laws? • What laws currently govern security obligations and breach reporting? • How is EU and national legislation likely to change in the near future? • What you can do to stay abreast of the changes ahead

Moderator: Joe Dauncey Head of Information Risk & Security, SSE plc

Johan Vandendriessche Partner, Crosslaw

Dirk Fleischer CSO, LANXESS Chris Hankin Director of the Institute for Security Science and Technology Imperial College London George Eapen CISO, GE Middle East

06

Jean-Dominique Nollet Head of Forensic Laboratory, European Cybercrime Centre EC3 Europol

09:20

Presentation: Critical Success Factors in the Design of a Security Operations Centre (SOC) - the need to address risk in the People, Process and Technology domains

• Technology alone is not enough to stand up to cyber threats • Attention needs to be paid to the people, policy, operations and cyber management that bring about security • This presentation examines an enterprise-wide approach to cyber security, where no stone is left unturned Alasdair Rodgers Director Consulting, CTO, Restrata

10:00

Networking Break

10:30 Presentation: Personal Development in a Cyber Asset World

• Why is it so hard? Why haven’t we fixed all these problems already? • What are the competencies needed to safeguard the cyber assets of our organisations • How do we adapt our organisations to manage the cyber risk? Joe Dauncey Head of Information Risk & Security, SSE plc

11:30

Platform: Do you have a plan B?

With the increasing number of incidents and a global shortage of cyber security professionals, organisations need to focus beyond prevention and detection and look instead to their response strategy. Chris Neely from Resilient Systems will cover the fundamentals of Resilient’s award winning Incident Response Platform and how it enables organisations to react faster, coordinate better and respond faster to major cyber attacks and business crises.

Chris Neely Director Sales Engineering, Resilient Systems

11:40

Presentation: The Human Factor: Designing Employee Centred Policies Which Will Maximise Secure Behaviour

• Let’s look at some reasons for why employees ignore security and compliance rules • How can we leverage trust relationships to improve security in organisations? • Why is employing a “fear tactic” to gain compliance likely to fail? • Examples and lessons learned from research in this area

12:50

Seated Lunch

13:50 Presentation: Managing Complex and Evolving Cyber Threat Landscape Using Actionable Cyber Threat Intelligence • Overview of the Cyber Threat landscape • Overview of Cyber Threat Intelligence approaches • Intelligence Sharing and benefits with working with intelligence agencies • Combating APT’s using up-to-date cyber threat intelligence • Using Cyber Threat Intelligence as way to focus and prioritize security resources • Challenges for a successful implementation of Cyber Threat Intelligence programme Burim Bivolaku Global Chief Information Security Officer, Noble Group

14:30

Presentation: Knowing Your Assets: The Importance of Structured Data Management

With no structured assessment of their own assets, many companies are unaware of just how much data they have and where it is • Without a clear understanding of data ownership it is impossible to adequately assess the threat and thus protect yourself • How does data management improve risk assessment and efficacy information security protocols? • What are steps you can take to better manage your vast amounts of corporate data Shash Patel

Prof. M. Angela Sasse

Director, Information Risk Management & Privacy, Air Products

12:20

15:10

Professor of Human-Centred Technology, University College London

Presentation: Defending Against Phishing; Preparing and Using Human Defences

As the security industry has continually failed to cultivate the human element of security, phishing has become the top attack vector for cyber criminals and APT. Despite this, many organizations overlook the potential value humans can provide to their security posture. In this presentation, Andy Sceats will discuss how to reduce susceptibility to  human-targeted attacks by providing immersive simulated phishing and how to empower users to be human sensors that can recognize and report suspected attacks, thus reducing the attack detection window.

Andy Sceats Managing Director, Phishme

T: +44 203 740 9106 | E: [email protected] | A Conference by Qatalyst Global | www.qatalystglobal.com

Refreshments & Networking

15:30

Case Study: How did Alliander Respond Internally to a Recent Wave of Cyber Attacks on the Utilities Sector

• With recent utility cyber incidents, how did we go about measuring the risk to our organisation? • Building a robust risk management strategy which includes prevention, detection and protection • What were the greatest challenges and how are we looking to overcome them? • What still needs to be done to complete our journey towards cyber safety? Erwin Kooi Lead Security Architect, Alliander

16:10

Group Activity: How Do You Create a Level Understanding of Cyber Security Threats for both IT and Process Control Departments

Process control systems are increasingly becoming the prime target for cyber attackers and spear phishing of engineers is becoming a common attempt to take down the control system. This session will present new research and discuss what should companies do to tighten controls, education, and security for process control departments. We will also look at IT/OT integration strategies Chris Hankin

Director of the Institute for Security Science and Technology

Imperial College London

17:00

Chairman’s Closing Remarks

07

www.criticalcybersecurity.com

London, UK

CYBER SECURITY

FOR CRITICAL ASSETS | EUROPE 17 - 18 November 2015

Upcoming events • Cyber Security for Critical Assets Summit USA, 16th - 17th March 2016, Houston, Texas EVENT SPONSORS

CREATING BESPOKE STRATEGIC BUSINESS EVENTS, CONFERENCES, SUMMITS AND WEBINARS