The
ICS Cyber Security risk is not theoretical. Although
ICS security incidents are often kept under the radar, serious incidents do happen. Executives need to understand and balance the
cyber security risk related to the use of
ICS with other business factors. The Board needs to understand that the Cyber Risk to
ICS is not an IT-issue to be managed deep down in their organization. It is a risk affecting the continuity and reputation of the business.
Cyber security of ICS should be part of long-term strategy, HR plans, business processes and many other domains.
However, fighting the
cyber security risk of
ICS on your own is a losing battle. Other organizations face the same risks and challenges.
Join our
Cyber Security for ICS Canada Summit, on September 9-11, 2015 in Calgary, Canada, and join forces with peers, technology firms, government and other organizations to tackle this massive challenge!
Bring your business cards, because you will meet industry experts like...
- Chief Information Officers (CIO)
- Chief Technology Officers (CTO)
- Chief Information Security Officers (CISO)
- ICS manager
- SCADA manager
- Chief Security Scientist
- ICS & SCADA security
- Information Security
- CISSP
- Cyber Security Deployment manager
- Technical Analyst
- Critical Infrastructure
- Manager CIP Security and Compliance
- Cyber and Infrastructure Security Analyst – EEI
- Director – Industrial Security Program
Confirmed Speakers Include:
- Scott Woynarski, Team Lead It Security, Trican Well Service
- Vincent Chiew, President & Co-Founder, ISC2 Alberta Chapter
- Hani Mansi, Director, Risk & Information Security, ATCO
- Dr. Pavol Zavarsky, Director of Research and Associate Professor MISSM, Concordia University of Alberta
- Dr. Hassan Farhangi, Ph.D., SM-IEEE, and PEng, is the Director of the Group for Advanced Information Technology (GAIT), Technology Centre of British Columbia Institute of Technology
- Mark Humphreys, P.Eng. , Sr SCADA Engineer, Supervisory, ATCO Pipelines (tentative)
- Richard Rowlandson, Network Security Analyst, AECOM (tentative)
- Suresh Durairaj, Information Security Professional, CISSP, CISA, CIPP, TOGAF, ITIL, Talisman Energy
- Shafic Punja, Technological Crimes team, Calgary Police Services
Please fill in your name and email to receive the conference agenda of this event.
Workshop Day, September 9, 2015
- WORKSHOP A: ICS Cyber Threats 101
9:00AM – 2:00PM - WORKSHOP B: Preventing Exploitation of Vulnerabilities in ICS Components
2:30PM –4:30PM - Strengthening DCS Processors and Networks
4:45PM – 6:45PM
Main Summit Day One, September 10, 2015
- Including: Morning & Afternoon Networking Break, Networking Lunch
Main Summit Day Two, September 11, 2015
- Including: Morning Networking Break, Networking Lunch
The agenda is available as PDF under downloads at the right side of the page.
Venue
The venue is not yet available for this event.
Follow this event to be informed when the venue is available and stay informed on other changes.
Venue & Accommodation
Venue to be confirmedCalgary, Canada
AccommodationMore information to follow...
Please note: We will never recommend, approve or appoint any third party rooming service to act on our behalf. Please be extremely wary if you are approached by any such companies. We will always endeavour to negotiate the best available rates for you so please use the Hotel´s website link provided.