The Rise of Critical Infrastructure Attacks: Evolving the Organization to Respond & Prepare for Cyber Security Threats
The national and economic security of the United States depends on the reliable function of critical infrastructure, which was once isolated in terms of being NOT connected to the Internet.
The attacks on critical infrastructure are a growing concern with greater convenience of connectivity. The once limited attack surface is now easier to access. The attacks are on the increase and within critical infrastructure a cyber attack can mean loss of life not just loss of material and corporate assets.
This Exchange focuses on several sectors of critical infrastructure including; energy, chemical, nuclear, healthcare, financial services and transportation.
The 2016 Conference is an in depth focus on:
- Spend Analysis & Vendor Evaluation
- Key Performance Indicators (KPI) & Bench marking
- Supplier-Contractor Relations
- Contract Management, Review & Negotiation
- Contract Alignment/Centralization
- Creating Actionable Data
Oncor Electric Delivery
Principal Consultant, Industrial Control Systems Security
Global Sales Manager of Security solutions for Industrial Control Systems (
Clark Public Utilities
North America Director of Sales
Owl Computing Technologies Inc.
National Renewable Energy Lab
Operational Technology Security Subject Matter Expert
Great River Energy
City of Riverside
Director – Information Security
Sempra Energy Utilities
Chief Information Officer
Director, Operations Technology & NERC Reliability Governance
Cyber Intelligence Unit Manager & CISO
VP of IT Infrastructure & Security Services
Energy Future Holdings
Alameda Municipal Power
Territory Account Manager
Cyber Security for Critical Infrastructure Agenda 2016
The 2016 Agenda outlines the Cyber Security for Critical Infrastructure Event- outlining the 3 day portion, including speakers, sponsors, breakout sessions, and round tables. Download the brochure for more information.
Cyber Security for Crticial Infrastructure Sponsorship Brochure 2016
The 2016 Sponsorship Package includes sponsor benefits, the delegate profile, opportunities for one-on-one meetings, and more. Download the brochure below for more information.
Join 150+ Serialisation Experts this November to:
Apply insight from 10+ case studies from across big pharma, CMOs, generics and SMEs.
Standardise your serialisation process across multiple sites to save costs and create flexibility with insight from Teva.
Hear directly from EMVO, GS1, Ministry of Health & Welfare, Republic of Korea; regulators and associations will give critical regulatory updates to ensure you are up to speed with the imminent deadlines.
Digitalise your serialisation data: Utilise data commercially with Merck's cutting edge case study.
Spark key conversation around group integration and strategy with Vetter Pharma's strategic panel discussion: Exclusive project team panel discussion with IT, project strategy and commercial teams.
Create a harmonised serialisation process through enhancing connectivity and standardisation with Servier's case study.
Real Estate Development
"A sound security posture must be designed holistically. Having a single security team accountable for the overall design of the policies, program, procedures and architecture helps ensure that the needs of the company to fulfill its business objectives are met with the flexibility to manage security across all business domains without negatively impacting the desired business mission.” "
" This environment helped me learn about security solutions I may need or that I didn’t even know I needed. Let’s face it -- nobody knows everything, so this is a great opportunity to be able to learn. "
" I’ve been to three Exchanges now and the ROI for us has been the efficiency. Meeting one on one for 30 minutes with 10 to 12 CISOs really enables us to get our points across in a short period of time. The vast majority of those discussions end with us scheduling follow-up calls. We’re definitely going to participate in the four Cyber Security Exchanges scheduled in 2017.” "
"With such a small group of CISOs and cyber security vendors gathered together for 2.5 days, everyone here is able to dive into deep discussions of the issues and solutions.” "
" To be able to collaborate and share ideas with CISOs from some of the world’s biggest companies has been pretty amazing "