MANUSEC USA

11th – 12th October 2017

Chicago USA

This series will bridge the gap between the process control and corporate IT senior level professionals, allowing them to discuss challenges, critical issues and debate best practice guidelines

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

The Event

MANUSEC: Cyber Security for Critical Manufacturing

11th-12th October 2017 Chicago, USA

Cyber-attacks on the American manufacturing industry have doubled within the last year due to the growth in cyber-attack sophistication.
With an increased cause for concern over the threat of intellectual property theft, the Cyber Security for Critical Manufacturing Summit has brought together its first event for senior security thought leaders, to help build productive discussions and guide the key manufacturing companies across America.

The conference will bridge the gap between the process control and corporate IT senior level professionals, allowing them to discuss challenges, share experiences and debate best practice guidelines.

This will lead to the building of robust policies and standards that will shape a securer future for the manufacturing industry.Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Make the most of your 2 days!

  • Learn to identify your most valuable data assets
  • Gain perspectives and updates within the industry
  • Increase your network of senior Cyber Security peers in an exclusive environment
  • Improve employee awareness to the threats of cyber-attacks

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Agenda

DAY 01  

>

11 October 2017
08:00 Registration and Seated Breakfast
08:50 Opening Address from the Chairman
09:00 Opening Panel
Perfecting The Enterprise-Wide Cyber Security Culture

  • Cyber Security begins and ends with human behaviour – how do you factor that into policies?
  • How can/do you minimize that error internally?
  • What is the right balance for mobilising employees vs protecting ICS systems?
09:40 Keynote
APTs: Defining and defeating Cyber Security’s greatest adversary

  • Why is it becoming increasingly more difficult to tell whether an attack is perpetrated by a national actor, organized crime or individual?
  • Understanding and improving an organisation’s foundational security to help protect themselves from attack vectors
10:10 Platform
Understanding the Industrial Cloud

  • Defining the level of visibility required to uncover advanced threats and malicious activity
  • Making use of real time monitoring to detect human error and potential operational issues
10:20 Morning Refreshments and Speed Networking
11:00 Keynote
Understanding Tomorrow’s Cyber – The Bigger Picture

  • Understanding how global cyber capabilities are growing
  • Tying cyber espionage and terrorism to the overall risk calculation
  • Comprehending not just what and how cyber events occur but also why they do
11:30 Keynote
Anatomy of an Industrial Cyber Security Attack

  • How do ICS cyberattacks really operate? Where are the security gaps that enable these attacks?
  • Different protocols used in configuration and production operations and how to secure each
12:00 Keynote
Winning against the indefensible Attack

  • File-less Memory Attacks are rising rapidly
  • This topic will demonstrate how Control Flow Integrity may change the game
12:30 Seated Lunch
13:30 Keynote
Can a person from the other side of the world disrupt and take out our infrastructure? If so, how long will humanity last?

  • The challenges in securing interconnected critical infrastructure assets, including the Internet, IP networks, telecommunications, banking and process control (SCADA) networks used in industry.
  • The importance of designing security solutions that integrate science, technology and policy
14:20 Platform
Key Features for a Business Driven Identity & Access Management Strategy

  • Understand how data loss prevention can be enhanced when leveraged with IAM capabilities
  • Key considerations when transforming IAM
14:30 Keynote
Combating the Ransomware Threat

  • Cyber extortion is an increasingly prevalent threat to the energy industry, and the most prominent tool at hackers’ disposal – ransomware is gaining momentum as one of the most feared malware types tracked by enterprise security teams
  • Analyzing the disruption to regular operations, financial losses incurred to restore systems and files and the potential harm to an organization’s reputation
15:00 Afternoon Refreshments and Networking
15:30 Presentation
Harmonising Initiatives: The Role of Industry and End-Users in Reducing Cyber Crime

  • Creating a culture of sharing incident information
16:00 Keynote
Using Disruptive Technologies for Oil and Gas Capital Projects

  • Using augmented reality and AR glasses
  • PCN and DSR assurance
16:30 Roundtables
Moderated Discussions – Choice of Topics

  • Key Considerations for Safeguarding ICS Networks
  • Preventing threats on portable media
  • Challenging conventional security architectures
  • Information classification and architecture
  • Cloud storage
  • Building a reliable operations team
17:10 Chairman’s Closing Address
17:30 Networking Drinks and Canapés hosted by CA Technologies
DAY 02  

>

12 October 2017
08:00 Registration and Seated Breakfast
08:55 Welcome Address from the Chair
09:00 Opening Panel
Moving from Assessment to Acknowledgement: Attacks Are Going To Happen

  • Attacks will happen and do happen – what response plans are there?
  • Preparing the whole company, not just IT
  • Tools and training for a secure companywide culture
09:40 Platform
Applying Web Isolation to Protect Critical Infrastructure

  • What is web isolation?
  • How isolation eliminates malware and phising
  • Live Demo: Experience Isolation In Action
  • Case Study: Leading oil & gas company deploys isolation globally
09:50 Keynote
5-Point-Palm Exploding Heart Technique – The Difference and Benefits of SIEMS Vs Point Solutions   

  • Point solutions, end point solutions, or the network as your super power
  • Discussing the strengths and weaknesses of focused or centralized solutions and offers a different angle on how to secure your environment with a long term vendor agnostic strategy rather then any one product solution
  • Consolidation Vs point solution
10:20 Morning Refreshments & Networking
11:00 Keynote
Moving the Security Needle: Protecting Industrial Endpoints Against a Connected World

  • IIoT and today’s threat landscape have rendered traditional industrial control systems (ICS) security controls, such as air gapping and security by obscurity, unreliable. In this presentation, we will examine a next-generation approach to securing the process control network including:
  • IIoT challenges to cyber security
  • Automated Inventory of the Endpoints That Matter Most
  • Proprietary ICS Baselines and Breach Detection
  • Case Study
11:30 Case Study
Cyber Mutual Assistance – Bridging Mutual Assistance To Electric Utility Operators

  • Today, the electric industry’s culture of mutual assistance is a model for creating responses to cyber threats to the energy grid. Based on lessons learned from major destructive cyber incidents overseas, and from exercises in North America, the Cyber Mutual Assistance Program was developed. It is a natural extension of the electric power industry’s longstanding approach of sharing critical personnel and equipment when responding to emergencies.
12:10 Keynote
State Of The Phish: Understanding End User Behaviours Towards Phising

  • Despite having a solid security awareness and training program in place, today’s cybercriminals manage to evade even the savviest end users through carefully planned email phishing attacks that are only getting more advanced.
  • Hear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves.
  • Learn about the most devastating types of phishing emails used and how to thwart them.
12:40 Seated Lunch hosted by Arbor Networks
13:40 Case Study
Information Security: Careers, Crafts and Wizardry (People, Processes and Technology)

  • Overview of a strong InfoSec program
  • Discussion of skills gap between what is needed and what is available
  • Cyber Security skills: Broad understanding, Technical Knowledge, Analytical Capabilities
14:20 Case Study
Developing A Strategy to Fight Advanced Persistent Threats – How Best To Respond?

  • How to spot a campaign of Intellectual Property theft using cyber methods
  • The development of cyber cartels and the extent of international operations.
  • Protecting business intelligence and intellectual property for competitive advantage
  • The underground economy supporting espionage and fraud
  • The anatomy of an APT operation
15:00 Networking Break
15:30 Group Discussion: Cyber Risk As A Board-Level Issue

  • What are the major concerns the board will be interested in?
  • Vendor risk management – managing risk with interfacing operations.
  • How best to change the practice of IT being seen as a cost center to a core function which requires investment
  • Mobile technologies, social media and the general increase in electronic communication – what effect has this had?
16:20 Chairman’s Closing Remarks

 

Steering Committee

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Speakers

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Sponsors

Presenting Sponsor

Indegy

Indegy improves operational safety and reliability by providing real-time situational awareness and security for industrial control networks. Our customers implement the Indegy platform to gain comprehensive visibility and control over the critical controllers that enable the automation of industrial processes. Indegy's core technologies monitor control-layer activities and identify in real-time changes to controller logic, configuration, firmware and state. Indegy applications for asset management, configuration control, comprehensive activity reports and backup and recovery capabilities enable quick response to cyber attacks, insider threats and human error.

Presenting Sponsor

Cylance

Cylance is a cybersecurity products and services company focusing on stopping tomorrow's attacks today. Founded in 2012 by ex-McAfee Global CTO Stuart McClure and ex-McAfee Chief Scientist Ryan Permeh, Cylance was created to solve the malware problem once and for all. Our flagship product, CylancePROTECT®, is the world's first next-generation antivirus built on artificial intelligence and machine learning. Named the SC Magazine Award winner for "Best Emerging Technology" in 2015.

Networking Sponsor

Bayshore

Bayshore is an award-winning, patented IT/OT Gateway platform providing IT departments with unprecedented visibility into OT operations. It enables Fortune 1000 industrial and enterprise customers to rapidly build & execute policies for OT cybersecurity, secure M2M communications, manufacturing operations, & robotics automation. Bayshore is distinguished by its extremely deep content inspection, granular filtering of network flows (including files within files and archives), policy building and enforcement, and its ability to detect, parse and segment industrial protocols. Leveraging these capabilities, Bayshore delivers ROI in areas such as production zone cybersecurity, operational continuity, data protection/data loss prevention, and plant safety.

Packages Available

Packages Available

Please contact Nathan Sharpe on nathan@qatalystglobal.com for sponsorship opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Partners

Supporting Partner

Information Security Forum (ISF)

Founded in 1989, the <a href="http://www.securityforum.org">Information Security Forum</a> (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members. ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program.

Online Partner

EM360°

Keeping busy executives up to date with reports on the latest IT trends, presenting views from expert analysts and solution providers; EM360° offers specialist coverage making it the comprehensive guide for all aspects of organisational IT. With an established medium for editorial and online resources, we serve a global audience of C-level executives, management and IT practitioners, informing them of the latest developments in their industries.

Online Partner

Crowd Reviews

CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users which have experienced products and services first-hand and have an interest in letting other potential buyers their thoughts on their experience. CrowdReviews.com is driven by an algorithm allowing for both customers and providers of products and services to understand how the rankings are determined. The service can be used by potential buyers to learn more about their vendors prior to making a purchasing decision.

Please contact Philippa Kartawick on philippa.kartawick@qatalystglobal.com for partnership opportunities.

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

History

 

Testimonials

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

Register

Primary Market

IT and Process Control Departments

Conference + Evening Reception

$1,299

 

Register Now

VENDOR / OTHER

Product and Service Providers

Conference + Evening Reception

$2,999

 

Register Now

SPONSOR

Interested in Sponsorship?

Enquire Now

Contact Us

GET IN TOUCH
Qatalyst Global
Dowgate Hill House
14 – 16 Dowgate Hill,
London, EC4R 2SU, UK
UK +44 203 740 9106
USA +1 212 537 6203
For sponsorship opportunities contact
Nathan Sharpe // Nathan@qatalystglobal.com
For speaking opportunities contact
Victoria Anderson // Victoria@qatalystglobal.com
For any queries relating to registration, logistics and marketing contact our team on
info@qatalystglobal.com

Send a Message

Qatalyst Global is a senior-level Cyber Security Summit and Industrial IoT Summit provider. CS4CA Summit

WordPress Image Lightbox

OUR FEATURED VIDEO

 

SIGN UP FOR UPDATES

Please fill in your details below to receive regular updates from Qatalyst Global.

 

DOWNLOAD BROCHURE

Please fill in your details below to download the brochure.

 

Interested in Sponsorship?

Please fill in your details to the form below to Interested in Sponsorship.

 

Interested in Sponsorship?

Please fill in your details below if you are interested in sponsorship: