SlideShare a Scribd company logo
1 of 2
Download to read offline
Press release
7-8-2016
EXPERTS MEET TO DISCUSS HOW TO PROTECT U.S ENERGY INFRASTRUCTURE
FROM CYBER THREAT
In light of increasing awareness of the threat that cyber-attacks pose to energy
infrastructure, the third annual Industrial Control Cybersecurity USA conference will take
place in California later this year.
Taking place in Sacramento from October 3rd
to October 5th
2016, the conference will bring
together leading cyber security talent from senior decision-makers such as Chief Information
Officers, Heads of Information Security and Heads of Operational Technology.
Organised by Cyber Senate, a body dedicated to supporting partnerships and information-
sharing in the cyber security industry, the event will focus on how to adapt to the changing
landscape, in which the work of IT and operational topics is inextricably intertwined and how
to manage day-to-day processes, such as the security issues that arise from procurement
and working with supply chains.
The conference has announced key speakers and over eight in depth panel discussions to
assist infrastructure owners and cyber security specialists with the challenges of mitigating
evolving cyber threats:
• Marty Edwards, Director of ICS ICERT, Department of Homeland Security
• Philip D Quade, Special Assistant to the Director National Security Agency for Cyber,
and Director, NSA Cyber Task Force
• Keri Glitch, Vice President, Cyber & Physical Security, AVANGRID
• Chris Blask, ICS ISAC, Director Webster University Cyberspace Research Institute
Discussing the upcoming event, organiser James Nesbitt of Cyber Senate said:
“Technological advances such as the Internet of Things have been great for our industry, but
they create as many vulnerabilities as they do efficiencies. Systems that were previously
exempt from the risk of cyber-attacks are now online, completely changing the way we need
to think about security.
“This means that those tasked with protecting Critical National Infrastructure need to
constantly refresh their skills and knowledge in order to ensure that they stay one step
ahead of the hackers. We believe that information sharing is perhaps the most important tool
we have in our armoury to protect our infrastructure from cyber threats and hope that, by
bringing together leading subject matter experts from across the cyber security industry, this
conference will help the sector develop a framework that can help to minimise the threat that
cyber-attacks pose, both now and in the future.”
Venue: 1220 9th Street, Sacramento, CA 95814
ENDS
For media information, please visit: contact Daryl Fig 1-(916)-290-9329 or
Daryl.Fig@sagacity-media.com
About the Cyber Senate: The Cyber Senate is an exclusive network and information triage,
creating a common voice for the Cyber Security industry. It regularly hosts events that
provide guidance on pressing security issues across key Smart Infrastructure sectors such
as Energy, Internet of Things, Smart Cities, Transport and Healthcare to further progress
public and private information sharing. The Cyber Senate is a strategic alliance partner with
the ICS ISAC. For more information, visit: http://cybersenate.com/

More Related Content

What's hot

Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT ServicesCyber Watching
 
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder SlidesFED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder SlidesJSchaus & Associates
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityGareth Niblett
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsGareth Niblett
 
JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016Jon Neiditz
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...ijseajournal
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyHB Litigation Conferences
 
Update on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming EventsUpdate on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming Eventsictseserv
 
How Is IoT Changing Web Development?
How Is IoT Changing Web Development?How Is IoT Changing Web Development?
How Is IoT Changing Web Development?Cloud Analogy
 
Cyber Security - the 21st Century Domain
Cyber Security - the 21st Century DomainCyber Security - the 21st Century Domain
Cyber Security - the 21st Century DomainJohn Gilligan
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintShiva Bissessar
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security InfographicIdeba
 
Call for participation - 9th international conference on artificial intellige...
Call for participation - 9th international conference on artificial intellige...Call for participation - 9th international conference on artificial intellige...
Call for participation - 9th international conference on artificial intellige...gerogepatton
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossKristian Foss
 
170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_final170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_finalPatrick Le Fevre
 

What's hot (20)

Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
"Introduction & Cyberwatching project" - Nick Ferguson, Trust-IT Services
 
A Resilient Future | William Barker | June 2015
A Resilient Future | William Barker | June 2015A Resilient Future | William Barker | June 2015
A Resilient Future | William Barker | June 2015
 
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder SlidesFED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
FED GOV CON - DOD & The Intel Community Event - Robert Elder Slides
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
 
Update on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming EventsUpdate on Recent SESERV Results and Upcoming Events
Update on Recent SESERV Results and Upcoming Events
 
key Information management and technology Issues 2008-11
key Information management and technology Issues 2008-11key Information management and technology Issues 2008-11
key Information management and technology Issues 2008-11
 
How Is IoT Changing Web Development?
How Is IoT Changing Web Development?How Is IoT Changing Web Development?
How Is IoT Changing Web Development?
 
Cyber Security - the 21st Century Domain
Cyber Security - the 21st Century DomainCyber Security - the 21st Century Domain
Cyber Security - the 21st Century Domain
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital Footprint
 
Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
 
Call for participation - 9th international conference on artificial intellige...
Call for participation - 9th international conference on artificial intellige...Call for participation - 9th international conference on artificial intellige...
Call for participation - 9th international conference on artificial intellige...
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian Foss
 
170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_final170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_final
 
Calgary2011
Calgary2011Calgary2011
Calgary2011
 

Similar to Industrial Control Cybersecurity USA Cyber Senate conference

Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Andrea Mennillo
 
10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend10 IT Automation Conferences to Attend
10 IT Automation Conferences to AttendCloudCheckr
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 James Nesbitt
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportSamantha Wagner
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 

Similar to Industrial Control Cybersecurity USA Cyber Senate conference (20)

Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend10 IT Automation Conferences to Attend
10 IT Automation Conferences to Attend
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 

More from James Nesbitt

Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Asset information and data management smart rail
Asset information and data management smart railAsset information and data management smart rail
Asset information and data management smart railJames Nesbitt
 
Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure  Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure James Nesbitt
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Asset information and data management for Smart Rail June 26th
Asset information and data management for Smart Rail June 26thAsset information and data management for Smart Rail June 26th
Asset information and data management for Smart Rail June 26thJames Nesbitt
 
Asset information and data management for smart rail systems conference Londo...
Asset information and data management for smart rail systems conference Londo...Asset information and data management for smart rail systems conference Londo...
Asset information and data management for smart rail systems conference Londo...James Nesbitt
 
Rail asset information and data management for smart rail June 26th conferenc...
Rail asset information and data management for smart rail June 26th conferenc...Rail asset information and data management for smart rail June 26th conferenc...
Rail asset information and data management for smart rail June 26th conferenc...James Nesbitt
 
CBTC Crossrail London March 12th 2014
CBTC Crossrail London March 12th 2014CBTC Crossrail London March 12th 2014
CBTC Crossrail London March 12th 2014James Nesbitt
 
Asset information and Data management for Smart Rail systems
Asset information and Data management for Smart Rail systemsAsset information and Data management for Smart Rail systems
Asset information and Data management for Smart Rail systemsJames Nesbitt
 
CBTC Communications Based Train Control conference March 12th 2014
CBTC Communications Based Train Control conference March 12th 2014 CBTC Communications Based Train Control conference March 12th 2014
CBTC Communications Based Train Control conference March 12th 2014 James Nesbitt
 
Communications Based Train Control Conference London March 12 2014
Communications Based Train Control Conference London March 12 2014 Communications Based Train Control Conference London March 12 2014
Communications Based Train Control Conference London March 12 2014 James Nesbitt
 

More from James Nesbitt (11)

Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Asset information and data management smart rail
Asset information and data management smart railAsset information and data management smart rail
Asset information and data management smart rail
 
Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure  Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Asset information and data management for Smart Rail June 26th
Asset information and data management for Smart Rail June 26thAsset information and data management for Smart Rail June 26th
Asset information and data management for Smart Rail June 26th
 
Asset information and data management for smart rail systems conference Londo...
Asset information and data management for smart rail systems conference Londo...Asset information and data management for smart rail systems conference Londo...
Asset information and data management for smart rail systems conference Londo...
 
Rail asset information and data management for smart rail June 26th conferenc...
Rail asset information and data management for smart rail June 26th conferenc...Rail asset information and data management for smart rail June 26th conferenc...
Rail asset information and data management for smart rail June 26th conferenc...
 
CBTC Crossrail London March 12th 2014
CBTC Crossrail London March 12th 2014CBTC Crossrail London March 12th 2014
CBTC Crossrail London March 12th 2014
 
Asset information and Data management for Smart Rail systems
Asset information and Data management for Smart Rail systemsAsset information and Data management for Smart Rail systems
Asset information and Data management for Smart Rail systems
 
CBTC Communications Based Train Control conference March 12th 2014
CBTC Communications Based Train Control conference March 12th 2014 CBTC Communications Based Train Control conference March 12th 2014
CBTC Communications Based Train Control conference March 12th 2014
 
Communications Based Train Control Conference London March 12 2014
Communications Based Train Control Conference London March 12 2014 Communications Based Train Control Conference London March 12 2014
Communications Based Train Control Conference London March 12 2014
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Industrial Control Cybersecurity USA Cyber Senate conference

  • 1. Press release 7-8-2016 EXPERTS MEET TO DISCUSS HOW TO PROTECT U.S ENERGY INFRASTRUCTURE FROM CYBER THREAT In light of increasing awareness of the threat that cyber-attacks pose to energy infrastructure, the third annual Industrial Control Cybersecurity USA conference will take place in California later this year. Taking place in Sacramento from October 3rd to October 5th 2016, the conference will bring together leading cyber security talent from senior decision-makers such as Chief Information Officers, Heads of Information Security and Heads of Operational Technology. Organised by Cyber Senate, a body dedicated to supporting partnerships and information- sharing in the cyber security industry, the event will focus on how to adapt to the changing landscape, in which the work of IT and operational topics is inextricably intertwined and how to manage day-to-day processes, such as the security issues that arise from procurement and working with supply chains. The conference has announced key speakers and over eight in depth panel discussions to assist infrastructure owners and cyber security specialists with the challenges of mitigating evolving cyber threats: • Marty Edwards, Director of ICS ICERT, Department of Homeland Security • Philip D Quade, Special Assistant to the Director National Security Agency for Cyber, and Director, NSA Cyber Task Force • Keri Glitch, Vice President, Cyber & Physical Security, AVANGRID • Chris Blask, ICS ISAC, Director Webster University Cyberspace Research Institute Discussing the upcoming event, organiser James Nesbitt of Cyber Senate said: “Technological advances such as the Internet of Things have been great for our industry, but they create as many vulnerabilities as they do efficiencies. Systems that were previously exempt from the risk of cyber-attacks are now online, completely changing the way we need to think about security. “This means that those tasked with protecting Critical National Infrastructure need to constantly refresh their skills and knowledge in order to ensure that they stay one step ahead of the hackers. We believe that information sharing is perhaps the most important tool we have in our armoury to protect our infrastructure from cyber threats and hope that, by bringing together leading subject matter experts from across the cyber security industry, this conference will help the sector develop a framework that can help to minimise the threat that cyber-attacks pose, both now and in the future.” Venue: 1220 9th Street, Sacramento, CA 95814 ENDS For media information, please visit: contact Daryl Fig 1-(916)-290-9329 or Daryl.Fig@sagacity-media.com
  • 2. About the Cyber Senate: The Cyber Senate is an exclusive network and information triage, creating a common voice for the Cyber Security industry. It regularly hosts events that provide guidance on pressing security issues across key Smart Infrastructure sectors such as Energy, Internet of Things, Smart Cities, Transport and Healthcare to further progress public and private information sharing. The Cyber Senate is a strategic alliance partner with the ICS ISAC. For more information, visit: http://cybersenate.com/