Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

SCADA and Control Systems Security Summit


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

SCADA and Control Systems Security Summit

  1. 1. Featuring interactive sessions and real world case studies specifically Special Offer! The First 20 Utility designed for the electric, water and oil & gas industries to facilitate a highly Executives Attend focused, stakeholder-driven dialogue and peer networking opportunities the Conference to help protect your process controls and the critical infrastructure they support Only for $999! from cyber threats. Register by 9/25/2009. See page 2. proudly presents Enhancing Cyber Security for Critical Infrastructure Protection through Seamless Compliance, Configuration and Change Management Synergies December 7-9, 2009 • Washington, D.C. Metro Area Perspectives From the Following U.S. Department of Homeland Security North American Electric Reliability Corporation (NERC) Hear from industry leaders, including: Jim Brenton Wayne Morgan National Institute of Standards and Director, CIP Standards Development, President Technology (NIST) ERCOT & Member West Virginia Idaho National Laboratory NERC Critical Infrastructure American Water Protection Committee American Water Works Association Seán Paul McGurk L.C. Williams Bonneville Power Administration Director, Control Systems Security Program Manager, Critical International Society of National Cyber Security Division, Cyber Asset Infrastructure for U.S. Department of Homeland Enterprise IT Security Automation Security Tennessee Valley Authority The Repository of Industrial Security Incidents (RISI) Hear about best practices on how to protect your process Puget Sound Energy controls and the critical infrastructure they support by: Tennessee Valley Authority ✔ Create flexible and secure architectures with ongoing, cross-functional and well- Pepco Holdings Inc. coordinated collaboration between IT, IS and Engineering Washington Suburban Sanitary ✔ Maximize ability to address incidents with increased scenario planning Commission ✔ Increase buy-in by demonstrating how risk-driven enterprise information security West Virginia American Water architecture spans and aligns with objectives across all business functions Electric Reliability Council of Texas ✔ Elevate security levels by leveraging seamless change management procedures with (ERCOT) the latest cutting-edge technologies specifically tailored for utilities ✔ Ensure your systems are compliant-ready with advanced risk assessment and ReliabilityFirst Corporation critical asset identification CONTROL Magazine The Smart Grid Security Blog Plus! Case studies and expertise from Co-Located with the Smart Media Metering Partners: Networking and Operations Summit www.scadasecuritysummit.com
  2. 2. At SCADA & Control Systems Security Summit you will meet… VPs, Directors and Managers responsible for: • SCADA/Process Controls/Real Time Systems • Information Technology • Information Security Dear Colleague, • Cyber Security • Critical Infrastructure/Resource Protection This year the President pledged to Engineering safeguard the Nation’s vital digital • “Protecting this infrastructure will systems, stating, be a national security priority. We • Regulatory Affairs/Compliance networks are secure, trustworthy will ensure that these • Risk Management and resilient.” With 85 percent of the U.S. in private hands, enhancing the critical infrastructure in • System Operations SCADA systems and other process them will be no small task between controls supporting • Smart Grid Government and the utilities. Secu Telemetry question is not whether a cybe rity experts agree the • r security breach will occur, but systems ready if the target is you? when! Are your 5 Reasons Why SCADA At SCADA & Control Systems Secu rity Summit, you will hear from a leading government officials, polic ymakers, regulators, technology expe speaker faculty of & Control Systems practitioners on how you can bette rts and utility Security Summit Gives r assess the vulnerability of your SCA bolster its security layers according DA system to attack and over to open, interlocked networks, ly. In response to the relatively recen t shift of control systems You the Best Value for the expansion of the Smart Grid, Your Marketing Spend: hacking capabilities and more strin increasingly sophisticated gent compliance requirements, secu priority! rity should be your #1 You will be exposed to senior 1 decision makers from the Guarantee your seat at the tabl electric, water and oil and gas e of industry leaders as they addr the most pressing cyber security ess and work through industries. critical to your business. In addi components to be discussed, chan tion to the technical ge and configuration management We actively maintain a conversation so that you can bette r address the human barriers arou will be a major part of the 2 reduced vendor ratio, which nd security implementation. creates a more intimate I look forward to meeting you in Wash networking and knowledge ington, D.C.! sharing environment for utilities. 15+ confirmed industry your learning 3 P . Maximize .S speakers with first-hand attending our experience and foresight on experience by ! the key security challenges to aining sessions Christopher Boucher interactive tr er today! be discussed. d regist Program Director See page 3 an 4 Extensive networking Christopher.Boucher@iqpc.com opportunities, allowing face- to-face interaction with heads of your target market. 5 Expert advice on how to effectively deploy new security, change and Venue Information configuration management Please visit the website for venue information: www.scadasecuritysummit.com protocols. Registration Information Qualified Utilities Register by Register by Register by Register by Standard Other Register by Register by Standard Professionals 9/25/2009 10/9/2009 10/23/2009 11/6/2009 Price 10/23/2009 11/6/2009 Price Conference Only (save $400) (save $300) (save $200) (save $100) Conference Only (save 600) (save $300) $1199 $1299 $1399 $1499 $1,599 $1999 $2299 $2,599 All Access (save $1347) (save $1247) (save $1147) (save $1047) (save $947) All Access (save $1547) (save $1347) (save $1147) $1899 $1999 $2099 $2199 $2299 $2699 $2899 $3099 Workshop(s) $549 each $549 each $549 each $549 each $549 each Workshop(s) $549 each $549 each $549 each Special Offer! The First 20 Utility Executives Attend the Conference Only for $999! Register by 9/25/2009 Please note multiple discounts cannot be combined. Special Discounts Available: A limited number of discounts are Payment Policy: Payment is due in full at the time of registration and includes lunches available for the non-profit sector, government organizations and and refreshments. Your registration will not be confirmed until payment is received and A $99 processing charge will be assessed to all registrations not academia. For more information, please contact customer service at accompanied by credit card payment at the time of registration. may be subject to cancellation. For IQPC’s Cancellation, Postponement and 1-800-882-8684. Substitution Policy, please visit www.iqpc.com/cancellation MAKE CHECKS PAYABLE IN U.S. DOLLARS TO: IQPC Details for making payment via EFT or wire transfer: Special Dietary Needs: If you have a dietary restriction, please contact Customer Service * CT residents or people employed in the state of CT must add JPMorgan Chase at 1-800-882-8684 to discuss your specific needs. 6% sales tax. Penton Learning Systems LLC dba IQPC: 957-097239 TEAM DISCOUNTS: For information on team discounts, please ABA/Routing #: 021000021 ©2008 IQPC. All Rights Reserved. The format, design, content and arrangement of this contact IQPC Customer Service at 1-800-882-8684. Only one Reference: Please include the name of the attendee(s) and the event brochure constitute a trademark of IQPC. Unauthorized reproduction will be actionable discount may be applied per registrant. number: 18253.001 under the Lanham Act and common law principles. 2
  3. 3. Pre-Conference Workshops Monday, December 7, 2009 These training sessions will provide participants with an opportunity to engage in a hands-on, deep-dive working group environment to help address and unravel the key issues and challenges associated with control system cyber security, critical infrastructure protection and the change and configuration protocols required for total business transformation! Sign up today! 8:00am – 11:00am 7:45am Registration for Workshop A A Introduction to Enhancing Control Systems Security from the Department of Homeland Security Today’s interconnected utilities demand that you protect systems controls for How you will benefit: critical infrastructure and business-specific protection. Though this is a major • Reduce organizational risk by understanding how real and perceived challenge for any single utility to overcome, possessing a complete threats will affect service reliability system operability, service deliverability understanding of the threat landscape, known incidents and risk exposure to and business continuity your specific system is critical to know what and where to secure as well as • Prevent exploits and detect intrusions using mitigation strategies to how to respond adequately when and if attack does occur. The purpose of common vulnerabilities this course is to introduce students to the basics of industrial control systems • Minimize and reduce system downtime with a well-governed response security, which includes a high level overview of the comparative analysis of IT and recovery strategy and control system architecture, security vulnerabilities and mitigation strategies unique to the control system domain. Workshop Leader: Jeffrey Hahn, Training & Education, DHS Control Systems Security What will be covered: Program, Idaho National Laboratory • Overview on the current cyber security landscape: understanding the risks • Industrial Control Systems Applications • Current State of Industry • Practical Application of Cyber Security 11:15am – 2:15pm 11:00am Registration for Workshop B – Lunch will be served. B Mitigating Risk and Increasing Audit-ability of SCADA Systems with Best-in-Class Configuration and Change Management Strategies SCADA environments present unique challenges around security in that they • Meeting security compliance attestation requirements for audit purposes must be consistently available and cannot be shut down to perform security upgrades. It is however, critical that these systems be protected from cyber How you will benefit: threats, and other vulnerabilities such as human error. This workshop will • Gain a deeper understanding of unique requirements of control systems provide you with practical knowledge of the unique requirements in securing environments as they relate to security and audit-ability SCADA infrastructure, as well as insight into implementing effective change • Exposure to best practices in change management for control systems management and business process improvement techniques. environments • Achieve and maintain ongoing compliance by process mapping What will be covered: organizational structures and governance • Integrating security, monitoring and control techniques into control systems environments Workshop Leader: • Methodologies for developing reliable audit trails to help monitor and Walter Sikora, VP Security Solutions, Industrial Defender respond to system changes 2:30pm – 5:30pm 2:15pm Registration for Workshop C C Conducting Full-Risk Assessments and Identifying Critical System Assets to Fortify Security & Enable Process Control Redesign Without identifying the proper assets to protect, no control system or the legacy SCADA environments without disrupting mission critical processes infrastructure they purport to protect will work. In fact, protection requires or compromising system operability that you closely examine all systems within the enterprise in totality and not in isolation as well as to achieve the proper balance between a compliant system How you will benefit: and one that is fully secure. What is involved in protecting cyber assets as • Ensure the successful and secure upgrade of SCADA systems with project opposed to physical ones? How do you design systems without replacing management strategies that do not compromise real-time system availability entire architectures and then sustain those changes over time? • Overcome business continuity challenges by understanding your system gaps and security assurance level What will be covered: • Support IT improvements over time with increased self-monitoring and • How to appropriately assess and identify multi-layered protection based on enterprise-wide process mapping procedures best-in-class critical cyber asset methodologies • How to design and redesign control systems that are compliant without Workshop Leader: compromising optimal security levels Michael Toecker, Control Systems Security Designer, Compliance & • How to leverage and integrate cutting-edge security technologies into Infrastructure Protection, Burns & McDonnell Engineering www.scadasecuritysummit.com 3
  4. 4. Main Conference Day 1 Tuesday, December 8, 2009 7:30 Registration & Coffee 10:00 Morning Networking Break 8:00 Chairperson’s Welcome and Opening Remarks 10:45 Achieving Highly Secure and Compliant IT Architectures through Full-Scale Process Assessment & Redesign 8:15 Keynote: Enhancing Control Systems Security by What we've learned so far isn't so much that you need to know your Aligning National Policy with Private Interests system architecture as you need to know the requirements and then With approximately 85 percent of the systems controlling critical redesign your architecture to meet those requirements. Because this is a infrastructure in private hands, it will be crucial for Government and journey and not a destination – evidenced by more stringent regulation utilities to work in coordination with one another in addressing today’s and evolving threats – the security you had in place yesterday is not good cyber security concerns as well as to help shape policy, increase awareness enough for today and today’s isn’t good enough for tomorrow. In this and drive implementation. In this session, you will learn about: session, you will learn how to: • Current threat landscape, common vulnerabilities and key control • Reduce risk exposure by understanding the business requirements for system security issues based on the Risk = Threat x Vulnerability x connectivity, what isn’t needed and what is negotiable Consequences formula • Meet federal regulations by leveraging compliance software and • Ongoing mitigation strategies being developed as part of the National Infrastructure Protection Plan, including the creation of public-private establishing liability for self-monitoring responsibilities • Create flexible architectures with ongoing, cross-functional collaboration partnerships and joint working groups • Future policy actions and regulatory recommendations being taken by between IT, IS and engineering the DHS Andrew Labovitch Seán Paul McGurk Manager of Information Technology Director, Control Systems Security, National Cyber Security Division Pepco Holdings Inc. U.S. Department of Homeland Security 11:30 Attaining Non-Disruptive SCADA Security Upgrades 9:00 Technology Panel: Upgrading Legacy Control Systems with a Systematic, Incremental Change Strategy with Best-in-Class Next Generation Technologies and Unlike other industries, utilities cannot shut down entire systems to make Seamless Configuration Management the necessary upgrades, thereby presenting enormous challenges, Decades ago, developers gave little consideration that the SCADA device including how you do so without disrupting service levels. For those who would ever be connected to anything other then a closed network. The have tackled this challenge, the project management component is like reality, though, is that utilities must implement security improvements walking on pins and needles. In this session, you will learn how to: outlined in the SCADA procurement standards by understanding the • Relieve budgetary strain and minimize operational disruption with an in- appropriate implementation how-to, and then ensure that those house SCADA design and integration team enhancements are maintained over time. It is this that will create the most • Effectuate successful security migrations using DNP Secure pressing ongoing challenge: sustainable security. In this session, you will Authentication and other communications protocols learn how to: • Improve system reliability and boilerplate standards with post mortem • Deal with the existing base of equipment during process upgrades • Integrate network security into process designs in-line with the continual analysis evolution of control systems and regulatory standards Jake Brodsky • Introduce process self-integrity monitoring as a means of ensuring Control Systems Engineer reliable and safe controls Washington Suburban Sanitary Commission Moderator: Doug Maughan Program Manager, Cyber Security R&D 12:15 Networking Luncheon U.S. Department of Homeland Security Panelists: 1:15 Point/Counterpoint Roundtable: Achieving L.C. Williams Program Manager Compliance and a Strong Security Posture without Critical Cyber Asset Infrastructure for Enterprise IT Security Impacting System Operability or Process Efficiency Tennessee Valley Authority Because utilities often use the terms ‘compliant’ and ‘security’ interchangeably, it is highly possible for your baseline standards to Andrew Labovitch effectively meet threshold requirements without achieving a secure Manager of Information Technology environment. In this session, you will discuss and learn how to: Pepco Holdings Inc. • Balance threshold standards with added security via advanced system Jake Brodsky metrics • Sustain secure, compliant environments with regular system monitoring Control Systems Engineer Washington Suburban Sanitary Commission and risk assessment processes embedded into new, internal operational Larry Bugh directives • Save costs and resources by automating policy compliance with Chief Security Officer ReliabilityFirst Corporation & Member, NERC CIP Committee standards and regulation Kevin Morley Larry Bugh Security & Preparedness Program Manager Chief Security Officer American Water Works Association ReliabilityFirst Corporation & Member, NERC CIP Committee 4
  5. 5. Day 1 Continued 2:15 Selling Security to Key Stakeholders Using 4:30 Interactive Q&A Session: Balancing the Quantifiable Risk & Financial Metrics Dichotomy Between Security and Compliance Long before implementation becomes a reality, you must first Companies and public agencies alike continually struggle with demonstrate that the costs associated with control system security compliance deadlines while serving their customers and meeting upgrades are justified by organizational decision makers. The business objectives. Couple those challenges with legacy challenge remains: how do you communicate potential exposure as infrastructures not inherently designed for security and internal a tangible, monetized business metric that upper management will cultural barriers, and you potentially get chaos. In this session you understand? In this session, you will learn how to: will learn about risk management and strategies for avoiding the • Increase buy-in by demonstrating how risk-driven enterprise mad dash toward compliance to the detriment of measurable information security architecture spans and aligns with objectives security as well as: across all business functions • Why your compliance efforts may ultimately fail • Develop a ‘security culture’ by leveraging key performance • Developing a balance between compliance activity and a strong indicators of the core business security posture • Transform information security from a cost center into an actively • What prevents effective information sharing and industry managed component of overall profit collaboration L.C. Williams Jon Stanford Program Manager, Critical Cyber Asset Infrastructure for Chief Security Information Officer Enterprise IT Security Bonneville Power Administration Tennessee Valley Authority 5:30 Close of Conference Day 1 3:00 Afternoon Networking Break 3:45 Preparing for SCADA Cyber Intrusion with an Executable Enterprise Incident Response Plan Though SCADA operators and IT professionals are actively involved in enhancing the security of their control systems as a result of past incidents, what they may not be adequately prepared for is how to adequately respond to a real time attack, especially since automation is not conducive to knowledge of manual operation. In this session, you will learn how to: • Avert system downtime with a response plan tailored to the unique organizational structures and management philosophies • Assure business continuity with multi-tiered approach to cross- functional training requirements, security governance and contingency planning • Elevate ability to adequately address incidents with increased due diligence and configuration and patch management Wayne Morgan President West Virginia American Water Sponsorship and Exhibition Opportunities About the Organizer: Sponsorships and exhibits are excellent opportunities for your company to Energy & Utilities IQ, showcase its products and services to high-level, targeted decision makers a division of IQPC, is attending the SCADA & Control Systems Security Summit. Energy & Utilities IQ dedicated to providing helps companies like yours achieve important sales, marketing and branding practical, detailed objectives by setting aside a limited number of event sponsorships and exhibit information through conferences, training courses, spaces – all of which are tailored to assist your organization in creating a webinars and our monthly e-newsletter. By platform to maximize its exposure within the industry. providing accurate, objective and up-to-date developments and trends in various industries, For more information on sponsoring or exhibiting at this or upcoming events, Energy IQ enables organizations to remain please contact Mario Matulich at 1 (212) 885-2719 or sponsorship@iqpc.com. competitive and profitable. www.scadasecuritysummit.com 5
  6. 6. Main Conference Day 2 Wednesday, December 9, 2009 7:45 Registration & Coffee 10:45 R&D Think Tank: An Update on Industry Advancements in Intelligent Control System Security from the National Institute of Standards 8:00 Chairperson’s Recap of Conference Day 1 and Technology This research and development think tank will highlight the latest trends in control system intelligence and the standards that 8:15 Keynote: Interpreting NERC CIP for Audit: support their application – priorities that are sometimes at odds Examining New Paradigms for Categorizing with one another! In this session you will learn about: Critical Systems • Real and perceived threats to critical infrastructure based on new Historically friendly industry standards and a lack of information sharing developments as a result of ongoing research has bred a culture in which critical assets have been underreported and • NIST’s role in influencing regulation, providing professional advice miscategorized, rendering systems both non-compliant and insecure. and other cross-benchmarking tools to ensure SCADA security Now, a ratcheting up on requirements by agencies like NERC are awareness and implementation of best practice strategies challenging utilities to balance the need to avoid $1m/violation/day • Latest cutting-edge technologies for use in securing SCADA penalties for non-compliance and the need to safeguard controls from systems in utility environments and the sector-specific cyber threat and imminent system failure – business risks that no utility applications of such solutions can afford! In this session you will learn about: • Emerging critical asset standards and the future of critical asset Keith Stouffer identification Mechanical Engineer, National Institute of Standards and • What needs to be protected and at what level Technology & Voting Member, International Society of • Achieving short-term compliance without compromising long- Automation term security with attainable technical and non-technical strategies for implementation 11:30 Peer-to-Peer Interactive Roundtable: Protecting Jim Brenton Critical Infrastructure from Risk by Creating Director, CIP Standards Development, ERCOT & Member Accessible Platforms for Increased Incident NERC Critical Infrastructure Protection Committee Reporting and Industry-wide Information Sharing With each organization managing a unique business approach to 9:00 Perspectives Panel: Mind the Gap: Bridging service delivery, there has historically been very little information SCADA with Smart Technology Security for a exchanged between utilities even though security challenges are Sustainable Energy Future commonly shared. In response to low incident reporting, for Where SCADA is controlled and users are well-known, the Internet example, RISI created an industry-wide repository and online is open and pervasive. As utilities enter into this new era of the database for collecting, investigating, analyzing and sharing critical Smart Grid and other “smart” technologies, these two worlds are information regarding cyber security. By providing industry with destined to collide, presenting roadblocks and threat to system accurate security incident data, organizations can better operators. In this panel, leaders from utilities, academia, vendors understand the nature of the security risk to critical control and the analyst community will describe the new infrastructure of systems. This in turn, allows companies to better focus their the Smart Grid, highlighting the likely areas of connection to resources and prevent such incidents from occurring in the future. critical SCADA systems as well as brainstorm solutions to the In this session, the following questions will be explored: security challenges increased connectivity will bring and the • How urgent is the security risk to control systems and how following: • How to identify new attack vectors as a result of smart serious are the consequences? • What are the threat sources and which security vulnerabilities are implementations • How to select appropriate technologies for SCADA system exploited? • Which industrial cyber-security incidents are fact and which are security upgrades • How to create long-term protection with highly sustainable urban myth? • How can we ensure safe transmission of information and fears security governance without increasing risk? Moderators: • How can you actively contribute to improving industry-wide Jack Danahy system security? Co-Founder Walt Boyes The Smart Grid Security Blog Editor-in-Chief, CONTROL Magazine & Advisory Board Andy Bochman Member Co-Founder The Repository of Industrial Security Systems The Smart Grid Security Blog Please visit our website for panelist information. 12:30 Networking Luncheon 10:00 Morning Networking Break 6
  7. 7. Day 2 Continued 1:30 Working Towards Cultural Transformation 3:00 Afternoon Networking Break through the Effective Knowledge Management of Core Business and Change Objectives With an ever-aging workforce of SCADA operators possessing a 3:30 30 Ideas in 60 Minutes: Enhancing Cyber specific skill set and those on the IT controlling another, it will be Security with Best-in-Class Change and important that there are successful knowledge transfer, safety training Configuration Management Practices programs, talent management capabilities, including ensuring that the Keeping systems patched, filtering traffic and disconnecting newer, more sophisticated software required to detect intrusion is not unneeded services to improve security is often met with pushback undermined because of improper configuration. The transformation of from control system owners who claim that such procedures industry culture must take place for these important changes to take compromise reliability and efficiency. Utility companies, public place, first, and then for security to be optimized at the levels these sector stakeholders and technology innovators will break down the critical controls require. In this session, you will learn how to: risk assessment, technological advances and policy activities that • Overcome resistance and effectuate security change have had the greatest impact in their efforts to secure process management by harmonizing disparate IT and SCADA standards, controls from cyber attack. The panel will also brainstorm next- cross-training functions with new process upgrades and steps and outline key takeaways for conference participants, establishing liability to specific processes including: • Ensure seamless system usability of security enhancements by • How to assess critical physical and cyber infrastructures, identify identifying and appropriating commercial solutions that do not risk exposure and create a plan for change conflict with the control systems domain • How to optimize control systems around the tradeoffs associated • Create sustainable organizational human structures by creating a with compliance and security through process redesign solid governance model and a security threshold that conforms • How to ensure sustainable architectures and ongoing control to and exceeds Government regulation system governance Mark Fabro Moderator: Chief Security Scientist & Panelist for Subcommittee on Walt Boyes Emerging Threats Editor-in-Chief, CONTROL Magazine & Advisory Board Cybersecurity and Science and Technology, DHS Member The Repository of Industrial Security Systems Panelists: 2:15 Improving Control Management by Fostering New Chris Jager Communication Channels and Organizational Sr. IT Security Analyst, Puget Sound Energy & Chairman Structures Between Engineering, IT and IS Energy Sector Security Consortium With control systems taking on more and more of a hybrid function, many SCADA engineers are finding their roles and Mark Fabro responsibilities changing with respect to the systems they’ve Chief Security Scientist & Panelist for Subcommittee on operated for decades, particularly as IT takes on a greater role. Emerging Threats However, without an organization-wide understanding of this shift Cybersecurity and Science and Technology, DHS or a governance structure in place to definitively determine who Keith Stouffer owns what, many new obstacles have been created with respect to Mechanical Engineer, National Institute of Standards and control systems management. In this session, you will learn how to: • Optimize the security and usability of implementations by Technology & Voting Member International Society of Automation building matrices between IT and SCADA operators • Avoid threat overexposure by assigning liability to specific Jon Stanford SCADA security functions • Track system changes by establishing audit trails and access systems Chief Security Information Officer Bonneville Power Administration Chris Jager Sr. IT Security Analyst, Puget Sound Energy & Chairman Energy Sector Security Consortium 4:30 Chairperson’s Closing Remarks and End of Conference About our Media Partners POWERGRID International is the power industry’s leading source of industrial client. CSIA brings successful integration to the marketplace by: information on electric power transmission and distribution • Creating recognition and demand for CSIA certified members automation, engineering, and information technology. More than • Improving system integration best practices and performance; and 36,000 worldwide electric utility professionals, managers, engineers and other • Providing an industry forum and networking opportunities. qualified subscribers count on POWERGRID International to present the information Website: www.controlsys.org they need to make on-the-mark business and technical decisions every day. Advertising in POWERGRID International puts your company’s name where you want Founded in 1945, The International Society of Automation is a leading, it to be–in front of key industry decision makers every day. Please visit www.Power- global, nonprofit organization that is setting the standard for automation by Grid.Com for more information. helping over 30,000 worldwide members and other professionals solve difficult technical problems, while enhancing their leadership and personal Control Engineering continues to set high standards as the career capabilities. Based in Research Triangle Park, North Carolina, ISA develops multimedia leader of control, instrumentation and automation. For standards, certifies industry professionals, provides education and training and more than 50 years, Control Engineering Magazine has upheld a publishes books and technical articles. commitment to consistency and quality, earning subscribers’ trust and building great affinity. We serve the automation market, which designs, implements, maintains, and Control is the voice of the end user in process automation. manages control/instrumentation systems, components, and equipment. Please visit The Control brand is an integrated content delivery system www.controleng.com for more information. that serves relevant content to the global end user audience in all the ways they choose to receive it: print magazine, print supplements, CSIA is committed to the business development of control system website, e-zines, blogs, RSS feeds, webcasts and podcasts. integration companies and their implementation of best practices in order to provide a healthy, low-risk channel for the application of technology to their www.scadasecuritysummit.com 7
  8. 8. International Quality & Productivity Center REGISTRATION CARD 535 5th Avenue, 8th Floor YES! Please New York, NY 10017 register me for ❑ Main Conference Only- December 8-9 ❑ All-Access Pass- December7-9 ❑ Workshop(s) Only- December 7 Choose Your Workshop(s) See Page 2 for pricing details. ❑A ❑B ❑C Your customer registration code is: When registering, please provide the code above. Name__________________________________ Job Title ________________________ Organization____________________________________________________________ Approving Manager______________________________________________________ Address________________________________________________________________ City__________________________________State______________Zip____________ Phone________________________________Fax_______________________________ E-mail__________________________________________________________________ 5 EASY WAYS TO REGISTER: ❑ Please keep me informed via email about this and other related events. 1 Web: www.scadasecuritysummit.com ❑ Check enclosed for $_________ (Payable to IQPC) 2 Call: 1-800-882-8684 ❑ Charge my __Amex __Visa __Mastercard __Diners Club 3 Email: info@iqpc.com Card #__________________________________Exp. Date___/___ CVM code ______ 4 Fax: 1-646-378-6025 Details for making payment via EFT or wire transfer can be found on 5 Mail: IQPC preceding page. 535 5th Avenue, 8th Floor, ❑ I cannot attend, but please keep me informed of all future events. 18253.001/D/SC New York, NY 10017 Featuring interactive sessions and real world case studies specifically Special Offer! The First 20 Utility designed for the electric, water and oil & gas industries to facilitate a highly focused, Executives Attend stakeholder-driven dialogue and peer networking opportunities to help protect the Conference your process controls and the critical infrastructure they support from cyber threats. Only for $999! Register by 9/25/2009. See page 2. proudly presents Enhancing Cyber Security for Critical Infrastructure Protection through Seamless Compliance, Configuration and Change Management Synergies December 7-9, 2009 • Washington, D.C. Metro Area Media Partners: www.scadasecuritysummit.com