Enterprise cyber security


Published on

Develop Strategies to Utilize People, Process & Technology to Optimize your Governance, Risk & Compliance Management

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Enterprise cyber security

  1. 1. With the increasing number of regulations and threats As we navigate new and uncertain challenges in the digital “ Researched & Organized by: facing information assets the time to invest in this age, we must also address the growing threat cyberattacks area has never been more critical. Especially when present to our transportation networks, electricity grid, financial considering the cost of the breakdown of one critical systems and other assets and infrastructure. infrastructure could top $230bn President Obama, 2011 ”ENTERPRISE CYBER SECURITY & saveINFORMATION ASSURANCE SUMMIT $400 register before 17th February17-18 April, 2012, San Jose, California, USADEVELOP STRATEGIES TO UTILIZE PEOPLE,PROCESS & TECHNOLOGY TO OPTIMIZE YOURGOVERNANCE, RISK & COMPLIANCE MANAGEMENT PY• Discover the emerging national and federal initiatives driving Host Organization: your industry forward and giving you the competitive edge CO• establish a clear governance policy to enhance awareness through education generating confidence in the security of your T system F Expert Speakers• learn to mitigate the risk through certification & prioritization to End User Perspective A build resilience, improve response times and enhance system robustness D R• Develop a clear process to efficiently manage the changing regulatory landscape ensuring effective and efficient compliance• builD a clear plan to navigate the rapidly evolving threat landscape and guarantee the protection of your critical information and operational assets • realize how to certify the secure deployment of the latest technologies to maximize the protection of your critical assets and guarantee ROI Government & Trade: ExClUSIvE GAME-CHANGING INFORMATION INCUlDING… ` Up-to-date case studies from key US industry end users including:Wells Fargo & UTC ` Expert technical analysis on major industry challenges including integrated risk management and ‘big data’ from BT Global & Verizon ` Case studies to build clear strategies for efficient and economic compliance Industry Insight From: from Sempra & Enbridge ` Perspective from US government agencies including the FBI and NSTA on initiatives to ensure the security and reliability of critical infrastructure ` Workshops and roundtables discussing the international threat and critical infrastructure & key resource protection from GICSR industry ISACs And many more… For the latest speaker line up and agenda updates please visit: www.cybersummits.com/enterprise
  2. 2. Welcome to the enterprise cyber security& information assurance summitDear Reader, Enterprise Security Mangers –In the past few years there have been land mark changes to the Protect Against Risk and Regulatory Cyber Security industry; from the implementation of integrated technology, to the game changing power of the countless publi- Violation cized breaches and malware. This is all without mentioning the With the challenges and costs of securing the reliability of your rapidly evolving regulatory and compliance landscape. infrastructure increasing rapidly it is essential to approach these complex concerns with detailed planning. This focussed meeting will equip you with To guarantee a secure and efficient enterprise system it is vital to consider the the foresight to economically ensure the resiliency of your assets. three core disciplines of people, process and technology. The way to balance these areas is through the concept of Governance, Risk & Compliance (GRC). ` Industry leading case studies on integrated risk management andEnterprise GRC brings the matter of IT security to the board level, driving compliance solutions from Sempra & Enbridgespending and investment in this sector. ` Federal and national initiatives driving change in standards and` The GRC market is estimated to be worth over $32bn auditing` By 2015 the US federal Cyber Security market will reach $15bn ` Government strategies to enhance resilience to cyber incidents and manage the cyber threat including the FBI Infragard partnership` The USA alone spends $14BN a year on IT-governance Don’t get caught out the rapidly changing landscape and the cost of The attacks of 2011 have taught us that the threat landscape is not just a breach. Discover clear proven strategies being implemented by your evolving but rapidly mutating. This requires security managers to consider new information security peers by signing up today!and creative techniques to detect, prevent and prepare for a breach scenario. With the cost of the breakdown of one critical infrastructure topping $230bn PYand added complexity coming from the increasing number of regulations and Solution Providers – Cyber Securitythe frequent dynamic changes this area is growing rapidly. Activity is on the Rise… CONo one wants to be the weak link in global infrastructure or have their As integrated and mobile devices become ubiquitous it is vital that the reputation tarnished by a breach event but maintaining security and technology securing key information assets evolve with this. With the compliance in a rapidly evolving industry is costly, time consuming and likely hood of a Pearl Harbor-scale intrusion in 2012 increasing military information security spending by 50% to $9bn - the potential for huge Ttechnically challenging. It is now more vital than ever for public and private partnerships to rethink security strategies to minimize risk, maximize resiliency contracts has never been greater! Fand ensure business continuity. At this ground breaking ground breaking industry event you will hear… AThe Enterprise Cyber Security & Information Assurance Summit will supply your • National risk management and security initiatives from international trend setters including BT & Wells Fargo Rbusiness with: • Enterprise end user need for industry wide co-operation and D The critical intelligence and tools you need to build a cost effective, time standardization outlined by FBI and ISA efficient cyber security strategy • Federal and national plans for regulations and enhancing security Key lessons and tried and tested action plans to mitigate risk and save Jon the premier Cyber Security forum to receive market forecast and insight millions of USD in compliance and reliability into government lead industry drivers to accurately plan your business for 2012 and beyond. The insight and connection you need to secure your place in this booming industry We’ll put you in front of industry leading buyers from across North America to fill your order books in 2 days!The Enterprise Cyber Security & Information Assurance Summit will bring together 150 cyber security subject matter and industry experts for two days of business critical strategy, unrivalled networking and stimulating discussion. What We Are Going To Do for You…I look forward to meeting you in San Jose in April. Practical real world strategies and sharing best practice are at the forefront of the Enterprise Cyber Security & Information Assurance Summit. We are committed to ensuring you go away with new contacts and the most up-to-date information. Most importantly you will leave knowing your Natasha Sheel Tel: +44 (0) 207 375 7537 business is going to move forwardSenior Industry Analyst Email: nsheel@FCBusinessIntelligence.com www.cybersummits.com/enterprise ` REALIZE initiatives to ensure the security and reliability of criticalFC Business Intelligence infrastructure ` ASCERTAIN how to ensure cost effective and efficient security and “GICSR is proud to be collaborating with FC Business Intelligence on this compliance maintenance project bringing together key senior level IT Security personnel to tackle the key challenges facing North American critical enterprises. ` UNDERSTAND the persistent and evolving threats and how to securely integrate new technology The Enterprise Cyber Security & Information Assurance Summit will help ` LISTEN to case studies from leading end users and government you to: bodies for how to successfully merge people, process & technology ` Develop strategies to utilize people, process & technology to ensure the reliability of your assets ` Optimizing your governance, risk & compliance management ` DISCOVER the innovative methods developed by global industry leaders to enhance system robustness and resiliency With the increasing number of regulations and threats facing information register today today -www.cybersummits.com/enterprise or phone +44207375 7537 Register - visit visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459 assets the time to invest in this area has never been more critical especially when considering the cost of the breakdown of one critical infrastructure could top $230bn.” Richard Zaluski, Executive VP – International,
  3. 3. expert speakers at this year’s meeting include:KEYNOTE SPEAKERS GOVERNMENT & TRADE BODIES: Jay Bavisi, President & CEO, Deborah Kobza, Executive Director / CEO, EC Council Gicsr & nh-isac John Chesson, Richard Zaluski, Executive Vice President - Special Agent, International, Gicsr FBI Rob Duiven Larry Clifton, CEO / President, Programme Director, National internet security alliance PHOTO Cyber Security Strategy, Ministry of Security and (RET) General Mick Kicklighter, Director, Department of cip & hs, George Mason university Steve Haynes, Director - Cyber Security &END USER PERSPECTIVE information Assurance, Whitehouse national security telecommunications advisory Munillal Chatarpal, committee Manager - Risk Management & Security, PY enbridge energy INDUSTRY EXPERTS INCLUDING: Ola Lawal, Corporate Security Officer, CO enbridge energy Peter Allor, Senior Security Strategist, Cyber Incident & Vulnerability Handling, ibM Alexander Kunz, T Security Governance Manager, sempra Gene Fredriksen, F Global CISO, Ken Baylor, VP / CISO of Security & Antifraud, tYco A Wells Fargo Ernie Rakaczky, Principal Security Architect, R TBA, Director – Governance, Risk, invensys D Compliance, bt Global William Hagestad II, Lieutenant Colonel US Marine Corps (RET), Chief Catherine Lester, Solutions Architect, verizon Cyber Security Strategist, red-Dragon rising Marci McCarthy, President CEO, TBA, Director, raytheon tech exec networks Our expert speaker line up will be discussing the issues critical to you. The Christopher Leigh, Global IT Compliance & FBI Computer Intrusion & Counter Intelligence along with IBM who will be Risk Officer, utc discussing the need for building a long term incident response plan. David Gavilan, Executive Director & Assistant General Counsel, Turnover to see the extensive agenda, established techniques and Jp Morgan chase forward looking strategies our internationally renowned speakers will be presenting and sharing at this premier industry meeting... Conference at a glance MORNING AFTERNOON EXTRAS • Red Dragon Rising Workshop: • Industry Drivers: latest on Whitehouse, • Mitigating the risk and Managing International cyber Day 1 DoD and DHS initiatives understanding the threat Threat April 17th • Looking at the standards and • Building incident response • CISO roundtable their evolution to managing your plans and SIEM • Networking drinks reception governance & compliance strategy • Critical Infrastructure and Key Day 2 • Maximizing security through merging • Managing regulation through Resource Protection workshop April 18th people, process & technology integrated risk solutions • Red Dragon Rising Workshop: • Ensuring an educated & aware • Breach scenario event Managing Chinese cyber Threat workforce register today - visit www.cybersummits.com//enterprise or phone +44 (0) 207 375 7537
  4. 4. November 8th - 9th, Movenpick, Amsterdam, Netherlands Session 1: Industry Drivers Session 2: Managing the Threat Session 3: Mitigating the riskGuide to EU and National Policies and Case Study: Defending the Triad - Energy and Building Multi-layer SecurityInitiatives Critical Infrastructure • Discover how to effectively and dynamically • Hear first the legislation and standards • Learn how energy infrastructure is a key part of prioritize between availability, integrity and associated with the roll out of smart grid any national defensive cyber-security posture to confidentiality maximizing the efficiency of your technology ensuring your knowledge is up-to- ensure effective protection operations date • Discover a national security prospective to • Develop proven and effective strategies of • Realize the true requirement for security as countering cyber-spies from National Cyber- protection merging IT and physical techniques to intelligent and integrated technology becomes Entities compromising the electricity grid to enhance your system security a reality allowing you stand out in a competitive ensure the security • Learn techniques to monitor what is happening industry • Understand the cyber-threats and impact of an both inside and outside the office to mitigate risk• Learn how to securely integrate smart technology attack to the Energy Critical Infrastructure so you • Master the art of educating personnel in how throughout the industry to enhance your can be confident in your preparation to protect their industry ensuring security and productivity and reliability • Expert lead case studies of past cyber-events to efficiency• Discover the true potential for integrated the power infrastructure including the Aurora and Ernie Hayden, Managing Principal, Global Energy operations to ensure the security of Europe’s Stuxnet vulnerabilities defining comprehensive and Utility Vertical, Verizon energy future security precautions for the energy sectorEvangelos Ouzonis, Senior Expert, Network Richard Zaluski, Executive Vice President, Case Study: Shell and WurldTECHsSecurity Policy, ENISA International, GICSR collaboration in Infrastructure Security • Understand the scope of additional connectivity Panel Session: Certifying Vendor Security and Panel Session: Vulnerability and Impact and the associated risks to maximise your Utility Operations Analysis security• Look the at co-operative efforts to establish • Learn how to utilize penetration testing and • Learn methods to protect against malware and PY testing and certification of vendor technology to look at realistic attack scenarios to study the social engineering targeting sensitive business guarantee you work with trusted providers consequences and impacts identifying the information that you can implement• Explore the development of cross-industry vulnerabilities so you can protect your system • Discover proven real world steps to secure CO partnerships to establish standards that will • Analyze your systems to identify high risk critical information infrastructure so you can be produce results high impact areas to efficiently focus your confident in the strength of your system• Discuss the logistics of ensuring that technology resources to enhance your resiliency and system • Gain an up-to-the minute understanding of where and equipment are utilized securely through robustness the security needs, threats and solutions are T certifying the operators of critical infrastructure • Establish the best way to ascertain what is heading ensuring you stay competitive F ensuring overall system robustness connected guaranteeing the safe migration from Expert, Cyber Security Lead, Shell• Uncover the need to verify the organizational an isolated system Tyler Williams, President, WurldTECH A processes and internal security of the end user to • Understanding the scope of additional improve resilience and drive enhanced security connectivity and the associated risks building Access Control RModerator: Tyler Williams, President, WurldTECH comprehensive security precautions • Discover real world techniques to authenticate D Moderator: David Spinks, Chairman, CSIRS users giving you confidence in the security of End Users: Cyber Security Lead,Shell, WIB members Vendor: Peter Wood, CEO, your system First Base Technologies • learn proven methods to manage who has Case Study: The Efforts of EuroSCSIE in authorization and access allowing you to Standards and Guidelines Case Study: Establishing emergency response maximize the protection of your system• An expert lead look at the standards and plans and CERT • Discover strategies to identify the individuals guidelines available to boost your understanding • Understand the threats. vulnerabilities and being granted access to your system to • Learn which standards are compatible and use consequences of a breach so you can build a strengthen your defenses these to build an effective security program clear action plan • Hear a step by step guide to enforce user • Hear about the efforts to build international • Establish a compute emergency response so accountability to enhance your security industry-wide best practice guidelines and there is a clear action plan for system failures requirements placing you ahead of the ensuring you are back on-line as quickly as competition possible• Discover the European wide efforts to increase • Learn how to improve your resiliency and GET THE MOST OUT OF THE awareness through sharing and exchanging recovery to minimize your downtime if the system information to build proven strategies fails CONFERENCE • Discover the operational benefits of cyber Annemarie Zielstra, Director, Attend one of our exclusive workshopsEuroSCSIE / CPNI.NL security and system robustness maximizing productivity CSIRS and RUSI Closed Door Meeting: Dimitrios Serpanos, Director, ISI Confidential discussion of the threats you are facing, the steps being utilized to protect your organization and guides to building response plans to enhance overall system robustness Red Dragon Rising Workshop: Expert lead session covering the motivations for govern- ment and commercially sponsored cyber- attacks. Take away a clear step by step guide 3 SIMPlE STEPS TO REGISTER do this before August 19th to save $400 for you to implement in your organization maximizing your resilience Email nsheel@FCBusinessIntelligence.com with BOOKME in the subject line Call me now on +44 207 375 7537 Visit www.cybersummits.com/EU to find out more Or register on line at: https://secure.eyeforenergy.com/cyber/register.shtml register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
  5. 5. November 8th - 9th, Movenpick, Amsterdam, Netherlands Session 4: People and Policy Session 5: Operational and Information Session 6: Securing ProcessNational Cyber Security Strategy: Success Technology Control Systemsthrough cooperation Security Challenges for Information Technology The connection of SCADA and Corporate• Discuss methods to secure the ICT infrastructure controlling Energy Systems networks critical to ensure the strength of the national and • Realize the challenges to uniting the two different • Hear real world procedures for how SCADA and European society and economy worlds to determine how to bridge the gap business networks can co-exist ensuring SCADA • Hear plans for necessary cooperation between improving education and communication systems are compliant with business network existing parties (public & private) in the digital • Uncover the requirements for smart security security requirements guaranteeing the security society at an international level across the energy chain from smart appliances, of your system• Discover methods to build security through grid and market operators building action plans • Learn clear strategies to manage SCADA system Linking and reinforcing initiatives and that drive results inventory in and outside the industrial IT network encouraging individual responsibility ensuring • Learn why someone may consider disrupting the allowing you to confident in the strength of your you have the response capacity to withstand ICT energy chain and your operations guaranteeing system disruptions and cyber attacks the protection of your system • Discover proven strategies to secure the • Learn how establishing the Cyber Security Board • Hear plans for pathway to avoid security connections between process control and office and National Cyber Security Centre will use becoming a show stopper for new energy IT networks that will produce results to self-regulation, legislation and if necessary systems ensuring you stay productive and • Understand the types of firewalls available for regulations increase the resilience of Critical profitable segregating the SCADA and corporate networks Infrastructure maximizing the productivity of your systems Eric Luiijf, C(I)IP Consultant, TNO / CPNI.NLRob Duiven, Programme Director, National Cyber Gitte Bergknut, MU Nordic Information SecuritySecurity Strategy, Case Study: Alliander’s work in Uniting Process Manager, E.ON Sverige ABMinistry of Security and Justice and IT Security • Learn how to unite process control and ICT Case Study: Elia’s effort to integrate cyber PYCase Study: CPNI and Dutch Government Policy security in the migration from SDH to IP/MPLS security in advance of implementing smart grid and Training Initiatives infrastructure saving time frustration and money network• Discover how public – private partnerships can • Hear proven strategies to secure the • Uncover tested strategies to overcome the CO be used to make your critical infrastructure more intersections of transmission, distribution and technical and organizational challenges of the resilient generation which you can put to use immediately migration from SDH to IP/MPLS allowing you to • Learn tested techniques to educate, raise • Discover how to successfully apply the expertise stay competitive awareness and manage the latest technologies within IT to the operations problem turning T • Discuss the need for a the implementation of and challenges from the Cybercrime Information wasted hours to productive ones a layered security solution to guarantee the F Exchange increasing your operational robustness • Realize the need for co-ordination and efficiency of your operations• Discover the process control and smart grid road collaboration across Europe to help you stay • Listen to the evolving business needs required A map outlining a step by step guide to guarantee competitive to handle the migration to a securely connected security Johan Rambi, Privacy and Security Officer, system giving you the edge R• Gain the latest insight into the planned Alliander • Hear real world methods to allow IT practices Netherlands and European cyber technology D and operational engineering to harmonize helping and training facility and learn how this fits into Building Security in Design drive your productivity the Dutch NCSS and EU-US initiatives on cyber- • Learn how to plan long term security into the security letting you gain the edge in a tough Kris Hallaert, IT Security Officer, Elia purchasing and deployment process to saving industry you time and money Viking Panel Session: Vital Infrastructure,Auke Huistra, Project Manager Cybercrime • Discover methods to factor in the difference in NetworKs, INformation and Control SystemInformation Exchange, CPNI.NL life span and the realistic costs of upgrades to ManaGementRob Duiven, Programme Director, National Cyber legacy systems ensuring you stay profitable • Expert lead guide to the vulnerabilities of SCADA Security Strategy, • Hear real world strategies to build high systems and the cost of cyber-attacks on society Ministry of Security and Justice security low latency solutions maximizing your resulting from different architecture solutions productivity saving you time and moneyPeople and Process • Develop proven methods to maintain security • Hear the tried and tested strategies and • Realize that technology is necessary for security through patching, anti-virus and firewalls technologies used to mitigate and protect against but people and process are of equal or greater guaranteeing the security of your system weaknesses importance to guarantee complete security • Discover the existing and innovative • Understand that addressing people, process and communication solutions you can utilize to technology together will give a greater chance of secure you power system maintaining and protecting the integrity of your IP GROUP DISCOUNTS • Learn how employing simulations, modeling and networks More heads are better than one! Maximise testing to ensure the solutions you implement on • Learn how to guarantee personnel (and families) your legacy system drive reliability and security are fully educated, professional and competent the benefits to your business, and ensure valuable lessons make it back to the office, Gunnar Bjoerkman, Project Co-ordinator, Viking through utilizing governance and policy to build by sending a team to this event. awareness • Hear strategies to train security and network Qualify for a group discount? personnel to keep a vigilant eye on the traffic Contact nsheel@FCBusinessIntelligence. patterns to discern the precursor anomalies to com or call on +44 (0) 207 375 7537 new and different levels of attack ensuring you are prepared Register before August 19th to save $400John Basset, Assosciate, RUSI You can do this in 3 easy steps: Reply to this email with BOOKME in the subject line Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459 7537 register today - visit www.cybersummits.com/enterprise or phone +44207375
  6. 6. look at who you could be networking with in 2011The Enterprise Cyber Security & Information Assurance Summit provides outstanding networking opportunities for anyone involved with eGRC strategies The types of Organization this conference isto secure Critical Infrastructure. This is the premier cyber security meeting – aimed at attracting:attracting 150+ security & industry stakeholders. If security or compliance are part of you job role – you simply can’t afford to miss out!We will be providing: Government Agencies and Trade Associations` Dedicated networking time across the conference Department of Defence DHS CERT` Fully interactive panel sessions for you to identify yourself to the entire GICSR ISACA ISA delegate audience as a topic expert NICE NSA FBI NIST` Dedicated workshops, discussion groups, coffee breaks, lunches and evening drinks for you to target key clientsYou could have more face to face conversations at this conference than in INDUSTRY END USERSa year. Leading industry end users will be attending this conference to meet solution providers offering new technologies and strategies to reduce the cost ATT Paypal Northrop Grummanand time of ensuring security and compliance. Sign up today and fill your order Verizon Bank of America Boeingbook! T Systems Well Fargo Lockheed Martin BT Global PGE SAIC VISA SCE Take a look at the job titles this Ebay Sempra conference will attract: JP Morgan Chase Raytheon PYManaging Directors Senior/Chief Security Officers Specialist Solution ProvidersPresidents Compliance SpecialistChief Executives Cyber Security Architect CO RSA SAP McAfeeChief Security Officer (CSO) Security Lead. Symantec Microsoft TycoChief Information Security Officer Senior Security Consultant HP CISCO(CISO) Director, Network Security PracticeChief Information Officer (CIO) Security Lead / Co-ordinator TChief Technology officer (CTO) Director of Communications and Break Down of Audience at Previous FC Cyber Summits FSenior security leads/Engineers Information System SecurityCyber Security Managers Chief Technologist AReliability Managers Senior Security AnalystDirector of Compliance Director / VP / Manager of Risk RTechnical Directors Director / VP / Manager AuditOperational Security Director / VP / Manager Compliance DIT Security Director / VP / Manager Information Standards Managers SecuritySenior Information Protection Analyst Risk & compliance managerEnterprise information Corporate informationSecurity Principle Key Sponsorship and Exhibition Benefits Make a list of your most Work out your budget important aims Speak with your marketing team • This is the only Enterprise Cyber Security & Information • Exhibition booth and decide your annual confer- Assurance Summit with industry support covering the whole of North America – meet over a 150 key industry colleagues in • Brand visibility ence investment – make sure 2days of intense business development. you assign the right budget to • Private meetings the right show. No matter what • This is the exhibition that project managers and key decision • Breakfast briefings your budget is we will work makers will attend to source the latest services and technologies. • Speaking slots with you to build a package Don’t get left behind by your competitors! that achieves your aims and • Conference material branding • Build your own cyber security brand through high level exposure exceeds expectations. on all our conference marketing, • Sponsor a session on site and in person to fill your sales book for 2012 and beyond Call me at EyeforEnergy to discuss your package now! Coffee 1 • Unlike many other industry Exhibition space regularly sells out weeks in advance. 2 trade shows, exhibitions and Conference Room 5 Don’t miss out – secure your place today! conferences our packages are 6 3 not “one size fits all”. Tell us 4 CAll NOW 7 what you want to get out of the Coffee Ieuan Phillips event, what your budget is and 8 we will build it for you …simple! iphillips@fcbusinessintelligence.com +44 207 375 4304 register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
  7. 7. Researched & Organized by: I have been impressed with the level of understanding and research undertaken by the organisers, the quality of speakers will “ surely make this an event no one will want to miss David Spinks, CSIRS ”ENTERPRISE CYBER SECURITY & INFORMATIONASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA save $4004 Reasons why your company needs you here... register before1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they 17th February are putting in place and what solutions are leading the way in cyber security2. Gain invaluable knowledge and insight into cost and time effective compliance, security and Date & Venue strategies to ensure the successful integration of new technology November 17th - 18th, 2012 Hyatt Place, San Jose, CA, USA3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas, strategies and contacts that ensure your business leads the way when it comes to cyber security and Hotel Discount smart grid deployment FC Business Intelligence has negotiated a discounted rate for all conference attendees.4. Save your department time and money by attending this one stop shop for all things regarding cyber SImily quote the name of the conference security; give your company the chance to make 2012 the most profitable year ever! when booking your accommodationREGISTER NOW IN 3 EASY STEPS PY 1. Select Your Registration Package Pass Features PLATINUM PASS GOLD PASS POST CONFERENCE MATERIALS CO ` Full access to conference, workshops and exhibition   T ` Full access to all lunches, breaks   F ` Full access to all networking events   R A ` Full Post Conference Materials including audio recordings, PDF presentation files and digital attendee list   D Super Early Bird Price - Before 17th Februrary $1795 $1595 Early Bird Price - Before 16th March $1995 $1795 $495 Full price $2195 $1995 DIScOunT cODE: 2. Enter Attendee detailsMr/Mrs/Ms/Dr: First name: Last name: ONLINE100Company: Position/Title: Enter the discount code when you register to save $100Telephone: Fax: Email:Address: Zipcode: Country: 3. Payment Options I enclose a check/draft for: Credit card number: (Payable to First Conferences Ltd) Expiry date: Security number: Please invoice my company: Name on card: Purchase Order Number: Please charge my credit card: Amex Visa Mastercard Signature:Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before Feb17th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to MORE CALL CALL (0) 207 375 7537charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged FAX: +44 (0) 207 375 7576to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are WAYS TOexclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and EMAIL: nsheel@eyeforenergy.comthe relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct REGISTERat time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. ONLINE: www.cybersummits.com/enterpriseDesign by www.thecreativetree.co.uk
  8. 8. With the increasing number of regulations and threats As we navigate new and uncertain challenges in the digital “ Researched & Organized by: facing information assets the time to invest in this age, we must also address the growing threat cyberattacks area has never been more critical. Especially when present to our transportation networks, electricity grid, financial considering the cost of the breakdown of one critical systems and other assets and infrastructure. infrastructure could top $230bn President Obama, 2011 ”ENTERPRISE CYBER SECURITY & saveINFORMATION ASSURANCE SUMMIT $400 register before17-18 April, 2012, San Jose, California, USA 17th FebruaryDEVELOP STRATEGIES TO UTILIZE PEOPLE,PROCESS & TECHNOLOGY TO OPTIMIZE YOURGOVERNANCE, RISK & COMPLIANCE MANAGEMENT PY• Discover the emerging national and federal initiatives driving Host Organization: your industry forward and giving you the competitive edge CO• establish a clear governance policy to enhance awareness through education generating confidence in the security of your T system F Expert Speakers• learn to mitigate the risk through certification & prioritization to End User Perspective A build resilience, improve response times and enhance system robustness D R• Develop a clear process to efficiently manage the changing regulatory landscape ensuring effective and efficient compliance• builD a clear plan to navigate the rapidly evolving threat landscape and guarantee the protection of your critical information and operational assets • realize how to certify the secure deployment of the latest technologies to maximize the protection of your critical assets and guarantee ROI Government & Trade: ExClUSIvE Case Studies from: ` SEMPRA ` BT Global ` JP Morgan Chase ` ENBRIDGE ` Wells Fargo ` UTC ` Raytheon ` Verizon ` FBI Industry Insight From: CALL CALL (0) 207 375 7537 4 EASY WAYS FAX: +44 (0) 207 375 7576 TO REGISTER EMAIL: nsheel@eyeforenergy.com ONLINE: www.cybersummits.com/enterprise And many more…Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information sharing and Business Development at the Premier Industry Gathering: www.cybersummits.com/enterprise