This document summarizes a two-day conference on European Smart Grid Cyber and SCADA Security held in London in March 2013. The conference featured keynote speakers from organizations such as ENISA, Iberdrola, E.ON, and Enel discussing topics such as enhancing smart grid security, deploying cybersecurity on power generation control systems, risk management for critical infrastructure, and challenges in power network security. Breakout sessions covered issues like FP7 early warning detection projects, ICS cybersecurity in power generation, securing devices for home and control networks, and vulnerabilities in critical infrastructure and embedded devices. The document provides an agenda with session details, speaker bios, and registration information.
Returning to London for its sixth year next march this event is attracting significant interest. Join us at SMi Group's European Smart Grid Cyber Security 2016 conference & exhibition
Security of the Electric Grid: It's more than just NERC CIPEnergySec
The availability of spectrum for utility communications networks, heightened consumer protection and privacy concerns, cloud computing and its application to the smart grid, supply chain security – these are just some of the policy and regulatory issues that could have a significant impact on utilities as they integrate millions of data points for more efficient control of the modernized grid. Attention has been focused on compliance with NERC-CIP mandates and passing audits, but what is their place in the broader security picture? Will other policy developments change the landscape of grid security?
The Presentation focusses on the development from current mobile networks into the future sensor-driven mobile networks. A special focus is given on security aspects, especially measurable security of systems. The presentation was given at the IDC Mobility Series 2012 in Budapest.
The presentation provides an overview on areas for Master Thesis work at UNIK in the areas of Wireless Networks and Information Security (WNIS). Students from UiO, NTNU or any of our collaboration partners are invited to take contact to define a study in one of these areas. Some of these areas include:
* Radio communication, including
- Communication in the high North, advancing propagation models
- models and protocols for industrial sensor networks
- heterogeneous and adaptive networks
- Internet access and provision for emerging economies
* The 3rd wave of Internet: the Internet of People, Things and Services
- providing context-awareness for mobile and business services
- Socialtainment, integrating your social network into future (electrical) mobility
* Information Security
- establish measurable security for the sensor networks
- adaptable security for sensor-driven applications in traffic, eHealth
* Mobile Applications
- Monitoring Air Quality through mobile devices
- using mobile phones for health monitoring (and fun)
* Light-weight solutions for autonomous operations
- distributed logic for decentralised decision making
- light-weight software for autonomous operations
- semantic systems for advanced information handling in shipping
- in Norwegian
Disse foilene inneholder områder for masteroppgaver som kan gjennomføres ved UNIK, forskningsinstitutter ved Kjeller eller samarbeidene industri. Vi tilbyr masteroppgaver i området adaptive nett og informasjonssikkerhet.
Returning to London for its sixth year next march this event is attracting significant interest. Join us at SMi Group's European Smart Grid Cyber Security 2016 conference & exhibition
Security of the Electric Grid: It's more than just NERC CIPEnergySec
The availability of spectrum for utility communications networks, heightened consumer protection and privacy concerns, cloud computing and its application to the smart grid, supply chain security – these are just some of the policy and regulatory issues that could have a significant impact on utilities as they integrate millions of data points for more efficient control of the modernized grid. Attention has been focused on compliance with NERC-CIP mandates and passing audits, but what is their place in the broader security picture? Will other policy developments change the landscape of grid security?
The Presentation focusses on the development from current mobile networks into the future sensor-driven mobile networks. A special focus is given on security aspects, especially measurable security of systems. The presentation was given at the IDC Mobility Series 2012 in Budapest.
The presentation provides an overview on areas for Master Thesis work at UNIK in the areas of Wireless Networks and Information Security (WNIS). Students from UiO, NTNU or any of our collaboration partners are invited to take contact to define a study in one of these areas. Some of these areas include:
* Radio communication, including
- Communication in the high North, advancing propagation models
- models and protocols for industrial sensor networks
- heterogeneous and adaptive networks
- Internet access and provision for emerging economies
* The 3rd wave of Internet: the Internet of People, Things and Services
- providing context-awareness for mobile and business services
- Socialtainment, integrating your social network into future (electrical) mobility
* Information Security
- establish measurable security for the sensor networks
- adaptable security for sensor-driven applications in traffic, eHealth
* Mobile Applications
- Monitoring Air Quality through mobile devices
- using mobile phones for health monitoring (and fun)
* Light-weight solutions for autonomous operations
- distributed logic for decentralised decision making
- light-weight software for autonomous operations
- semantic systems for advanced information handling in shipping
- in Norwegian
Disse foilene inneholder områder for masteroppgaver som kan gjennomføres ved UNIK, forskningsinstitutter ved Kjeller eller samarbeidene industri. Vi tilbyr masteroppgaver i området adaptive nett og informasjonssikkerhet.
The following is a smart grid security presentation I developed for my fellow task force members on NERC's 2010 Smart Grid Task Force. The charts included are very helpful in understanding at a glance, where the risks and threats to smart grid reliability and security lie. In the end though it is the 'human factor' that is most important to keep in mind in risk mitigation.
Securing Mobile - A Business Centric Approach
For a higher quality version, visit: http://decklaration.com/verizon
Presentation given by Omar Khawaja (of Verizion) at Verizon the 2013 Mobile World Congress in Barcelona.
OMA Seminar/Webinar, October 27, 2016, "How Developers Can Get the Most Out of IoT Standards and Tools" - Presentation #4 from Hatem Oueslati, CEO and Co-Founder, IOTEROP
"Security, Interoperability and Remote Device Management in IoT: How LWM2M can meet the Challenge of Tomorrow’s Industries and Smart Cities"
The following is a smart grid security presentation I developed for my fellow task force members on NERC's 2010 Smart Grid Task Force. The charts included are very helpful in understanding at a glance, where the risks and threats to smart grid reliability and security lie. In the end though it is the 'human factor' that is most important to keep in mind in risk mitigation.
Securing Mobile - A Business Centric Approach
For a higher quality version, visit: http://decklaration.com/verizon
Presentation given by Omar Khawaja (of Verizion) at Verizon the 2013 Mobile World Congress in Barcelona.
OMA Seminar/Webinar, October 27, 2016, "How Developers Can Get the Most Out of IoT Standards and Tools" - Presentation #4 from Hatem Oueslati, CEO and Co-Founder, IOTEROP
"Security, Interoperability and Remote Device Management in IoT: How LWM2M can meet the Challenge of Tomorrow’s Industries and Smart Cities"
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
Internet of Things Innovations & Megatrends Update 12/14/16Mark Goldstein
Mark Goldstein, President, International Research Center (http://www.researchedge.com/) presented an Internet of Things Innovations & Megatrends Update to the IEEE Computer Society Phoenix Chapter (http://ewh.ieee.org/r6/phoenix/compsociety/) on Wednesday, December 14, 2016 bringing up to date his presentation to the Chapter a year earlier. His long-form presentation explores the next Internet wave, the Internet of Things (IoT), expected to connect tens of billions of new sensors and devices in the coming years. Waves of change will roll through home, business, government, industrial, medical, transportation, and other complex ecosystems. This presentation examines how IoT will be implemented and monetized creating new business models from pervasive sensor deployments and data gathering, accompanied by new privacy and security risks. And it explores IoT’s roadblocks and operational challenges, emerging standards and protocols, gateway and wireless integration, and big data strategies and opportunities.
Internet of Things (IoT) is an emerging platform for human interaction. As such it needs enough security and privacy guarantees to make it an attractive platform for people to come onboard.
Presentation for a group of employees of Centric, a large software consultancy company. It provides an illustration of how IoT is currently being developed in farming, agri-logistics and food consumption. It also addresses the technical and organizational challenges that have to be overcome to make IoT application in agri-food a success. Open platforms and software development and above all appropriate business models are key issues that have to be addressed. The new EU-project "Internet of Food and Farm 2020" will address these issues by fostering a collaborative IoT ecosystem to upscale the use of IoT in agri-food.
KG2 develops campaigns to target growers who require insurance cover at seasonally receptive times. The direct marketing techniques assist clients to accurately target the right customer.
IOT based smart security and monitoring devices for agriculture sneha daise paulson
Agriculture sector being the backbone of the Indian economy deserves security. Security not in terms of resources only but also agricultural products needs security and protection at very initial stage, like protection from attacks of rodents or insects, in fields or grain stores. Such challenges should also be taken into consideration. Security systems which are being used now a days are not smart enough to provide real time notification after sensing the problem. The integration of traditional methodology with latest technology as Internet of Things can lead to agricultural modernization. Keeping this scenario in mind an ‘Internet of Things’ based device have been designed, tested and analyzed which is capable of analyzing the sensed information and then transmitting it to the user. This device can be controlled and monitored from remote location and it can be implemented in agricultural fields, grain stores and cold stores for security purpose. This paper is oriented to accentuate the methods to solve such problems like identification of rodents, threats to crops and delivering real time notification based on information analysis and processing without human intervention. In this device, mentioned sensors and electronic devices are integrated using Python scripts. Based on attempted test cases, we were able to achieve success in 84.8% test cases.
The Internet of Things. How it Works. Why it Matters.Laurie Lamberth
Slides from a webcast put on by the Gerson Lehrman Group in February, 2013 on the Internet of Things. Travel with me on a half-hour journey through the thought leaders in the space, into the types of devices and networks that support them -- with a big finish about how the Internet of Things can improve the environment, our health, our communities and our lives.
From turbine to toaster, the electrical grids are evolving. Increases in distributed generation, battery storage, advanced metering, and automation results in a growing dependency on computational and communication technology. With engineers and technicians historically focused only on the physical infrastructure, there is an increased need to bring that same focus and understanding to the grid’s supporting cyber infrastructure. By first examining the multitude of cyber threats, this talk explores the challenges, misconceptions, and barriers associated with protecting the modernized power grid.
-IoT Security is a Safety/Privacy Issue
-Consider the devices you bring into your home and to work
Video Links:
-Hue: https://www.youtube.com/watch?v=7TOsFqqJgj4
-Slow Cooker: https://www.walmart.com/ip/BLACK-DECKER-WiFi-Enabled-6-Quart-Slow-Cooker/128745799
-Smart Toilet: https://www.youtube.com/watch?v=HyZ7S4fE5v4
Yesterday Pierluigi Paganini, CISO Bit4Id and founder Security Affairs, presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the Internet of Things, a technology that is changing user’s perception of the technology.
European smart grid cyber and scada securityYulia Rotar
European Smart Grid Cyber and SCADA Security Conference by the SMi Group, London, UK, 10-11 March 2014.
Get in touch with us via mmalik@smi-online.co.uk
Don't Get Hacked! Cybersecurity Boot CampEnergySec
At the 2011 NARUC Winter Committee Meetings, Patrick Miller teamed up with seasoned security experts Miles Keogh from NARUC and Bill Hunteman from the Department of Energy to deliver an engaging Cybersecurity Boot Camp.
Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...MaRS Discovery District
To become smart grid leaders, Ontario needs to effect a transformation in a risk-averse environment. To do so, the province needs not only to advance its electricity infrastructure but also embrace a long-term and global vision.
This breakfast panel brings together diverse energy-sector stakeholders, including utilities, key industry players, government authorities, regulatory bodies and innovators.
Does an opportunity exist for Ontario utilities that implement intelligent operations to leverage that expertise into other markets? Can synergy between innovation and the electricity sector be created to support these practices? How much are we open to change?
http://www.marsdd.com/events/details/ontario-smart-grid-opportunities-electrical-utility-sector/
http://www.ibm.com/smarterplanet/us/en/smart_grid/article/cyber_security.html?cmp=agus_cxosp2gridsec-20100426&cm=c&csr=endsecurity&cr=slideshare&ct=usbrb401&cm_mmc=agus_cxosp2gridsec-20100426-usbrb401-_-c-_-endsecurity-_-slideshare
IBM End-to-End Smart Grid Security Involving IT Security and Enterprise Asset Management
Infrastructure Security by Sivamurthy HiremathClubHack
With the development of technology, the interdependence of various infrastructures has increased, which also enhanced their vulnerabilities. The National Information Infrastructure security concerns the nation’s stability and economic security. So far, the research in Internet security primarily focused on securing the information rather than securing the infrastructure itself.
The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber attacks we need immediate solutions for securing the Internet infrastructure. Given the prevailing threat situation, there is a compelling need to develop Hardware redesign architectures, Algorithms, and Protocols to realize a dependable Internet infrastructure. In order to achieve this goal, the first and foremost step is to develop a comprehensive understanding of the security threats and existing solutions. These attempts to fulfil this important step by providing classification of Security attacks are classified into four main categories: DNS hacking, Routing table poisoning, Packet mistreatment, and Denial-of-Service attacks. We are generally discussing on the existing Infrastructure solutions for each of these categories, and also outline a methodology for developing secured Nation.
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
Internet of Things forecast, economics, applications, technology, research challenges, sensor networks security, attack models, countermeasures, network security visualization
This kickoff intrtoduces the concept of the Agile Fractal grid to more than 100 companies that particpated in the full day workshop lead by Chuck Speicher and John Reynolds and Craig Miller the Chief scientist of the NRECA
As you move your IT Infrastructure into the cloud, how secure can you expect your applications to be? Join Alert Logic and Internap on this webcast for an enlightening discussion on the state of cloud security and how it impacts security management decisions, especially in the context of deploying infrastructure to hosted and cloud environments.
1. SMi proudly present their 3rd Annual Conference
European
Smart Grid Cyber
and SCADA Security
Behavior Detection,
,
Applications and Devices
11th - 12th March 2013
Copthorne Tara Hotel, London,
United Kingdom
KEY SPEAKERS INCLUDE:
• European Network and Information Security • Swissgrid, Senior Advisor Operations, TSC SC
Agency, Head of Resilience and CIIP Unit, Chairman, Rudolf Baumann
Dr Vangelis Ouzounis
. • CRISALIS, FP7 Project Co-ordinator,
• European SCADA and Control Systems Corrado Leita
Information Exchange, Chair
• DNV KEMA Energy & Sustainability, Business
European Reference Network of Critical
Director Management and Operations
Infrastructure Protection, Coordinator
Annemarie Zielstra Consulting, Maurice Adriaensen
• Iberdrola, IT Manager SIMOD, • FOX IT Sales Director Europe CNI,
,
Miguel Escamilla Chavero Henk Pieper
• E.ON, Information Security Manager, • Infrastructure Security Labs, President,
Gitte Bergknut John McNabb
• Enel Distribuzione SpA, IT and Security • Cylance, Senior Researcher, Justin Clarke
Systems, Daniela Pestonesi
• Zigbee Alliance, Principal Consultant,
• Con Edison of New York, Smart Grid Project
Robert Cragie
Manager, Patricia Robison
• Vattenfall, Senior Research and Development • Security Matters, COO, Damiano Bolzoni
Engineer, Daniel Zajd • CNA Insurance, European Underwriting
• Alliander Alliance Manager Privacy &
, Director, Technology & Cyber Risks,
Security, Johan Rambi Jacob Ingerslev
POST CONFERENCE WORKSHOP 13th MARCH 2013 8.30AM-1.00PM
Approaches to Network Monitoring and Situational
Awareness in Critical Infrastructure
Presented by Dr Damiano Bolzoni, University of Twente
SPONSORED BY
www.smartgridcybersecurity.co.uk
Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
Book by the xxth December and save £300 off the conference price
2. DAY ONE 11th March 2013 www.smartgridcybersecurity.co.uk
8.30 REGISTRATION & COFFEE DETECTION, AWARENESS, CHALLENGES
9.00 CHAIRMAN'S OPENING REMARKS 1.50 FP7 EARL WARNING DETECTION PRESENTED BY
Y
Mark Ossel, ESNA Board Member and VP Echelon
,
CRISALIS
Energy and Utility
FP7 project funded by DG Enterprise called CRISALIS,
EUROPEAN RECOMMENDATIONS Critical Infrastructure Security AnaLysIS
• Project focuses: Creation of practical, short-term
9.10 ENHANCING THE SECURITY OF SMART GRIDS solutions for the protection of critical infrastructure
New for 2013
— ENISA'S CONTRIBUTION environment from targeted attacks- primarily power
• Recommendations on Smart Grids Security
grid
• Minimum Security Measures
• Consortium members- Enel, Symantec, Security
• Risks Assessment and Management of
Smart Grids Matters and Alliander
• Certification of Smart Grids products • First deliverables of the project: Requirement study, in
• EU US co-operation on Smart Grids which we will study in depth the characteristics of the
Evangelos Ouzounis, Senior Expert, Network Security power generation and smart metering environments
Policy, ENISA - European Network and Information
• Identify risks and possible threat scenarios
Security Agency
• Feedback on our activity
9.50 DEPLOYING WORLDWIDE CYBERSECURITY Corrado Leita, Project Coordinator, CRISALIS
ON THERMAL POWER GENERATION
New for 2013
CONTROL SYSTEMS 2.30 ICS CYBER SECURITY IN POWER GENERATION
• Iberdrola overview AND FUTURE SCENARIO
• Iberdrola & Thermal Stations Strategy
• Electric grid and power generation scenario in Italy
New for 2013
• Cyber Security’s Goal and Vision
• Power Generation: Architecture and Frameworks
• AURA Project (Cybersecurity projects
examples) • Risk Analysis: Threats and impacts
• Conclusions • CI owner requirements for ICS protection
Miguel Chavero, IT Manager SIMOD, Iberdrola • Enel Cyber Security ICS Laboratory
• CRISALIS project participation
10.30 MORNING COFFEE Daniela Pestonesi, Project Leader Research Technical
Area, Automation & Diagnostics, Enel Engineering and
RISK MANAGEMENT ASSESSMENT
Research Spa
11.00 RISK MANAGEMENT FOR CRITICAL
INFRASTRUCTURE 3.10 AFTERNOON TEA
• Making security a priority
• Lack of standards and the effect on investment 3.40 CHALLENGES IN POWER-NETWORK SECURITY
• Cyber Security and Electricity pricing-
AND IT
cause and effect
• Updates and improvements in power-network and IT
• Fostering a culture of awareness
• Measuring resiliency • Common processes, systems and collaboration
• Incident response and countermeasures procedures
• Technical, cultural, and political cooperation for • Integration of system planning, operations and IT
success • Future developments and sharing knowledge
Maurice Adriaensen, Business Regional Director
Rudolf Baumann, Chairman of the Transmission
Management and Operations Consulting,
Security Cooperation, Senior Advisor Operations,
DNV KEMA Energy & Sustainability
swissgrid AG
11.40 LESSONS LEARNED FROM THE NEW SMART
METER/GRID RISK ASSESSMENT 4.20 ENHANCING NETWORK MONITORING AND
METHODOLOGY IN THE NETHERLANDS SITUATIONAL AWARENESS IN CRITICAL
WORKSHOP ON THIS
TOPIC MARCH 13TH
• Introduction
INFRASTRUCTURE
• Explanation IS1 Risk Assessment methodology on
• Current approaches to network monitoring and
Smart Meter/Grid in NL
• Practice on case “sector Privacy & Security AMI situational awareness
requirements v2.0” • Strengths and shortcomings of current approaches
• Lessons learned • Non-signature based approaches for improved
• Status European standard on Smart Grid Cyber monitoring and situational awareness
Security
• Discussion of 2 use cases
• Next steps
Damiano Bolzoni, COO, Security Matters
Johan Rambi, Alliance Manager Privacy & Security,
Alliander
5.00 CHAIRMAN'S CLOSING REMARKS AND
12.20 NETWORKING LUNCH CLOSE OF DAY ONE
Register online at: www.smartgridcybersecurity.co.uk • Alternatively fax your registration
3. DAY TWO 12th of March 2013 www.smartgridcybersecurity.co.uk
8.30 REGISTRATION & COFFEE 12.20 NETWORKING LUNCH
9.00 CHAIRMAN'S OPENING REMARKS 1.50 SECURING DEVICES FOR HOME AND CONTROL
Annemarie Zielstra, Director CPNINL, Centre for the NETWORKS
Protection of National Infrastructure (CPNI) • Home and Control Networks
• What is a Home network (HAN)?
9.10 HOW THE BOARD SHOULD TAKE CARE OF CYBER • What is a Control Network?
RESILIENCE • Topologies
• Cyber incidents on the increase, now a risk for any
• Devices
business
- Types of devices on home and control networks
• This leads to serious concerns on business process
- Distinguishing characteristics
continuity, privacy of consumers, identity theft or the
protection of intellectual property - Security challenges
• Cyber resilience needs to be part of strategic (both - Information Security Pillars
risk and reputation) management and leadership is - Cryptography
required - Public key cryptography
• Creating concrete, visible boardroom recognition of - Symmetric key cryptography
cyber resilience, as an enabler for cyber benefits - Hybrid cryptography
• Translating boardroom recognition into risk - Protocol stack security
management, communications, legal and operations - Building blocks
Annemarie Zielstra, Chair of the European SCADA and - Frame security
Control Systems Information Exchange (EuroSCSIE) - Authentication and key establishment
Coordinator of European Reference Network of - Credentials
Critical Infrastructure Protection (ERNCIP) Thematic - ZigBee SEP 1.0 stack security description
Group on ICS and Smart Grids - ZigBee SEP 2.0 stack security description
Robert Cragie, Chair, Security Task Group,
9.50 SCADA AND ICS SECURITY EXPERIENCES
Zigbee Alliance
• Experiences of how to run a Cyber Security program
• Business Awareness and Societal Responsibility
New for 2013
2.30 SECURITY ISSUES OF CONTROL SYSTEMS &
- Compliance & Review
WIRELESS METERS AT DRINKING WATER UTILITIES
- Training
New for 2013
• Use of technical mitigations such as IDS in • How do they differ from Smart energy meters?
- Cogeneration • Communications infrastructure vulnerabilities of fixed
- Hydro and wireless
- Heating • Lack of encryption
• Results and lessons learned • Theft
Gitte Bergknut, MU Nordic Information Security • Data collection privacy
Manager, EON Sverige AB • Billing
John McNabb, Principal, Infrastructure Security Labs
SYSTEMS, DEVICES, APPLICATIONS
3.10 AFTERNOON TEA
10.30 MORNING COFFEE
EXPOSING VULNERABILITIES AND CYBER RISK
11.00 SMART GRID INTEGRATES LEGACY AND NEW ICS AND INSURANCE
(SCADA, DCS, PLC) SYSTEMS, DEVICES, AND
APPLICATIONS
3.40 VULNERABILITIES IN CRITICAL
• Smart Grid Cyber Security – Integrating legacy and
INFRASTRUCTURE AND EMBEDDED DEVICES
new ICS enhances the grid and simultaneously
• Key roles of embedded devices in our every day lives
increases complexity and vulnerability
• Vulnerabilities in embedded system
• Cyber Security – needs to address ICS at all levels:
field devices, the device systems, the applications • Findings and impact behind several recent SCADA
New for 2013
supporting the devices and systems, the vulnerabilities that had worldwide impact
communications/network interfacing to the devices • Moving towards a resolution of existing vulnerabilities
and systems, etc. and avoidance of future vulnerabilities -Education of
• ICS Cyber Security Controls: Technical, Physical, manufacturers, end users, academia, government,
Administrative Risk Management – Smart Grid More and the general public
challenging with increased complexity and extended • The process that occurs when end users or the
systems and communications general public identify vulnerabilities in critical
• Leverage existing ICS standards and frameworks: infrastructure
IEC, NIST DOE, ISA, ISO, NERC
, - What to expect
• Smart Grid Architecture and Frameworks with ICS - How to reduce your risk
• Threats and Vulnerabilities - How to leverage existing agencies
• Examples of ICS systems utilized for Smart Grid : - Processes to minimize your required effort
transformers, switches, inverters, DG Justin Clarke, Security Researcher, Cylance
Patricia Robison, Smart Grid Project Manager, Con
Edison of New York
4.20 CYBER RISKS & INSURANCE
• Cyber Crime as an Industry
11.40 CREATING AN APP CONNECTED TO A BACKEND
New for
SYSTEM • Legal environment
2013
• Low awareness within the organisation about the • What is Cyber Insurance
effects of a connected app • Industry specific exposures
• The least secure point in a network will be the target Jacob Ingerslev, European Underwriting Director,
• An app will be an extension of the company CNA Europe
environment
• Data stored on the mobile device 5.00 CHAIRMAN'S CLOSING REMARKS AND
Daniel Zajd, Senior R and D Engineer, Vattenfall A B CLOSE OF DAY TWO
to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
4. POST CONFERENCE WORKSHOP Wednesday 13th March 2013, Copthorne Tara Hotel, London, UK
Approaches to Network Monitoring and Situational
Awareness in Critical Infrastructure
8.30am – 1.00pm In Association with University Twente
Overview of workshop Programme
This workshop will present solutions
8:30 Registration and Coffee
currently available for monitoring critical
networks and situational awareness. We 9.00 Current solutions for network monitoring and situational
will analyse what are the major strengths awareness of critical networks
and weaknesses of each approach, when - Signature-based
it can be used and what is the output - Rule-based
- Behavior-based
users can expect.
- Visualization
We will wrap up the session with 10.30 Advantages and disadvantages of each approach
demonstrations of the approaches - Where and when use what
presented using real-life examples. - Which threats can be detected?
- Technical skills required to operate
Why you should attend: 11.30 Coffee Break
• Understand the importance of
12.00 Demonstrations
situational awareness and behavioural
monitoring 1.00 Question and Answer session
• Gain insight in to the benefits and
disadvantages of signature based, rule
based, behavioural and visualisation About the workshop host
based solutions Dr Damian° Bolzoni (1981) received his PhD in 2009 from the
• Learn what threats can be detected University of Twente, where he performed research on anomaly-
based intrusion detection. Since 2008 he has been involved in
and what skills are required to operate
securing computer networks of critical infrastructure. Before joining
• Interact with industry and engage with the University of Twente, he has been working for the Italian branch
our workshop leader who is actively of KPMG, within the Information Risk Management division. Since
involved in two security projects with 2009 he holds the position of Chief Operations Officer within
major energy companies at present. SecurityMatters BV .
New for 2013. SMi's Event Communities
SMi Group is a global events business specialising in business to business conferences, workshops
and masterclasses. We successfully create and run 250 events every year across 6 sectors
including Defence and Security, Energy and Utilities, Finance and Pharmaceutical. We believe in
bringing together the most knowledgeable experts from across the globe in each sector to learn,
engage, share and network be it in London, Paris or Singapore.
To further enhance the SMi experience, we have launched our very own SMi Event Communities.
These will be exclusive, private and secure communities in which our clients will learn, share,
engage and network.
The SMi Event Communities will build and expand your experience beyond the conference,
workshop or Masterclass you attend. Not just another "social network”, SMi’s Event Communities
have been specifically designed around the needs of our delegates, speakers and sponsors,
allowing all of our clients to foster longer term relationships with all of the other attendees beyond
the two day event for year round engagement.
To take part all you need to do is register for this event. SMi Group Communities
Learn Engage Share Network
5. SPONSORS
DNV KEMA Energy & Sustainability, with more than 2,300 experts in
over 30 countries around the world, is committed to driving the global
transition toward a safe, reliable, efficient, and clean energy future. With
a heritage of nearly 150 years, we specialize in providing world-class,
innovative solutions in the fields of business & technical consultancy,
testing, inspections & certification, risk management, and verification.
As an objective and impartial knowledge-based company, we advise and
support organizations along the energy value chain: producers, suppliers
& end-users of energy, equipment manufacturers, as well as government
bodies, corporations and non-governmental organizations. DNV KEMA
Energy & Sustainability is part of DNV a global provider of services for
,
managing risk with more than 10,000 employees in over 100 countries.
For more information on DNV KEMA Energy & Sustainability, visit
www.dnvkema.com
Fox-IT prevents, solves and mitigates the most serious cyber threats
with innovative solutions for government, defense, law enforcement,
critical infrastructure, banking, and commercial enterprise clients
worldwide. Our approach combines human intelligence and technology
into innovative solutions that ensure a more secure society. We develop
custom and packaged solutions that maintain the security of sensitive
government systems, protect industrial control networks, defend online
banking systems, and secure highly confidential data and networks.
www.fox-it.com
Supported by
For Sponsorship or Speaking
Opportunities please contact
Jamison Nesbitt
Business Development Director
P: +44 (0) 20 7827 6164
M: +44 (0) 7710 780 576
Email: jnesbitt@smi-online.co.uk
Don’t miss out on social
media networking!
Follow us on Twitter @UtilitiesSMi
and join us on Linkedin
http://uk.linkedin.com/in/smigroup
www.smartgridcybersecurity.co.uk
6. EUROPEAN SMART GRID CYBER AND SCADA SECURITY
Conference: 11th & 12th March 2013, Copthorne Tara Hotel, London Workshops: 13th March 2013
4 WAYS TO REGISTER
ONLINE at www.smartgridcybersecurity.co.uk
FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor
PHONE on +44 (0) 870 9090 711 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS
EARL BIRD □ Register by December 16th and receive £300
Y
DISCOUNT off the conference price
CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE
I would like to attend: (Please tick as appropriate) Fee Total
PUBLIC SECTOR, ACADEMICS & UTILITIES
□ Conference & Workshop £1398.00 + VAT £1677.60
□ Conference only £899.00 +VAT £1078.80
Unique Reference Number
□ Workshop A only £599.00 + VAT £718.80
Our Reference LV U-013
COMMERCIAL ORGANISATIONS
DELEGATE DETAILS □ Conference & Workshop
□ Conference only
£2198.00
£1599.00
+VAT
+VAT
£2747.50
£1998
Please complete fully and clearly in capital letters. Please photocopy for additional
□ Workshop only £599.00 +VAT £748.75
delegates.
Title: Forename:
PROMOTIONAL LITERATURE DISTRIBUTION
Surname: □ Distribution of your company’s promotional
literature to all conference attendees £999.00 + VAT £1198.80
Job Title:
Department/Division: The conference fee includes refreshments, lunch, conference papers and access
to the Document Portal containing all of the presentations.
Company/Organisation:
Email:
Address:
VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.
□ Please contact me to book my hotel
Town/City:
Alternatively call us on +44 (0) 870 9090 711,
Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
Direct Tel: Direct Fax:
Mobile: DOCUMENTATION (Shipped 10-14 days after the event)
Switchboard: I cannot attend but would like to purchase access to the following Document Portal/paper
copy documentation: Price Total
Signature: Date: □ Access to the conference documentation
I agree to be bound by SMi's Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80
ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00
(or only £300 if ordered with the Document Portal)
Title: Forename:
Surname: PAYMENT
Email: Payment must be made to SMi Group Ltd, and received before the event, by one of
the following methods quoting reference D-018 and the delegate’s name. Bookings
Address (if different from above):
made within 7 days of the event require payment on booking, methods of payment are
below. Please indicate method of payment:
Town/City: □ UK BACS Sort Code 300009, Account 00936418
□ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Post/Zip Code: Country: Swift (BIC): LOYDGB21013, Account 00936418
Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18
□ Cheque We can only accept Sterling cheques drawn on a UK bank.
□ Credit Card □ Visa □ MasterCard □ American Express
Terms and Conditions of Booking All credit card payments will be subject to standard credit card charges.
Payment: If payment is not made at the time of booking, then an invoice will be issued and
must be paid immediately and prior to the start of the event. If payment has not been received
Card No: □□□□ □□□□ □□□□ □□□□
then credit card details will be requested and payment taken before entry to the event.
Bookings within 7 days of event require payment on booking. Access to the Document Portal
will not be given until payment has been received.
Valid From □□/□□ Expiry Date □□/□□
Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates
CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card
may not ‘share’ a place at an event. Please make separate bookings for each delegate.
Cardholder’s Name:
Cancellation: If you wish to cancel your attendance at an event and you are unable to send
a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,
providing that cancellation is made in writing and received at least 28 days prior to the start Signature: Date:
of the event. Regretfully cancellation after this time cannot be accepted. We will however
provide the conferences documentation via the Document Portal to any delegate who has I agree to be bound by SMi's Terms and Conditions of Booking.
paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we
are not normally able to provide documentation in these circumstances. We cannot accept
Card Billing Address (If different from above):
cancellations of orders placed for Documentation or the Document Portal as these are
reproduced specifically to order If we have to cancel the event for any reason, then we will
.
make a full refund immediately but disclaim any further liability
, .
Alterations: It may become necessary for us to make alterations to the content, speakers,
timing, venue or date of the event compared to the advertised programme.
Data Protection: The SMi Group gathers personal data in accordance with the UK Data
Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to
VAT
tell you about other products and services. Unless you tick here □ we may also share your
data with third parties offering complementary products or services. If you have any queries VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on
or want to update any of the data that we hold then please contact our Database Manager Document Portal and Literature Distribution for all UK customers and for those EU
databasemanager@smi-online.co.uk or visit our website www .smi-online.co.uk/updates quoting
the URN as detailed above your address on the attached letter . customers not supplying a registration number for their own country here: ________________
If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk