SlideShare a Scribd company logo
1 of 6
Download to read offline
2015
Marriott West loop Hotel, Houston, texas, Usa
Securing against the present and future threats towards the industry
oil and gas cyber
security North america
13th & 14th
May
exPert SPeaker PaneL IncLudeS:
• James Morrison, computer scientist, Houston cyber task
Force, Federal Bureau of Investigation
• catherine cavazos, Data security Manager, nov
• Michael Lewis, Policy and Framework advisor, information
risk strategy and Management, chevron Information
technology company
• Jason Mceachin, Director, sales engineering, Lookingglass
cyber Solutions
• donna dodson, Deputy cyber security advisor, national
Institute of Standards and technology
• clifford neuman, Director, centre for computer systems
security, information sciences institute, university of
Southern california
• claudia escobar, state-wide security Programme
Manager, office of the chief information security officer,
Department of information resources, State of texas
• randy hamilton, Manager, it security and compliance,
newfield exploration company
• Mike Firstenberg, Director of industrial security, Waterfall
Security
• amy taylor, Director, Houston branch, kane russell
coleman & Logan Pc
• Glenn a Fink, cyber security researcher, secure cyber
systems group, Pacific northwest national Laboratory
BeneFItS oF attendInG:
• Understand the current key market regulations to set a
new standard across the industry
• Discover how you need to operate to create a safer
environment
• Discuss how the industry needs to develop in North
america
• evaluate live demos on how to block oncoming attacks
and minimise the clean up
• Hear about the latest technology and software available
• listen from leading case studies and understand what
lessons have be learned
www.oilandgas-cybersecurity.com
register online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
PLuS an InteractIve haLF-day Pre-conFerence WorkShoP • tueSday 12th May 2015
cybersecurity Frameworks and architectures
Hosted by: the cyber Security Institute (cSI)
1:30pm - 5:30pm
Book By 27th FeBruary and Save $300 • Book By 31St March and Save $100
sMi present their 6th in the series of…
Sponsored by
#oilgascybertx
oil and Gas cyber Security north america
day one │ Wednesday 13th May 2015 www.oilandgas-cybersecurity.com
register online at www.oilandgas-cybersecurity.com • alternatively
8.30 registration & coffee
9.00 chairman's opening remarks
catherine cavazos, Data security Manager, national oilwell
varco
FraMeWork and StandardS
oPenInG addreSS
9.10 Building resiliency into a cybersecurity Program
• overview of a cybersecurity Programo identify
- Protect
- Detect
- respond
- recover
• incident Handling
- overview of Process
- Needed capabilities
• incident Handling and information sharing
donna dodson, Deputy cyber security advisor, national
Institute of Standards and technology
9.50 cybersecurity Framework and Information Sharing Guidance
for oil and Gas
• this presentation will provide oil and gas industry specific
guidance for using/implementing the Nist cybersecurity
Framework and for sharing cybersecurity information
Michael Lewis, Policy and Framework advisor, information risk
strategy and Management, chevron Information technology
company   
10.30 Morning coffee
11.00 are control System networks expendable?
• all software can be hacked
• all it security technology is software
• Hardware-enforced security use cases in oil & gas
• Pervasive threats drive best-practice evolution
Mike Firstenberg, Director of industrial security,
Waterfall Security
11.40 Selling the cost of Security to Management
• guiding security professionals on how to identify and
employ reference resources and metrics from well-know,
widely-accepted sources
• Quantifying the threats and risks in a context that is
consistent with the size and maturity of your company and
industry
• “selling” why protecting information assets have a cost, and
what the trade-offs are between cost and risks
• Describing the power of having well-informed workers and
the impact he can have on the protecting corporate
information assets
• “training” management to focus on protecting information
assets and reducing risks like they already foucs on reducing
business expense
randy hamilton, Manager, it security and compliance,
newfield exploration company
12.20 networking Lunch
1.40 the Power of threat Intelligence in your cybersecurity Program
• Harnessing the power of threat intelligence collection,
aggregation, ingestion, and automation for full threat
intelintegration into your cybersecurity defense lifecycle
• adding global context to internal and external threat intel
sources enables decision support both within and outside
the enterprise perimeter
• aggregating disperate threat information supports
improved analysis and confidence
Jason Mceachin, Director, sales engineering, Lookingglass
cyber Solutions
2.20 Strategies & tactics dealing With Insider and outsider caused
Breaches
• current events in breaches
• What the bad guys are doing and why
• strategies and tactics to address risks and weaknesses
• What to do now 
danny Miller, system chief information security officer,
texas a & M university
cyBer SecurIty For GaS oPeratIonS
3.00 Security in drilling, Modeling and automation
• broadening cyber-attacks landscape effects the security of
products used
• Not only networks are vulnerable, all tools used are
susceptible
• identify security gaps within a drilling process
• avoid false environments, there are no silver bullets
catherine cavazos, Data security Manager, national oilwell
varco
3.40 afternoon tea
4.10 cybersecurity architectures — curriculum & related issues
• Why cybersecurity architectures are critical for securing
enterprise information systems
• overview of representative cybersecurity architectures and
frameworks
• requirements of cultivating cybersecurity architects
• cybersecurity architecture curriculum
andrew yang, executive director, cyber security institute,
university of houston - clear Lake
4.50 Panel discussion- combating against a Breach
• cyber-attacks are growing concern for all organizations
that can cause severe financial and reputational damage
• in this panel, we discuss the challenges around
insider threat detection
- types of attack that may be conducted
- the behavioural characteristics of insiders
- detection systems
- securing against the unknown
- examples of approaches adopted by oil & gas companies
- the future outlook for cyber security
James Morrison, computer scientist, Houston cyber task
Force, Federal Bureau of Investigation
catherine cavazos, Data security Manager, national oilwell
varco
claudia escobar, statewide security Programme Manager,
State of texas - department of Information resources
5.30 chairman's closing remarks and close of day one
PaneL
dIScuSSIon
Lookingglass cyber Solutions is the world leader in threat intelligence management
combining global network situational awareness with automated internet intelligence to
support threat, security and risk operations. lookingglass enables security professionals to
navigate, investigate, analyze and research relevant, context-enriched threat
information through a single platform. the lookingglass scout platform provides
aggregated access to lookingglass’ industry-leading, extensive and diverse threat
sources alerting organizations to impending risk. the scout platform drives effectiveness
and efficiency by replacing the manual process of management threat intelligence for
enterprise and mid-sized organizations. For more information, visit www.LGScout.com
Sponsored by
fax your registration to +44 (0)870 9090 712 or call +44 (0)870 9090 711
8.30 registration & coffee
9.00 chairman's opening remarks
catherine cavazos, Data security Manager, national oilwell
varco
GovernMent reGuLatIonS and SuPPort
oPenInG addreSS
9.10 current efforts that the State of texas office of the chief
Information Security officer is Working on
• establishing a statewide cybersecurity coordination and
collaboration platform
• enabling regional cybersecurity response coordination
• coordinating statewide cybersecurity exercise and
preparedness
• coordinating cybersecurity intelligence sharing among key
entities within the state
claudia escobar, statewide security Programme Manager,
State of texas - department of Information resources
9.50 cyber Insurance for the oil & Gas Industry
• Key threats/risks , for example
- scaDa systems
- Nation state hackers
• regulatory, legal and litigation trends around cyber issues
• traditional insurance response for cyber risk
• cyber insurance
robert Parisi, FiNPro cyber & technology Product lead,
Marsh, Inc.
10.30 Morning coffee
11.00 creating a cyber Fortress against all enemies
• the current culture
• lessons learned
• Dissecting the anatomy of insurance coverage
• oolkits and tourniquets
• Forecast for the Future
amy dunn taylor, Director, Houston branch, kane russell
coleman & Logan Pc
11.40 Legal aspects of cyber Security
• the role of the board of Directors, including legal duties
and potential liabilities
• Developing company policies to address today’s threats,
including data privacy policies, employee policies and
incident response policies
• Developing effective cyber clauses in vendor and client
contracts
• Understanding cyber insurance and what it will (and will
not) cover
• legal aspects of an effective incident response, including
coordination with law enforcement and complying with
notification requirements
Michael titens, Partner, thompson & knight LLP
12.20 networking Lunch
caSe StudIeS
1.40 digital ants: dynamic and resilient Infrastructures Protection
• the Need: Why oil and gas industry needs next-generation
resilient cyber security protection
• our approach: Nature-inspired Digital ants and how they
work
• the benefits: How a mobile resilient cyber defense keeps
infrastructure safe
• competing approaches: Why big-data with centralized
analytics can’t do the job alone
Glenn Fink, senior cyber security researcher, Pacific
northwest national Laboratory
2.20 understanding the International ramifications of
cyber Insecurity in energy
• targeting of energy in Warfare
• cyber and less-than-War
• the technological landscape of Vulnerability
• employing the cyber Weapon in energy
chris Bronk, assistant Professor, university of houston
3.00 afternoon tea
3.30 Situational awareness and cyber-Physical attack detection
and remediation for oil and Gas Infrastructure
• cyber-physical systems for critical infrastructure must be
understood as federated systems of systems
• the impact of cyber-threats to the operational resilience of
the physical systems requires domain specific models of
the system of system impact
• effective remediation of cyber-Physical attacks on such
systems depends on actionable situational awareness
• remediation activities must be evaluated in the context of
both organizational policy, and the physical impact on the
system of systems based on the models developed
• by combining cyber-models and domain specific physical
models we can improve the operational resiliency of
cyber-physical systems
clifford neuman, Director, Usc center for computer systems,
university of Southern california
4.10 cybersecurity and zero-day monitoring and detection in
oil and Gas installations
• challenges in detecting zero-day attacks
• cybersecurity threat situation for oil and gas
• incident handling in oil and gas and why it is challenging
• efficient and non-intrusive cybersecurity monitoring and
detection of Drilling rigs and Production Platforms
Siv hilde houmb, cto, Secure-nok
4.50 chairman’s closing remarks and close of day two
oil and Gas cyber Security north america
www.oilandgas-cybersecurity.com day two │ thursday 14th May 2015
Waterfall Security Solutions Ltd. is the leading provider of stronger-than-
firewalls protections for industrial control networks and critical
infrastructures. the company’s products are deployed in utilities and
critical national infrastructures throughout North america, europe, asia
and israel. Waterfall’s technologies reduce the cost and complexity of
compliance with Nerc-ciP, Nrc, Nist, cFats and other regulations, and
include support for leading industrial applications: Frost & sullivan
describe Waterfall's solutions as ensuring "optimum security for networks
across user verticals" and awarded Waterfall the 2012 Network security
award for industrial control systems entrepreneurial company of the
year and the 2013 North america award for customer Value
enhancement. www.waterfall-security.com
Sponsored by
SPonSorShIP oPPortunItIeS
sMi offer sponsorship, exhibition,
advertising and branding packages,
uniquely tailored to complement
your company's marketing strategy.
should you wish to join the increasing
number of companies benefiting
from promoting their business at our
conferences please call:
alia Malick, Director, on
+44 (0) 207 827 6168 or
email amalick@smi-online.co.uk
overview:
the workshop will provide discussions of cybersecurity
frameworks/architectures, including the Nist
cybersecurity Framework, the sherwood applied
business security architecture (sabsa), and the cobit
framework.
Important questions that will be discussed include:
• What is a cybersecurity framework?
• What is its relationship to the enterprise information
framework?
• What role does a cybersecurity framework play in
securing an enterprise information system?
• What are some of the representative cybersecurity
frameworks or architectures?
Why you should attend:
Participants at this workshop will learn the basics of
cybersecurity frameworks and architectures, and get a
taste of representative frameworks commonly adopted
by organizations and cybersecurity professionals. With
the workshop format, the participants will be able to
interact with the presenters and discuss questions they
may have about cybersecurity frameworks and
architectures.
Programme:
1.30 registration and coffee
2.00 opening remarks and introductions
2.10 Session 1: the nISt Framework
andrew yang, Director,
cyber Security Institute
2.50 Session 2: SaBSa
ross Leo, associate Director,
cyber Security Institute
3.30 coffee
4.00 Session 3: coBIt
norman comstock, Director,
Berkeley research Group
4.40 Session 4: discussion and case Study
Sergio Muniz, President,
cyFor technologies
5.30 end of workshop
about the workshop leaders:
norman comstock is a veteran manager of
enterprise information systems, with specialties
in executive management and technology
consultant to private and public corporations.
ross Leo is an experienced cybersecurity
trainer and consultant, and currently serves as
the associate director of the cyber security
institute at the University of Houston-clear lake.
Sergio Muniz is a seasoned cybersecurity
professional, and the founder and president of
the cyFor technologies.
andrew yang is an experienced computer
science educator and researcher, and
currently serves as the executive director of the
cyber security institute.
about cSI
the cyber security institute (csi) was established as an
educational and research arm of the University of
Houston-clear lake (UHcl), to provide research and
education services to strengthen the Houston region's
efforts of securing the cyberspace and cyber systems.
With support from nearby governmental agencies and
organizations, the UHcl-csi has offered cybersecurity
training, conducted cybersecurity related research,
and provided free seminars and workshops to raise
cybersecurity awareness.
www.prtl.uhcl.edu/portal/page/portal/Sce/csi
haLF day Pre-conFerence WorkShoP
tuesday 12th May 2015
Marriott West Loop hotel
1.30pm - 5.30pm
cybersecurity Frameworks and
architectures
hosted by:
FeBruary
e&P Information & data Management
3-4 February 2015, london, UK
Floating LnG
18-19 February 2015, london, UK
telematics usage Based Insurance
18-19 February 2015, london, UK
March
Project Financing in oil and Gas
north america
9-10 March 2015, Houston, Usa
european Smart Grid cyber Security
9-10 March 2015, london, UK
Gas to Liquids north america
11-12 March 2015, Houston, Usa
oil and Gas telecommunications
25-26 March 2015, london, UK
Supported by
Want to know how you can get
involved?
Interested in promoting your
services to this market?
contact Julia rotar on
+44 (0)20 7827 6088 or email:
jrotar@smi-online.co.uk
SMi ENERGY FORWARD PLANNER 2015
oIL and GaS cyBer SecurIty north aMerIca
conference: 13th-14th May 2015 | Marriott West Loop hotel, houston, texas, uSa Workshop: 12th May 2015, texas, uSa
4 WayS to reGISter
Fax your booking form to +44 (0) 870 9090 712
Phone on +44 (0) 870 9090 711
www.oilandgas-cybersecurity.com
PoSt your booking form to: events team, SMi Group Ltd, 2nd Floor
South, harling house, 47-51 Great Suffolk Street, London, Se1 0BS
If you have any further queries please call the events team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk
Payment: if payment is not made at the time of booking, then an invoice will be issued and must
be paid immediately and prior to the start of the event. if payment has not been received then
credit card details will be requested and payment taken before entry to the event. bookings within
7 days of event require payment on booking. access to the Document Portal will not be given until
payment has been received.
Substitutions/name changes: if you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. two or more delegates may
not ‘share’ a place at an event. Please make separate bookings for each delegate.
cancellation: if you wish to cancel your attendance at an event and you are unable to send a
substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing
that cancellation is made in writing and received at least 28 days prior to the start of the event.
regretfully cancellation after this time cannot be accepted. We will however provide the
conferences documentation via the Document Portal to any delegate who has paid but is unable
to attend for any reason. Due to the interactive nature of the briefings we are not normally able to
providedocumentationinthesecircumstances.Wecannotacceptcancellationsofordersplaced
forDocumentationortheDocumentPortalasthesearereproducedspecificallytoorder.ifwehave
to cancel the event for any reason, then we will make a full refund immediately, but disclaim any
further liability.
alterations: it may become necessary for us to make alterations to the content, speakers, timing,
venue or date of the event compared to the advertised programme.
data Protection: the sMi group gathers personal data in accordance with the UK Data Protection
act1998andwemayusethistocontactyoubytelephone,fax,postoremailtotellyouaboutother
products and services. Unless you tick here □we may also share your data with third parties offering
complementary products or services. if you have any queries or want to update any of the data
that we hold then please contact our Database Manager databasemanager@smi-online.co.uk or
visitourwebsitewww.smi-online.co.uk/updatesquotingtheUrNasdetailedaboveyouraddresson
the attached letter.
unique reference number
our reference e-060
terms and conditions of Booking
deLeGate detaILS
Please complete fully and clearly in capital letters. Please photocopy for additional delegates.
title: Forename:
Surname:
Job title:
department/division:
company/organisation:
email:
company vat number:
address:
town/city:
Post/Zip code: country:
direct tel: direct Fax:
Mobile:
Switchboard:
Signature: date:
i agree to be bound by sMi's terms and conditions of booking.
accountS dePt
title: Forename:
Surname:
email:
address (if different from above):
town/city:
Post/Zip code: country:
direct tel: direct Fax:
Payment must be made to SMi Group Ltd, and received before the event, by
one of the following methods quoting reference e-060 and the delegate’s
name. Bookings made within 7 days of the event require payment on booking,
methods of payment are below. Please indicate method of payment:
□ Wire transfer lloyds tsb bank plc, 39 threadneedle street, london, ec2r 8aU
sort code: 30-00-09 account: 11775391
swift (bic): LoydGB21013 ibaN: GB75 Loyd 3000 0911 7753 91
□ cheque We can only accept cheques in Us Dollars
□ credit card □ Visa □ Mastercard □ american express
all credit card payments will be subject to standard credit card charges.
card No: □□□□ □□□□ □□□□ □□□□
Valid From □□/□□ expiry Date □□/□□
cVV Number □□□□ 3 digit security on reverse of card, 4 digits for aMex card
cardholder’s name:
Signature: date:
i agree to be bound by sMi's terms and conditions of booking.
card Billing address (if different from above):
PayMent
vat
Vat at 20% is charged on the Document portal and literature distribution for all UK customers and for
those eU customers not supplying a registration number for their own country here
conFerence PrIceS GrouP dIScountS avaILaBLe
I would like to attend: (Please tick as appropriate) Fee
□ conference & Workshop $1898.00
□ conference only $1299.00
□ Workshop only $599.00
PROMOTIONAL LITERATURE DISTRIBUTION
□ Distribution of your company’s promotional
literature to all conference attendees $1598.00 + vat $1917.60
the conference fee includes refreshments, lunch, conference papers, and access to
the Document Portal. Presentations that are available for download will be subject to
distribution rights by speakers. Please note that some presentations may not be
available for download. access information for the document portal will be sent to
the e-mail address provided during registration. Details are sent within 24 hours post
conference.
venue Marriott West Loop hotel, 1750 West Loop South Freeway, houston, tx 77027
□ Please contact me to book my hotel
alternatively call us on +44 (0) 870 9090 711,
email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
□ Book by 27th February to receive $300 off the conference price
□ Book by 31st March to receive $100 off the conference price
earLy BIrd
dIScount
docuMentatIon
I cannot attend but would like to Purchase access to the following
document Portal/Paper copy documentation. Price total
□ access to the conference documentation
on the Document Portal $799.00 + vat $958.80
□ the conference Presentations – paper copy $799.00 - $799.00
(or only $600 if ordered with the Document Portal)

More Related Content

What's hot

Beyond top secret
Beyond top secretBeyond top secret
Beyond top secretgorin2008
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Evidence-Based Risk Management
Evidence-Based Risk ManagementEvidence-Based Risk Management
Evidence-Based Risk ManagementEnergySec
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
Preparing for the Inevitable
Preparing for the InevitablePreparing for the Inevitable
Preparing for the InevitableOmoniyiAnimasaun
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramJaim Harlow
 
Human factors in cybersecurity
Human factors in cybersecurity Human factors in cybersecurity
Human factors in cybersecurity Rick van der Kleij
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Week 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadWeek 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadVinoth Sn
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 

What's hot (19)

Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Beyond top secret
Beyond top secretBeyond top secret
Beyond top secret
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Evidence-Based Risk Management
Evidence-Based Risk ManagementEvidence-Based Risk Management
Evidence-Based Risk Management
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
Preparing for the Inevitable
Preparing for the InevitablePreparing for the Inevitable
Preparing for the Inevitable
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
ACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_ProgramACGSV_Feb11_Keynote_Program
ACGSV_Feb11_Keynote_Program
 
Human factors in cybersecurity
Human factors in cybersecurity Human factors in cybersecurity
Human factors in cybersecurity
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
Asset Security
Asset Security Asset Security
Asset Security
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Week 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadWeek 1&2 intro_ v2-upload
Week 1&2 intro_ v2-upload
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 

Viewers also liked

SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016Dale Butler
 
Energy sector cybersecurity framework implementation guidance final 01-05-15
Energy sector cybersecurity framework implementation guidance final 01-05-15Energy sector cybersecurity framework implementation guidance final 01-05-15
Energy sector cybersecurity framework implementation guidance final 01-05-15Dr Dev Kambhampati
 
7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity experts7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity expertssusyangryany
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015AVEVA
 
Cybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryCybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryTunde Ogunkoya
 
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...Connected Futures
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 

Viewers also liked (7)

SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
 
Energy sector cybersecurity framework implementation guidance final 01-05-15
Energy sector cybersecurity framework implementation guidance final 01-05-15Energy sector cybersecurity framework implementation guidance final 01-05-15
Energy sector cybersecurity framework implementation guidance final 01-05-15
 
7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity experts7 most important rules for oil and gas cybersecurity experts
7 most important rules for oil and gas cybersecurity experts
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
 
Cybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryCybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas Industry
 
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 

Similar to Oil and Gas Cyber Security Conference in Houston

E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north americaAlia Malick
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015Dale Butler
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Similar to Oil and Gas Cyber Security Conference in Houston (20)

E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
IGPC Data Breach Planning braindump
IGPC Data Breach Planning braindumpIGPC Data Breach Planning braindump
IGPC Data Breach Planning braindump
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 

More from Dale Butler

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceDale Butler
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceDale Butler
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceDale Butler
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conferenceDale Butler
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceDale Butler
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceDale Butler
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceDale Butler
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceDale Butler
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020Dale Butler
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 Dale Butler
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020Dale Butler
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 Dale Butler
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 Dale Butler
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceDale Butler
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020Dale Butler
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceDale Butler
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceDale Butler
 

More from Dale Butler (20)

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conference
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conference
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conference
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conference
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conference
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conference
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conference
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conference
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020
 
Space Week 2020
Space Week 2020Space Week 2020
Space Week 2020
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conference
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conference
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

Oil and Gas Cyber Security Conference in Houston

  • 1. 2015 Marriott West loop Hotel, Houston, texas, Usa Securing against the present and future threats towards the industry oil and gas cyber security North america 13th & 14th May exPert SPeaker PaneL IncLudeS: • James Morrison, computer scientist, Houston cyber task Force, Federal Bureau of Investigation • catherine cavazos, Data security Manager, nov • Michael Lewis, Policy and Framework advisor, information risk strategy and Management, chevron Information technology company • Jason Mceachin, Director, sales engineering, Lookingglass cyber Solutions • donna dodson, Deputy cyber security advisor, national Institute of Standards and technology • clifford neuman, Director, centre for computer systems security, information sciences institute, university of Southern california • claudia escobar, state-wide security Programme Manager, office of the chief information security officer, Department of information resources, State of texas • randy hamilton, Manager, it security and compliance, newfield exploration company • Mike Firstenberg, Director of industrial security, Waterfall Security • amy taylor, Director, Houston branch, kane russell coleman & Logan Pc • Glenn a Fink, cyber security researcher, secure cyber systems group, Pacific northwest national Laboratory BeneFItS oF attendInG: • Understand the current key market regulations to set a new standard across the industry • Discover how you need to operate to create a safer environment • Discuss how the industry needs to develop in North america • evaluate live demos on how to block oncoming attacks and minimise the clean up • Hear about the latest technology and software available • listen from leading case studies and understand what lessons have be learned www.oilandgas-cybersecurity.com register online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 PLuS an InteractIve haLF-day Pre-conFerence WorkShoP • tueSday 12th May 2015 cybersecurity Frameworks and architectures Hosted by: the cyber Security Institute (cSI) 1:30pm - 5:30pm Book By 27th FeBruary and Save $300 • Book By 31St March and Save $100 sMi present their 6th in the series of… Sponsored by #oilgascybertx
  • 2. oil and Gas cyber Security north america day one │ Wednesday 13th May 2015 www.oilandgas-cybersecurity.com register online at www.oilandgas-cybersecurity.com • alternatively 8.30 registration & coffee 9.00 chairman's opening remarks catherine cavazos, Data security Manager, national oilwell varco FraMeWork and StandardS oPenInG addreSS 9.10 Building resiliency into a cybersecurity Program • overview of a cybersecurity Programo identify - Protect - Detect - respond - recover • incident Handling - overview of Process - Needed capabilities • incident Handling and information sharing donna dodson, Deputy cyber security advisor, national Institute of Standards and technology 9.50 cybersecurity Framework and Information Sharing Guidance for oil and Gas • this presentation will provide oil and gas industry specific guidance for using/implementing the Nist cybersecurity Framework and for sharing cybersecurity information Michael Lewis, Policy and Framework advisor, information risk strategy and Management, chevron Information technology company    10.30 Morning coffee 11.00 are control System networks expendable? • all software can be hacked • all it security technology is software • Hardware-enforced security use cases in oil & gas • Pervasive threats drive best-practice evolution Mike Firstenberg, Director of industrial security, Waterfall Security 11.40 Selling the cost of Security to Management • guiding security professionals on how to identify and employ reference resources and metrics from well-know, widely-accepted sources • Quantifying the threats and risks in a context that is consistent with the size and maturity of your company and industry • “selling” why protecting information assets have a cost, and what the trade-offs are between cost and risks • Describing the power of having well-informed workers and the impact he can have on the protecting corporate information assets • “training” management to focus on protecting information assets and reducing risks like they already foucs on reducing business expense randy hamilton, Manager, it security and compliance, newfield exploration company 12.20 networking Lunch 1.40 the Power of threat Intelligence in your cybersecurity Program • Harnessing the power of threat intelligence collection, aggregation, ingestion, and automation for full threat intelintegration into your cybersecurity defense lifecycle • adding global context to internal and external threat intel sources enables decision support both within and outside the enterprise perimeter • aggregating disperate threat information supports improved analysis and confidence Jason Mceachin, Director, sales engineering, Lookingglass cyber Solutions 2.20 Strategies & tactics dealing With Insider and outsider caused Breaches • current events in breaches • What the bad guys are doing and why • strategies and tactics to address risks and weaknesses • What to do now  danny Miller, system chief information security officer, texas a & M university cyBer SecurIty For GaS oPeratIonS 3.00 Security in drilling, Modeling and automation • broadening cyber-attacks landscape effects the security of products used • Not only networks are vulnerable, all tools used are susceptible • identify security gaps within a drilling process • avoid false environments, there are no silver bullets catherine cavazos, Data security Manager, national oilwell varco 3.40 afternoon tea 4.10 cybersecurity architectures — curriculum & related issues • Why cybersecurity architectures are critical for securing enterprise information systems • overview of representative cybersecurity architectures and frameworks • requirements of cultivating cybersecurity architects • cybersecurity architecture curriculum andrew yang, executive director, cyber security institute, university of houston - clear Lake 4.50 Panel discussion- combating against a Breach • cyber-attacks are growing concern for all organizations that can cause severe financial and reputational damage • in this panel, we discuss the challenges around insider threat detection - types of attack that may be conducted - the behavioural characteristics of insiders - detection systems - securing against the unknown - examples of approaches adopted by oil & gas companies - the future outlook for cyber security James Morrison, computer scientist, Houston cyber task Force, Federal Bureau of Investigation catherine cavazos, Data security Manager, national oilwell varco claudia escobar, statewide security Programme Manager, State of texas - department of Information resources 5.30 chairman's closing remarks and close of day one PaneL dIScuSSIon Lookingglass cyber Solutions is the world leader in threat intelligence management combining global network situational awareness with automated internet intelligence to support threat, security and risk operations. lookingglass enables security professionals to navigate, investigate, analyze and research relevant, context-enriched threat information through a single platform. the lookingglass scout platform provides aggregated access to lookingglass’ industry-leading, extensive and diverse threat sources alerting organizations to impending risk. the scout platform drives effectiveness and efficiency by replacing the manual process of management threat intelligence for enterprise and mid-sized organizations. For more information, visit www.LGScout.com Sponsored by
  • 3. fax your registration to +44 (0)870 9090 712 or call +44 (0)870 9090 711 8.30 registration & coffee 9.00 chairman's opening remarks catherine cavazos, Data security Manager, national oilwell varco GovernMent reGuLatIonS and SuPPort oPenInG addreSS 9.10 current efforts that the State of texas office of the chief Information Security officer is Working on • establishing a statewide cybersecurity coordination and collaboration platform • enabling regional cybersecurity response coordination • coordinating statewide cybersecurity exercise and preparedness • coordinating cybersecurity intelligence sharing among key entities within the state claudia escobar, statewide security Programme Manager, State of texas - department of Information resources 9.50 cyber Insurance for the oil & Gas Industry • Key threats/risks , for example - scaDa systems - Nation state hackers • regulatory, legal and litigation trends around cyber issues • traditional insurance response for cyber risk • cyber insurance robert Parisi, FiNPro cyber & technology Product lead, Marsh, Inc. 10.30 Morning coffee 11.00 creating a cyber Fortress against all enemies • the current culture • lessons learned • Dissecting the anatomy of insurance coverage • oolkits and tourniquets • Forecast for the Future amy dunn taylor, Director, Houston branch, kane russell coleman & Logan Pc 11.40 Legal aspects of cyber Security • the role of the board of Directors, including legal duties and potential liabilities • Developing company policies to address today’s threats, including data privacy policies, employee policies and incident response policies • Developing effective cyber clauses in vendor and client contracts • Understanding cyber insurance and what it will (and will not) cover • legal aspects of an effective incident response, including coordination with law enforcement and complying with notification requirements Michael titens, Partner, thompson & knight LLP 12.20 networking Lunch caSe StudIeS 1.40 digital ants: dynamic and resilient Infrastructures Protection • the Need: Why oil and gas industry needs next-generation resilient cyber security protection • our approach: Nature-inspired Digital ants and how they work • the benefits: How a mobile resilient cyber defense keeps infrastructure safe • competing approaches: Why big-data with centralized analytics can’t do the job alone Glenn Fink, senior cyber security researcher, Pacific northwest national Laboratory 2.20 understanding the International ramifications of cyber Insecurity in energy • targeting of energy in Warfare • cyber and less-than-War • the technological landscape of Vulnerability • employing the cyber Weapon in energy chris Bronk, assistant Professor, university of houston 3.00 afternoon tea 3.30 Situational awareness and cyber-Physical attack detection and remediation for oil and Gas Infrastructure • cyber-physical systems for critical infrastructure must be understood as federated systems of systems • the impact of cyber-threats to the operational resilience of the physical systems requires domain specific models of the system of system impact • effective remediation of cyber-Physical attacks on such systems depends on actionable situational awareness • remediation activities must be evaluated in the context of both organizational policy, and the physical impact on the system of systems based on the models developed • by combining cyber-models and domain specific physical models we can improve the operational resiliency of cyber-physical systems clifford neuman, Director, Usc center for computer systems, university of Southern california 4.10 cybersecurity and zero-day monitoring and detection in oil and Gas installations • challenges in detecting zero-day attacks • cybersecurity threat situation for oil and gas • incident handling in oil and gas and why it is challenging • efficient and non-intrusive cybersecurity monitoring and detection of Drilling rigs and Production Platforms Siv hilde houmb, cto, Secure-nok 4.50 chairman’s closing remarks and close of day two oil and Gas cyber Security north america www.oilandgas-cybersecurity.com day two │ thursday 14th May 2015 Waterfall Security Solutions Ltd. is the leading provider of stronger-than- firewalls protections for industrial control networks and critical infrastructures. the company’s products are deployed in utilities and critical national infrastructures throughout North america, europe, asia and israel. Waterfall’s technologies reduce the cost and complexity of compliance with Nerc-ciP, Nrc, Nist, cFats and other regulations, and include support for leading industrial applications: Frost & sullivan describe Waterfall's solutions as ensuring "optimum security for networks across user verticals" and awarded Waterfall the 2012 Network security award for industrial control systems entrepreneurial company of the year and the 2013 North america award for customer Value enhancement. www.waterfall-security.com Sponsored by SPonSorShIP oPPortunItIeS sMi offer sponsorship, exhibition, advertising and branding packages, uniquely tailored to complement your company's marketing strategy. should you wish to join the increasing number of companies benefiting from promoting their business at our conferences please call: alia Malick, Director, on +44 (0) 207 827 6168 or email amalick@smi-online.co.uk
  • 4. overview: the workshop will provide discussions of cybersecurity frameworks/architectures, including the Nist cybersecurity Framework, the sherwood applied business security architecture (sabsa), and the cobit framework. Important questions that will be discussed include: • What is a cybersecurity framework? • What is its relationship to the enterprise information framework? • What role does a cybersecurity framework play in securing an enterprise information system? • What are some of the representative cybersecurity frameworks or architectures? Why you should attend: Participants at this workshop will learn the basics of cybersecurity frameworks and architectures, and get a taste of representative frameworks commonly adopted by organizations and cybersecurity professionals. With the workshop format, the participants will be able to interact with the presenters and discuss questions they may have about cybersecurity frameworks and architectures. Programme: 1.30 registration and coffee 2.00 opening remarks and introductions 2.10 Session 1: the nISt Framework andrew yang, Director, cyber Security Institute 2.50 Session 2: SaBSa ross Leo, associate Director, cyber Security Institute 3.30 coffee 4.00 Session 3: coBIt norman comstock, Director, Berkeley research Group 4.40 Session 4: discussion and case Study Sergio Muniz, President, cyFor technologies 5.30 end of workshop about the workshop leaders: norman comstock is a veteran manager of enterprise information systems, with specialties in executive management and technology consultant to private and public corporations. ross Leo is an experienced cybersecurity trainer and consultant, and currently serves as the associate director of the cyber security institute at the University of Houston-clear lake. Sergio Muniz is a seasoned cybersecurity professional, and the founder and president of the cyFor technologies. andrew yang is an experienced computer science educator and researcher, and currently serves as the executive director of the cyber security institute. about cSI the cyber security institute (csi) was established as an educational and research arm of the University of Houston-clear lake (UHcl), to provide research and education services to strengthen the Houston region's efforts of securing the cyberspace and cyber systems. With support from nearby governmental agencies and organizations, the UHcl-csi has offered cybersecurity training, conducted cybersecurity related research, and provided free seminars and workshops to raise cybersecurity awareness. www.prtl.uhcl.edu/portal/page/portal/Sce/csi haLF day Pre-conFerence WorkShoP tuesday 12th May 2015 Marriott West Loop hotel 1.30pm - 5.30pm cybersecurity Frameworks and architectures hosted by:
  • 5. FeBruary e&P Information & data Management 3-4 February 2015, london, UK Floating LnG 18-19 February 2015, london, UK telematics usage Based Insurance 18-19 February 2015, london, UK March Project Financing in oil and Gas north america 9-10 March 2015, Houston, Usa european Smart Grid cyber Security 9-10 March 2015, london, UK Gas to Liquids north america 11-12 March 2015, Houston, Usa oil and Gas telecommunications 25-26 March 2015, london, UK Supported by Want to know how you can get involved? Interested in promoting your services to this market? contact Julia rotar on +44 (0)20 7827 6088 or email: jrotar@smi-online.co.uk SMi ENERGY FORWARD PLANNER 2015
  • 6. oIL and GaS cyBer SecurIty north aMerIca conference: 13th-14th May 2015 | Marriott West Loop hotel, houston, texas, uSa Workshop: 12th May 2015, texas, uSa 4 WayS to reGISter Fax your booking form to +44 (0) 870 9090 712 Phone on +44 (0) 870 9090 711 www.oilandgas-cybersecurity.com PoSt your booking form to: events team, SMi Group Ltd, 2nd Floor South, harling house, 47-51 Great Suffolk Street, London, Se1 0BS If you have any further queries please call the events team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk Payment: if payment is not made at the time of booking, then an invoice will be issued and must be paid immediately and prior to the start of the event. if payment has not been received then credit card details will be requested and payment taken before entry to the event. bookings within 7 days of event require payment on booking. access to the Document Portal will not be given until payment has been received. Substitutions/name changes: if you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. two or more delegates may not ‘share’ a place at an event. Please make separate bookings for each delegate. cancellation: if you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start of the event. regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has paid but is unable to attend for any reason. Due to the interactive nature of the briefings we are not normally able to providedocumentationinthesecircumstances.Wecannotacceptcancellationsofordersplaced forDocumentationortheDocumentPortalasthesearereproducedspecificallytoorder.ifwehave to cancel the event for any reason, then we will make a full refund immediately, but disclaim any further liability. alterations: it may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme. data Protection: the sMi group gathers personal data in accordance with the UK Data Protection act1998andwemayusethistocontactyoubytelephone,fax,postoremailtotellyouaboutother products and services. Unless you tick here □we may also share your data with third parties offering complementary products or services. if you have any queries or want to update any of the data that we hold then please contact our Database Manager databasemanager@smi-online.co.uk or visitourwebsitewww.smi-online.co.uk/updatesquotingtheUrNasdetailedaboveyouraddresson the attached letter. unique reference number our reference e-060 terms and conditions of Booking deLeGate detaILS Please complete fully and clearly in capital letters. Please photocopy for additional delegates. title: Forename: Surname: Job title: department/division: company/organisation: email: company vat number: address: town/city: Post/Zip code: country: direct tel: direct Fax: Mobile: Switchboard: Signature: date: i agree to be bound by sMi's terms and conditions of booking. accountS dePt title: Forename: Surname: email: address (if different from above): town/city: Post/Zip code: country: direct tel: direct Fax: Payment must be made to SMi Group Ltd, and received before the event, by one of the following methods quoting reference e-060 and the delegate’s name. Bookings made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment: □ Wire transfer lloyds tsb bank plc, 39 threadneedle street, london, ec2r 8aU sort code: 30-00-09 account: 11775391 swift (bic): LoydGB21013 ibaN: GB75 Loyd 3000 0911 7753 91 □ cheque We can only accept cheques in Us Dollars □ credit card □ Visa □ Mastercard □ american express all credit card payments will be subject to standard credit card charges. card No: □□□□ □□□□ □□□□ □□□□ Valid From □□/□□ expiry Date □□/□□ cVV Number □□□□ 3 digit security on reverse of card, 4 digits for aMex card cardholder’s name: Signature: date: i agree to be bound by sMi's terms and conditions of booking. card Billing address (if different from above): PayMent vat Vat at 20% is charged on the Document portal and literature distribution for all UK customers and for those eU customers not supplying a registration number for their own country here conFerence PrIceS GrouP dIScountS avaILaBLe I would like to attend: (Please tick as appropriate) Fee □ conference & Workshop $1898.00 □ conference only $1299.00 □ Workshop only $599.00 PROMOTIONAL LITERATURE DISTRIBUTION □ Distribution of your company’s promotional literature to all conference attendees $1598.00 + vat $1917.60 the conference fee includes refreshments, lunch, conference papers, and access to the Document Portal. Presentations that are available for download will be subject to distribution rights by speakers. Please note that some presentations may not be available for download. access information for the document portal will be sent to the e-mail address provided during registration. Details are sent within 24 hours post conference. venue Marriott West Loop hotel, 1750 West Loop South Freeway, houston, tx 77027 □ Please contact me to book my hotel alternatively call us on +44 (0) 870 9090 711, email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712 □ Book by 27th February to receive $300 off the conference price □ Book by 31st March to receive $100 off the conference price earLy BIrd dIScount docuMentatIon I cannot attend but would like to Purchase access to the following document Portal/Paper copy documentation. Price total □ access to the conference documentation on the Document Portal $799.00 + vat $958.80 □ the conference Presentations – paper copy $799.00 - $799.00 (or only $600 if ordered with the Document Portal)