• No results found

ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT

N/A
N/A
Protected

Academic year: 2021

Share "ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

And many more

Host Organization:

Government & Trade:

Industry Insight From:

Expert Speakers

End User Perspective

Discover

the emerging national and federal initiatives driving

your industry forward giving you the competitive edge

Develop

a clear process to efficiently manage the changing

regulatory landscape ensuring effective and efficient compliance

establish

a clear governance policy to enhance awareness

through education to generate confidence in the security of your

system

learn

to mitigate risk through certification & prioritization and

build resilience, improve response times and enhance system

robustness

builD

a clear plan to navigate the rapidly evolving threat

landscape and guarantee the protection of your critical

information and operational assets

realize

how to certify the secure deployment of the latest

technologies to maximize the protection of your critical assets

and guarantee ROI

ENTERPRISE CYBER SECURITY &

INFORMATION ASSURANCE SUMMIT

ExClUSIvE GAME-CHANGING INFORMATION

INCUlDING…

`Up-to-date case studies from key US industry end users including:Wells Fargo & UTC

`Expert technical analysis on major industry challenges including integrated risk management and the $300bn 'big data' industry from BT Global & Verizon `Case studies to build clear strategies for efficient and economic compliance

from Sempra & Enbridge

`Perspective from US government agencies including the FBI and NSTA on initiatives to ensure the security and reliability of critical infrastructure `Workshops and roundtables discussing the international threat and critical

infrastructure & key resource protection from GICSR industry ISACs

17-18 April, 2012, San Jose, California, USA

As we navigate new and uncertain challenges in the digital age, we must also address the growing threat cyberattacks present to our transportation networks, electricity grid, financial systems and other assets and infrastructure.

US President Barack Obama, 2011

Researched & Organized by: With the increasing number of regulations and threats

facing information assets, the time to invest in this area has never been more critical. Especially when considering the cost of the breakdown of one critical infrastructure could top $230bn

save

$

400

register before

February 17

DEVELOP STRATEGIES TO UTILIZE PEOPLE,

PROCESS & TECHNOLOGY TO OPTIMIZE YOUR

GOVERNANCE, RISK & COMPLIANCE MANAGEMENT

www.cybersummits.com/enterprise

(2)

Welcome to

the enterprise cyber security

& information assurance summit

Tel: +44 (0) 207 375 7537

Email: nsheel@FCBusinessIntelligence.com www.cybersummits.com/enterprise

Register today - visit

www.nuclearenergyinsider.com/asia

or phone 1 800 814 3459

Dear Reader,

In the past few years there have been land mark changes to the Cyber Security industry; from the implementation of integrated technology, to the game changing power of the countless publicized breaches and malware. This is all without mentioning the rapidly evolving regulatory and compliance landscape.

To guarantee a secure and efficient enterprise system it is vital to consider the three core disciplines of people, process and technology. The way to balance these areas is through the concept of Governance, Risk & Compliance (GRC). Enterprise GRC brings the matter of IT security to the board level, driving spending and investment in this sector.

` The GRC market is estimated to be worth over $32bn

` By 2015 the US federal Cyber Security market will reach $15bn

` The USA alone spends $14BN a year on IT-governance

The attacks of 2011 have taught us that the threat landscape is not just evolving but rapidly mutating. This requires security managers to consider new and creative techniques to detect, prevent and prepare for a breach scenario. With the cost of the breakdown of one critical infrastructure topping $230bn

and added complexity coming from the increasing number of regulations and the frequent dynamic changes this area is growing rapidly.

No one wants to be the weak link in global infrastructure or have their

reputation tarnished by a breach event but maintaining security and compliance in a rapidly evolving industry is costly, time consuming and technically challenging. It is more vital than ever for public/private partnerships to

minimize risk, maximize resiliency and ensure business continuity.

The Enterprise Cyber Security Summit will supply your business with:

 The critical intelligence and tools you need to build a cost effective, time efficient cyber security strategy

 Key lessons and tried and tested action plans to mitigate risk and save millions of USD in compliance and reliability

 The insight & connections to secure your place in this booming industry

The Enterprise Cyber Security & Information Assurance Summit will bring together 150 cyber security subject matter and industry experts for two days of business critical strategy, unrivalled networking and stimulating discussion.

I look forward to meeting you in San Jose in April.

Natasha Sheel

Senior Industry Analyst

FC Business Intelligence

register today - visit

www.cybersummits.com/enterprise

or phone

+44 207 375 7537

Enterprise Security Mangers

Protect Against Risk and Regulatory

Violation

With the challenges and costs of securing the reliability of your

infrastructure increasing rapidly it is essential to approach these complex concerns with detailed planning. This focussed meeting will equip you with the foresight to economically ensure the resiliency of your assets.

` Industry leading case studies on integrated risk management and compliance solutions from Sempra & Enbridge

` Federal and national initiatives driving change in standards and auditing

` Government strategies to enhance resilience to cyber incidents and manage the cyber threat including the FBI Infragard partnership

Don’t get caught out by the rapidly changing landscape and the cost of a breach. Discover clear proven strategies being implemented by your information security peers by signing up today!

Solution Providers

Cyber Security

Activity is on the Rise

As integrated and mobile devices become ubiquitous it is vital that the technology securing key information assets evolve with this. With the likely hood of a Pearl Harbor-scale intrusion in 2012 increasing military information security spending by 50% to $9bn - the potential for huge contracts has never been greater!

At this ground breaking industry event you will hear…

` National risk management and security initiatives from international trend setters including BT & Wells Fargo

` Enterprise end user need for industry wide co-operation and standardization outlined by FBI and ISA

` Federal and national plans for regulations and enhancing security

Join the premier Cyber Security forum to receive market forecast and insight into government lead industry drivers to accurately plan your business for 2012 and beyond.

We’ll put you in front of industry leading buyers from across North America to fill your order books in 2 days!

What We Are Going To Do for You

Practical real world strategies and sharing best practice are at the forefront of the Enterprise Cyber Security & Information Assurance Summit.

We are committed to ensuring you go away with new contacts and the most up-to-date information. Most importantly you will leave knowing your business is going to move forward.

` REALIZE initiatives to ensure the security and reliability of critical infrastructure

` ASCERTAIN how to ensure cost effective and efficient security and compliance maintenance

` UNDERSTAND the persistent and evolving threats and how to securely integrate new technology

` LISTEN to case studies from leading end users and government bodies for how to successfully merge people, process & technology

` DISCOVER the innovative methods developed by global industry leaders to enhance system robustness and resiliency

“GICSR is proud to associated this ground breaking summit bringing together key senior level IT Security personnel to tackle the key challenges facing North American critical enterprises:

` Develop strategies to utilize people, process & technology

` Gain a positive ROI on your security and technology investment.

` Optimizing your governance, risk & compliance management

The Enterprise Cyber Security Summit will address the key issues in the Industry and provide the security, and technology-related insight necessary to make the right decisions.”

(3)

MORNING AFTERNOON EXTRAS

Day 1

April 17th

• Industry Drivers: latest on Whitehouse, DoD and DHS initiatives

• Looking at the standards and their evolution to managing your governance & compliance strategy

• Mitigating the risk and understanding the threat • Building incident response

plans and SIEM

• Red Dragon Rising Workshop: Managing International Cyber Threat • CISO roundtable

• Networking drinks reception

Day 2

April 18th

• Maximizing security through merging people, process & technology

• Ensuring an educated & aware workforce

• Managing regulation through integrated risk solutions • Breach scenario event

• Critical Infrastructure and Key Resource Protection workshop • Red Dragon Rising Workshop:

Managing Chinese Cyber Threat

Conference at a glance

register today - visit

www.cybersummits.com/enterprise

or phone

+44 (0) 207 375 7537

Discover the expert speakers representing the critical enterprises you work with...

Register today - visit

www.nuclearenergyinsider.com/asia

or phone 1 800 814 3459

KEYNOTE SPEAKERS

Jay Bavisi,President & CEO,

EC Council

John Chesson, Special Agent,

FBI

Munillal Chatarpal,

Manager - Risk Management & Security, enbridge energy

Ola Lawal,

Corporate Security Officer, enbridge energy

Alexander Kunz,

Security Governance Manager, sempra

CRITICAL INFRASTRUCTURE PERSPECTIVE

GOVERNMENT & TRADE BODIES:

Deborah Kobza,

Executive Director / CEO, Gicsr & nh-isac Richard Zaluski,

Executive Vice President - International, Gicsr

Larry Clifton,

CEO / President,

internet security alliance (RET) General Mick Kicklighter,

Director,

Department of cip and homeland security Steve Haynes,

Director - Cyber Security & information Assurance,Whitehouse national security telecommunications advisory committee

INDUSTRY EXPERTS INCLUDING:

Peter Allor,

Senior Security Strategist, Cyber Incident & Vulnerability Handling,ibM

Gene Fredriksen,

Global CISO, tYco

Ernie Rakaczky,

Principal Security Architect, invensys

William Hagestad II,

Lieutenant Colonel US Marine Corps (RET), Chief Cyber Security Strategist,

red-Dragon rising

Marci McCarthy, President CEO, tech exec networks

Ken Baylor,

VP / CISO of Security & Antifraud, Wells Fargo

David Gavilan, Executive Director &

Assistant General Counsel, Jp Morgan chase

ENERGY

FINANCE

Director – Governance, Risk, Compliance, bt Global Catherine Lester, Solutions Architect, verizon Director, raytheon Christopher Leigh,

Global IT Compliance & Risk Officer, utc

COMMUNICATION

(4)

register today - visit

www.cybersummits.com/enterprise

or phone

+44207375 7537

Session 1: Industry Drivers

Guide to National Policies and Initiatives

` Hear the legislation and standards

associated with cyber security &

information assurance putting you ahead of the competition

` Realize the true requirement for security

as intelligent and integrated technology becomes a reality giving you the competitive edge

` Learn how to securely integrate technology

to enhance your productivity and reliability

` Discover the true potential for integrated

operations to ensure the security of North American critical Infrastructure

Deborah Kobza, President & CEO, GICSR

The Economic & Legal Driver for Cyber Security

` Discuss the key economic mechanisms

driving the cyber attacker/infiltrator and learn how to determine how they apply to your industry and firm helping you to mitigate this risk

` Determine if inefficient cyber security

coordination norms driven by profit is placing your enterprise and supply chain at risk allowing you to focus your protection strategies

` Learn how to measure, monetize, and

incentivize in-firm cyber security given the insider threat is emerging as the most costly vector maximizing your security posture

` Establish where cyber security policy and

investment decisions should be made in your organizational structure enhancing your efficiency

(Ret) General Mick Kicklighter, Director, Center for Infrastructure Protection & Homeland Security, GMU

Cyber Security: The Legal Issues

` Learn about the need for a legal framework

for regulatory obligations producing optimum efficiency and productivity

` Recognize and avoid common mistakes

by implementing clear enterprise wide policies through a steering committee with attendance from all business departments maximizing your efficiency

` Hear how policies managed by a legal

team can ensure no glaring omissions in managing the flow and sensitivity of data giving you confidence in the protection of your critical information assets

` Discover expert suggestions to ensure

policy compliance through awareness training and vulnerability testing to make an instant impact

April 17th - 18th, Hyatt Place, San Jose, CA, USA

3 SIMPlE STEPS TO REGISTER

do this before February 17th to

save

$

400

Email nsheel@FCBusinessIntelligence.com with BOOKME in the subject line Call me now on +44 207 375 7537

Or register on line at: www.cybersummits.com/enterprise

Session 3: Mitigating the risk

Energy Case Study: Integrated Risk Management Program

` Discover how to integrate all business

processes and to combine this with real world threat intelligence allowing you to recognize your vulnerabilities and prioritize your security activities

` Learn how to track and recognize gaps in

your operations R&D and investment to help you stay productive

` Hear Sempra’s four year plan to map and

automate testing & compliance which with maturity will lead to a computer incident response that mitigates the post event risk ensuring you stay profitable

` Discuss the long term goal to visualize all

data ensuring true enterprise efficiency

Alexander Kunz, Security Governance Manager, Sempra

Building Multi-layer Security and SEIM Systems

` Developing proven and effective strategies

of protection merging IT and physical techniques to maximize your system security

` Learn techniques to monitor what is

happening both inside and outside the office – deploying SEIM - systems to mitigate risk

` Master the art of educating personnel in

how to protect their industry maximizing security and efficiency

` Debate the differences between SEIM

systems, how each works, what are their strengths and how to ensure you utilize the best system to suit your purpose

Ernie Rakaczky, Principal Security Architect, Invensys

Federal Case Study: Enterprise Wide Risk Management Template

` Learn to conceptualize cyber security away

from a purely IT challenge giving you the competitive edge in the security field

` Hear the need to consider the financial, legal

& compliance challenges along with those of IT ensuring you maximize your productivity

` Discover the need to shift the ownership of

the cyber security program to a chief risk officer who sits outside the IT sphere helping to make your enterprise security vision a reality

` Realize how you can utilize this shift to

educate the entire enterprise mitigating the insider threat and minimizing the risk of multimodal attacks on the person enhancing your overall security posture

Larry Clinton, CEO President, Internet Security Alliance

Session 2: Managing the threat

Federal Case Study: Cyber Security Trends & the FBI Infragard Partnership

` Discover the need for businesses to work

together in predicting, preventing, detecting and responding to incidents to ensure the security of national critical infrastructures

` Hear the Federal Bureau of Investigations

partnership with the private sector to promote cyber security knowledge and innovation by sharing intelligence to create a secure and resilient cyber environment

` Understand the insider threat and the need

for increased awareness and prevention in order to keep your business safe

` FBI led session into the current trends

in cyber security & counterintelligence allowing you to build a clear protection strategy for your business

John Chesson, Special Agent, FBI

Understanding the International Advanced Persistent Threat

` Learn more about the Chinese Warfare

Strategy from real world case studies to build your awareness to focus your security efforts

` Take away a series of tactical and strategic

cyber network attack mitigation short & long term matrices for application and use to maximize protection

` Hear a review of Chinese Warfare computer

network exploits across the entire technical taxonomy to enhance the efficiency of your security plan

` Examine the Chinese Cyber Threat from

Information Warfare through the broad range of military, civilian and commercially supported cyber-attack vectors to help ensure the resilience of your assets

(Ret) Colonel Bill Hagestad, CSO, Red Dragon rising

Building a Long Term Incident Response Plan

` Understanding the threats, vulnerabilities

and consequences of a breach to guarantee full preparation for a breach scenario ensuring system resiliency

` Build a clear action plan for when the

system fails to improve your resiliency and recovery whilst minimizing your downtime

` IBM led discussion of the long term

recovery from an incident and utilizing the lessons learned to enhance the overall strength of your system

` Discover the operational benefits of cyber

security in order to build system robustness

Peter Allor, Senior Security Strategist, Cyber Incident & Vulnerability Handling PM, IBM

(5)

Register today - visit

register today - visit

www.nuclearenergyinsider.com/asia

www.cybersummits.com/enterprise

or phone 1 800 814 3459

or phone

+44207375 7537

Session 4: People and Policy

Securing and Training a Skilled Workforce

` Hear strategies to ensure the cross over in

education of operational engineers and cyber security practitioners safeguarding the long term future success of your company

` Determine proven methods to guarantee the

depth of challenges in security are training are understood by those involved maximizing productivity

` Uncover tried and tested tactics for

transferring and building skills that ensures critical challenges are successfully met

` Discover initiatives to train the workforce in

up-to-date technologies and challenges that will give you the edge

Jay Bavisi, President & CEO, EC Council

End User Education and Awareness

` Realize that technology is necessary for

security but people and process are of equal or greater importance to guarantee complete security

` Understand that addressing people, process

and technology together will give a greater chance of maintaining and protecting the integrity of your IP networks

` Learn how to guarantee personnel are fully

educated, professional and competent through utilizing policy to build awareness

` Hear strategies to train security and network

personnel to keep a vigilant eye on the traffic patterns to discern the precursor anomalies of attack ensuring you are prepared

(Ret) General Mick Kicklighter, Director, Center for Infrastructure Protection & Homeland Security, GMU Marci McCarthy, CEO & President,

Tech Exec Networks

Finance Case Study: The Legal & Technical needs for a Governance Policy

` Discover the legal side of the emerging

and evolving threat driving the need for regulations

` Hear an expert led guide through enterprise

policy and governance to ensure your compliance

` Discuss who bares the loss from successful

attack and how to mitigate loss through PCI compliance to ensure you stay profitable

` Expert lead guide to the skills of the good

and bad guys exemplifying the need for upcoming legislation giving you the same edge as the pros

Ken Baylor, VP / CISO of Security & Anti-Fraud, Wells Fargo

April 17th - 18th, Hyatt Place, San Jose, CA, USA

GROUP DISCOUNTS

More heads are better than one! Maximise the benefits to your business, and ensure valuable lessons make it back to the office, by sending a team to this event.

Qualify for a group discount?

Contact nsheel@FCBusinessIntelligence.com

or call on +44 (0) 207 375 7537

Session 5: Securing Emerging

Technology

Telecoms Case Study: The Rise of ‘Dig Data’

` Learn how to ensure the volume of data

you are managing is stored correctly and securely to help increase work flow

` Discover the latest techniques to guarantee

the security and strength of stored data allowing you to be confident in the

protection of your critical information assets

` Hear the need to regulate and act upon

the volume of data stored about any given individual to ensure no harmful breach results

` Uncover the latest legislation regulating

the security and privacy of stored data to ensure you aren’t caught out and stay ahead of the competition

Catherine Lester, Security Architect, Verizon

Telecoms Case Study: Maximizing the Effectiveness and Security of the Cloud

` Hear the principal federal & state laws

regulating cloud activities to give you the competitive edge

` Uncover a due diligence checklist for you to

consult with before your enterprise enters a cloud service agreement

` Discover the risks of the cloud regarding

privacy, confidentiality & security of business information so you can mitigate these risks

` Learn how to utilize the cloud to enhance

ROI and optimize your security posture presenting the business case for cyber security advancements

TBC, Director Security & Governance, BT Global

Securing a Corporate Network that Includes Personal Devices: Bring Your Own Device (BYOD)

` Learn how to maximize the security of

a corporate network that accounts for a BYOD initiative giving you confidence in your security posture whilst optimizing enterprise wide efficiency

` Hear how to secure devices running off

multiple operating networks through policy enforcement, health checks and quarantine guaranteeing the protection of you assets whilst increasing workflow

` Uncover where your corporate data is being

stored remotely and just how secure it is so you can put clear strategies into action to ensure the security of your data

` Discover how you can utilize disk

encryption and the remote wiping of sensitive data when a device is lost or stolen ensuring your critical information stays in the right hands

Gene Fredriksen, Global CISO, Tyco Catherine Lester, Security Architect, Verizon

Session 6: Managing Regulations and

Compliance

Energy Case Study: Integrated Compliance: The Much Needed Evolution for IT Compliance Mandates

` Hear how to implement an IT security policy

to discover what is implemented and what is not providing you with a technological platform for mandates to maximize the effectiveness of you compliance activities

` Discover how to integrate and automate

compliance allowing you to present the business case for security risk management that will increase efficiency, build assurance and save money

` Uncover a methodology to prepare

for entering into heavily regulated new business areas with the addition of extra mandates ensuring you stay profitable

` Learn how to build a common library of

risk and control covering all mandates and controls whilst listing the business risks they mitigate

Muni Chatarpal, Supervisor, Risk Management & Security, Enbridge Energy

Ola Lawal, Advisor,

Information Security & Risk, Enbridge

Defense Case Study: Strategic Look at the Emerging Threats and Regulations

` Take a long term look at the emerging

threats and compliance and what this means going forward to give you the same edge as the pros

` Hear strategies to implement the latest

innovative thinking to ensure you are constantly updating and adapting to stay ahead of the competition

` Discuss the changing compliance and

discover strategies to prepare for future changes in regulations mitigating the risk of failing to comply ensuring no costly violations

` Consider the emerging threat as it mutates

with time and learn what the regulators are doing to defend against this ensuring you are ahead of the game

Chris Leigh, Global IT Compliance & Risk Officer, UTC

The Need for a Unified and Universal Regulatory Initiative

` Discuss the needs and benefits of an

overarching universal regulatory system giving you the competitive edge

` Discover the benefits of working across

industry to achieve a common information security goal allowing you to be confident in the protection measures you are taking

` Hear if the drive for a universal regulation

of data is real and the timescale this will go through making you the go to expert on your return

` Identify which regulations you need to be

adhering and which will help you achieve true security and confidence

(6)

look at who you could be networking with in 2012

The Enterprise Cyber Security & Information Assurance Summit provides

outstanding networking opportunities for anyone involved with eGRC strategies to secure Critical Infrastructure. This is the premier cyber security meeting – attracting 150+ security & industry stakeholders. If security or compliance are part of your job role – you simply can’t afford to miss out!

We will be providing:

`Dedicated networking time across the conference

`Fully interactive panel sessions for you to identify yourself to the entire delegate audience as a topic expert

`Dedicated workshops, discussion groups, coffee breaks, lunches and evening drinks for you to target key clients

You could have more face to face conversations at this conference than in a year. Leading industry end users will be attending this conference to meet solution providers offering new technologies and strategies to reduce the cost and time of ensuring security and compliance. Sign up today and fill your order book!

Managing Directors Presidents Chief Executives

Chief Security Officer (CSO) Chief Information Security Officer (CISO)

Chief Information Officer (CIO) Chief Technology officer (CTO) Senior security leads/Engineers Cyber Security Managers Reliability Managers Director of Compliance Technical Directors Operational Security IT Security Standards Managers

Senior Information Protection Analyst Enterprise information

Security Principle

Senior/Chief Security Officers Compliance Specialist Cyber Security Architect Security Lead.

Senior Security Consultant Director, Network Security Practice Security Lead / Co-ordinator Director of Communications and Information System Security Chief Technologist

Senior Security Analyst Director / VP / Manager of Risk Director / VP / Manager Audit Director / VP / Manager Compliance Director / VP / Manager Information Security

Risk & compliance manager Corporate information

Take a look at the job titles this

conference will attract:

INDUSTRY END USERS

ATT Verizon T Systems BT Global VISA Ebay JP Morgan Chase Paypal Bank of America Well Fargo PGE SCE Sempra Raytheon Northrop Grumman Boeing Lockheed Martin SAIC

Specialist Solution Providers

RSA Symantec HP SAP Microsoft CISCO McAfee Tyco Invensys

Key Sponsorship and Exhibition Benefits

• This is the only Enterprise Cyber Security & Information

Assurance Summit with industry support covering the whole of North America – meet over a 150 key industry colleagues in 2days of intense business development.

• This is the exhibition that project managers and key decision makers will attend to source the latest services and technologies. Don’t get left behind by your competitors!

• Build your own cyber security brand through high level exposure on all our conference marketing,

on site and in person to fill your sales book for 2012 and beyond • Unlike many other industry

trade shows, exhibitions and conferences, our packages are not “one size fits all”. Tell us what you want to get out of the event, what your budget is and we will build it for you …simple!

Conference Room Coffee REGISTRATION Conference Room Coffee Coffee 1 2 10 9 8 1 2 3 4 5 6 7 8 3 4 5 6 7

Make a list of your most

important aims

• Exhibition booth • Brand visibility • Private meetings • Breakfast briefings • Speaking slots

• Conference material branding • Sponsor a session

register today - visit

visit www.cybersummits.com/enterprise

or phone

+44 207 375 7537

Call me at FC Business Intelligence to

Exhibition space regularly sells out weeks in advance. Don’t miss out – secure your place today!

CAll NOW

Phillips - Business development Manager

iphillips

@

fcbusinessintelligence.com

+

44 207 375 4304

The types of Organization this conference is

aimed at attracting:

Work out your budget

Speak with your marketing team and decide your annual confer-ence investment – make sure you assign the right budget to the right show. No matter what your budget is we will work with you to build a package that achieves your aims and exceeds expectations.

50%

20%

10%

15%

5%

Industry End Users

Government Software Providers Solution Providers Other Department of Defence GICSR NICE FBI DHS NSA NIST CERT ISA

Government Agencies and Trade Associations

(7)

register today - visit

visit www.cybersummits.com/enterprise

or phone

+44 207 375 7537

Date & Venue

February 17th - 18th, 2012 Hyatt Place, San Jose, CA, USA

Hotel Discount

FC Business Intelligence has negotiated a discounted rate for all conference attendees. Simply quote the name of the conference when booking your accommodation

4 Reasons why your company needs you here...

1.

Meet with your clients and competitors: find out what lessons they have learned, the initiatives they

are putting in place and what solutions are leading the way in cyber security

2.

Gain invaluable knowledge and insight into cost and time effective compliance, security and

strategies to ensure the successful integration of new technology

3.

Return to the office armed with critical cyber security industry knowledge. It will be your ideas,

strategies and contacts that ensure your business leads the way when it comes to Cyber Security

4.

Save your department time and money by attending this one stop shop for all things regarding cyber

security; give your company the chance to make 2012 the most profitable year ever!

Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before March 16th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. Design by www.thecreativetree.co.uk

REGISTER NOW IN 3 EASY STEPS

I enclose a check/draft for:

(Payable to First Conferences Ltd)

Please invoice my company:

Purchase Order Number: Please charge my credit card: Amex Visa Mastercard

Credit card number:

Expiry date: Security number: Name on card:

Signature:

Pass Features

PLATINUM PASS

GOLD PASS

POST CONFERENCE MATERIALS

` Full access to conference, workshops and exhibition

` Full access to all lunches, breaks

` Full access to all networking events

` Full Post Conference Materials including audio recordings,

PDF presentation files and digital attendee list

Super Early Bird Price - Before February 17

$1795

$1595

$495

Early Bird Price - Before March 16

$1995

$1795

Full price

$2195

$1995

1. Select Your Registration Package

3. Payment Options

MORE

WAYS TO

REGISTER

CALL

CALL (0) 207 375 7537

FAX:

+44 (0) 207 375 7576

EMAIL: nsheel@fcbusinessintelligence.com

ONLINE:

www.cybersummits.com/enterprise

Mr/Mrs/Ms/Dr: First name: Last name:

Company: Position/Title:

Telephone: Fax: Email:

Address: Zipcode: Country:

2. Enter Attendee details

DIScOunT cODE:

Enter the discount code when you register to save $100

ONLINE100

ENTERPRISE CYBER SECURITY & INFORMATION

ASSURANCE SUMMIT

17-18 April, 2012, San Jose, California, USA

Researched & Organized by:

I have been impressed with the level of understanding and research undertaken by the organisers, the quality of speakers will surely make this an event no one will want to miss

David Spinks, CSIRS

save

$

400

register before

February 17

(8)

And many more

Host Organization:

Government & Trade:

Industry Insight From:

Expert Speakers

End User Perspective

4 EASY WAYS

TO REGISTER

CALL

CALL (0) 207 375 7537

FAX:

+44 (0) 207 375 7576

EMAIL: nsheel@eyeforenergy.com

ONLINE:

www.cybersummits.com/enterprise

Discover

the emerging national and federal initiatives driving

your industry forward giving you the competitive edge

Develop

a clear process to efficiently manage the changing

regulatory landscape ensuring effective and efficient compliance

establish

a clear governance policy to enhance awareness

through education to generate confidence in the security of your

system

learn

to mitigate risk through certification & prioritization and

build resilience, improve response times and enhance system

robustness

builD

a clear plan to navigate the rapidly evolving threat

landscape and guarantee the protection of your critical

information and operational assets

realize

how to certify the secure deployment of the latest

technologies to maximize the protection of your critical assets

and guarantee ROI

ENTERPRISE CYBER SECURITY &

INFORMATION ASSURANCE SUMMIT

17-18 April, 2012, San Jose, California, USA

As we navigate new and uncertain challenges in the digital age, we must also address the growing threat cyberattacks present to our transportation networks, electricity grid, financial systems and other assets and infrastructure.

US President Barack Obama, 2011

Researched & Organized by: With the increasing number of regulations and threats

facing information assets, the time to invest in this area has never been more critical. Especially when considering the cost of the breakdown of one critical infrastructure could top $230bn

save

$

400

register before

February 17

DEVELOP STRATEGIES TO UTILIZE PEOPLE,

PROCESS & TECHNOLOGY TO OPTIMIZE YOUR

GOVERNANCE, RISK & COMPLIANCE MANAGEMENT

Join 150

+

Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information Sharing and Business

Development at the Premier Industry Gathering:

www.cybersummits.com/enterprise

ExClUSIvE

Case Studies from

:

`SEMPRA `ENBRIDGE `Raytheon ` BT Global ` Wells Fargo ` Verizon ` JP Morgan Chase ` UTC ` FBI

References

Related documents

It provides an advisory function to the Cyber Security Program Manager (CSPM), Chief Information Officer (CIO) and Information Technology Policy Board (ITPB)..

 Physical and cyber security managers and directors, Risk managers  Specialists/managers/directors of critical infrastructure security programs  Homeland security

Moderator: Dan Lohrmann, Chief Security Officer, Michigan Department of Technology, Management and Budget Panelist: Doug Robinson, National Association of State Chief

National Cyber Security Awareness Month Webinar October 7, 2015... Chief Information Security and Privacy Officer – King

Under the authority of the Department of Homeland Security (DHS) Chief Information Officer (CIO), the Chief Information Security Officer (CISO) bears the primary responsibility

1) Review reports from senior management regarding cyber security risks, cyber attacks, and cyber risk management plans?. 2) Monitor whether the company is adequately managing

 State energy agencies need to build the capability to address cyber security with in their scope of work and address cyber security with in their scope of work and

All personnel who provide leadership support above the project level, including the Chief Information Officer, the CIO Staff, Directors and Senior Managers within the IT