The 2nd Next Generation Cyber Security for Utilities

November 8 & 9, 2017 - Washington, DC, USA

The 2nd Next Generation Cyber Security for Utilities

With an increased number and breadth of cyber threats being launched against countries in general, and utilities in particular, a new and comprehensive approach to cyber security for utilities is more important than ever. The 2nd Next Generation Cyber Security for Utilities will address these issues.

The inherent potential for a ripple effect that it can produce easily translates into national defense concerns, thus prompting regulatory guidelines for the industry. It can also be a matter of significantly jeopardizing personal safety as well as economic growth.

Layered security architecture options, which are tailored to specific customers; consistent and continuous maintenance of defenses; and a broad engagement of diverse customer groups, have become an integral part of business development and growth. Cyber security technology often serves as an essential element in business upkeep, as well as a key instrument for customer outreach, engagement, and participation. Cyber security antics and innovative technology pervade business training efforts, and inform many of the internal and external threats, as well as their solutions.

Ensuring safe and reliable operation is the fundamental mission of a utility. If controls or communications for grid assets fail, the equipment must continue to operate in a safe, reliable manner, even in non-ideal situations.

Key Topics

Through a series of presentations, sessions, and panel discussions, this event will cover some of the major current concerns of the industry.

  • The evolution of cyber security for utilities and where you stand in the spectrum
  • Analysis of whether to own security operations or to outsource to a third party
  • Leveraging cyber security to achieve resiliency without compromise
  • Practice and Training sessions to raise internal awareness to cyber threats
  • Technological and strategic cyber security options for municipal utilities
  • Emerging threats in utility security
  • Protecting control systems from internal attacks
  • Protecting against utility worker imposters and energy theft
  • Monitoring weaknesses exposed by guidelines to identify the main vulnerability areas within the organization
  • Early detection of threats to operational systems to enhance preparedness
  • Continued security and monitoring of OT (Operational Technology / Control system) networks
  • Deploying a set of controls to mitigate cyber attacks
  • The value of physical and cyber security convergence
  • Configuration change management: challenges and solutions
  • Recovery from breakdown
  • Building a real-time incident response plan to eradicate malicious files, software, and other harmful threats
  • The lack of understanding and effective tools to address the number 1 threat — Advanced Persistent Threat (or APT)

Who Will Attend

This two-day conference will offer excellent opportunities for you to network with your peers from other utility companies: CEOs, CIOs, CSOs, Vice-Presidents, Directors, and Senior Managers responsible for:

  • Cyber/Information Security
  • SCADA/Grid Security and/or Protection
  • Compliance and Regulatory Matters
  • Utilities and power generators
  • Physical/System Security
  • Energy management service providers
  • Data Management Centers
  • Customer service, customer care and customer programs
  • Planning, Governance, & Risk Management
  • Distribution companies
  • IT, Information, and Network Security

Agenda Highlights

  • The evolution of cyber security for utilities and where your company stands in the spectrum
  • Leverage cyber security to achieve resiliency without compromise
  • Risk management and insurance implications
  • Technological and strategic cyber security options for municipal utilities
  • Digital transformation calls for fundamental changes to existing it security strategies
  • Automatization of data collection, processing, and management
  • Safeguard utility control systems from external and internal attackers
  • Analysis of whether to own security operations or to outsource to a third party
  • Effective cyber security demands not only the technologists, but also input from other sectors and parts of the enterprise
  • Create effective partnerships between OT and IT leaders
  • Development of crisis management and site-specific security plans by electric companies
  • Provide concrete measures capable of protecting the evolving intelligent network against interruption, exploitation, compromise, or outright attacks
  • Improving cyber security: The diversity imperative
  • Panel discussion: Strategy is the best security

Active Communications International, Inc. (ACI) is a leader in conference planning and production. With offices in Chicago, London, Pune, Portland, Poznań and Milwaukee, we produce world-class events focusing on areas of most relevance to our served industry sectors. We are dedicated to deliver high-quality, informative and value added strategic business conferences where audience members, speakers, and sponsors can transform their business, develop key industry contacts and walk away with new resources.

Jobs from Indeed