3rd Next Generation Cyber Security for Utilities

3rd Next Generation Cyber Security for Utilities

3rd Next Generation Cyber Security for Utilities
Denver, CO
February 13 – 14, 2019

Staying a Step Ahead of Increasingly-Sophisticated Cyber Threats

With the value of damages caused by cyber-attacks growing rapidly every year, adopting a new and comprehensive approach to cyber security for utilities is more important than ever. Among essential facilities that feel this pressure, few feel it more than our utilities. Cyber incidents have the potential to bring regional economic growth to a grinding halt, especially when they target the lifeblood of our modern civilizations. With threats becoming more sophisticated and gaining better resources, security professionals must continue to adapt and develop their methods of defense and response to ensure the uninterrupted production of our power.

Confirmed Speakers Include:

– Todd Ponto, Chief Technology Officer, AESI
– Dave Trask, Information & Control Systems Principal Engineer, Canadian Nuclear Laboratories
– Ryan Spelman, Senior Director of Business Development, Center for Internet Security
– Kaitlin Brennan, Manager of Cyber & Infrastructure Security, Edison Electric Institute
– Ralph King, Cyber Security Program Manager, Electric Power Research Institute
– Charles Salas, Manager of Industrial Cyber Security, Exelon
– Simon Slobodnik, IT Specialist, Federal Energy Regulatory Commission
– Andrew Bochman, Senior Cyber & Energy Security Strategist, Idaho National Laboratory
– Glen Chason, Senior Consultant of Industrial Control Systems, Mandiant
– Jim Cunningham, Executive Director, Protect Our Power
– Brian Gatus, Principal Manager of Indirect Procurement, Southern California Edison
– Reid Fudge, CISO/Enterprise Risk Management, Tri-State Generation and Transmission Association
– Todd Ponto, Chief Technology Officer, AESI
And many more

Topics that we will cover include:

– Leveraging cyber security to achieve resiliency without compromise
– Technological and strategic cyber security options for municipal utilities
– Early detection of threats to operational systems to enhance preparedness
– Building a real-time incident response plan to eradicate malicious files, software, and other harmful threats
– Deploying a set of controls to mitigate cyber attacks
– Analysis of whether to own security operations or to outsource to a third party
– Monitoring weaknesses exposed by guidelines to identify the main vulnerability areas within the organization
– The value of physical and cyber security convergence

Exclusive Tour of Tri-State Generation & Transmission

During the afternoon of Tuesday 12th February a limited number of conference attendees will receive the unique opportunity to attend a site tour to Tri-State Generation & Transmission.

All participants are invited to join the site tour at no extra fee. Spaces are limited and will be allocated on a first come – first served basis. Please register your attendance when booking for the conference.

Related Posts

Article Topics

 |   |   | 

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Research

Biometrics White Papers

Biometrics Events

Explaining Biometrics