Post on 22-Jan-2015
description
And many more…
Host Organization:
Government & Trade:
Industry Insight From:
Expert Speakers End User Perspective
• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardgivingyouthecompetitiveedge
• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance
• establishacleargovernancepolicytoenhanceawarenessthrougheducationtogenerateconfidenceinthesecurityofyoursystem
• learntomitigateriskthroughcertification&prioritizationandbuildresilience,improveresponsetimesandenhancesystemrobustness
• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets
• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI
ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT
ExClUSIvE GAME-CHANGING INFORMATION INCUlDING…` Up-to-datecasestudiesfromkeyUSindustryendusersincluding:WellsFargo&UTC
` Experttechnicalanalysisonmajorindustrychallengesincludingintegratedriskmanagementandthe$300bn'bigdata'industryfromBTGlobal&Verizon
` CasestudiestobuildclearstrategiesforefficientandeconomiccompliancefromSempra&Enbridge
` PerspectivefromUSgovernmentagenciesincludingtheFBIandNSTAoninitiativestoensurethesecurityandreliabilityofcriticalinfrastructure
` Workshopsandroundtablesdiscussingtheinternationalthreatandcriticalinfrastructure&keyresourceprotectionfromGICSRindustryISACs
17-18 April, 2012, San Jose, California, USA
“ Aswenavigatenewanduncertainchallengesinthedigital
age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.
”
US President Barack Obama, 2011
Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassets,thetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn
save $400
register before February 17
DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT
www.cybersummits.com/enterpriseFor the latest speaker line up and agenda updates please visit:
Welcome to the enterprise cyber security & information assurance summit
Tel:+44(0)2073757537Email:nsheel@FCBusinessIntelligence.comwww.cybersummits.com/enterprise
Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459
Dear Reader,
In the past few years there have been land mark changes to the Cyber Security industry; from the implementation of integrated technology, to the game changing power of the countless publicized breaches and malware. This is all without mentioning the rapidly evolving regulatory and compliance landscape.
Toguaranteeasecureandefficiententerprisesystemitisvitaltoconsiderthethreecoredisciplinesofpeople,processandtechnology.ThewaytobalancetheseareasisthroughtheconceptofGovernance,Risk&Compliance(GRC).EnterpriseGRCbringsthematterofITsecuritytotheboardlevel,drivingspendingandinvestmentinthissector.
` The GRC market is estimated to be worth over $32bn
` By 2015 the US federal Cyber Security market will reach $15bn
` The USA alone spends $14BN a year on IT-governance
Theattacksof2011havetaughtusthatthethreatlandscapeisnotjustevolvingbutrapidlymutating.Thisrequiressecuritymanagerstoconsidernewandcreativetechniquestodetect,preventandprepareforabreachscenario.Withthecostofthebreakdownofonecriticalinfrastructuretopping$230bnandaddedcomplexitycomingfromtheincreasingnumberofregulationsandthefrequentdynamicchangesthisareaisgrowingrapidly.
Noonewantstobetheweaklinkinglobalinfrastructureorhavetheirreputationtarnishedbyabreacheventbutmaintainingsecurityandcomplianceinarapidlyevolvingindustryiscostly, time consuming and technically challenging.Itismorevitalthaneverforpublic/privatepartnershipstominimizerisk,maximizeresiliencyandensurebusinesscontinuity.
TheEnterpriseCyberSecuritySummitwillsupplyyourbusinesswith:
Thecriticalintelligenceandtoolsyouneedtobuildacosteffective,timeefficientcybersecuritystrategy
Keylessonsandtriedandtestedactionplanstomitigateriskandsave millions of USDincomplianceandreliability
Theinsight&connectionstosecureyourplaceinthisboomingindustry
TheEnterpriseCyberSecurity&InformationAssuranceSummitwillbringtogether150cybersecuritysubjectmatterandindustryexpertsfortwodaysofbusinesscriticalstrategy,unrivallednetworkingandstimulatingdiscussion.
IlookforwardtomeetingyouinSanJoseinApril.
Natasha SheelSeniorIndustryAnalystFC Business Intelligence
register today - visit www.cybersummits.com/enterprise or phone +44 207 375 7537
Enterprise Security Mangers – Protect Against Risk and Regulatory Violation
Withthechallengesandcostsofsecuringthereliabilityofyourinfrastructureincreasingrapidlyitisessentialtoapproachthesecomplexconcernswithdetailedplanning.Thisfocussedmeetingwillequipyouwiththeforesighttoeconomicallyensuretheresiliencyofyourassets.
` Industry leading case studies on integrated risk management and compliance solutions from Sempra & Enbridge
` Federal and national initiatives driving change in standards and auditing
` Government strategies to enhance resilience to cyber incidents and manage the cyber threat including the FBI Infragard partnership
Don’tgetcaughtoutbytherapidlychanginglandscapeandthecostofabreach.Discoverclearprovenstrategiesbeingimplementedbyyourinformationsecuritypeersbysigninguptoday!
Solution Providers – Cyber Security Activity is on the Rise…Asintegratedandmobiledevicesbecomeubiquitousitisvitalthatthetechnologysecuringkeyinformationassetsevolvewiththis.WiththelikelyhoodofaPearlHarbor-scaleintrusionin2012increasingmilitaryinformationsecurityspendingby50%to$9bn-thepotentialforhugecontractshasneverbeengreater!
Atthisgroundbreakingindustryeventyouwillhear…
` National risk management and security initiatives from international trend setters including BT & Wells Fargo
` Enterprise end user need for industry wide co-operation and standardization outlined by FBI and ISA
` Federal and national plans for regulations and enhancing security
JointhepremierCyberSecurityforumtoreceivemarketforecastandinsightintogovernmentleadindustrydriverstoaccuratelyplanyourbusinessfor2012andbeyond.
We’llputyouinfrontofindustryleadingbuyersfromacrossNorthAmericatofill your order books in 2 days!
What We Are Going To Do for You…
PracticalrealworldstrategiesandsharingbestpracticeareattheforefrontoftheEnterprise Cyber Security & Information Assurance Summit.Wearecommittedtoensuringyougoawaywithnewcontactsandthemostup-to-dateinformation.Mostimportantlyyouwillleaveknowingyourbusinessisgoingtomoveforward.
` REALIZE initiatives to ensure the security and reliability of critical infrastructure
` ASCERTAIN how to ensure cost effective and efficient security and compliance maintenance
` UNDERSTAND the persistent and evolving threats and how to securely integrate new technology
` LISTEN to case studies from leading end users and government bodies for how to successfully merge people, process & technology
` DISCOVER the innovative methods developed by global industry leaders to enhance system robustness and resiliency
“GICSRisproudtoassociatedthisgroundbreakingsummitbringingtogetherkeyseniorlevelITSecuritypersonneltotacklethekeychallengesfacingNorthAmericancriticalenterprises:
` Develop strategies to utilize people, process & technology
` Gain a positive ROI on your security and technology investment.
` Optimizing your governance, risk & compliance management
TheEnterpriseCyberSecuritySummitwilladdressthekeyissuesintheIndustryandprovidethesecurity,andtechnology-relatedinsightnecessarytomaketherightdecisions.”Richard Zaluski, Executive VP, GICSR
MORNING AFTERNOON EXTRAS
Day 1
April 17th
•IndustryDrivers:latestonWhitehouse,DoDandDHSinitiatives•Lookingatthestandardsandtheirevolutiontomanagingyourgovernance&compliancestrategy
•Mitigatingtheriskandunderstandingthethreat•BuildingincidentresponseplansandSIEM
•RedDragonRisingWorkshop:ManagingInternationalCyberThreat•CISOroundtable•Networkingdrinksreception
Day 2 April 18th
•Maximizingsecuritythroughmergingpeople,process&technology•Ensuringaneducated&awareworkforce
•Managingregulationthroughintegratedrisksolutions•Breachscenarioevent
•CriticalInfrastructureandKeyResourceProtectionworkshop•RedDragonRisingWorkshop:ManagingChineseCyberThreat
Conference at a glance
register today - visit www.cybersummits.com/enterprise or phone +44 (0) 207 375 7537
Discover the expert speakers representing the critical enterprises you work with...
Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459
KEYNOTE SPEAKERSJay Bavisi, President & CEO, EC Council
John Chesson, Special Agent, FBI
Munillal Chatarpal, Manager - Risk Management & Security, enbridge energy
Ola Lawal, Corporate Security Officer, enbridge energy
Alexander Kunz, Security Governance Manager, sempra
CRITICAL INFRASTRUCTURE PERSPECTIVE GOVERNMENT & TRADE BODIES:
Deborah Kobza, Executive Director / CEO, Gicsr & nh-isac
Richard Zaluski, Executive Vice President - International, Gicsr
Larry Clifton, CEO / President, internet security alliance
(RET) General Mick Kicklighter, Director, Department of cip and homeland security
Steve Haynes, Director - Cyber Security & information Assurance, Whitehouse national security telecommunications advisory committee
INDUSTRY EXPERTS INCLUDING:
Peter Allor, Senior Security Strategist, Cyber Incident & Vulnerability Handling, ibM
Gene Fredriksen, Global CISO, tYco
Ernie Rakaczky, Principal Security Architect, invensys
William Hagestad II, Lieutenant Colonel US Marine Corps (RET), Chief Cyber Security Strategist, red-Dragon rising
Marci McCarthy, President CEO, tech exec networks
Ken Baylor, VP / CISO of Security & Antifraud, Wells Fargo
David Gavilan, Executive Director & Assistant General Counsel, Jp Morgan chase
ENERGY
FINANCE
Director – Governance, Risk, Compliance, bt Global
Catherine Lester, Solutions Architect, verizon
Director, raytheon
Christopher Leigh, Global IT Compliance & Risk Officer, utc
COMMUNICATION
DEFENSE
register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
Session 1: Industry Drivers Guide to National Policies and Initiatives` Hearthelegislationandstandardsassociatedwithcybersecurity&informationassuranceputtingyouaheadofthecompetition` Realizethetruerequirementforsecurityasintelligentandintegratedtechnologybecomesarealitygivingyouthecompetitiveedge` Learnhowtosecurelyintegratetechnologytoenhanceyourproductivityandreliability` DiscoverthetruepotentialforintegratedoperationstoensurethesecurityofNorthAmericancriticalInfrastructure
DeborahKobza,President&CEO,GICSR
The Economic & Legal Driver for Cyber Security` Discussthekeyeconomicmechanismsdrivingthecyberattacker/infiltratorandlearnhowtodeterminehowtheyapplytoyourindustryandfirmhelpingyoutomitigatethisrisk` Determineifinefficientcybersecuritycoordinationnormsdrivenbyprofitisplacingyourenterpriseandsupplychainatriskallowingyoutofocusyourprotectionstrategies` Learnhowtomeasure,monetize,andincentivizein-firmcybersecuritygiventheinsiderthreatisemergingasthemostcostlyvectormaximizingyoursecurityposture` Establishwherecybersecuritypolicyandinvestmentdecisionsshouldbemadeinyourorganizationalstructureenhancingyourefficiency
(Ret)GeneralMickKicklighter,Director,CenterforInfrastructureProtection&HomelandSecurity,GMU
Cyber Security: The Legal Issues` Learnabouttheneedforalegalframeworkforregulatoryobligationsproducingoptimumefficiencyandproductivity` Recognizeandavoidcommonmistakesbyimplementingclearenterprisewidepoliciesthroughasteeringcommitteewithattendancefromallbusinessdepartmentsmaximizingyourefficiency` Hearhowpoliciesmanagedbyalegalteamcanensurenoglaringomissionsinmanagingtheflowandsensitivityofdatagivingyouconfidenceintheprotectionofyourcriticalinformationassets` Discoverexpertsuggestionstoensurepolicycompliancethroughawarenesstrainingandvulnerabilitytestingtomakeaninstantimpact
April 17th - 18th, Hyatt Place, San Jose, CA, USA
3 SIMPlE STEPS TO REGISTER do this before February 17th to save $400Email nsheel@FCBusinessIntelligence.com with BOOKME in the subject lineCall me now on +44 207 375 7537Or register on line at: www.cybersummits.com/enterprise
Session 3: Mitigating the riskEnergy Case Study: Integrated Risk Management Program` Discoverhowtointegrateallbusinessprocessesandtocombinethiswithrealworldthreatintelligenceallowingyoutorecognizeyourvulnerabilitiesandprioritizeyoursecurityactivities` LearnhowtotrackandrecognizegapsinyouroperationsR&Dandinvestmenttohelpyoustayproductive` HearSempra’sfouryearplantomapandautomatetesting&compliancewhichwithmaturitywillleadtoacomputerincidentresponsethatmitigatestheposteventriskensuringyoustayprofitable` Discussthelongtermgoaltovisualizealldataensuringtrueenterpriseefficiency
AlexanderKunz,SecurityGovernanceManager,Sempra
Building Multi-layer Security and SEIM Systems` DevelopingprovenandeffectivestrategiesofprotectionmergingITandphysicaltechniquestomaximizeyoursystemsecurity` Learntechniquestomonitorwhatishappeningbothinsideandoutsidetheoffice–deployingSEIM-systemstomitigaterisk` Mastertheartofeducatingpersonnelinhowtoprotecttheirindustrymaximizingsecurityandefficiency` DebatethedifferencesbetweenSEIMsystems,howeachworks,whataretheirstrengthsandhowtoensureyouutilizethebestsystemtosuityourpurpose
ErnieRakaczky,PrincipalSecurityArchitect,Invensys
Federal Case Study: Enterprise Wide Risk Management Template` LearntoconceptualizecybersecurityawayfromapurelyITchallengegivingyouthecompetitiveedgeinthesecurityfield` Heartheneedtoconsiderthefinancial,legal&compliancechallengesalongwiththoseofITensuringyoumaximizeyourproductivity` DiscovertheneedtoshifttheownershipofthecybersecurityprogramtoachiefriskofficerwhositsoutsidetheITspherehelpingtomakeyourenterprisesecurityvisionareality` Realizehowyoucanutilizethisshifttoeducatetheentireenterprisemitigatingtheinsiderthreatandminimizingtheriskofmultimodalattacksonthepersonenhancingyouroverallsecurityposture
LarryClinton,CEOPresident,
Internet Security Alliance
Session 2: Managing the threatFederal Case Study: Cyber Security Trends & the FBI Infragard Partnership` Discovertheneedforbusinessestoworktogetherinpredicting,preventing,detectingandrespondingtoincidentstoensurethesecurityofnationalcriticalinfrastructures` HeartheFederalBureauofInvestigationspartnershipwiththeprivatesectortopromotecybersecurityknowledgeandinnovationbysharingintelligencetocreateasecureandresilientcyberenvironment` Understandtheinsiderthreatandtheneedforincreasedawarenessandpreventioninordertokeepyourbusinesssafe` FBIledsessionintothecurrenttrendsincybersecurity&counterintelligenceallowingyoutobuildaclearprotectionstrategyforyourbusiness
JohnChesson,SpecialAgent,FBI
Understanding the International Advanced Persistent Threat` LearnmoreabouttheChineseWarfareStrategyfromrealworldcasestudiestobuildyourawarenesstofocusyoursecurityefforts` Takeawayaseriesoftacticalandstrategiccybernetworkattackmitigationshort&longtermmatricesforapplicationandusetomaximizeprotection` HearareviewofChineseWarfarecomputernetworkexploitsacrosstheentiretechnicaltaxonomytoenhancetheefficiencyofyoursecurityplan` ExaminetheChineseCyberThreatfromInformationWarfarethroughthebroadrangeofmilitary,civilianandcommerciallysupportedcyber-attackvectorstohelpensuretheresilienceofyourassets
(Ret)ColonelBillHagestad,CSO,Red Dragon rising
Building a Long Term Incident Response Plan` Understandingthethreats,vulnerabilitiesandconsequencesofabreachtoguaranteefullpreparationforabreachscenarioensuringsystemresiliency` Buildaclearactionplanforwhenthesystemfailstoimproveyourresiliencyandrecoverywhilstminimizingyourdowntime` IBMleddiscussionofthelongtermrecoveryfromanincidentandutilizingthelessonslearnedtoenhancetheoverallstrengthofyoursystem` Discovertheoperationalbenefitsofcybersecurityinordertobuildsystemrobustness
PeterAllor,SeniorSecurityStrategist,Cyber
Incident&VulnerabilityHandlingPM,IBM
Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459register today - visit www.cybersummits.com/enterprise or phone +44207375 7537
Session 4: People and PolicySecuring and Training a Skilled Workforce` Hearstrategiestoensurethecrossoverineducationofoperationalengineersandcybersecuritypractitionerssafeguardingthelongtermfuturesuccessofyourcompany` Determineprovenmethodstoguaranteethedepthofchallengesinsecurityaretrainingareunderstoodbythoseinvolvedmaximizingproductivity` Uncovertriedandtestedtacticsfortransferringandbuildingskillsthatensurescriticalchallengesaresuccessfullymet` Discoverinitiativestotraintheworkforceinup-to-datetechnologiesandchallengesthatwillgiveyoutheedge
JayBavisi,President&CEO,EC Council
End User Education and Awareness` Realizethattechnologyisnecessaryforsecuritybutpeopleandprocessareofequalorgreaterimportancetoguaranteecompletesecurity` Understandthataddressingpeople,processandtechnologytogetherwillgiveagreaterchanceofmaintainingandprotectingtheintegrityofyourIPnetworks` Learnhowtoguaranteepersonnelarefullyeducated,professionalandcompetentthroughutilizingpolicytobuildawareness` Hearstrategiestotrainsecurityandnetworkpersonneltokeepavigilanteyeonthetrafficpatternstodiscerntheprecursoranomaliesofattackensuringyouareprepared
(Ret)GeneralMickKicklighter,Director,CenterforInfrastructureProtection&HomelandSecurity,GMU
MarciMcCarthy,CEO&President,Tech Exec Networks
Finance Case Study: The Legal & Technical needs for a Governance Policy` Discoverthelegalsideoftheemergingandevolvingthreatdrivingtheneedforregulations` Hearanexpertledguidethroughenterprisepolicyandgovernancetoensureyourcompliance` DiscusswhobaresthelossfromsuccessfulattackandhowtomitigatelossthroughPCIcompliancetoensureyoustayprofitable` Expertleadguidetotheskillsofthegoodandbadguysexemplifyingtheneedforupcominglegislationgivingyouthesameedgeasthepros
KenBaylor,VP/CISOofSecurity&Anti-Fraud,
Wells Fargo
April 17th - 18th, Hyatt Place, San Jose, CA, USA
GROUP DISCOUNTS Moreheadsarebetterthanone!Maximisethebenefitstoyourbusiness,andensurevaluablelessonsmakeitbacktotheoffice,bysendingateamtothisevent.
Qualify for a group discount?Contactnsheel@FCBusinessIntelligence.comorcallon+44 (0) 207 375 7537
Session 5: Securing Emerging Technology
Telecoms Case Study: The Rise of ‘Dig Data’` Learnhowtoensurethevolumeofdatayouaremanagingisstoredcorrectlyandsecurelytohelpincreaseworkflow` Discoverthelatesttechniquestoguaranteethesecurityandstrengthofstoreddataallowingyoutobeconfidentintheprotectionofyourcriticalinformationassets` Heartheneedtoregulateandactuponthevolumeofdatastoredaboutanygivenindividualtoensurenoharmfulbreachresults` Uncoverthelatestlegislationregulatingthesecurityandprivacyofstoreddatatoensureyouaren’tcaughtoutandstayaheadofthecompetition
CatherineLester,SecurityArchitect,Verizon
Telecoms Case Study: Maximizing the Effectiveness and Security of the Cloud` Heartheprincipalfederal&statelawsregulatingcloudactivitiestogiveyouthecompetitiveedge` Uncoveraduediligencechecklistforyoutoconsultwithbeforeyourenterpriseentersacloudserviceagreement` Discovertherisksofthecloudregardingprivacy,confidentiality&securityofbusinessinformationsoyoucanmitigatetheserisks` LearnhowtoutilizethecloudtoenhanceROIandoptimizeyoursecurityposturepresentingthebusinesscaseforcybersecurityadvancements
TBC,DirectorSecurity&Governance,BT Global
Securing a Corporate Network that Includes Personal Devices: Bring Your Own Device (BYOD)` LearnhowtomaximizethesecurityofacorporatenetworkthataccountsforaBYODinitiativegivingyouconfidenceinyoursecurityposturewhilstoptimizingenterprisewideefficiency` Hearhowtosecuredevicesrunningoffmultipleoperatingnetworksthroughpolicyenforcement,healthchecksandquarantineguaranteeingtheprotectionofyouassetswhilstincreasingworkflow` Uncoverwhereyourcorporatedataisbeingstoredremotelyandjusthowsecureitissoyoucanputclearstrategiesintoactiontoensurethesecurityofyourdata` Discoverhowyoucanutilizediskencryptionandtheremotewipingofsensitivedatawhenadeviceislostorstolenensuringyourcriticalinformationstaysintherighthands
GeneFredriksen,GlobalCISO,Tyco
CatherineLester,SecurityArchitect,Verizon
Session 6: Managing Regulations and Compliance
Energy Case Study: Integrated Compliance: The Much Needed Evolution for IT Compliance Mandates` HearhowtoimplementanITsecuritypolicytodiscoverwhatisimplementedandwhatisnotprovidingyouwithatechnologicalplatformformandatestomaximizetheeffectivenessofyoucomplianceactivities` Discoverhowtointegrateandautomatecomplianceallowingyoutopresentthebusinesscaseforsecurityriskmanagementthatwillincreaseefficiency,buildassuranceandsavemoney` Uncoveramethodologytoprepareforenteringintoheavilyregulatednewbusinessareaswiththeadditionofextramandatesensuringyoustayprofitable` Learnhowtobuildacommonlibraryofriskandcontrolcoveringallmandatesandcontrolswhilstlistingthebusinessriskstheymitigate
MuniChatarpal,Supervisor,RiskManagement&Security,Enbridge Energy
OlaLawal,Advisor,Information Security & Risk, Enbridge
Defense Case Study: Strategic Look at the Emerging Threats and Regulations` Takealongtermlookattheemergingthreatsandcomplianceandwhatthismeansgoingforwardtogiveyouthesameedgeasthepros` Hearstrategiestoimplementthelatestinnovativethinkingtoensureyouareconstantlyupdatingandadaptingtostayaheadofthecompetition` Discussthechangingcomplianceanddiscoverstrategiestoprepareforfuturechangesinregulationsmitigatingtheriskoffailingtocomplyensuringnocostlyviolations` Considertheemergingthreatasitmutateswithtimeandlearnwhattheregulatorsaredoingtodefendagainstthisensuringyouareaheadofthegame
ChrisLeigh,GlobalITCompliance&RiskOfficer,UTC
The Need for a Unified and Universal Regulatory Initiative` Discusstheneedsandbenefitsofanoverarchinguniversalregulatorysystemgivingyouthecompetitiveedge` Discoverthebenefitsofworkingacrossindustrytoachieveacommoninformationsecuritygoalallowingyoutobeconfidentintheprotectionmeasuresyouaretaking` Hearifthedriveforauniversalregulationofdataisrealandthetimescalethiswillgothroughmakingyouthegotoexpertonyourreturn` Identifywhichregulationsyouneedtobeadheringandwhichwillhelpyouachievetruesecurityandconfidence
look at who you could be networking with in 2012TheEnterpriseCyberSecurity&InformationAssuranceSummitprovidesoutstandingnetworkingopportunitiesforanyoneinvolvedwitheGRCstrategiestosecureCriticalInfrastructure.Thisisthepremiercybersecuritymeeting–attracting150+security&industrystakeholders.Ifsecurityorcompliancearepartofyourjobrole–yousimplycan’taffordtomissout!
We will be providing: `Dedicated networking time across the conference
` Fully interactive panel sessions for you to identify yourself to the entire delegate audience as a topic expert
`Dedicated workshops, discussion groups, coffee breaks, lunches and evening drinks for you to target key clients
Youcouldhavemorefacetofaceconversationsatthisconferencethaninayear.Leadingindustryenduserswillbeattendingthisconferencetomeetsolutionprovidersofferingnewtechnologiesandstrategiestoreducethecostandtimeofensuringsecurityandcompliance.Signuptodayandfillyourorderbook!
ManagingDirectorsPresidentsChiefExecutivesChiefSecurityOfficer(CSO)ChiefInformationSecurityOfficer(CISO)ChiefInformationOfficer(CIO)ChiefTechnologyofficer(CTO)Seniorsecurityleads/EngineersCyberSecurityManagersReliabilityManagersDirectorofComplianceTechnicalDirectorsOperationalSecurityITSecurityStandardsManagersSeniorInformationProtectionAnalystEnterpriseinformationSecurityPrinciple
Senior/ChiefSecurityOfficersComplianceSpecialistCyberSecurityArchitectSecurityLead.SeniorSecurityConsultantDirector,NetworkSecurityPracticeSecurityLead/Co-ordinatorDirectorofCommunicationsandInformationSystemSecurityChiefTechnologistSeniorSecurityAnalystDirector/VP/ManagerofRiskDirector/VP/ManagerAuditDirector/VP/ManagerComplianceDirector/VP/ManagerInformationSecurityRisk&compliancemanagerCorporateinformation
Take a look at the job titles this conference will attract:
INDUSTRY END USERS
ATTVerizonTSystemsBTGlobalVISAEbay
JPMorganChasePaypalBankofAmericaWellFargoPGESCE
SempraRaytheonNorthropGrummanBoeingLockheedMartinSAIC
Specialist Solution Providers
RSASymantecHP
SAPMicrosoftCISCO
McAfeeTycoInvensys
Key Sponsorship and Exhibition Benefits
• ThisistheonlyEnterpriseCyberSecurity&InformationAssuranceSummitwithindustrysupportcoveringthewholeofNorthAmerica–meetovera150keyindustrycolleaguesin2daysofintensebusinessdevelopment.
• Thisistheexhibitionthatprojectmanagersandkeydecisionmakerswillattendtosourcethelatestservicesandtechnologies.Don’tgetleftbehindbyyourcompetitors!
• Buildyourowncybersecuritybrandthroughhighlevelexposureonallourconferencemarketing,onsiteandinpersontofillyoursalesbookfor2012andbeyond
• Unlikemanyotherindustrytradeshows,exhibitionsandconferences,ourpackagesarenot“onesizefitsall”.Telluswhatyouwanttogetoutoftheevent,whatyourbudgetisandwewillbuilditforyou…simple!
Conference Room
Coffee
REGISTRATION
Conference Room
Coffee
Coffee
1 2 10 9 8
1
2
3
4
5
6
7
8
3 4 5 67
Make a list of your most important aims
•Exhibitionbooth
•Brandvisibility
•Privatemeetings
•Breakfastbriefings
•Speakingslots
•Conferencematerialbranding•Sponsorasession
register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
Call me at FC Business Intelligence to
Exhibitionspaceregularlysellsoutweeksinadvance.Don’tmissout–secureyourplacetoday!
CAll NOWPhillips - Business development Manageriphillips@fcbusinessintelligence.com
+44 207 375 4304
The types of Organization this conference is aimed at attracting:
Work out your budget
Speakwithyourmarketingteamanddecideyourannualconfer-enceinvestment–makesureyouassigntherightbudgettotherightshow.Nomatterwhatyourbudgetiswewillworkwithyoutobuildapackagethatachievesyouraimsandexceedsexpectations.
50%20%
10%15%
5%
Industry End Users
Government
Software Providers
Solution Providers
Other
DepartmentofDefenceGICSRNICE
FBIDHSNSA
NISTCERTISA
Government Agencies and Trade Associations
Break Down of Audience at Previous FC Cyber Summits
register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537
Date & VenueFebruary 17th - 18th, 2012Hyatt Place, San Jose, CA, USA
Hotel DiscountFC Business Intelligence has negotiated a discounted rate for all conference attendees. Simply quote the name of the conference when booking your accommodation
4 Reasons why your company needs you here...
1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they are putting in place and what solutions are leading the way in cyber security
2. Gain invaluable knowledge and insight into cost and time effective compliance, security and strategies to ensure the successful integration of new technology
3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas, strategies and contacts that ensure your business leads the way when it comes to Cyber Security
4. Save your department time and money by attending this one stop shop for all things regarding cyber security; give your company the chance to make 2012 the most profitable year ever!
Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before March 16th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. Design by www.thecreativetree.co.uk
REGISTER NOW IN 3 EASY STEPS
I enclose a check/draft for:
(Payable to First Conferences Ltd)
Please invoice my company:
Purchase Order Number: Please
charge my credit card: Amex Visa Mastercard
Credit card number:
Expiry date: Security number:
Name on card:
Signature:
Pass Features PLATINUM PASS GOLD PASS POST CONFERENCE MATERIALS
` Full access to conference, workshops and exhibition ` Full access to all lunches, breaks ` Full access to all networking events ` Full Post Conference Materials including audio recordings,
PDF presentation files and digital attendee list Super Early Bird Price - Before February 17 $1795 $1595
$495 Early Bird Price - Before March 16 $1995 $1795
Full price $2195 $1995
1. Select Your Registration Package
3. Payment Options
MORE WAYS TO REGISTER
CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: nsheel@fcbusinessintelligence.comONLINE: www.cybersummits.com/enterprise
Mr/Mrs/Ms/Dr: First name: Last name:
Company: Position/Title:
Telephone: Fax: Email:
Address: Zipcode: Country:
2. Enter Attendee details DIScOunT cODE:
Enter the discount code when you register to save $100
ONLINE100
ENTERPRISE CYBER SECURITY & INFORMATION
ASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA
Researched & Organized by:
“ Ihavebeenimpressedwiththelevelofunderstandingandresearchundertakenbytheorganisers,thequalityofspeakerswill
surelymakethisaneventnoonewillwanttomiss
” David Spinks, CSIRS
save $400
register before February 17
And many more…
Host Organization:
Government & Trade:
Industry Insight From:
Expert Speakers End User Perspective
4 EASY WAYS TO REGISTER
CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: nsheel@eyeforenergy.comONLINE: www.cybersummits.com/enterprise
• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardgivingyouthecompetitiveedge
• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance
• establishacleargovernancepolicytoenhanceawarenessthrougheducationtogenerateconfidenceinthesecurityofyoursystem
• learntomitigateriskthroughcertification&prioritizationandbuildresilience,improveresponsetimesandenhancesystemrobustness
• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets
• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI
ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT17-18 April, 2012, San Jose, California, USA
“ Aswenavigatenewanduncertainchallengesinthedigital
age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.
”
US President Barack Obama, 2011
Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassets,thetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn
save $400
register before February 17
DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT
Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information Sharing and Business
Development at the Premier Industry Gathering: www.cybersummits.com/enterprise
ExClUSIvE Case Studies from:
` SEMPRA
` ENBRIDGE
` Raytheon
` BTGlobal
` WellsFargo
` Verizon
` JPMorganChase
` UTC
` FBI