Enterprise cyber security (2)

8
And many moreHost Organization: Government & Trade: Industry Insight From: Expert Speakers End User Perspective DISCOVER the emerging national and federal initiatives driving your industry forward giving you the competitive edge DEVELOP a clear process to efficiently manage the changing regulatory landscape ensuring effective and efficient compliance ESTABLISH a clear governance policy to enhance awareness through education to generate confidence in the security of your system LEARN to mitigate risk through certification & prioritization and build resilience, improve response times and enhance system robustness BUILD a clear plan to navigate the rapidly evolving threat landscape and guarantee the protection of your critical information and operational assets REALIZE how to certify the secure deployment of the latest technologies to maximize the protection of your critical assets and guarantee ROI ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT EXCLUSIVE GAME-CHANGING INFORMATION INCULDING` Up-to-date case studies from key US industry end users including:Wells Fargo & UTC ` Expert technical analysis on major industry challenges including integrated risk management and the $300bn 'big data' industry from BT Global & Verizon ` Case studies to build clear strategies for efficient and economic compliance from Sempra & Enbridge ` Perspective from US government agencies including the FBI and NSTA on initiatives to ensure the security and reliability of critical infrastructure ` Workshops and roundtables discussing the international threat and critical infrastructure & key resource protection from GICSR industry ISACs 17-18 April, 2012, San Jose, California, USA As we navigate new and uncertain challenges in the digital age, we must also address the growing threat cyberattacks present to our transportation networks, electricity grid, financial systems and other assets and infrastructure. US President Barack Obama, 2011 Researched & Organized by: With the increasing number of regulations and threats facing information assets, the time to invest in this area has never been more critical. Especially when considering the cost of the breakdown of one critical infrastructure could top $230bn SAVE $400 register before February 17 DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT www.cybersummits.com/enterprise For the latest speaker line up and agenda updates please visit:

description

Develop Strategies to Utilize People, Process & Technology to Optimize your Governance, Risk & Compliance Management

Transcript of Enterprise cyber security (2)

Page 1: Enterprise cyber security (2)

And many more…

Host Organization:

Government & Trade:

Industry Insight From:

Expert Speakers End User Perspective

• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardgivingyouthecompetitiveedge

• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance

• establishacleargovernancepolicytoenhanceawarenessthrougheducationtogenerateconfidenceinthesecurityofyoursystem

• learntomitigateriskthroughcertification&prioritizationandbuildresilience,improveresponsetimesandenhancesystemrobustness

• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets

• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI

ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT

ExClUSIvE GAME-CHANGING INFORMATION INCUlDING…` Up-to-datecasestudiesfromkeyUSindustryendusersincluding:WellsFargo&UTC

` Experttechnicalanalysisonmajorindustrychallengesincludingintegratedriskmanagementandthe$300bn'bigdata'industryfromBTGlobal&Verizon

` CasestudiestobuildclearstrategiesforefficientandeconomiccompliancefromSempra&Enbridge

` PerspectivefromUSgovernmentagenciesincludingtheFBIandNSTAoninitiativestoensurethesecurityandreliabilityofcriticalinfrastructure

` Workshopsandroundtablesdiscussingtheinternationalthreatandcriticalinfrastructure&keyresourceprotectionfromGICSRindustryISACs

17-18 April, 2012, San Jose, California, USA

“ Aswenavigatenewanduncertainchallengesinthedigital

age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.

US President Barack Obama, 2011

Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassets,thetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn

save $400

register before February 17

DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT

www.cybersummits.com/enterpriseFor the latest speaker line up and agenda updates please visit:

Page 2: Enterprise cyber security (2)

Welcome to the enterprise cyber security & information assurance summit

Tel:+44(0)2073757537Email:[email protected]/enterprise

Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459

Dear Reader,

In the past few years there have been land mark changes to the Cyber Security industry; from the implementation of integrated technology, to the game changing power of the countless publicized breaches and malware. This is all without mentioning the rapidly evolving regulatory and compliance landscape.

Toguaranteeasecureandefficiententerprisesystemitisvitaltoconsiderthethreecoredisciplinesofpeople,processandtechnology.ThewaytobalancetheseareasisthroughtheconceptofGovernance,Risk&Compliance(GRC).EnterpriseGRCbringsthematterofITsecuritytotheboardlevel,drivingspendingandinvestmentinthissector.

` The GRC market is estimated to be worth over $32bn

` By 2015 the US federal Cyber Security market will reach $15bn

` The USA alone spends $14BN a year on IT-governance

Theattacksof2011havetaughtusthatthethreatlandscapeisnotjustevolvingbutrapidlymutating.Thisrequiressecuritymanagerstoconsidernewandcreativetechniquestodetect,preventandprepareforabreachscenario.Withthecostofthebreakdownofonecriticalinfrastructuretopping$230bnandaddedcomplexitycomingfromtheincreasingnumberofregulationsandthefrequentdynamicchangesthisareaisgrowingrapidly.

Noonewantstobetheweaklinkinglobalinfrastructureorhavetheirreputationtarnishedbyabreacheventbutmaintainingsecurityandcomplianceinarapidlyevolvingindustryiscostly, time consuming and technically challenging.Itismorevitalthaneverforpublic/privatepartnershipstominimizerisk,maximizeresiliencyandensurebusinesscontinuity.

TheEnterpriseCyberSecuritySummitwillsupplyyourbusinesswith:

Thecriticalintelligenceandtoolsyouneedtobuildacosteffective,timeefficientcybersecuritystrategy

Keylessonsandtriedandtestedactionplanstomitigateriskandsave millions of USDincomplianceandreliability

Theinsight&connectionstosecureyourplaceinthisboomingindustry

TheEnterpriseCyberSecurity&InformationAssuranceSummitwillbringtogether150cybersecuritysubjectmatterandindustryexpertsfortwodaysofbusinesscriticalstrategy,unrivallednetworkingandstimulatingdiscussion.

IlookforwardtomeetingyouinSanJoseinApril.

Natasha SheelSeniorIndustryAnalystFC Business Intelligence

register today - visit www.cybersummits.com/enterprise or phone +44 207 375 7537

Enterprise Security Mangers – Protect Against Risk and Regulatory Violation

Withthechallengesandcostsofsecuringthereliabilityofyourinfrastructureincreasingrapidlyitisessentialtoapproachthesecomplexconcernswithdetailedplanning.Thisfocussedmeetingwillequipyouwiththeforesighttoeconomicallyensuretheresiliencyofyourassets.

` Industry leading case studies on integrated risk management and compliance solutions from Sempra & Enbridge

` Federal and national initiatives driving change in standards and auditing

` Government strategies to enhance resilience to cyber incidents and manage the cyber threat including the FBI Infragard partnership

Don’tgetcaughtoutbytherapidlychanginglandscapeandthecostofabreach.Discoverclearprovenstrategiesbeingimplementedbyyourinformationsecuritypeersbysigninguptoday!

Solution Providers – Cyber Security Activity is on the Rise…Asintegratedandmobiledevicesbecomeubiquitousitisvitalthatthetechnologysecuringkeyinformationassetsevolvewiththis.WiththelikelyhoodofaPearlHarbor-scaleintrusionin2012increasingmilitaryinformationsecurityspendingby50%to$9bn-thepotentialforhugecontractshasneverbeengreater!

Atthisgroundbreakingindustryeventyouwillhear…

` National risk management and security initiatives from international trend setters including BT & Wells Fargo

` Enterprise end user need for industry wide co-operation and standardization outlined by FBI and ISA

` Federal and national plans for regulations and enhancing security

JointhepremierCyberSecurityforumtoreceivemarketforecastandinsightintogovernmentleadindustrydriverstoaccuratelyplanyourbusinessfor2012andbeyond.

We’llputyouinfrontofindustryleadingbuyersfromacrossNorthAmericatofill your order books in 2 days!

What We Are Going To Do for You…

PracticalrealworldstrategiesandsharingbestpracticeareattheforefrontoftheEnterprise Cyber Security & Information Assurance Summit.Wearecommittedtoensuringyougoawaywithnewcontactsandthemostup-to-dateinformation.Mostimportantlyyouwillleaveknowingyourbusinessisgoingtomoveforward.

` REALIZE initiatives to ensure the security and reliability of critical infrastructure

` ASCERTAIN how to ensure cost effective and efficient security and compliance maintenance

` UNDERSTAND the persistent and evolving threats and how to securely integrate new technology

` LISTEN to case studies from leading end users and government bodies for how to successfully merge people, process & technology

` DISCOVER the innovative methods developed by global industry leaders to enhance system robustness and resiliency

“GICSRisproudtoassociatedthisgroundbreakingsummitbringingtogetherkeyseniorlevelITSecuritypersonneltotacklethekeychallengesfacingNorthAmericancriticalenterprises:

` Develop strategies to utilize people, process & technology

` Gain a positive ROI on your security and technology investment.

` Optimizing your governance, risk & compliance management

TheEnterpriseCyberSecuritySummitwilladdressthekeyissuesintheIndustryandprovidethesecurity,andtechnology-relatedinsightnecessarytomaketherightdecisions.”Richard Zaluski, Executive VP, GICSR

Page 3: Enterprise cyber security (2)

MORNING AFTERNOON EXTRAS

Day 1

April 17th

•IndustryDrivers:latestonWhitehouse,DoDandDHSinitiatives•Lookingatthestandardsandtheirevolutiontomanagingyourgovernance&compliancestrategy

•Mitigatingtheriskandunderstandingthethreat•BuildingincidentresponseplansandSIEM

•RedDragonRisingWorkshop:ManagingInternationalCyberThreat•CISOroundtable•Networkingdrinksreception

Day 2 April 18th

•Maximizingsecuritythroughmergingpeople,process&technology•Ensuringaneducated&awareworkforce

•Managingregulationthroughintegratedrisksolutions•Breachscenarioevent

•CriticalInfrastructureandKeyResourceProtectionworkshop•RedDragonRisingWorkshop:ManagingChineseCyberThreat

Conference at a glance

register today - visit www.cybersummits.com/enterprise or phone +44 (0) 207 375 7537

Discover the expert speakers representing the critical enterprises you work with...

Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459

KEYNOTE SPEAKERSJay Bavisi, President & CEO, EC Council

John Chesson, Special Agent, FBI

Munillal Chatarpal, Manager - Risk Management & Security, enbridge energy

Ola Lawal, Corporate Security Officer, enbridge energy

Alexander Kunz, Security Governance Manager, sempra

CRITICAL INFRASTRUCTURE PERSPECTIVE GOVERNMENT & TRADE BODIES:

Deborah Kobza, Executive Director / CEO, Gicsr & nh-isac

Richard Zaluski, Executive Vice President - International, Gicsr

Larry Clifton, CEO / President, internet security alliance

(RET) General Mick Kicklighter, Director, Department of cip and homeland security

Steve Haynes, Director - Cyber Security & information Assurance, Whitehouse national security telecommunications advisory committee

INDUSTRY EXPERTS INCLUDING:

Peter Allor, Senior Security Strategist, Cyber Incident & Vulnerability Handling, ibM

Gene Fredriksen, Global CISO, tYco

Ernie Rakaczky, Principal Security Architect, invensys

William Hagestad II, Lieutenant Colonel US Marine Corps (RET), Chief Cyber Security Strategist, red-Dragon rising

Marci McCarthy, President CEO, tech exec networks

Ken Baylor, VP / CISO of Security & Antifraud, Wells Fargo

David Gavilan, Executive Director & Assistant General Counsel, Jp Morgan chase

ENERGY

FINANCE

Director – Governance, Risk, Compliance, bt Global

Catherine Lester, Solutions Architect, verizon

Director, raytheon

Christopher Leigh, Global IT Compliance & Risk Officer, utc

COMMUNICATION

DEFENSE

Page 4: Enterprise cyber security (2)

register today - visit www.cybersummits.com/enterprise or phone +44207375 7537

Session 1: Industry Drivers Guide to National Policies and Initiatives` Hearthelegislationandstandardsassociatedwithcybersecurity&informationassuranceputtingyouaheadofthecompetition` Realizethetruerequirementforsecurityasintelligentandintegratedtechnologybecomesarealitygivingyouthecompetitiveedge` Learnhowtosecurelyintegratetechnologytoenhanceyourproductivityandreliability` DiscoverthetruepotentialforintegratedoperationstoensurethesecurityofNorthAmericancriticalInfrastructure

DeborahKobza,President&CEO,GICSR

The Economic & Legal Driver for Cyber Security` Discussthekeyeconomicmechanismsdrivingthecyberattacker/infiltratorandlearnhowtodeterminehowtheyapplytoyourindustryandfirmhelpingyoutomitigatethisrisk` Determineifinefficientcybersecuritycoordinationnormsdrivenbyprofitisplacingyourenterpriseandsupplychainatriskallowingyoutofocusyourprotectionstrategies` Learnhowtomeasure,monetize,andincentivizein-firmcybersecuritygiventheinsiderthreatisemergingasthemostcostlyvectormaximizingyoursecurityposture` Establishwherecybersecuritypolicyandinvestmentdecisionsshouldbemadeinyourorganizationalstructureenhancingyourefficiency

(Ret)GeneralMickKicklighter,Director,CenterforInfrastructureProtection&HomelandSecurity,GMU

Cyber Security: The Legal Issues` Learnabouttheneedforalegalframeworkforregulatoryobligationsproducingoptimumefficiencyandproductivity` Recognizeandavoidcommonmistakesbyimplementingclearenterprisewidepoliciesthroughasteeringcommitteewithattendancefromallbusinessdepartmentsmaximizingyourefficiency` Hearhowpoliciesmanagedbyalegalteamcanensurenoglaringomissionsinmanagingtheflowandsensitivityofdatagivingyouconfidenceintheprotectionofyourcriticalinformationassets` Discoverexpertsuggestionstoensurepolicycompliancethroughawarenesstrainingandvulnerabilitytestingtomakeaninstantimpact

April 17th - 18th, Hyatt Place, San Jose, CA, USA

3 SIMPlE STEPS TO REGISTER do this before February 17th to save $400Email [email protected] with BOOKME in the subject lineCall me now on +44 207 375 7537Or register on line at: www.cybersummits.com/enterprise

Session 3: Mitigating the riskEnergy Case Study: Integrated Risk Management Program` Discoverhowtointegrateallbusinessprocessesandtocombinethiswithrealworldthreatintelligenceallowingyoutorecognizeyourvulnerabilitiesandprioritizeyoursecurityactivities` LearnhowtotrackandrecognizegapsinyouroperationsR&Dandinvestmenttohelpyoustayproductive` HearSempra’sfouryearplantomapandautomatetesting&compliancewhichwithmaturitywillleadtoacomputerincidentresponsethatmitigatestheposteventriskensuringyoustayprofitable` Discussthelongtermgoaltovisualizealldataensuringtrueenterpriseefficiency

AlexanderKunz,SecurityGovernanceManager,Sempra

Building Multi-layer Security and SEIM Systems` DevelopingprovenandeffectivestrategiesofprotectionmergingITandphysicaltechniquestomaximizeyoursystemsecurity` Learntechniquestomonitorwhatishappeningbothinsideandoutsidetheoffice–deployingSEIM-systemstomitigaterisk` Mastertheartofeducatingpersonnelinhowtoprotecttheirindustrymaximizingsecurityandefficiency` DebatethedifferencesbetweenSEIMsystems,howeachworks,whataretheirstrengthsandhowtoensureyouutilizethebestsystemtosuityourpurpose

ErnieRakaczky,PrincipalSecurityArchitect,Invensys

Federal Case Study: Enterprise Wide Risk Management Template` LearntoconceptualizecybersecurityawayfromapurelyITchallengegivingyouthecompetitiveedgeinthesecurityfield` Heartheneedtoconsiderthefinancial,legal&compliancechallengesalongwiththoseofITensuringyoumaximizeyourproductivity` DiscovertheneedtoshifttheownershipofthecybersecurityprogramtoachiefriskofficerwhositsoutsidetheITspherehelpingtomakeyourenterprisesecurityvisionareality` Realizehowyoucanutilizethisshifttoeducatetheentireenterprisemitigatingtheinsiderthreatandminimizingtheriskofmultimodalattacksonthepersonenhancingyouroverallsecurityposture

LarryClinton,CEOPresident,

Internet Security Alliance

Session 2: Managing the threatFederal Case Study: Cyber Security Trends & the FBI Infragard Partnership` Discovertheneedforbusinessestoworktogetherinpredicting,preventing,detectingandrespondingtoincidentstoensurethesecurityofnationalcriticalinfrastructures` HeartheFederalBureauofInvestigationspartnershipwiththeprivatesectortopromotecybersecurityknowledgeandinnovationbysharingintelligencetocreateasecureandresilientcyberenvironment` Understandtheinsiderthreatandtheneedforincreasedawarenessandpreventioninordertokeepyourbusinesssafe` FBIledsessionintothecurrenttrendsincybersecurity&counterintelligenceallowingyoutobuildaclearprotectionstrategyforyourbusiness

JohnChesson,SpecialAgent,FBI

Understanding the International Advanced Persistent Threat` LearnmoreabouttheChineseWarfareStrategyfromrealworldcasestudiestobuildyourawarenesstofocusyoursecurityefforts` Takeawayaseriesoftacticalandstrategiccybernetworkattackmitigationshort&longtermmatricesforapplicationandusetomaximizeprotection` HearareviewofChineseWarfarecomputernetworkexploitsacrosstheentiretechnicaltaxonomytoenhancetheefficiencyofyoursecurityplan` ExaminetheChineseCyberThreatfromInformationWarfarethroughthebroadrangeofmilitary,civilianandcommerciallysupportedcyber-attackvectorstohelpensuretheresilienceofyourassets

(Ret)ColonelBillHagestad,CSO,Red Dragon rising

Building a Long Term Incident Response Plan` Understandingthethreats,vulnerabilitiesandconsequencesofabreachtoguaranteefullpreparationforabreachscenarioensuringsystemresiliency` Buildaclearactionplanforwhenthesystemfailstoimproveyourresiliencyandrecoverywhilstminimizingyourdowntime` IBMleddiscussionofthelongtermrecoveryfromanincidentandutilizingthelessonslearnedtoenhancetheoverallstrengthofyoursystem` Discovertheoperationalbenefitsofcybersecurityinordertobuildsystemrobustness

PeterAllor,SeniorSecurityStrategist,Cyber

Incident&VulnerabilityHandlingPM,IBM

Page 5: Enterprise cyber security (2)

Register today - visit www.nuclearenergyinsider.com/asia or phone 1 800 814 3459register today - visit www.cybersummits.com/enterprise or phone +44207375 7537

Session 4: People and PolicySecuring and Training a Skilled Workforce` Hearstrategiestoensurethecrossoverineducationofoperationalengineersandcybersecuritypractitionerssafeguardingthelongtermfuturesuccessofyourcompany` Determineprovenmethodstoguaranteethedepthofchallengesinsecurityaretrainingareunderstoodbythoseinvolvedmaximizingproductivity` Uncovertriedandtestedtacticsfortransferringandbuildingskillsthatensurescriticalchallengesaresuccessfullymet` Discoverinitiativestotraintheworkforceinup-to-datetechnologiesandchallengesthatwillgiveyoutheedge

JayBavisi,President&CEO,EC Council

End User Education and Awareness` Realizethattechnologyisnecessaryforsecuritybutpeopleandprocessareofequalorgreaterimportancetoguaranteecompletesecurity` Understandthataddressingpeople,processandtechnologytogetherwillgiveagreaterchanceofmaintainingandprotectingtheintegrityofyourIPnetworks` Learnhowtoguaranteepersonnelarefullyeducated,professionalandcompetentthroughutilizingpolicytobuildawareness` Hearstrategiestotrainsecurityandnetworkpersonneltokeepavigilanteyeonthetrafficpatternstodiscerntheprecursoranomaliesofattackensuringyouareprepared

(Ret)GeneralMickKicklighter,Director,CenterforInfrastructureProtection&HomelandSecurity,GMU

MarciMcCarthy,CEO&President,Tech Exec Networks

Finance Case Study: The Legal & Technical needs for a Governance Policy` Discoverthelegalsideoftheemergingandevolvingthreatdrivingtheneedforregulations` Hearanexpertledguidethroughenterprisepolicyandgovernancetoensureyourcompliance` DiscusswhobaresthelossfromsuccessfulattackandhowtomitigatelossthroughPCIcompliancetoensureyoustayprofitable` Expertleadguidetotheskillsofthegoodandbadguysexemplifyingtheneedforupcominglegislationgivingyouthesameedgeasthepros

KenBaylor,VP/CISOofSecurity&Anti-Fraud,

Wells Fargo

April 17th - 18th, Hyatt Place, San Jose, CA, USA

GROUP DISCOUNTS Moreheadsarebetterthanone!Maximisethebenefitstoyourbusiness,andensurevaluablelessonsmakeitbacktotheoffice,bysendingateamtothisevent.

Qualify for a group [email protected]+44 (0) 207 375 7537

Session 5: Securing Emerging Technology

Telecoms Case Study: The Rise of ‘Dig Data’` Learnhowtoensurethevolumeofdatayouaremanagingisstoredcorrectlyandsecurelytohelpincreaseworkflow` Discoverthelatesttechniquestoguaranteethesecurityandstrengthofstoreddataallowingyoutobeconfidentintheprotectionofyourcriticalinformationassets` Heartheneedtoregulateandactuponthevolumeofdatastoredaboutanygivenindividualtoensurenoharmfulbreachresults` Uncoverthelatestlegislationregulatingthesecurityandprivacyofstoreddatatoensureyouaren’tcaughtoutandstayaheadofthecompetition

CatherineLester,SecurityArchitect,Verizon

Telecoms Case Study: Maximizing the Effectiveness and Security of the Cloud` Heartheprincipalfederal&statelawsregulatingcloudactivitiestogiveyouthecompetitiveedge` Uncoveraduediligencechecklistforyoutoconsultwithbeforeyourenterpriseentersacloudserviceagreement` Discovertherisksofthecloudregardingprivacy,confidentiality&securityofbusinessinformationsoyoucanmitigatetheserisks` LearnhowtoutilizethecloudtoenhanceROIandoptimizeyoursecurityposturepresentingthebusinesscaseforcybersecurityadvancements

TBC,DirectorSecurity&Governance,BT Global

Securing a Corporate Network that Includes Personal Devices: Bring Your Own Device (BYOD)` LearnhowtomaximizethesecurityofacorporatenetworkthataccountsforaBYODinitiativegivingyouconfidenceinyoursecurityposturewhilstoptimizingenterprisewideefficiency` Hearhowtosecuredevicesrunningoffmultipleoperatingnetworksthroughpolicyenforcement,healthchecksandquarantineguaranteeingtheprotectionofyouassetswhilstincreasingworkflow` Uncoverwhereyourcorporatedataisbeingstoredremotelyandjusthowsecureitissoyoucanputclearstrategiesintoactiontoensurethesecurityofyourdata` Discoverhowyoucanutilizediskencryptionandtheremotewipingofsensitivedatawhenadeviceislostorstolenensuringyourcriticalinformationstaysintherighthands

GeneFredriksen,GlobalCISO,Tyco

CatherineLester,SecurityArchitect,Verizon

Session 6: Managing Regulations and Compliance

Energy Case Study: Integrated Compliance: The Much Needed Evolution for IT Compliance Mandates` HearhowtoimplementanITsecuritypolicytodiscoverwhatisimplementedandwhatisnotprovidingyouwithatechnologicalplatformformandatestomaximizetheeffectivenessofyoucomplianceactivities` Discoverhowtointegrateandautomatecomplianceallowingyoutopresentthebusinesscaseforsecurityriskmanagementthatwillincreaseefficiency,buildassuranceandsavemoney` Uncoveramethodologytoprepareforenteringintoheavilyregulatednewbusinessareaswiththeadditionofextramandatesensuringyoustayprofitable` Learnhowtobuildacommonlibraryofriskandcontrolcoveringallmandatesandcontrolswhilstlistingthebusinessriskstheymitigate

MuniChatarpal,Supervisor,RiskManagement&Security,Enbridge Energy

OlaLawal,Advisor,Information Security & Risk, Enbridge

Defense Case Study: Strategic Look at the Emerging Threats and Regulations` Takealongtermlookattheemergingthreatsandcomplianceandwhatthismeansgoingforwardtogiveyouthesameedgeasthepros` Hearstrategiestoimplementthelatestinnovativethinkingtoensureyouareconstantlyupdatingandadaptingtostayaheadofthecompetition` Discussthechangingcomplianceanddiscoverstrategiestoprepareforfuturechangesinregulationsmitigatingtheriskoffailingtocomplyensuringnocostlyviolations` Considertheemergingthreatasitmutateswithtimeandlearnwhattheregulatorsaredoingtodefendagainstthisensuringyouareaheadofthegame

ChrisLeigh,GlobalITCompliance&RiskOfficer,UTC

The Need for a Unified and Universal Regulatory Initiative` Discusstheneedsandbenefitsofanoverarchinguniversalregulatorysystemgivingyouthecompetitiveedge` Discoverthebenefitsofworkingacrossindustrytoachieveacommoninformationsecuritygoalallowingyoutobeconfidentintheprotectionmeasuresyouaretaking` Hearifthedriveforauniversalregulationofdataisrealandthetimescalethiswillgothroughmakingyouthegotoexpertonyourreturn` Identifywhichregulationsyouneedtobeadheringandwhichwillhelpyouachievetruesecurityandconfidence

Page 6: Enterprise cyber security (2)

look at who you could be networking with in 2012TheEnterpriseCyberSecurity&InformationAssuranceSummitprovidesoutstandingnetworkingopportunitiesforanyoneinvolvedwitheGRCstrategiestosecureCriticalInfrastructure.Thisisthepremiercybersecuritymeeting–attracting150+security&industrystakeholders.Ifsecurityorcompliancearepartofyourjobrole–yousimplycan’taffordtomissout!

We will be providing: `Dedicated networking time across the conference

` Fully interactive panel sessions for you to identify yourself to the entire delegate audience as a topic expert

`Dedicated workshops, discussion groups, coffee breaks, lunches and evening drinks for you to target key clients

Youcouldhavemorefacetofaceconversationsatthisconferencethaninayear.Leadingindustryenduserswillbeattendingthisconferencetomeetsolutionprovidersofferingnewtechnologiesandstrategiestoreducethecostandtimeofensuringsecurityandcompliance.Signuptodayandfillyourorderbook!

ManagingDirectorsPresidentsChiefExecutivesChiefSecurityOfficer(CSO)ChiefInformationSecurityOfficer(CISO)ChiefInformationOfficer(CIO)ChiefTechnologyofficer(CTO)Seniorsecurityleads/EngineersCyberSecurityManagersReliabilityManagersDirectorofComplianceTechnicalDirectorsOperationalSecurityITSecurityStandardsManagersSeniorInformationProtectionAnalystEnterpriseinformationSecurityPrinciple

Senior/ChiefSecurityOfficersComplianceSpecialistCyberSecurityArchitectSecurityLead.SeniorSecurityConsultantDirector,NetworkSecurityPracticeSecurityLead/Co-ordinatorDirectorofCommunicationsandInformationSystemSecurityChiefTechnologistSeniorSecurityAnalystDirector/VP/ManagerofRiskDirector/VP/ManagerAuditDirector/VP/ManagerComplianceDirector/VP/ManagerInformationSecurityRisk&compliancemanagerCorporateinformation

Take a look at the job titles this conference will attract:

INDUSTRY END USERS

ATTVerizonTSystemsBTGlobalVISAEbay

JPMorganChasePaypalBankofAmericaWellFargoPGESCE

SempraRaytheonNorthropGrummanBoeingLockheedMartinSAIC

Specialist Solution Providers

RSASymantecHP

SAPMicrosoftCISCO

McAfeeTycoInvensys

Key Sponsorship and Exhibition Benefits

• ThisistheonlyEnterpriseCyberSecurity&InformationAssuranceSummitwithindustrysupportcoveringthewholeofNorthAmerica–meetovera150keyindustrycolleaguesin2daysofintensebusinessdevelopment.

• Thisistheexhibitionthatprojectmanagersandkeydecisionmakerswillattendtosourcethelatestservicesandtechnologies.Don’tgetleftbehindbyyourcompetitors!

• Buildyourowncybersecuritybrandthroughhighlevelexposureonallourconferencemarketing,onsiteandinpersontofillyoursalesbookfor2012andbeyond

• Unlikemanyotherindustrytradeshows,exhibitionsandconferences,ourpackagesarenot“onesizefitsall”.Telluswhatyouwanttogetoutoftheevent,whatyourbudgetisandwewillbuilditforyou…simple!

Conference Room

Coffee

REGISTRATION

Conference Room

Coffee

Coffee

1 2 10 9 8

1

2

3

4

5

6

7

8

3 4 5 67

Make a list of your most important aims

•Exhibitionbooth

•Brandvisibility

•Privatemeetings

•Breakfastbriefings

•Speakingslots

•Conferencematerialbranding•Sponsorasession

register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537

Call me at FC Business Intelligence to

Exhibitionspaceregularlysellsoutweeksinadvance.Don’tmissout–secureyourplacetoday!

CAll NOWPhillips - Business development [email protected]

+44 207 375 4304

The types of Organization this conference is aimed at attracting:

Work out your budget

Speakwithyourmarketingteamanddecideyourannualconfer-enceinvestment–makesureyouassigntherightbudgettotherightshow.Nomatterwhatyourbudgetiswewillworkwithyoutobuildapackagethatachievesyouraimsandexceedsexpectations.

50%20%

10%15%

5%

Industry End Users

Government

Software Providers

Solution Providers

Other

DepartmentofDefenceGICSRNICE

FBIDHSNSA

NISTCERTISA

Government Agencies and Trade Associations

Break Down of Audience at Previous FC Cyber Summits

Page 7: Enterprise cyber security (2)

register today - visit visit www.cybersummits.com/enterprise or phone +44 207 375 7537

Date & VenueFebruary 17th - 18th, 2012Hyatt Place, San Jose, CA, USA

Hotel DiscountFC Business Intelligence has negotiated a discounted rate for all conference attendees. Simply quote the name of the conference when booking your accommodation

4 Reasons why your company needs you here...

1. Meet with your clients and competitors: find out what lessons they have learned, the initiatives they are putting in place and what solutions are leading the way in cyber security

2. Gain invaluable knowledge and insight into cost and time effective compliance, security and strategies to ensure the successful integration of new technology

3. Return to the office armed with critical cyber security industry knowledge. It will be your ideas, strategies and contacts that ensure your business leads the way when it comes to Cyber Security

4. Save your department time and money by attending this one stop shop for all things regarding cyber security; give your company the chance to make 2012 the most profitable year ever!

Terms & Conditions: Special Needs - Special Needs – Places are transferable without any charge. Cancellations before March 16th 2012 incur an administrative charge of 25%. If you cancel your registration on or after March 16th 2012 we will be obliged to charge you the full fee. Please note – you must notify FC Business Intelligence ltd in writing, of a cancellation, or we will be obliged to charge you the full fee. The organizers reserve the right to make changes to the program without notice. All prices displayed are exclusive of VAT unless otherwise stated but, VAT will be charged, where applicable, at the prevailing rate on the invoice date and the relevant details will appear on the invoice. FC Business Intelligence takes every care to ensure that prices quoted are correct at time of publishing however, bookings will only be accepted if there is no material error in the price advertised on the website. Design by www.thecreativetree.co.uk

REGISTER NOW IN 3 EASY STEPS

I enclose a check/draft for:

(Payable to First Conferences Ltd)

Please invoice my company:

Purchase Order Number: Please

charge my credit card: Amex Visa Mastercard

Credit card number:

Expiry date: Security number:

Name on card:

Signature:

Pass Features PLATINUM PASS GOLD PASS POST CONFERENCE MATERIALS

` Full access to conference, workshops and exhibition ` Full access to all lunches, breaks ` Full access to all networking events ` Full Post Conference Materials including audio recordings,

PDF presentation files and digital attendee list Super Early Bird Price - Before February 17 $1795 $1595

$495 Early Bird Price - Before March 16 $1995 $1795

Full price $2195 $1995

1. Select Your Registration Package

3. Payment Options

MORE WAYS TO REGISTER

CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: [email protected]: www.cybersummits.com/enterprise

Mr/Mrs/Ms/Dr: First name: Last name:

Company: Position/Title:

Telephone: Fax: Email:

Address: Zipcode: Country:

2. Enter Attendee details DIScOunT cODE:

Enter the discount code when you register to save $100

ONLINE100

ENTERPRISE CYBER SECURITY & INFORMATION

ASSURANCE SUMMIT 17-18 April, 2012, San Jose, California, USA

Researched & Organized by:

“ Ihavebeenimpressedwiththelevelofunderstandingandresearchundertakenbytheorganisers,thequalityofspeakerswill

surelymakethisaneventnoonewillwanttomiss

” David Spinks, CSIRS

save $400

register before February 17

Page 8: Enterprise cyber security (2)

And many more…

Host Organization:

Government & Trade:

Industry Insight From:

Expert Speakers End User Perspective

4 EASY WAYS TO REGISTER

CALL CALL (0) 207 375 7537 FAX: +44 (0) 207 375 7576EMAIL: [email protected]: www.cybersummits.com/enterprise

• Discover theemergingnationalandfederalinitiativesdrivingyourindustryforwardgivingyouthecompetitiveedge

• Developaclearprocesstoefficientlymanagethechangingregulatorylandscapeensuringeffectiveandefficientcompliance

• establishacleargovernancepolicytoenhanceawarenessthrougheducationtogenerateconfidenceinthesecurityofyoursystem

• learntomitigateriskthroughcertification&prioritizationandbuildresilience,improveresponsetimesandenhancesystemrobustness

• builDaclearplantonavigatetherapidlyevolvingthreatlandscapeandguaranteetheprotectionofyourcriticalinformationandoperationalassets

• realizehowtocertifythesecuredeploymentofthelatesttechnologiestomaximizetheprotectionofyourcriticalassetsandguaranteeROI

ENTERPRISE CYBER SECURITY & INFORMATION ASSURANCE SUMMIT17-18 April, 2012, San Jose, California, USA

“ Aswenavigatenewanduncertainchallengesinthedigital

age,wemustalsoaddressthegrowingthreatcyberattackspresenttoourtransportationnetworks,electricitygrid,financialsystemsandotherassetsandinfrastructure.

US President Barack Obama, 2011

Researched & Organized by: Withtheincreasingnumberofregulationsandthreatsfacinginformationassets,thetimetoinvestinthisareahasneverbeenmorecritical.Especiallywhenconsideringthecostofthebreakdownofonecriticalinfrastructurecouldtop$230bn

save $400

register before February 17

DEVELOP STRATEGIES TO UTILIZE PEOPLE, PROCESS & TECHNOLOGY TO OPTIMIZE YOUR GOVERNANCE, RISK & COMPLIANCE MANAGEMENT

Join 150+ Cyber Security and ERM Colleagues for Two Business Critical Days of Analysis, Information Sharing and Business

Development at the Premier Industry Gathering: www.cybersummits.com/enterprise

ExClUSIvE Case Studies from:

` SEMPRA

` ENBRIDGE

` Raytheon

` BTGlobal

` WellsFargo

` Verizon

` JPMorganChase

` UTC

` FBI