ICS Cyber Security Energy & Utilities Forum Programme

Best International Cyber Security
Practises for Critical Energy
Infrastructure Protection
UPDATED
PROGRAMMES
& REGISTRATION
ICS Cyber Security Energy & Utilities Forum & Exhibition
May 11–14, 2015 Abu Dhabi, UAE
Workshop 1: ICS Cyber Security Awareness for Managers (NEW)
11 May
Workshop 2: Critical Infrastructure Protection:
Including Cyber Security in the Whole Lifecycle
11 May
Workshop 3: A Behind the Headlines Demonstration of Cyber-Attacks
on a Utility – A Hacker’s Perspective
11 May
ICS Cyber Security Energy & Utilities Forum Programme & Exhibition
Officially Supported by:
12–14 May
Supporting Groups:
itSMF
GULF
The IT Service Management Forum
Media Partners:
Official Web Portals:
Official Publications:
Middle East
ICS Cyber Security Energy & Utilities Forum
May 11-14, 2015 Abu Dhabi, UAE
CONTENTS
Advisory Committee .......................................................................................................... 2
ADVISORY COMMITTEE
Event Outline .................................................................................................................... 2
JAY ABDALLAH
Schneider Electric
AYMAN AL-ISSA
Booz Allen Hamilton
EYAD ALQADI
Cisco Systems Int.
NOURI OTHMAN AGHA
aeCERT
ERIC BYRES
Byres Security
NICK COLES
Dome Exhibitions
PAUL DOREY
CSO Confidential Ltd
ERIC KNAPP
Honeywell
JUSTIN LOWE
PA Consulting
GUY MEGUER
Airbus
ALEX TARTER
Ultra Electronics 3eTI
PAUL WRIGHT
Intel Security
SIMON GOLDSMITH
BAE Systems Applied Intelligence
Overview ............................................................................................................................ 3
Workshop 1 (NEW): ICS Cyber Security Awareness for Managers (May 11) ........................ 4
Workshop 2: Critical Infrastructure Protection: Including Cyber Security in the
Whole Lifecycle (May 11) ................................................................................................ 5
Workshop 3: A Behind the Headlines Demonstration of Cyber-Attacks on a
Utility – A Hacker’s Perspective (May 11) ........................................................................ 6
ICS Cyber Security Energy & Utilities Forum Programme (May 12–14) ............................ 7–9
ICS Cyber Security Energy & Utilities Exhibition (May 12–14) ............................................ 10
Exhibition Visitors ........................................................................................................ 10
Networking Opportunities
Conference Reception.................................................................................................... 10
Gala Dinner .................................................................................................................. 10
Venue ................................................................................................................................ 11
Accommodation ................................................................................................................ 11
About Abu Dhabi .............................................................................................................. 11
Visas .................................................................................................................................. 11
Who Will Attend .............................................................................................................. 11
Organisers.......................................................................................................................... 12
Registration .................................................................................................................... 12
LinkedIn Group .................................................................................................................. 12
ICS CYBER SECURITY ENERGY & UTILITIES EVENT TIMETABLE
07.00
Monday
May 11
Tuesday
May 12
Wednesday
May 13
Thursday
May 14
Registration –
all Workshops
Forum
Registration
08.00
12.00
13.00
Workshop 1
Luncheon
Workshop 2
Luncheon
Workshop 3
Luncheon
ICS Cyber Security Forum
Luncheon
14.00
16.00
Luncheon
ICS Cyber Security Forum
ICS Cyber Security Forum
Luncheon
ICS Cyber Security Energy & Utilities Exhibition
Workshop 1: ICS Cyber Security Awareness for Managers
Workshop 2: Critical Infrastructure Protection: Including Cyber Security in the Whole Lifecycle
Workshop 3: A Behind the Headlines Demonstration of Cyber-Attacks on a Utility – A Hacker’s Perspective
Page 2
19.00
Conference
Reception
ICS Cyber Security Energy & Utilities Exhibition
ICS Cyber Security Energy & Utilities Forum
18.00
Workshop 2
ICS Cyber Security Energy & Utilities Exhibition
ICS Cyber Security Forum
17.00
Gala
Dinner
OVERVIEW
Following on from the success of the first two Forums of May 2012 and October 2013, the 3rd ICS Cyber Security Energy & Utilities Forum has been
called to examine the issues of concern here in the region together with the growing number of international partnerships being formed around the
world to tackle and address the increasing number of cyber attacks. According to a recent ICS-CERT report, it highlighted that 53% of the cyber
security incidents worldwide during the first half of one year were related to the energy sectors. When it comes to this region it has been reported
that cyber attacks targeting key installations costs the Gulf countries $1B annually and is growing as exemplified by the recent Kaspersky report on
the current activities of a new group of hackers called ‘Desert Falcons’ targeting businesses throughout the Middle East. One more worrying factor
is that in the future cyber operations could change or manipulate electronic information thus distorting its integrity and therefore seriously affecting
management decision-making and system performance.
The focus of this Forum is expanded to include utilities as well as the hydrocarbon sector and their cyber protection needs, both of which are of vital
importance to the various countries in this region given their billion dollar expansion plans. As the GCC petroleum sector alone accounts for 49% of
its GDP, effective cyber security protection of this premium part of their critical national infrastructures is mandatory.
Qatar named cyber security as one of its top 3 research priorities last year together with Saudi Arabia and Bahrain. ictQATAR have recently spoken
about the upcoming regulations to safeguard people and businesses against cyber risks and establishing a streamlined ecosystem with a robust
legal and legislative framework including the Critical Information Infrastructure Protection Law. Kuwait has similarly entered into a $1B programme
involving cyber security with the UK and Oman is enhancing its cyber security programmes across the country and particularly in the energy and the
utilities sectors. Here in the UAE, according to a recent 3 year investigation by Symantec, data revealed that the UAE has the highest number of
communication system breaches across the Middle East. Moreover the UAE budget for cyber security is expected to double to $10 B within the next
decade.
Last year the UAE’s National Electronic Security Authority (NESA) announced a series of publications on a range of key strategies, policies and
standards to align and direct national cyber security efforts throughout the country. These documents included the National Cyber Security Strategy
(NCSS), Critical Information Infrastructure Policy (CIIP) and the UAE Information Assurance (IA) standard which collectively will work towards
enhancing the UAE national cyber security and ICT infrastructure and will be mandatory in their compliance.
Within this region all countries are building national organisations to protect their assets as these countries are also among the most highly
connected globally with high levels of internet usage for government, business and education and that is why cyber threats are growing in number
and sophistication.
Historically most Operational Technology (OT) networks were isolated from the Enterprise Networks and operated independently. However the
advent of internet based ICS systems due to the increased demand for greater business insight in real time has lead energy and utility companies
to integrate industrial control systems (ICS) and their enterprise IT systems in which potential problems can occur and have been demonstrated
internationally in doing so. Therefore those responsible for cyber security within an organisation must understand the difference between ICS and
IT system security in order for them to work together effectively. Moreover understanding the different needs of ICS and IT system security can only
lead to cooperation and collaboration between these historically disconnected camps. What is therefore the key to this, is to properly facilitate
Operational Security (OS), in much the same way that IT Security has come about, yet with different and complimentary parameters as is appropriate.
It comes as no surprise therefore that the market for ICS security is expected to top $10.33 billion by 2018. For example, designing a secure
architecture for a control system can be a difficult exercise as there are so many different types of systems in existence and so many possible
solutions, some of which might not be appropriate to the process control environment. Moreover the security of an organisation’s process control
system can be put at significant risk by third parties and securing the supply chain is one major area of concern.
Recent examples of encountered sector problems include a cyber attack on an
offshore platform that caused the tilting and resultant shutdown of the platform
and significant production losses. In the utility sector particular attention should
be paid to the cyber threats to the substation devices and most people advocate
that utilities and vendors work together to develop standardised processes to
overcome these potential device issues. As recently as 2 years ago, cyber security
was not in the top 10 areas of concern for utilities management and is now rated
as the fourth highest area of concern. A recent international review of utility
executives concluded that 48 % did not have integrated cyber, physical, corporate
and ICS security within their facilities. With regional plans for implementing smart
grids, greater attention needs to be paid to their cyber security needs particularly
as the 2014 Smart Grid Cyber Security Survey indicated 64 % of executives believe
the grid is not yet ready for security.
Page 3
www.csuae.org
WORKSHOP 1 (NEW)
Monday, May 11
ICS Cyber Security Awareness for Managers
In a world where there is often a disconnect between the
worlds of IT and OT, part of this issue is the need for managers
of these systems, from both sides of the firewall, to take
responsibility for understanding the opposing point of view.
This workshop has been designed to provide managers with an
understanding of today’s cyber security challenges. This
knowledge is vital when managing the security of their ICS
environments. The workshop will show how to best support
their organisations cyber security and risk mitigation/risk
reduction strategies for their ICS environments. HS and TC
have worked in partnership with the UK Centre for the
Protection of National Infrastructure and leading stakeholders
from UK Critical National Infrastructure (CNI) Industries to
develop this workshop.
What you will Learn on this Workshop
By the end of the workshop, you will know how to:
• Understand and identify what cyber security risks your ICS
face
• Understand what help is available from sources such as NESA,
CPNI and how to access this
• Identify the likely areas of weakness in your ICS environment
(people, process and technology)
• Recognise exactly where your ICS critical assets are vulnerable
• Understand what the organisational response to an ICS
security incident should look like and your responsibilities in
effectively managingthese
• Understand the need for ICS security awareness and training
in organisations at various levels
If you are a…
…Manager responsible for any ICS environment and/or people
working on securing these systems including:
•
•
•
•
Business Technical/Engineering/Procurement Lead
ICS Policy Maker
Site Single Point of Accountability (SPA) for Security
Site IT Manager
…then this workshop is for you.
It provides a high-level understanding of what the cyber
security risks are and the threats currently facing your ICS
environments. In addition, it discusses how to forward plan to
help mitigate and reduce these risks.
There are no pre-requisites for this workshop and no laptop
is required. All supporting material will be provided.
Workshop Duration and Contents
This half-day workshop, with Registration at 07.00 and
commencing at 08.00, consists of two sessions delivered
in a face-to-face environment. Session one covers the ICS
security risk landscape and ICS attack surface relevant to
your industry sector. Session 2 covers forward planning
including changing staff behaviours using security
awareness and cyber security incident management. The
Workshop concludes at 12.30 followed by Luncheon.
Session One –
• IT versus ICS – Similarities and differences
• ICS attack surface
• Introduction to ICS security risk management including
hacking demonstration
Session Two –
• Planning to reduce the cyber security risk
• Introduction to ICS cyber security incident management
Page 4
WORKSHOP LEADER
Tim Harwood, M.Inst.ISP, GSLC, FCMI, is Managing Director of
HS and T Consultancy. Tim is a veteran of the security world and
has been providing information security guidance and expertise
to corporate clients, the UK Government and the UK military for
over 30 years. As Managing Director of Harwood Security and
Training Consultancy, he provides strategic direction for the
company that he founded in 2013.
Tim’s professional background includes security capability
strategy planning and development, information security
capability framework design and implementation and security
awareness strategy design and implementation. He has
developed a security professional development framework for a
global top ten oil and gas company, delivers training as a
member of the SANS and Firebrand faculties and, as a thought
leader, regularly presents at summits and conferences.
In 2013, he participated as a Subject Matter Expert and Steering
Committee member for the design of the new GIAC certification,
the GICSP certification. As part of his work he contributed
questions for the certification exam and worked on the skills and
competency framework for the certification. In addition, he is an
Assessor and Interviewer for the IISP for potential new
members. Additionally, Tim has recently designed and delivered
ICS security training and awareness for CPNI (as part of the UK
National Cyber Security Strategy) as well as ENISA and other
National governments and global companies.
Tim is a Full member of the Institute of Information Security
Professionals (IISP), a Fellow of the Chartered Management
Institute (FCMI) and is the holder of the GIAC Security
Leadership (GSLC) and GIAC Security Essentials (GSEC)
Certifications. Tim is an elected member of the Board of
Directors for the Institute of Information Security Professionals
with the Board portfolio of IS skills and competencies.
WORKSHOP 2
Monday, May 11
Critical Infrastructure Protection:
Including Cyber Security in the Whole Lifecycle
Critical Infrastructures are systems and assets, whether
physical or virtual, so vital to the nations that the incapacity
or destruction of such systems and assets would have a
debilitating impact on security, national economic security,
national public health or safety, or any combination of those
matters. Their adequate protection is not only needed and
recommended, but mandatory since the publication of
different regulatory frameworks and national and
international directives all over the world.
Analyzing and understanding the associated risk to these
infrastructures and their basic relationship with Industrial
Control Systems (ICS) is a must for any professional
involved in different areas, such as ICT, energy, chemical and
nuclear industry, financial systems, public administration
or transport, among others.
This workshop will take the participants towards the study
of the state of the art of the Critical Infrastructures
Protection and Industrial Cyber Security all over the world.
A global approach to the protection of Industrial
Infrastructures including cybersecurity by design in all of
the stages of the life-cycle will be presented and explained.
The importance, definition and description of the Industrial
Cybersecurity Trusted Advisor (ICTA) role will be fully
explained and justified. At the end of the day the
participant will have the information and tools needed to
establish the next steps in the way of adequately protecting
the Industrial Infrastructure aligned with existing business,
market, regulation and risks requirements.
Topics Covered
• Current Critical Infrastructure Protection and Industrial
Cybersecurity landscape.
• Industrial Infrastructure evolution (convergence, IT vs OT)
• Threat landscape (Stuxnet, Dragonfly, BlackEnergy, etc...)
• Compliance: upcoming standards, regulations,
cybersecurity strategies, etc.
• Recent research projects (Basecamp, Robus, Shodan,
Shine, etc.)
• The Ecosystem: stakeholders, relations and
interdependencies
• Attacking Industrial Infrastructures: a Real Demonstration
• A real lab-based demo on how to take advantage of the
current weaknesses and vulnerabilities
• Industrial infrastructure from a cybersecurity perspective
• The industrial infrastructure projects lifecycle
• Industrial project cybersecurity risks (for each stage)
• Cybersecurity activities (for each stage)
• Cybersecurity solutions / technologies
• The industrial cybersecurity framework
• Implementing cybersecurity on industrial infrastructures
• Internal/External interdependencies (industrial and
cybersecurity vendors, system integrators, consultancies,
IT vs OT, etc.)
• Associated risks (audit/implement incompatibilities,
organizational risks, etc.)
• The Industrial Cybersecurity Trusted Advisor (ICTA) role
(description, advantages, approaches, etc.)
Please visit www.csuae.org for Workshop 2 Timetable
WORKSHOP LEADERS
Samuel Linares is Senior Lead Technologist at Booz Allen
Hamilton, Middle East and Asia Coordinator at Industrial
Cybersecurity Center, European Commission Independent
Evaluator, ENISA (European Network and Information
Security Agency) CIIP Expert and member of ISACA
Cybersecurity Task Force. With 2 decades of security,
system integration and multinational and multicultural
projects management experience, he has been the main
promoter of the “Industrial Cybersecurity” concept in
Spanish, being recognized as one of the key Spanish and
Latin-American experts.
Since 1999 Ignacio Paredes has been involved in multiple
projects related to information security and during the last
6 years he has specialized in cybersecurity for industrial
sectors. He is an expert in the design and deployment of
technical and administrative security solutions, including
topics such as applications security, secure network design,
critical infrastructure protection, ethical hacking or business
Page 5
continuity planning. He is also Middle East and Asia coordinator
for the Industrial Cybersecurity Center as well as an expert
assisting the implementation of the European Network and
Information Security Agency (ENISA) work programme in the
areas of Information Security Considerations, Information
Security Risk Management, International Standards and Best
Practices and Critical Information Infrastructure Protection.
Ayman Al Issa has over 20 years of experience in the fields of
Automation, Information Technology, and Cyber Security. He is a
member in the Cyber Security Advisory boards of top rated
worldwide universities for the advancement of researches on
industrial cyber security. He is an active member in different
international Security Innovation Alliances that are focused in a
worldwide program for improving the security of industrial control
systems by the close collaboration of the leading IT Security and
industrial control system vendors. Ayman worked for ADMA-OPCO
for 17 years and he was the Digital Oil Fields Cyber Security Advisor.
He joined Booz Allen Hamilton in 2014 as the Chief Technologist
& Senior Advisor/Architect in Industrial Cyber Security – MENA.
WORKSHOP 3
Monday, May 11
A Behind the Headlines Demonstration of Cyber-Attacks on a
Utility – A Hacker’s Perspective
You have all read about the intimidating Stuxnet,
BlackEnergy, Havex, or Sandworm threats that have been
discovered throughout the world, would you now like to see
what’s behind the headlines and how it affects you? Join us
for a hands-on workshop that will provide a real-life
demonstration on how to turn off the water to a country, or
plunge a city into darkness. There is a perception that only
nation states are capable of launching a cyber-attack
against utilities and industrial control systems, during this
workshop we will show you that the reality is anyone from
your employees to hacktivists are capable of doing it.
Who Should Attend
If you have ever wanted to see real attacks against an ICS,
or demystify the technical aspects of cyber security then
this workshop is for you. The workshop content is
appropriate for both senior management-level supervisors
as well as operationally astute technical decision makers.
Most participants are motivated by opportunities to learn
about or apply best security practices to industrial network
protection. This workshop is designed to help attendants
learn how an attacker can comprise your system and how
you can learn to protect yourselves.
WORKSHOP LEADER
Alex Tarter is an expert and thought leader on new
technologies and solutions for industrial and
commercial applications for the protection of critical
infrastructure. In addition to the work he does
developing security solutions, Alex performs
vulnerability and cyber security work for military and
industrial applications, having prepared more than 50
reports on various aspects of security, cryptography,
and situational awareness for industry, UK MoD, and
US DoD.
He holds a PhD from Lancaster University, and a
Master's of Engineering from Imperial College London,
and is a certified specialist in ISA 99/IEC 62443 cyber
security fundamentals.
He serves as a civilian advisory expert to NATO on
Cyber Defense for the Industrial Resources and
Communications Services Group.
Key Take-Aways
• Learn how to work through the vulnerabilities of an
industrial control system
• Experience first-hand how you can be exploited
• Take steps on what can be done to protect yourselves
• Walk-through real-attacks launched against real
industrial equipment and the damage that can be caused
Page 6
WORKSHOP 3 TIMES
Registration will be at 07.00
The workshop will begin at 08.00
Refreshments will be taken at 10.00
The workshop will conclude at 12.30 followed by lunch
ICS Cyber Security Energy & Utilities Forum Programme
Tuesday, May 12
07.30
Registration and Refreshments
12.00
Luncheon
08.15
WELCOME and INTRODUCTION
13.30
08.30
KEYNOTE ADDRESS
Mike McConnell,
Strategic Advisor and former Vice Chairman,
Booz Allen Hamilton,
Former Director of National Intelligence, USA
SESSION B
Chair: Justin Lowe
09.00
SESSION A
Chair: Aarnout Wennekers,
Advisor (Audit and Corporate Governance),
Ministry of Energy, Qatar
Topics raised in this session focus on the importance of
designing and building ICS security architectures to
provide greater assurance to its stakeholders that the
risks are being managed to acceptable levels. Also there
will be a showcase of a real experiment operating a
network of ICS honeynets deployed over several
continents and what were the lessons learned and how
this knowledge was fed back into the national
standards. Moreover the concept of ICS security will be
demonstrated through case studies in different critical
infrastructure sectors, to show the real value of
industrial network monitoring going beyond the
detection of cyber-attacks, and how the need to
maintain awareness about network and process
operations, which together with actionable intelligence
allows the preservation of overall system health.
This session will focus on specific national cyber
security frameworks giving guidance on how critical
systems need to be adequately protected and how they
compare with a classical approach. Topics covered and
debated will include guidance on understanding the
business risks, selecting and implementing security
improvements, establishing effective response
capabilities and give insights as to how they will
develop and be implemented.
09.00
09.35
RECENT DEVELOPMENTS ON THE FRENCH
LEGAL FRAMEWORK FOR CRITICAL NATIONAL
INFRASTRUCTURE: NEW CYBER LAWS
Pierre-Mayeul Badaire,
Product Unit Director, ERCOM, UAE
COLLABORATIVE CYBER DEFENSE CASE
FINLAND
Vesa Jaakkola, Codenomicon Ltd, Finland
10.10
Refreshments and Exhibition
10.40
ICS SECURITY – A GOOD PRACTICE FRAMEWORK
Justin Lowe, Energy Sector Cyber Security Expert,
PA Consulting, UK
11.15
PANEL SESSION
The speakers in Session A will be joined by other
senior industry figures
Page 7
13.30
BUILDING RESILIENT CYBER SECURITY
ARCHITECTURES FOR INDUSTRIAL CONTROL
SYSTEMS
Christopher Beggs, Managing Director,
Security Infrastructure Solutions (SIS), Australia
14.05
THE GOOD, THE BAD AND THE U-GLY:
45 DAYS OF ICS HONEYNET
Omar Sherin, Head of CIIP, QCERT, Qatar
14.40
Refreshments and Exhibition
15.10
WHERE CYBERSECURITY MEETS OPERATIONAL
VALUE
Damiano Bolzoni, Managing Director,
SecurityMatters, Netherlands
15.45
UNDERSTANDING THE VIEW FROM THE OTHER
SIDE OF THE FIREWALL
Tim Harwood, Managing Director,
Harwood Security and Training Consultancy, UK
16.20
PANEL SESSION
Session B speakers will be joined by other leading
practitioners
17.00
FORUM RECEPTION – EXHIBITION
18.30
CLOSE of DAY 1
ICS Cyber Security Energy & Utilities Forum Programme
Wednesday, May 13
08.00
Delegates Check In and Refreshments
12.45
08.30
SESSION C
Chair: Guy Meguer,
General Manager Middle East,
Cyber Security, AIRBUS, UAE
14.00
CYBER SECURITY IN ENERGY & UTILITIES –
RISK AND REWARD
Simon Goldsmith, Director, Cyber Security,
BAE Systems Applied Intelligence, UAE
CYBER SECURITY FOR PROCESS CONTROL
NETWORK
Debraj Chakraborty,
Solution Sales Specialist (Security),
YOKOGAWA, Bahrain
09.40
Refreshments and Exhibition
10.10
SECURE OPERATIONS
Eyad Alqadi,
Vertical Sales Manager – Oil & Gas Industry,
CISCO, UAE
10.45
CYBER RESPONSE STRATEGIES IN ICS
Greg Day, CTO, FireEye, UK
11.20
CYBER SECURITY COMPLIANCE; HOW TO ENSURE
THE RUBBER HITS THE ROAD
Mohamed Zumla, Cyber Security Consultant, Qatar
11.55
OIL & GAS PANEL SESSION
The speakers in Session C will be joined by
Imran Almarzooqi, Senior IT Security Engineer,
ADCO, UAE
09.05
SESSION D
This session will provide practical answers to challenging
risk management issues including:
• Determining your Risk Appetite: how much risk is
acceptable?
• Understanding the equations: measurements and
methodologies
• Assessing vulnerabilities in industrial control
environments
• Identifying threats within the context of risk
management
• Using risk measurements to enable stronger cyber
security
This session will include an introduction to new tools and
techniques for performing a cyber security risk
assessment. The briefing will include: methods of threat
detection; methods of vulnerability assessment;
determining impact and consequence; technology
controls for mitigating risk; and more. The session will
focus on technical controls only and will not cover risks
associated with personnel or policy.
This session commences with a presentation revealing
why the emergence of the next industrial revolution
provides a unique opportunity for industrial enterprises
and their automation providers to secure their
operational technology. It will be followed by a brief
overview of the potential threats to the process industry
from cyber-attacks and how they can be mitigated.
Of particular interest will be a practical and new
demonstration of how IT and OT vendors are
collaborating to bring next generation of Cyber Security
and compliance solutions to market for critical
infrastructure industry. At the same time the session will
discuss both the challenges and opportunities to address
the ever evolving landscape of security in the age where
agility and Internet of Things (IoT) is prevalent and
securing the supply chain is of increasing concern.
08.30
Luncheon
Eric Knapp, Director,
Cyber Security Solutions and Technology,
Honeywell Process Solutions, USA
Page 8
15.00
Refreshments and Exhibition
15.30
SESSION D CONTINUED
16.45
CLOSE of DAY 2
19.30
FORUM GALA DINNER
ICS Cyber Security Energy & Utilities Forum Programme
Thursday, May 14
07.30
Delegate Check In and Refreshments
08.00
SESSION E
Chair: Eric Knapp
11.00
Of growing concern is how “social engineers” try to
encourage people to download malicious files or click on
malicious links resulting in system invasion, business
disruption and malfunction and the first presentation will
not only demonstrate its impact but also how to combat
it in an ever increasing connected environment. Such
business disruptions have shown to be highly damaging
in economic and business reputation terms and so the
session will include the key approaches in business
continuity and incident management capability with
particular reference to ICS strategies in responding to
cyber attacks.
This session will begin with a vital presentation on some
of the emerging trends and vulnerabilities, and what it
means for the current approach to utility cyber security. It
will cover fundamental questions every utility or
industrial control owner should ask of their security
solution, including what is actually being protected. Of
highly relevant importance is the fact that security
solutions must fit within the operational constraints of
the system and within the risk appetite of the
organisation. Within the electricity sector smart grids
offer many benefits but they also have considerable risks
and threats associated with them. One of these is the
protection of data in transit to and from the devices in
the home. Combining these with the need to
authenticate a large number of system users, the system
commands and the data in transit for a very large number
of devices brings challenges of security and scale.
08.00
FROM THE NEWSPAPER TO THE NETWORK:
HOW WELL CHRONICLED CYBER-ATTACKS CAN
DAMAGE NATION’S UTILITIES
Benga Erinle, President, Ultra Electronics 3eTI, USA
08.35
PROTECTION OF DATA IN SMART GRIDS
David Alexander, Managing Consultant,
Global Utilities and Energy Practice,
PA Consulting, UK
09.10
Refreshments and Exhibition
09.40
LESSONS LEARNED FROM THE SMART METERING
PROGRAMME IN THE UK
William Bowers, Chief Information Security Officer
– Smart Metering DSP Programme, QinetiQ, UK
10.15
UTILITIES PANEL SESSION
The speakers from Session E will be joined by
Alaa Rahma, Head of Protection, Control and
Communications, GCC Interconnection Authority,
KSA; Moazzem Hossain, ADDC, UAE; and Senior
Representatives from ADWEA and DEWA, UAE
SESSION F
Chair: Pierre Haddad, Publisher,
The Security Review, UAE
11.00
SOCIAL ENGINEERING : CLICK HERE FOR DETAILS
Stephen Bailey, Cyber Security Expert,
PA Consulting, UK
11.35
EFFECTIVE BUSINESS CONTINUITY AND INCIDENT
RESPONSE CAPABILITIES IN ENERGY AND
UTILITIES
Kush Srivastava, Lead Auditor,
Continuity & Resilience, UAE
12.10
CYBER RESILIENCE: SURVIVING THE THREAT
Jay Abdallah, EMEA Cyber Security Manager,
Schneider Electric, UAE
12.45
PANEL SESSION
Speakers from Session F
13.15
KEYNOTE CLOSING ADDRESS
WHAT THE CRITICAL INFRASTRUCTURE OWNER
NEEDS ARE NOT NECESSARILY YOUR WANTS:
INTRODUCING THE TRUSTED ADVISOR ROLE
Ayman Al Issa,
Chief Technologist & Senior Advisor/Architect
in Industrial Cyber Security – MENA,
Booz Allen Hamilton, UAE
RECOGNITION OF FORUM EVENT SUPPORT
DELEGATE PRIZE DRAW
14.00
Programme may be subject to change and
The Forum
please visit www.csuae.org for updates
Page 9
Forum Concludes and Luncheon
EXHIBITION
May 12–14
The ICS Cyber Security Energy & Utilities Exhibition, which
will run on May 12-14, is an important part of the event and
this year sponsors and service companies return to the event
given the quality and number of senior level management
who attend.
Now that this event is one of the most important specialised
events in the international energy calendar with a particular
focus on the Middle East, the Organisers have decided to
enhance the exhibition by launching a focused visitor
campaign that will benefit exhibitors even more.
The Exhibition will include equipment and services focusing
on the themes of the event. Exhibition sites are allocated on
a first come, first served basis and include a shell scheme (3m
x 2m), lighting and power.
Exhibition Visitors
The Organisers are mounting an exhibition visitor campaign
to allow all interested parties to view and discuss the latest
developments and expertise that the international exhibitors
will be displaying during the ICS Cyber Security Energy &
Utilities Forum. Potential visitors must register online at
www.csuae.org
Exhibitors to date include:
– Booz Allen Hamilton
– Ultra Electronics 3eTI
– Schneider Electric
– BAE Systems Applied Intelligence
– Airbus
– ATKINS
– DTS Solution
– SANS
– Honeywell
– OWL COMPUTING TECHNOLOGIES
NETWORKING OPPORTUNITIES
Conference Reception
Tuesday, May 12
This is the perfect opportunity to meet your hosts and fellow
delegates plus special guests in an informal setting. All forum
participants and partners are invited to attend. This is an
ideal chance to renew old acquaintances and a useful
opportunity to interact with speakers and fellow delegates
prior to the beginning of the forum.
Gala Dinner
Wednesday, May 13
This special event offers superb networking opportunities
and a unique chance to foster new business relationships.
Enjoy the fine food and impressive backdrop at the exclusive
Gala Dinner.
Delegate and exhibitor partners are welcome to attend and
dress is smart casual.
Page 10
ICS Cyber Security Energy & Utilities Forum
Venue
Accommodation
The ICS Cyber Security Energy & Utilities Forum will be held
at the:
The registration fees for the event do not include
accommodation and delegates are responsible for booking
their own accommodation.
Hilton Abu Dhabi
PO Box 877, Abu Dhabi, UAE
Tel: +971 2 681 1900
Fax: +971 2 681 1696
Hotel bedrooms have been reserved for delegates at a
preferential rate at the Hilton Abu Dhabi. A special online
accommodation booking facility will be available shortly at
www.csuae.org/accommodation.
The Hilton Abu Dhabi enjoys both an enviable setting on the
beautiful Corniche overlooking the Arabian Gulf and a
convenient location, being just a seven minute drive from
downtown Abu Dhabi, two minutes away from Marina
Shopping Mall at the breakwater and only 35 minutes from
Abu Dhabi International Airport.
VISAS
No entry visa is required for GCC citizens.
Citizens of the following 33 countries will be issued with
a free-of-charge VISIT VISA on entry to the UAE: Andorra,
Australia, Austria, Belgium, Brunei, Canada, Denmark,
Finland, France, Germany, Greece, Hong Kong, Iceland,
Ireland, Italy, Japan, Liechtenstein, Luxembourg,
Malaysia, Malta, Monaco, New Zealand, Norway,
Portugal, San Marino, Singapore, Spain, Sweden,
Switzerland, The Netherlands, UK, United States and the
Vatican.
Citizens of other countries should apply to their nearest
UAE embassy.
Should you experience problems with visa arrangements,
please contact the Organisers.
ABOUT ABU DHABI
One of the seven emirates, Abu Dhabi is also the capital and
the second largest city in the United Arab Emirates. With a
population of roughly one million, Abu Dhabi is rapidly
growing and developing as an economic, business, tourist and
cultural destination. One of the world’s leading producers of
oil and gas, Abu Dhabi offers a unique mixture of luxurious
hotels, dazzling convention centres, high street fashion
outlets, amazing dunes and beaches, and a wide range of
cuisines. To find out more about Abu Dhabi please log on to
www.visitabudhabi.ae.
Who Will Attend
Given the focus on ICS/IT Security and Networking, delegates with the
following affiliations are expected to attend:
Automation & Process Control
Engineering
System Designers & Engineers
Network Engineers
Head of Corporate Security
Industrial Security Director
HSSE Director
Senior Security Consultants
Security Advisors
CIO
IT Applications Manager
IT Security Specialist
Head of SCADA
Head of IT
Page 11
VENUE & ACCOMMODATION
May 11-14, 2015 Abu Dhabi, UAE
REGISTRATION
ICS Cyber Security Energy & Utilities Forum
May 11-14, 2015 Abu Dhabi, UAE
REGISTRATION FEES
Workshop 1
(May 11)
ICS Cyber Security Awareness for Managers
US$475 (AED 1,745)
Workshop 2
(May 11)
Critical Infrastructure Protection: Includng Cyber Security in the Whole Lifecycle
US$895 (AED 3,285)
Workshop 3
(May 11)
A Behind the Headlines Demonstration of Cyber-Attacks on a Utility –
A Hacker’s Perspective
US$475 (AED 1,745)
ICS Cyber Security Energy & Utilities Forum
(May 12-14)
US$2,215 (AED 8,130)
Exhibition Visitors
FREE TO ATTEND
Each fee includes luncheon(s), refreshments and a comprehensive set of the appropriate Proceedings.
Attendance to the Forum also includes the Conference Reception and Gala Dinner.
HOW TO PAY
4 WAYS TO REGISTER
Payment can be made, either:
To reserve Workshop and/or Forum
places, or to visit the Exhibition:
by making your cheque
payable to Dome Exhibitions, in AED only
and forwarding the cheque to
Dome Exhibitions, PO Box 52641, Abu Dhabi, UAE
by bank transfer in AED or US$ only to:
Dome Exhibitions
A/C no. 329666020002
ADCB – Abu Dhabi
SWIFT Code ADCB AEAA
IBAN No. AE370030000329666020002
Tel: +971 2 674 4040 or
Fax: +971 2 672 1217 or
Email: [email protected] or
Register online: www.csuae.org
Copies of bank transfer documents should be sent to the
Organisers and all bank transfer charges will be the responsibility
of the delegate’s organisation. All delegates will receive an official
attendance invoice together with their joining instructions but their
participation is not confirmed until payment has been received.
ORGANISERS
For further information please refer to our website
at www.csuae.org or contact:
Nerie Mojica Conference Coordinator
Dome Exhibitions
PO Box 52641 Abu Dhabi UAE
Cancellations: All cancellations must be received in writing.
Cancellations received until April 30, 2015 are subject to a service
charge of US$350 (AED1,285) per event where appropriate. The
Organisers reserve the right to retain the whole fee if cancellation
is received after April 30, 2015.
E: [email protected]
T: +971 2 674 4040
F: +971 2 672 1217
Delegates may be substituted at any time.
Once registered, please join our LinkedIn Group and begin communications with your fellow attendees at
http://www.linkedin.com/groups/Oil-Gas-ICS-Cyber-Security-5019246
Page 12