"Cyber Security for Energy and Communications"
September 8-9, 2008
Hyatt Regency
Calgary, Alberta, Canada
Notional Agenda
Last updated: August 28, 2008
* Invited
Monday, September 8, 2008 | |
7:00 - 8:30am |
Registration |
7.30am | Trade Show opens |
8:45 - 9:00am |
OPENING REMARKS - Conference Moderator Ian Wilms, Chairman, Global Centre for Securing Cyberspace |
9:00 - 9:10am |
WELCOME REMARKS - Rob Anderson, MLA, Airdrie-Chestermere, Government of Alberta |
9:10 - 9:50am |
SESSION 1 - Opening Keynote Address Yogen Appalraju, Vice President, TELUS Security Solutions Among the sectors commonly identified as integral to Canada's Critical Infrastructure, Energy and Telecommunications are particularly important. New regulatory standards and frameworks are emerging for these sectors that reflect both this criticality, and the broader causes, vulnerabilities and fundamental weaknesses in our critical infrastructure. As recent history and events demonstrate, the need to find the optimal approach to cyber-security is urgent. In this endeavour, a close collaboration between Industry and Government is necessary, one where each recognizes and accepts its roles and responsibilities. Industry wants to know just how much security is enough, and Government must clearly define when and where its unique resources will be deployed. |
9:50 - 10:10am |
Morning Break |
10:10 - 11:10am |
SESSION 2 - Concurrent Session
Management/Executive Track - Bryan Singer, CISM, CISSP, Vice President Security Services, Wurldtech The Next Generation of Industrial Cyber Security Risk Intelligence - Implications for Industrial Control Systems and Critical Infrastructure Protection Technical Track - Kalvin Falconar, Senior Solution Strategist, CA Canada Co. & Denny Prvu, Principal Consultant, CA Canada Co. Business responsive organizations are continuing to put more pressure on IT for increased accessibility for collaboration, partnerships, joint-interest transactions, eBusiness and customer engagement. How do you manage and control these new relationships? How do you enable more system activity without increased risk or exposure? How do you maintain compliance and auditability? There are growing challenges for protecting the sensitive data and applications residing on your servers. The increasing value of data, more stringent regulations, and an emerging class of corporate "insiders" compromise your information and intellectual property. This forces you to work harder to manage security policies across complex environments. While your IT organization remains responsive to business requirements. What are leading organizations doing to streamline, simplify and automate protection of servers? What are leading organizations doing to manage user privileges and avoid costly exposures? One leading Canadian company, TELUS, has taken significant steps to ensure server resources are protected by employing Access Control solutions from CA. The solution operates at the system level to ensure efficient and consistent enforcement across all systems - including Windows, UNIX, Linux and virtualized environments. This provides TELUS a standard, single layer to support the auditing of each policy change and enforcement action in order to comply with global regulations. We will demonstrate how TELUS is protecting their valuable data and assts and how they’re adding value to the business by doing so. |
11:15am - 12:15pm |
SESSION 3 - Concurrent Session
Management/Executive Track - David Ruhlen, MBA, Consultant, Cyber-security Solutions Corp Wringing Business Value from Cyber-security Standards Technical Track - Venkat Pothamsetty, Industrial Security Architect, Cisco Enterprise and Industrial Control Network Integration: Security and Architectural Considerations Industrial control systems (ICS) |
12:15 - 1:30pm |
LUNCH
Keynote Speaker - Michael James Martin, MBA, GDM, SCPM, PMP, CBNT , Senior Managing Consultant, IBM "A Business Intelligence Approach to Energy Analytics from the Field". |
1:30 - 2:30pm |
SESSION 4 - Concurrent Sessions
Management/Executive Track - Mark Zanotti, Lofty Perch Inc. "Understanding your cyber security posture through self-assessment: Meeting security compliance with CS2SAT" This briefing will be a concise introduction to the Department of Homeland Security's Control System Cyber Security Self Assessment Tool (CS2ST). The briefing will be divided into two sections. This first section will provide detailed insight into the emerging standards that will have an effect on your organization. The second section will be a live demonstration of the CS2SAT and how it can assist your organization’s compliance initiatives. Attendees will have an opportunity to learn and understand how the tool works, see how the tool can be used across the entire control system domain (right down to the device level), and explore many of the features allowing users from every critical sector today to protect their industrial networks. Standards that are covered will be: Technical Track - Vaclav Vincalek, Pacific Coast Information Systems Ltd. The Biggest Threat to Web Security When authorized users on "secure" web applications unknowingly browse hacked sites, they can instantly infect their own system. And the web browser - the very thing that makes the Internet so useful for billions of people - is the ultimate vulnerability that helps hackers spread their malicious code across the web. Today up to 75 per cent of hacker attacks are targeted against web applications. Web security breaches are reported daily in the media. The threat is growing. In the first portion of our presentation, we will review the evolution of security as it relates to web activity. We will then cover the kinds of attacks that are commonly used by hackers to exploit web applications using the frameworks established by security organizations such as SANs Institute and WASC. Next, we will demonstrate the ease of which a hacker can take advantage of insecure web applications to conduct malicious actions. Finally, we will discuss the safeguards organization can take to detect and safeguard against web application vulnerabilities. |
2:35 - 3:35pm |
SESSION 5 - Concurrent Sessions
Management/Executive Track - James Arlen, CISA, Senior Security Consultant TELUS Security Solutions A Pragmatic Approach to Integrated Compliance Management in Regulated Environments: Technical Track - Timothy Durnford, Country Manager, ArcSight Canada A Practical Approach to Cyber Security within Control System Environments. |
3:35 - 3:50pm |
Afternoon Break |
3:50 - 4:50pm |
SESSION 6 - Keynote Address
Dr. Stephen Flynn, Homeland Security Advisor to Senator Barack Obama, former US Coast Guard Commander and author of "The Edge of Disaster" "Natural and manmade Disasters are not a question of if but only of when and how much damage will they cause. Changes in climate are elevating the risk of natural disasters. Acts of terrorism will remain a blight on the global landscape. Communities and firms are exposed directly and indirectly to the risks associated with increasingly complex and integrated telecommunications, energy and supply chain networks, and public services that are subject to periodic failures and disruption. Yet too often companies and citizens act as though disasters will happen only to someone else. Drawing on his best selling and critically acclaimed books, Dr. Stephen Flynn will outline why future historians may look back on the 21st Century as the Age of Catastrophes. But this era promises not just dangers but opportunities for those enterprises, communities, and countries that emphasize building a culture of resilience. The market will reward those firms and those nations that make preparedness a priority and be increasingly unforgiving of those that do not." |
Tuesday, September 9, 2008 | |
8:30 - 9:10am |
SESSION 7 - Morning Keynote Address
Brian Phillips, Director, Bell Canada An Integrated Communications System Supporting Energy Brian Phillips will discuss critical infrastructure protection. Using Vancouver 2010 Olympics Games as an example, he will highlight some of the vulnerable components and threats to energy and IT infrastructures. He will also discuss the lessons and innovations that continually emerge from the planning process and their potential value for executives in your organizations. |
9:10 - 9:50am |
SESSION 8 - Keynote Address
Patrick Gray, Senior Security Strategist, Cisco and 20 year FBI veteran. The internet landscape has shifted. What used to be a playground for hackers, crackers and script kiddies, is now a borderless abyss of organized crime fueled by financial gain. This presentation will explore the current threat landscape by highlighting the newest cyber criminals and examining the latest tactics employed by these predators. Gray will address how spammers, phishers, worm writes and hackers interact with this new crime element and how we can prepare our infrastructure to stave off these relentless attacks and protect our critical business assets. Additionally, the presentation will touch on how Web 2.0 is affecting the security of our networks. |
9:50 - 10:10am |
Morning Break |
10:10 - 11:10 |
SESSION 9 - Concurrent Sessions
Management/Executive Track - Mauricio Sanchez, Chief Network Security Architect, ProCurve Networking by HP Secrets of Network Security Technical Track - IBM - Hyman D. ("Hy") Chantz, CISSP, founding member and Certified Executive Consultant, IBM's Global Security and Privacy Practice Radio, Wireless, and RFID in the Energy Industry: Challenges and Opportunities |
11:15am - 12:15pm |
SESSION 10 - Concurrent Sessions
Management/Executive Track - Michael Legary, Founder, Seccuris Inc. CSA, CISSP, CISM, CISA, CCSA, GCIH Virtually Secure: Uncovering the Risks of Virtualization Technical Track - Ganesh Devarajan, Head of Security Analyst and Digital Vaccine Team, Tipping Point SCADA Networks: Security tools and Vulnerability assessments? |
12:15 - 1:30pm |
LUNCH - Keynote Address
Donald Meyer, Product Marketing Manager, High-End Security Systems, Juniper Networks SCADA (Supervisory Control and Data Acquisition) networks were designed and built before the age of cybercrimes with a primary focus on performance, availability and reliability - not security. As SCADA systems integrate with corporate networks and the Internet and SCADA vulnerabilities become more widely known, organizations are taking a hard look at risks in their operations and scrambling to fill the security gaps. Fortunately, a new generation of high-performance security products lets utilities defend their SCADA networks using the same technology that protects telecommunications, banking, and other critical IT infrastructure. The general principles are the same: keep outsiders out, keep insiders honest, keep an eye out for trouble, and keep communications open, clear, and fast - especially during emergencies. This is a review of some of the security technologies now available to protect SCADA, computer, and communications networks. |
1:30 - 2:30pm |
SESSION 11 - Concurrent Sessions
Management/Executive Track - Scott Montgomery, Vice President, Product Management, Secure Computing The rise of the Internet and the rapid spread of inexpensive bandwidth have made "Security by Obscurity" a thing of the past. Critical infrastructure systems are now interconnected with IT systems, accessed by remote users via wireless devices, used by non-trusted operators to provide data mining opportunities for their corporations, and tied in to third party networks for multi-enterprise coordination. These points of interconnect mean that the security threats that have permeated IT systems for decades can now be spread into critical infrastructure systems virtually undetected, making them vulnerable to hackers, saboteurs, and cyber criminals. This session will provide some insight into the threats being posed and discuss four security requirements essential to protect the world's critical cyber infrastructure. Technical Track - Lisa Lorenzin, Principal Solutions Architect, Juniper Networks Network Access Control (NAC) is one of the critical challenges in securing today's enterprise. How do you accommodate a variety of users - such as guests, partners, contractors, & employees - with disparate resource access requirements, privileges, & levels of trust, in a single enterprise network? And how do you build a security framework that works with your existing infrastructure, allows integration of multiple vendors' products to ensure best-of-breed technology, and creates a solid foundation for future growth - both what we expect to come and what we can't even imagine yet? Open standards - designed to ensure multi-vendor interoperability across a wide variety of endpoints, network technologies, and policies - enable technology that helps ensure endpoint compliance with integrity policies at and after network connection. The Trusted Computing Group (TCG), an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, has developed an open architecture and standards for Network Access Control called Trusted Network Connect (TNC). TNC is designed to encompass a wide variety of products and technologies, and is the foundation for new NAC standards being developed in the IETF, enabling NAC solutions that will protect your network today and grow with you into the future. |
2:35 - 3:35pm |
SESSION 12 - Concurrent Sessions
Management/Executive Track - Brian Geffert, Principal, AERS, Deloitte & Touche, Washington, DC LLP, CISSP, ISSMP, CISM, MBA and David A Moore, President and CEO, AcuTech Consulting Group CFATS: An Emerging Regulatory Challenge for Cyber Security Technical Track - Barry Kokotailo, Systems Security Specialist, CSA/CSNA/CISSP/CEH/EnCE Anti-Surveillance or How Not To Get Caught |
3:35 - 3:50pm |
Afternoon Break |
3:50 - 4:30pm |
SESSION 13 - Closing Keynote Address
Jason Wright, Sr. Product Marketing Manager, Fortinet Why Security Consolidation is Critical in Defending Against Today's Blended Attacks This presentation will give you the knowledge and tools you need to evaluate different solutions and answer critical questions: Is my network secure? Are point solutions practical? Are unified threat solutions enterprise-class technology? How can I implement multi-threat security with limited budget? How can my security systems help my organization go "green"? According to Gartner, "Ongoing convergence in technologies, market models and organizational processes offers enterprises a significant opportunity to reduce security costs, while improving security levels"(Gartner 2008). This presentation will equip IT leaders to seize the opportunities and benefits of convergence/consolidation. |
4:30pm | CLOSING REMARKS - Conference Moderator Ian Wilms, Chairman, Global Centre for Securing Cyberspace |