top of page
Symposium white 2.png
Cyber Security For Energy oil and gas 03-01.png

(CS)²AI  Online Symposium
Control System Cyber Security for Energy- 

Part 1: Oil & Gas Sector

December 1, 2021
1:00PM - 6:00PM EST

Register Today

About the Symposium

This event is
brought to you by:
Screen Shot 2021-11-23 at 5.30.24 PM.png
Screen Shot 2021-11-23 at 5.31.14 PM.png
Screen Shot 2021-11-23 at 5.32.08 PM.png
Screen Shot 2021-11-23 at 5.32_edited.jpg

Oil and Gas Threat Intelligence Briefing

Intelligence often makes the difference for organizations between being prepared to defend and being a victim. To defend, we must know who is targeting us, what they are after and how they maneuver.  Knowing whether you are vulnerable to compromise for Oil And Gas can not only mean loss of revenue, but impact to whole countries. Empower your team with Mandiant’s uniquely dynamic view of the threat landscape – specific to the Oil and Gas industry. Join Daniel Kapellmann Zafra for an in depth look at the threats facing Oil and Gas; what behaviors to understand and what vulnerabilities to address in defending against the todays advanced threats. 

OT Threat Hunting: What “Good” Looks Like

Exposing attackers that your technical controls may have missed often with cyber threat hunting requires advanced security skills that are hard to keep on staff.  Hunting across our OT environment is not as simple as conducting sweeps and matching the latest attacker techniques to the results. How do you know if your team, or your provider, has got what it takes to find todays advanced attacks in your environment? Join Neal Gay for a look inside Mandiant’s OT Threat Hunting team and learn what is required to hunt across endpoint, network, and logs for stealthy attacks to OT infrastructure. 

Leverage the Right Tools to Uplift Your Detection

Do you have tools that align your IT and OT security tech stack for swift threat detection?  Do you have the security expertise you need to defend against today’s sophisticated attackers? Join Microsoft’s Richard Diver to learn how to leverage Microsoft Azure Defender to identify cyber attacks and prevent them from disrupting your operations. Richard will demonstrate how Defender fits into your existing tech stack to add needed visibility and detection ability to your defense.

Cyber Response: Lessons Learned from OT Incident Response

Participate in this interactive discussion with Rob Labbe, of Teck Resources as we touch on some of the lessons learned from responding to OT incidents. Rob shares what has worked, as well as some of the challenges he has faced. Rob talks about how the theoretical translates to the practical in real-life scenarios, and what actually happens in the heat of the moment.

Command and Control: Four Things You Can’t Manage Without

While the other functions of your cyber defense program establish capabilities to identify, mitigate, and respond to threats, the Command and Control, or management function keeps all of these capabilities aligned to the mission. Organizations often find each group within their cyber defense is acting independently which leads to an ineffective defense. Join Megan of ISC4ICS as she shares the four things you can do to keep each of your cyber functions focused on the mission. 

Disruptive thinking is needed for OT Resilience

Cyber attacks on industrial environments are on the rise and become more and more impactful. Although these environments are quite vulnerable, the world is (with increasing speed) introducing hyper connectivity over modernization and optimization initiatives like digitalization, Industrial Internet of Things, Cloud usage, etc. It is easy to conclude that this can be a dangerous mix. How can you enable OT Resilience? In this presentation we will highlight 5 core activities and why a mix with Disruptive Thinking is required.

About the symposium
Come for the knowledge stay for the fun.jpg
Agenda

Agenda

Kickoff: Derek Harp, Founder & Chairman of (CS)²AI 

Keynote: Oil and Gas Threat Intelligence Briefing (45 min)

Followed by Q&A (10 min)

OT Threat Hunting: What “Good” Looks Like (15 min)

Followed by Q&A (10 min)

Cyber Process Hazard Analysis (PHA) (20 min)

Followed by Q&A (10 min)

Leverage the Right Tools to Uplift Your Detection (15 min)

Followed by Q&A (10 min)

Cyber Response: Lessons Learned from OT Incident Response (20 min)

Validate – “Not just a pen test. Testing Readiness” (15 min)  

Followed by Q&A (10 min)

Command and Control: Four Things You Can’t Manage Without (15 min)

Followed by Q&A (10 min)

Cyber Resiliency in Oil & Gas (20 min)

Followed by Q&A (10 min)

KPMG CISO Panel (45 min)

Symposium Close out

******************************

Bolt-on Technical Session

Cyber Oil & Gas Lab Demonstration (30 min)

Followed by Q&A (15 min)

Meet the speakes

Meet The Event Speakers

Chairman and Founder at (CS)²AI Headquarters

Derek Harp

Derek Harp

Chairman and Founder at (CS)²AI Headquarters

Host

Image-empty-state_edited.jpg
Richard Diver

Richard Diver

Sr. Technical Business Development Manager at Microsoft Security

Speaker - Microsoft Azure Defender

Image-empty-state_edited.jpg
Ronald Heil

Ronald Heil

Partner, KPMG Cyber, The Netherlands

Speaker - Disruptive thinking is needed for OT Resilience

Image-empty-state_edited.jpg
Pablo Almada

Pablo Almada

OT/IIoT Partner at KPMG Argentina

Technical Lab

Image-empty-state_edited.jpg
Daniel Kapellmann Zafra

Daniel Kapellmann Zafra

Technical Analysis Manager at Mandiant

Speaker - Threat Intelligence Briefing

Image-empty-state_edited.jpg
Rob Labbé

Rob Labbé

Director, Information Security at Teck Resources Limited

Speaker - Lessons Learned from OT Incident Response

Image-empty-state_edited.jpg
Ryan Boulais

Ryan Boulais

Chief Information Security Officer (CISO) at The AES Corporation

CISO Panel

Image-empty-state_edited.jpg
Matias Manassero

Matias Manassero

Sr. ICS/IT Cybersecurity Engineer at KPMG Argentina

Technical Lab

Image-empty-state_edited.jpg
Neal Gay

Neal Gay

Senior Manager, Managed Defense/ICS at Mandiant

Speaker - OT Threat Hunting

Image-empty-state_edited.jpg
Megan Samford

Megan Samford

VP, Chief Product Security Officer - Energy Management at Schneider Electric

Speaker - Command & Control

Image-empty-state_edited.jpg
Eng. Talal Baeshen

Eng. Talal Baeshen

Head of Cybersecurity Operational Technology of Saudi Arabian Mining Company (Ma’aden)

CISO Panel

Image-empty-state_edited.jpg
Deovanny Rafael Gomez Manzanero

Deovanny Rafael Gomez Manzanero

OT/ICS Cyber Security Sr. Consultant

Technical Lab

Image-empty-state_edited.jpg
Hossain Alshedoki

Hossain Alshedoki

IT/OT Cybersecurity | Data Privacy | Energy & Natural Resources

Speaker - Cyber Process Hazard Analysis (PHA)

Image-empty-state_edited.jpg
Evan Pena

Evan Pena

Director of Professional Services at Mandiant

Speaker - Validate – “Not just a pen test. Testing Readiness”

Image-empty-state_edited.jpg
Gustavo A. Diaz

Gustavo A. Diaz

Information Security Senior Director at Tenaris

CISO Panel

Image-empty-state_edited.jpg

Meet The Event Steering Committee

members%20helping%20members%20no%20cs2ai

(CS)²AI would like to thank Shelly Tzoumas and Walter Risi for serving as the Oil and Gas Symposium Event Chairs and their colleagues at Mandiant and KPMG for all the effort put into making this a unique and impactful event for the community. 

Yet another great example of Members Helping Members!

Sponsor the symposium
Become a Sponsor

Thanks for submitting!

oil-platform-on-the-ocean-offshore-drilling-for-g-2021-08-28-09-20-11-utc.jpg
bottom of page