1-2 January, 2016
Delta Bow Valley, Calgary, AB

Executive Think Tank Day 2

07:45 - 08:45 Registration and Breakfast

08:45 - 09:00 Chairperson Opening Remarks

Cyber Security Incident Response for the Energy Sector
Increasing open communication for proactive ,reactive, and disaster recovery approaches to cyber security

img

Francis Bradley

VP Policy Development
Canadian Electricity Association (CEA)

img

Amiran Alavaidze

IT Security Operations Lead
Nexen Energy ULC

Matt Harper

Director, Information Security
Devon Energy Corporation

Kurt Forster

Cyber SEcurity Specialist
Suncor

Fostering the relationship between ICS and IT
Processes and procedures behind the increasing need for security

Matt Harper

Director, Information Security
Devon Energy Corporation

10:45 - 11:45 Networking Break

Risk Management within Collaborative Environments
Ensuring caliber standards for cyber security from third party team members

img

Amiran Alavaidze

IT Security Operations Lead
Nexen Energy ULC

12:30 Concurrent Sessions

12:30 - 13:15 Open Forum Discussion Jim Love - CIO and Chief Digital Officer, IT World Canada
Securing mobile platforms; The Reality of threats in the Field

•How do you know that the data your control system is receiving from a mobile device has not been compromised? Ensuring the integrity of the data moving to and from your devices into the ICS can be a massive web of different networks and cause confusion when trying to secure data transport for your endpoints

Jim Love

CIO and Chief Digital Officer
IT World Canada

12:30 Concurrent Sessions

12:30 - 13:15 Think Tank 1
Managing Cyber Security Trough High Growth
and Downturns
•Develop long-term strategy that objectively quantifies cyber risk
• Manage security operations through periods of economic growth &
downturn to effectively allocate resources and proactively manage
security

12:30 Concurrent Sessions

12:30 - 13:15 Think Tank 2
Cost benefit analysis: using threat intelligence monitoring to drive security operations

•Managing the shift of cyber threat intelligence operations from SOCs to separate, dedicated intelligence teams

13:15 - 14:15 Networking Lunch Break

14:15 - 15:00 Case-Study presented by Checkpoint



3:00 Concurrent Sessions

15:00 - 15:45 Open Forum Discussion
Protecting critical infrastructures: Power generation, energy and transmission

3:00 Concurrent Sessions

15:00 - 15:45 Think Tank 1
Giving data a voice: Capitalizing on predictive security intelligence

•Address the challenge of generating ROI on cyber security spending
and building an investment business case to your board of directors

3:00 Concurrent Sessions

15:00 - 15:45 Think Tank 2
Cyber Threat Intelligence
Operations and Development
•Developing actionable insights for enhancement of your security program
•Focusing the objectives of threat intelligence groups to avoid getting lost in cyber space

15:45 - 17:00 Chairpersons Closing Remarks

17:00 - 23:59 End of Conference