Presentations

The Oil & Gas Cybersecurity Hat Trick: Physical, Process Control, and IT Security Convergence

The Oil & Gas Cybersecurity Hat Trick: Physical, Process Control, and IT Security Convergence

This presentation by Kimberly Legelis and William Lawrence, Ph.D., Lockheed Martin, includes survey statistics of what challenges organizations face in addressing cyber security risks, what security strategies are in use and security posture trends. Also focusing on security domain commonality, tools of integration for putting it all together, the cyber kill chain where all source information really pays off and how a fully integrated total security architecture is very important.
Maturing Your Cybersecurity Program

Maturing Your Cybersecurity Program

Hani Mansi Director of Risk & Information Security at ATCO, discusses understanding the current threat landscape and drivers for cybersecurity becoming an imperative business function​, the business benefits of a mature cybersecurity Program and an approach to maturing the governance, risk and compliance components of an organization’s cybersecurity Program.
Manage Risk in a Collaborative Network Environment With Partners and Vendors

Manage Risk in a Collaborative Network Environment With Partners and Vendors

Zoltan Palmai, Network Security Lead at Chevron, speaks about cybersecurity from an IT and digital asset perspective, approaches to risk assessment, making connections more secure, reliable and auditable. Palmai also discusses securing the business network and challenges in achieving optimal security.
Addressing the Inside Threat: Developing Cyber Threat Awareness Across All Levels of Personnel

Addressing the Inside Threat: Developing Cyber Threat Awareness Across All Levels of Personnel

Wes Devault, Lead Enterprise Architect at Cimarex, discusses the usage of social engineering attacks and the means for identifying suspicious email correspondence in this presentation from last year's event. He also shares how to employ strict access amangement strategies to mitigate proliferation of an intrusion across networks and developing advanced and recurring training programs to engender awareness across all levels of personnel.

Secure Information Sharing: Addressing Cyber Threats and the Benefit of Cyber Attack Information Sharing

Secure Information Sharing: Addressing Cyber Threats and the Benefit of Cyber Attack Information Sharing

Scott Langendorf is Senior Manager of Cyber Security Incident Response at Baker Hughes. In this past presentation, he discusses the importance of the four information sharing types BroNet, Vendor, IntelBus and Government so that companies can assist each other to prevent breaches or better enhance their detective capabilities.