Session Sponsors

dark indegy

Who The Event Is For

Meet Senior Decision Makers From:


  • North American E&P Companies
  • North American Midstream Companies
  • North American Refineries & Petrochemical Companies

With The Following Job Titles:


Directors, Head Of, Manager, Officers, Administrators, Architects, Specialists, Auditors, Engineers, Designers, Analysts

  • Process Control
  • Cyber Security
  • SCADA
  • Automation
  • Information Cyber Security
  • Risk
  • Digital Risk
  • Enterprise Risk
  • Incident & Crisis Management
  • Network & Communications
  • Operational Technology
  • Technology
  • Operations
  • Data Privacy
  • Compliance And Regulatory
  • Control Systems
  • Industrial Security
  • Corporate Security
  • Security Systems

Plus Key Suppliers Of:


  • Threat Detection Services
  • Encryption Systems
  • Reservoir Engineering Companies
  • Network Security Systems
  • Phishing Protection Services
  • Intrusion Detection Systems IDS
  • Intrusion Prevention Systems
  • Cyber Incident Response
  • Network Hardware Installation Services
  • Network Software Installation Services
  • Supervisory Applications
  • PLCs
  • Firewalls Layers
  • Cyber Security Protocols

SPEAKERS

 

Lee Neitzel

Lee

Office of the CTO

Wurldtech Security Technologies

The International Society of Automation

Lee Neitzel is a member of the...

View

Ravi Sandhu

Ravi Sandhu

Executive Director and Chief Scientist

University of Texas at San Antonio

Ravi Sandhu is founding Executive Director of the Institute for...

View

Wm. Arthur Conklin

Wm. Arthur Conklin

Professor of Critical Infrastructure Security

The University of Houston

Wm. Arthur Conklin, PhD is an Associate Professor and Director of the...

View

Kent Knudsen

Kent Knudsen

Supervisor Information Security

Plains All American Pipeline

Kent Knudsen graduated from Texas A&M University in 1990 with a...

View

Terry Gilsenan

Terry Gilsenan

CIO & VP of Technology

PIE Operating

Terry Gilsenan has been involved in Information Technology for over 30 years, after starting with a...

View

David Bang

Dave Bang

Manager IT Security Architecture & Communications

LyondellBasell

View

Tony Caruso

Tony Caruso

Cyber Security Adviser

Apache Corporation

Anthony Caruso is the cybersecurity advisor for Apache Corporation. Apache is an independent upstream...

View

Michael Lewis

Michael Lewis

Policy And Framework Adviser For Information And Risk Strategy

Chevron

Michael J. Lewis is currently Policy and Framework Advisor within...

View

Stuart Wagner

Stuart Wagner

Director, IT Security & Compliance

Enterprise Products

Stuart Wagner has developed and led information security programs for...

View

Cesar Felizzola

Cesar Felizzola

Automation Manager

DCP Midstream

View

Stephen Crayner

Stephen Crayner

Automation Engineer

DCP Midstream


Stephen Crayner is currently a process control engineer for DCP Midstream in the corporate automation group...View

Keith Stouffer

Keith Stouffer

Industrial Control Systems Cyber Security Lead

National Institute For Standards And Technology

Keith Stouffer has been with the Engineering Lab at...

View

Jeff Cornelius

jeff

EVP

Darktrace

View

Barak Perelman

Barak Perelman

CEO

Indegy

Barak Perelman is the CEO and Co-Founder of Indegy, an Industrial Cyber Security startup building a comprehensive security and...

View
Interview

Value Proposition

Solutions Delivered Over The Two Days Including:

  • Robust E&P Strategies: Looking At Demonstrating Ways To Cost-Effectively Secure Networks, Remote Assets And Remote Means Of Communication Against Cyber Attacks
  • What Are The True Risks That E&Ps Should Prepare For? Know When A $1 Million Spending On Defenses Is Justified On Assets Worth $100k
  • Access Control: Understand High Quality Protocols To Control Access To PCN Systems And Harden Infrastructure Whilst Maintaining Easy Communication
  • Sustainable Cyber Security Policies: Learn What Is Good Enough
  • Responding To Intrusion: Real World Case Studies On How An Operator Responded To And Managed An Actual Intrusion On Its Network
  • Improving Firewall Policies To Bring Them Up To The Highest Level: Having A Firewall It Isn't A Solution In Itself - It Has To Be Properly Managed And Maintained. A Full Section Of The Conference Has Been Dedicated To This Hot Issue
  • Securing Brownfield Equipment: Demonstrating How To Make Old Equipment And Systems Secure Without Embarking On Million-Dollar-Upgrades

JOIN OUR MAILING LIST

By continuing to use this site you agree to the use of cookies. For more information and to find out how to change this click here