Session Sponsors

dark indegy

WHO SHOULD ATTEND

Meet Senior Decision Makers From:


  • North American E&P Companies
  • North American Midstream Companies
  • North American Refineries & Petrochemical Companies

With The Following Job Titles:


Directors, Head Of, Manager, Officers, Administrators, Architects, Specialists, Auditors, Engineers, Designers, Analysts

  • Process Control
  • Cyber Security
  • SCADA
  • Automation
  • Information Cyber Security
  • Risk
  • Digital Risk
  • Enterprise Risk
  • Incident & Crisis Management
  • Network & Communications
  • Operational Technology
  • Technology
  • Operations
  • Data Privacy
  • Compliance And Regulatory
  • Control Systems
  • Industrial Security
  • Corporate Security
  • Security Systems

Plus Key Suppliers Of:


  • Threat Detection Services
  • Encryption Systems
  • Reservoir Engineering Companies
  • Network Security Systems
  • Phishing Protection Services
  • Intrusion Detection Systems IDS
  • Intrusion Prevention Systems
  • Cyber Incident Response
  • Network Hardware Installation Services
  • Network Software Installation Services
  • Supervisory Applications
  • PLCs
  • Firewalls Layers
  • Cyber Security Protocols

Venue Information

The Cyber Security for Process Control conference will be held at:

Austin Ballroom

Crowne Plaza Northwest Brookhollow

12801 Northwest Frwy

Houston, TX 77040

Phone: (713) 462 9977

REGISTER

Click Here To Register Your Place

ACCOMMODATION

American Business Conferences has secured a preferential room rate of $159 at the conference venue. To book at the preferential room rate, please use the link below:

Book Your Group Rate Here

It is advisable to book your accommodation as soon as possible, as rooms are subject to availability.

FLOOR PLAN

Floor Plan

Floor Plan
Interview

AGENDA AT A GLANCE

Solutions Delivered Over The Two Days Including:

  • Robust E&P Strategies: Looking At Demonstrating Ways To Cost-Effectively Secure Networks, Remote Assets And Remote Means Of Communication Against Cyber Attacks
  • What Are The True Risks That E&Ps Should Prepare For? Know When A $1 Million Spending On Defenses Is Justified On Assets Worth $100k
  • Access Control: Understand High Quality Protocols To Control Access To PCN Systems And Harden Infrastructure Whilst Maintaining Easy Communication
  • Sustainable Cyber Security Policies: Learn What Is Good Enough
  • Responding To Intrusion: Real World Case Studies On How An Operator Responded To And Managed An Actual Intrusion On Its Network
  • Improving Firewall Policies To Bring Them Up To The Highest Level: Having A Firewall It Isn't A Solution In Itself - It Has To Be Properly Managed And Maintained. A Full Section Of The Conference Has Been Dedicated To This Hot Issue
  • Securing Brownfield Equipment: Demonstrating How To Make Old Equipment And Systems Secure Without Embarking On Million-Dollar-Upgrades

JOIN OUR MAILING LIST

By continuing to use this site you agree to the use of cookies. For more information and to find out how to change this click here