Session Sponsors

dark indegy

WHO SHOULD ATTEND

Meet Senior Decision Makers From:


  • North American E&P Companies
  • North American Midstream Companies
  • North American Refineries & Petrochemical Companies

With The Following Job Titles:


Directors, Head Of, Manager, Officers, Administrators, Architects, Specialists, Auditors, Engineers, Designers, Analysts

  • Process Control
  • Cyber Security
  • SCADA
  • Automation
  • Information Cyber Security
  • Risk
  • Digital Risk
  • Enterprise Risk
  • Incident & Crisis Management
  • Network & Communications
  • Operational Technology
  • Technology
  • Operations
  • Data Privacy
  • Compliance And Regulatory
  • Control Systems
  • Industrial Security
  • Corporate Security
  • Security Systems

Plus Key Suppliers Of:


  • Threat Detection Services
  • Encryption Systems
  • Reservoir Engineering Companies
  • Network Security Systems
  • Phishing Protection Services
  • Intrusion Detection Systems IDS
  • Intrusion Prevention Systems
  • Cyber Incident Response
  • Network Hardware Installation Services
  • Network Software Installation Services
  • Supervisory Applications
  • PLCs
  • Firewalls Layers
  • Cyber Security Protocols

Program Download Form

Complete The Form Below To Access The Full Brochure & Exclusive Speaker Interviews

 

 

Featured Interviews Include:

David Bang, Manager IT Security Architecture & Communications, LyondellBasell

 

"American Business Conferences set the bar high for my first business conference! It was the perfect blend of learning and connecting"
Logistics & Planning, Citadel Energy

Program Download
Interview

AGENDA AT A GLANCE

Solutions Delivered Over The Two Days Including:

  • Robust E&P Strategies: Looking At Demonstrating Ways To Cost-Effectively Secure Networks, Remote Assets And Remote Means Of Communication Against Cyber Attacks
  • What Are The True Risks That E&Ps Should Prepare For? Know When A $1 Million Spending On Defenses Is Justified On Assets Worth $100k
  • Access Control: Understand High Quality Protocols To Control Access To PCN Systems And Harden Infrastructure Whilst Maintaining Easy Communication
  • Sustainable Cyber Security Policies: Learn What Is Good Enough
  • Responding To Intrusion: Real World Case Studies On How An Operator Responded To And Managed An Actual Intrusion On Its Network
  • Improving Firewall Policies To Bring Them Up To The Highest Level: Having A Firewall It Isn't A Solution In Itself - It Has To Be Properly Managed And Maintained. A Full Section Of The Conference Has Been Dedicated To This Hot Issue
  • Securing Brownfield Equipment: Demonstrating How To Make Old Equipment And Systems Secure Without Embarking On Million-Dollar-Upgrades

JOIN OUR MAILING LIST

By continuing to use this site you agree to the use of cookies. For more information and to find out how to change this click here