CS4CAUSA 2019 March 26, 2019 to March 27, 2019, Houston, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The State of Security Vs Level of Preparedness N/a • Security is not a tick box for other departments – How do ensure other ...
So You’ve Been Hacked. Now What? N/a • How can bad actors create unsafe conditions by making simple changes?• What value does ...
A Review of the Threat Landscape Across the United States N/a • What impact has growth of networks and communication systems had and exposed as vulnerabilities?• ...
OT Visibility is a Critical First Step – But Security is a Framework N/a A Review of the Threat Landscape Across the United States• What impact has growth of ...
Five Ways to Ensure the Integrity of Your Industrial Operations N/a In the course of the last twenty four months, there have been unprecedented changes to ...
Peering Inside the Real-world O&G Industrial SOC N/a Overcoming technical and organizational hurdles while building Industrial SOC to gain greater insight into the ...
Protecting the Unprotectable with Next-Generation Authentication N/a • Multi-factor authentication is a critical security measure yet many critical IT and OT systems ...
A Short Analysis of Hidden Vulnerabilities in IIoT & ICS Networks N/a Industrial and critical infrastructure organizations have known that their IIoT and ICS/SCADA assets are susceptible ...
To Secure Peace Must We Prepare for (Cyber) War? N/a • Understand how the global power struggle over information technology affects private organizations• Identify current ...
Improving Visibility of your Digital Forensic Data N/a • How to pragmatically get to implementation of protective controls through visibility and continuous monitoring
GridEx – North America’s Bi-annual Cyber/Physical Security Exercise and Lessons Learned N/a • How to engage senior leadership & improve communication• Tips for improving supply chain participation• ...
Introducing IoT and Making sure Security is a Part of the Process N/a • The complexity of the Industrial Internet of Things can be overwhelming, where do you ...
Cybersecurity Risks - Oil & Gas Meets Maritime Shipping N/a The challenges of exponential rise in volume and complexity of cyber attacks and a growing ...
Converging IT-OT Networks: The Power of 100% Device Visibility & Control N/a Can you identify what’s on your IT-OT network? Do you worry that needed security will ...
Securing the Future of Energy and Utilities N/a • Insider Threats to Critical Infrastructure, Trends Impacting IT/OT Convergence• The Impact of Visibility, Control ...
Governance, People and Processes N/a • Are all 3 playing their part to fill the security gap? What more can ...
Strategies to Support Outdated and Vulnerable Systems and Assets N/a • Industrial cyber security is ever evolving, with organizations now aligning budget and resources against ...
Current ICS Threat Landscape N/a The ICS threat landscape is complex and uneven. Threats targeting OT networks are growing with ...
Developments in Making Remote Access to ICS Safer & More Resilient N/a Any electron can be an attack, but remotely accessing industrial control systems can be a ...
Leveraging Cybersecurity to Improve Operations and Situational Awareness N/a Cybersecurity solutions are becoming more prevalent, and there are significant benefits that can be realized ...
Joining Resources to Evaluate Threats and Defending US Critical Infrastructure N/a • A review of current security landscape from foreign threats• Working with state and local ...
Building an Ecosystem to Establish a Resilient and Adaptable Security Posture N/a • What does it mean to be prepared for a cyber-attack? Are you prepared?• How ...
Threats and Attack Vectors are the Main “Influencer” on the Blueprint Solution for ICS N/a • A review of case studies in different sectors when securing both IT & OT ...
Automation as a Key Enabler in Leveraging AI for IoT Security N/a • The oportunities are vast but are AI threats understood?
Creating a Culture of Support for IT N/a • What impact has the change of technology had on OT?• Is it time to ...
How Open-Source Intelligence is Used to Attack Critical Infrastructure Assets N/a • A 3 Part presentation involving real assets