The Central ICS/SCADA Cyber Security Event of the Year for the APAC Region! This year’s conference will have THREE full days of content, and receptions and networking opportunities. You can register for the conference online to hold a spot.
Back To Schedule
Tuesday, April 24 • 9:00am - 3:00pm
Protecting Critical Infrastructure from Emerging Cyber Threats [Full Day Workshop]

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Cyber war is no more a depiction of a science fiction movie, it is a reality, and hence, protecting the industrial control systems that are at the heart of the critical industrial infrastructures is no more an option. The speaker will focus on covering the adoption of an actionable approach to enhancing cyber security within the existing industrial infrastructures and the design of new control systems “with effective implementable cybersecurity controls” during the EPC (Engineering, Procurement, and Construction) lifecycle. The speaker will also provide examples of previous experience in implementing industrial cybersecurity in brown oil fields, smart oil fields, power generation, transmission, distribution and other industrial infrastructures.

Why you should attend
• Understand the plant operation when designing cyber security models and solutions for control systems
• Learn how to embed industrial cyber security during the engineering project lifecycle
• Discuss the different types of critical infrastructures (energy, utilities, etc.) and how the type of operation is related to cyber security
• Develop ideas on how to move into cyber security by design for the new control systems.
• Understand how to enhance industrial cyber security within existing control systems
• What do you need to address before implementing cyber security solutions in the existing ICS systems

Main Takeaways
• Understanding the emerging cyber threats
• Discuss the latest ICS reports and incidents including the lessons that shall be learned
• Need for different industrial cyber security models for the different critical infrastructure
• Who are the stakeholders and what is the role of each?
• What are the important three Cs for effective industrial cyber security program?
• Why do we need to understand plant operation when planning to secure the plants from cyber threats?

avatar for Ayman Al Issa

Ayman Al Issa

Chief Technologist, Industrial Cyber Security, Booz Allen Hamilton
Ayman Al Issa is Chief Technologist for Booz Allen Hamilton’s Industrial Cyber Security practice in the Middle East and North Africa region. Over a career which spans more than 24 years to date, Mr. Al Issa has gained vast experience in the fields of automation, information technology... Read More →

Tuesday April 24, 2018 9:00am - 3:00pm PDT
Hullet Room (Atrium Ballroom) 4th Floor