29.10.2014 Views

April 2011 - Control Global

April 2011 - Control Global

April 2011 - Control Global

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Organized by AmericanBusinessConferences<br />

Save<br />

$200<br />

before <strong>April</strong> 15 -<br />

quote registration code CONT11<br />

May 25 - 26, <strong>2011</strong>, Holiday Inn Golden Gateway, San Francisco<br />

Quantify Risk, Evaluate Vulnerabilities, & Discover<br />

Solutions For<br />

Managing SCADA Network<br />

Security Risks<br />

Media Partner<br />

Strategies & Technical Solutions For Economically Managing Risk In A<br />

Multi-Threat Environment<br />

Megan J. Hertzler<br />

Assistant General<br />

Counsel and Director of<br />

Data Privacy<br />

XCEL<br />

ENERGY<br />

Gerald S. Frees<br />

Director, NERC CIP<br />

Compliance, Regulatory<br />

Services<br />

AMERICAN<br />

ELECTRIC<br />

POWER<br />

L C Williams<br />

Senior Program Manager,<br />

Critical Cyber Asset<br />

Infrastructure for<br />

Enterprise IT Security<br />

TENNESSEE<br />

VALLEY<br />

AUTHORITY<br />

Tim Roxey<br />

Director – Risk<br />

Assessment and<br />

Technology Division<br />

NORTH AMERICAN<br />

ELECTRIC<br />

RELIABILITY<br />

CORP.<br />

Mike Firstenberg<br />

Security Operations<br />

AMERICAN<br />

WATER -<br />

SECURITY<br />

OPERATIONS<br />

Amy Beth<br />

Superintendent of<br />

Process <strong>Control</strong><br />

DENVER<br />

WATER<br />

Luis A Suarez<br />

Program Manager,<br />

Information Security<br />

TENNESSEE<br />

VALLEY<br />

AUTHORITY<br />

“SCADA systems are becoming prey to increasingly sophisticated security threats due<br />

partly to the actual amount of physical connections but also to potential new<br />

vulnerabilities within the business network itself – including those that could impact<br />

trade secrets, proprietary information and the functionality of the business itself.”<br />

Register Now!<br />

Visit www.managing-scada-security-risks.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!