Critical Infrastructure Protection & Resilience North America

Program

Online Registration Now OPEN
Online registration is now open.
If you are a government representative, you may qualify for a free delegate place…
Click here for further details and fees >>
Download Preliminary Conference Program Guide (pdf) >>

Latest speakers announced:

  • Alessandro Lazari, Contract Agent, European Commission – Joint Research Centre – Directorate “Space, Security and Migration” – Unit E.02 “Technology innovation in Security”
  • Bryan Koon, Director, Florida Division of Emergency Management
  • Matt Conner, Chief Information Security Officer, National Geo-Spacial Intelligence Agency
  • Joseph Wassel, Director, C4 Resilience & Mission Assurance, US Department of Defence
  • David Fortino, Regional Continuity Manager, Federal Emergency Management Agency (FEMA)
  • Fred Ruonavar, Chief of DISA/DODIN Critical Infrastructure Program
  • Senior Representative, Office of Infrastructure Protection, U.S. Department of Homeland Security
  • Michael Lowder, Director – Office of Intelligence, Security & Emergency Response, US Dept of Transportation
  • Frederic Petit, Research Scientist, Argonne National Laboratory & Regional Director, International Association of CIP Professionals
  • Victoria Sherazi, Project Lead “Mitigating Risks in the Innovation Economy”, World Economic Forum
  • Stacey Stanchfield, Lead Cybersecurity Engineer, MITRE
  • Nathaniel Evans, Cyber Operations, Analysis and Research Lead, Argonne National Laboratory
  • Adrian Fielding, Business Leader – Telecoms and Security Integration, Honeywell
  • Brian Harrell, Director of Security and Risk Management, Navigant
  • Guy Buesnel, PNT Security Technologist, Spirent Communications
  • Sebastien Blanchard, Sales Manager, Bertin Corp
  • Andrew Tormey, Business Development, Gryphon Sensors
  • Andrea Chiappetta, Professor of Geopolitics, Marconi International University

2017 Critical Infrastructure Protection & Resilience North America topics of discussion include:

Including: FEMA Half Day Workshop – “Long Term Power Failure”
The focus of this workshop is specifically the local level response and interaction / coordination of local and state agencies and private sector partnerships. The workshop will yield a better understanding of how LTPO response is managed and its relationship within the multi-agency coordination concept. The discussion will assist in improving sustainment of power and response continuity. Private sector, state and local government entities will have the opportunity to participate in discussions addressing an LTPO.

Plenary Sessions:
Developing Greater Resilience in CNI
Hurricanes, Tornado’s and Flooding are a certainty, the only uncertainty is exactly where and when. Cyber security attacks can also now be added to the list of certainties, as they are now a daily occurrence. Man-made disasters and large scale terrorist attacks on CNI are deemed likely, so building resilience into our systems and services is crucial if we are to mitigate the impact on our security, economy, national public health and safety.

PPP & Collaboration in CIP and CIIP
As so much critical national infrastructure is in the hands of public sector organisations – Public, Private Partnership is a prerequisite for successful risk management and resilience.

Critical Infrastructure Interdependencies
It is the interdependencies between large numbers of independent critical national infrastructures that is the catalyst for multiple failures in the so called cascade effect. How do we identify the weaknesses and prevent and/or mitigate the effects?

Critical Infrastructure Protection (CIP):
Emerging Threats on CNI
Threats to critical national infrastructure come in many forms, whether it is UAV’s, disruption of GPS/GNSS signals or flood waters. Identifying new and potential threats is crucial to enabling governments, law enforcement, operators and stakeholders to take the necessary steps to mitigate against possible disruption.

Standards and Best Practice in CIP and Resilience
Protection and resilience of CNI can be driven by minimum standards and best practice, but how are these developed and met? What is considered a minimum standard and how can standardisations of standards and best practice meet the challenge?

Enhancing Preparedness and Response Capabilities
Prior, planning and preparation is the key to ensuring that CNI operators have the right equipment, processes and procedures in place to respond in the event of an emergency.

Technologies to Detect and Protect
What are some of the latest and future technologies, from ground surveillance to space based technology, to predict or detect potential threats to CNI, whetehr natural or terrorist related.

Critical Information Infrastructure Protection / Cyber Security (CIIP):
Cyber Security Legislation, Best Practice & Standards
As cyber-attacks become increasingly common, it is the role state actors to ensure that robust and comprehensive legislation is in place to ensure the proper protection and resilience of critical national infrastructure as well as promote the application of best practice.

Cybersecurity Threats and Trends
The digital age has opened up immense new opportunities for criminal activity, providing numerous communications channels and instant access to critical information and data. But what are the latest threats in the cybersecurity space and what are the future trends likely to be in attacks on our critical information infrastructure.

Cyber Defence Strategies for CII
How do we ensure that CNI operators have the right analysis and protection systems in place to prevent the disruption or destruction critical information infrastructure (CII) and have the right resilience proceedures in place the event of a breach.

Cyber Techniques and Technologies to Detect, Prevent and Protect
The increasing levels of cyber-attacks and advanced persistent threats require a new approach to cyber protection. Detecting and preventing intrusion earlier in the attack is critical and developing a multi-layered approach are key to success. New methodologies, devices and technologies must be found to detect threats as early as possible and provide strength-in-depth.