[vc_row full_width=”stretch_row” css=”.vc_custom_1597322805142{margin-top: -40px !important;background-image: url(https://iiot-world.com/wp-content/uploads/2019/02/cyber_security-1.jpg?id=9398) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”164px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Cybersecurity for the
Power and Oil and Gas Industries:
threats, challenges and solutions” font_container=”tag:h2|font_size:32px|text_align:left|color:%23ffffff|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][vc_custom_heading text=”Virtual Conference sponsored by Trend Micro” font_container=”tag:h2|font_size:18px|text_align:left|color:%23ffffff|line_height:18px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20italic%3A500%3Aitalic”][vc_custom_heading text=”March 13th, 2019″ font_container=”tag:h2|font_size:24px|text_align:left|color:%23ffffff|line_height:24px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20regular%3A500%3Anormal”][vc_custom_heading text=”2:00 PM until 3:15 PM EST” font_container=”tag:h2|font_size:18px|text_align:left|color:%23ffffff|line_height:18px” google_fonts=”font_family:Ubuntu%3A300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic|font_style:500%20bold%20regular%3A500%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_button size=”large” text=”Watch the recorded sessions” target=”_self” icon_pack=”” font_weight=”” text_transform=”” link=”#registerForm”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”200px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590503324813{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”What you’ll learn:” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_column_text el_class=”landing-what”]

Security, both physical and cybersecurity, is a top priority for any industrial player, especially in light of the rise in cybercrime in the last years. For certain industries, not having the proper cybersecurity measures in place can affect more than just the company’s reputation. The Oil & Gas, Water & Energy industries are prime examples of such verticals. There is high adoption of automation and digitalization in these industries, which has made their processes leaner & Faster. However, it has also made them more susceptible to Cyber-attacks on the Physical and industrial asset.

In order to determine which water and energy companies are most susceptible to attack, Trend Micro research team reviewed millions of endpoints from companies self-classified as “Energy”, “Oil and Gas”, and “Utilities”.

Register to this webinar to find out more about where Water & Energy industries are most vulnerable. Baker Hughes, a GE company, will also help you to understand what are the security solutions and best practices in Oil & Gas and Energy sectors.

[/vc_column_text][vc_empty_space height=”64px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=”center”][qodef_elements_holder_item horizontal_alignment=”center”][qodef_button size=”medium” text=”Register Now & watch all sessions” target=”_self” icon_pack=”” font_weight=”” text_transform=”” link=”#registerForm”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590503324813{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”5px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Agenda:” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”4894″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]

2:00 – 2:05

Welcome Introduction

Speaker 

Lucian Fogoros – Co-Founder, IIoT World

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator color=”black” border_width=”2″ el_width=”80″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”9384″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]

2:05 – 2:30

Feel the Flow: Where Water & Energy Industries are Most Vulnerable

Speaker

Rober McArdle – Director FTR – Cybercrime Research at Trend Micro

Session Description:

Because Water and Energy (W&E) sectors are critical to the economy of every nation, it is easy to sensationalize stories about potential cyberattacks against them. The reality, however, is that any internet connected critical infrastructure is vulnerable. In order to determine which water and energy companies were most susceptible to attack, we reviewed millions of endpoints from companies self-classified as “Energy”, “Oil and Gas”, and “Utilities”.

During our investigations we found several vulnerable and unprotected W&E systems online, bringing with them a danger to these critical infrastructures. We will reveal how we found that most vulnerable were mid-tier organizations as larger organizations could afford many layers of defense, dedicated information security teams and regular security.

We will highlight how threats against mid-tier organizations are still a threat to society because of Cl interdependencies and the distribution network setups. Failures in these organizations will have cascading and far-reaching effects Further up the supply chain. Without the more stringent security systems of their larger counter parts, mid-tier companies are susceptible to a number of targeted attack approaches.

 

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator color=”black” border_width=”2″ el_width=”80″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”9408″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]

2:30 – 2:55

Security solutions and best practices for Power and Oil and Gas industries

Speaker 

Derek Bourland – Senior Product Manager, Cyber Security, Baker Hughes, a GE company

Session Description:

When looking at industrial cybersecurity it’s vitally important to utilize key best practices to mitigate risk based on your unique cyber profile and get the most out of your investment. Best practices that will be covered include:

– Prioritizing your assets by value and inherent risk
– Maintaining the cyber health of critical assets and protecting against various types of sophisticated threats
– Choosing the right partners to assist you in your cybersecurity program that best fits with an OT technology cycle
– Don’t just look at cybersecurity products but look at products that are cyber secure

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_separator color=”black” border_width=”2″ el_width=”80″][vc_empty_space][vc_row_inner][vc_column_inner width=”1/4″][vc_single_image image=”12022″ alignment=”right” style=”vc_box_circle_2″][/vc_column_inner][vc_column_inner width=”3/4″][vc_column_text]2:55 – 3:15

Panel Discussion/Q&A

Moderator 

Greg Orloff – CBDO, IIoT World

Session Description:

– Open forum for virtual attendees to ask questions.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Speakers” font_container=”tag:h2|font_size:32px|text_align:center|color:%23ffffff|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15468″ offset=”” excerpt_length=”45″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”120px”][/vc_column][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” offset=”” excerpt_length=”50″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers” post_in=”15633″][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15634″ offset=”” excerpt_length=”45″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/2″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout3 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”large” image_size=”custom” display_excerpt=”yes” display_date=”no” display_author=”no” display_pagination=”” post_in=”15631″ offset=”” excerpt_length=”50″ custom_image_width=”240″ custom_image_height=”240″ extra_class_name=”landing-speakers”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504339006{margin-top: -40px !important;background-color: #4d7ea7 !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”80px”][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][vc_custom_heading text=”Participants” font_container=”tag:h2|font_size:32px|text_align:center|color:%233f3f3f|line_height:36px” google_fonts=”font_family:Ubuntu%20Condensed%3Aregular|font_style:400%20regular%3A400%3Anormal”][/qodef_elements_holder_item][/qodef_elements_holder][vc_empty_space height=”64px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”1/3″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” post_in=”4998″ offset=”” extra_class_name=”no_title center-image grayscale”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/3″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” offset=”” extra_class_name=”no_title center-image grayscale” post_in=”17946″][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][vc_column width=”1/3″][qodef_elements_holder holder_full_height=”no” number_of_columns=”one-column” switch_to_one_column=”” alignment_one_column=””][qodef_elements_holder_item][qodef_layout5 skin=”” posts_per_page=”1″ column_number=”1″ space_between_items=”huge” sort=”latest” image_size=”full” display_date=”no” display_author=”no” display_comments=”no” display_views=”no” display_share=”no” display_hot_trending_icons=”no” display_pagination=”” post_in=”16950″ offset=”” extra_class_name=”no_title center-image grayscale”][/qodef_elements_holder_item][/qodef_elements_holder][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590504871892{margin-top: -40px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_empty_space height=”120px”][/vc_column][/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1590505537680{margin-top: -40px !important;background-color: #efefef !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column][vc_column_text][/vc_column_text][vc_empty_space height=”80px”][vc_column_text]

[/vc_column_text][vc_empty_space height=”120px”][/vc_column][/vc_row]