Cyber Intelligence USA

Size: px
Start display at page:

Download "Cyber Intelligence USA"

Transcription

1 Cyber Intelligence USA Le Méridien, Arlington, VA, USA, 19 th 20 th June 2014 Sponsors & Exhibitors: Esteemed Speaker Line-up: Frank Konieczny, Chief Technology Officer, U.S. Air Force Dr. Ray Letteer, Chief, Cyber Security, U.S. Marine Corps Sanjeev Bhagowalia, Chief Advisor on Technology and Cybersecurity, Office of the Governor, State of Hawaii Dan Lohrmann, Chief Information Security Officer, State of Michigan Jonathan Trull, Chief Information Security Officer, State of Colorado Nickolas Savage, Assistant Special Agent in Charge (ASAC) of Cyber at the Washington Field Office (AOR), Federal Bureau of Investigation Curtis Levinson, United States Cyber Defense Advisor, NATO Howard Whyte, Security Operations Executive, Office of the Chief Information Officer, National Aeronautics and Space Administration (NASA) Major Laura Casulli, Cyber Security and Intelligence Law Attorney, U.S. Department of Defense Kara Sidener, Special Agent, Federal Bureau of Investigation Remy Faures, Senior Information Officer, The World Bank Group Reasons to attend: Large gathering of senior US government officials discussing cybercrime and emerging cyber threats Analyse the latest cyber security threats faced to US government infrastructure Discuss the emerging cyber threats being seen by law enforcement officials Listen to how the Financial Sector are securing their sensitive information Network with senior US government officials over 3 days Take part in our vibrant exhibition where the private sector will showcase their latest cyber defence solutions Organised By: Knowledge Partner: Web: I events@intelligence-sec.com I Tel: +44(0)

2 Day One: Thursday 19 th June Registration & Coffee CHAIRMAN S OPENING REMARKS Robert Clark, Professor of Law, Centre for Cyber Security Studies, U.S. COMBATING CYBER CRIMES IN THE U.S U.S. MARINE CORPS CYBER SECURITY OVERVIEW Current Cyber Security strategies adopted by the U.S. Marine Corps Challenges faced to computer network systems Cooperation with the private sector What is needed? Dr. Ray Letteer, Chief, Cyber Security, U.S. Marine Corps SECURING COMPUTER TECHNOLOGY IN THE U.S. AIR FORCE Overview of the U.S. Air Force Cyber Security Program Recent threats faced to our critical infrastructure Importance of secure computer networks for missions and operations at home and abroad Cooperation with other Military Divisions Frank Konieczny, Chief Technology Officer, U.S. Air Force Networking Coffee Break COMBATING CYBERCRIMES ACROSS THE UNITED STATES Overview of the FBI Cybercrime Division What cybercrimes are the US experiencing? What techniques are being used to combat cyber threats? FBI department collaboration Future steps Nickolas Savage, Assistant Special Agent in Charge (ASAC) of Cyber at the Washington Field Office (AOR), FBI INTERACTIVE PANEL DISCUSSION LATEST CYBER THREATS TO U.S. COMPUTER NETWORK SYSTEMS What are the threats? What systems are in place to combat the breaches? Cooperation between public and private sector Future steps needed for more security on computer networks Moderated by: Robert Clark, Professor of Law, Centre for Cyber Security Studies, U.S. Panellists: Dr. Ray Letteer, Chief, Cyber Security, U.S. Marine Corps Frank Konieczny, Chief Technology Officer, U.S. Air Force Nickolas Savage, Assistant Special Agent in Charge (ASAC) of Cyber at the Washington Field Office (AOR), FBI SECURE FEDERAL GOVERNMENT INFORMATION SHARING PUBLIC/PRIVATE PARTNERSHIPS AND THE FBI: PROTECTING THE NATION S CRITICAL INFRASTRUCTURE InfraGard program mission InfraGard program history and structure InfraGard information sharing model and success stories Kara Sidener, Special Agent, FBI TRANSLATING INDICATORS OF COMPROMISE INTO NETWORK PROTECTIONS AND INFORMATION COLLABORATION Types of Threat Intelligence Sharing Discussion on different types of indicator protections Automation of indicator protection Indicator collaboration Dan Wiley, Senior Security Consultant, Check Point Software Technologies Networking Coffee Break CROSS-INDUSTRY LESSONS LEARNED: INSIGHT ON CYBER INTELLIGENCE SHARING IN THE EVOLVING LANDSCAPE Examining the methods to be used to secure critical data Constructing a systematic approach for reducing the risk of losing critical enterprise data from the enterprise system Remy Faures, Senior Information Officer, The World Bank Group CYBER LAW REVIEW CYBER CRIME PROSECUTION CASE STUDIES AND PROGRESSION Overview of DoD Cyber Prosecution Division What legal loop holes are we seeing Legislation on cyber crimes Case study of recent cybercrime prosecution Major Laura Casulli, Cyber Security and Intelligence Law Attorney, U.S. Department of Defense CYBER WAR, CYBER ESPINAGE & THE LAW Overview of the work at the US on Cyber Security Defining Cyber War Case studies of Cyber Espionage Cyber Law and Prosecution Easy or Hard? CHAIRMAN S CLOSING REMARKS Networking Lunch Break Web: I events@intelligence-sec.com Tel: +44(0) I Fax: +44 (0)

3 Day Two: Friday20th June Registration & Coffee CHAIRMAN S OPENING REMARKS SECURING STATE CRITICAL INFRASTRUCTURE PROTECTING CRITICAL INFRASTRUCTURE IN MICHIGAN Overview of Michigan Cyber Defence Strategies Current cybercrimes being witnessed Vulnerable areas of attack What is needed for secure infrastructure in Michigan Future Roadmap Dan Lohrmann, Chief Information Security Officer, State of Michigan STATE OF COLORADO CYBER SECURITY STRATEGIES Overview of Colorado State Cyber Security What are the cyber criminals targeting? Cooperation with neighbouring States Future Roadmap Jonathan Trull, Chief Information Security Officer, State of Colorado Networking Coffee Break PROTECTING HAWAII S COMPUTER SYSTEMS Importance of Hawaii Cyber Defence Strategies Challenges of securing a network on a cluster of islands Cooperation with the USPACOM What is vulnerable for a cyber-attack Sanjeev Bhagowalia, Chief Advisor on Technology and Cybersecurity, Office of the Governor, State of Hawaii USING MULTIPLE ANTIVIRUS ENGINE SCANNING TO PROTECT CRITICAL INFRASTRUCTURE Explore how operators of critical infrastructure use multiple antivirus engines to protect their systems from malware Balancing the security requirements with the demands of the business Common network architecture of deployments in secure facilities Additional elements of the digital media processing workflow used to supplement multiple antivirus engine scanning Tony Berning, Senior Product Manager, OPSWAT GLOBAL CYBER SECURITY STRATEGIES ADDRESSING CYBER THREATS AND THE BENEFIT OF CYBER ATTACK INFORMATION SHARING Cyber Intelligence techniques International cooperation to combat cybercrimes Key areas for improvement What s next? Curtis Levinson, United States Cyber Defence Advisor, NATO PROTECTING U.S. CYBERSPACE Overview of NASA s Cyber Security Program Importance of securing U.S. Cyberspace Protecting NASA s critical infrastructure Future solutions Howard Whyte, Security Operations Executive, Office of the Chief Information Officer, National Aeronautics and Space Administration (NASA) Networking Coffee Break ADVANCES IN HIGH ASSURANCE TESTING Testing and assurance are expensive, half of the s/w development budget or more, especially for mission-critical systems Research on software failures shows that nearly all involve a small number of parameters New algorithms make it possible to cover all such interactions Cloud computing makes it possible to generate and run very large test arrays at reasonable cost This briefing describes the approach and industrial experience demonstrating significant cost advantages Rick Kuhn, Computer Scientist, National Institute of Standards and Technology (NIST) CHAIRMAN S CLOSING REMARKS Networking Lunch Web: I events@intelligence-sec.com Tel: +44(0) I Fax: +44 (0)

4 EVENT SPONSORS & EXHIBITORS BADGE AND LANYARD SPONSOR OPSWAT is a San Francisco based software company that provides solutions to secure and manage IT infrastructure for government, defense and other highly secure environments. Metascan and Metadefender help organizations protect against advanced threats and control data flow by using multiple antivirus engine scanning, data sanitization and file filtering. Learn more at PERSONALISED BRANDING SPONSORS Check Point Software Technologies Ltd. worldwide leader in securing the Internet is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. This unique approach gives Check Point customers uncompromised protection against all types of threats, reduces complexity and lowers total cost of ownership. Web: I events@intelligence-sec.com Tel: +44(0) I Fax: +44 (0)

5 EVENT PARTNERS KNOWLEDGE PARTNER InfraGard is a partnership between the FBI and the public and private sectors for the protection of our nation's critical infrastructure. At its core, InfraGard's strength and effectiveness is based upon the subject matter expertise of its trusted membership. It is a unique opportunity for both industry and government to unite in a cooperative effort of national security. From drinking water supplies to communications systems, chemical production processes to agricultural resources, Americans depend on a select group of critical infrastructures to sustain our way of life. Most of these systems and services are owned and operated by private industry. Therefore, the protection of our nation's infrastructure cannot be accomplished by the federal government alone. It requires coordinated action from numerous stakeholders - including government, the private sector, law enforcement, and concerned citizens. InfraGard is the critical link that forms a tightly-knit working relationship across industry and government to improve and extend information sharing so timely intelligence is delivered, vital assets are protected, and trusted relationships are formed. For more information, visit or contact your local FBI field office's InfraGard Coordinator MEDIA PARTNERS

6 Cyber Intelligence USA th -20 th June 201 BOOKING FORM DELEGATE DETAILS: Please complete your details below. Please Tick Military/Government, Public Sector Rate Standard Price Title/Rank: First Name: Surname: Two Day Conference & Exhibition $75 Job Title: Company: Tel: Please Tick Commercial Organisations Standard Price Fax: Address: Two Day Conference & Exhibition $700 Signature: Date: VENUE & ACCOMMODATION Hotel Name: Le Meridien Arlington, th Street North, Arlington, VA, 22209, USA Please tick here if you would us to contact you to book your accommodation PAYMENT DETAILS: Please complete your details below. Wire Transfer: Barclays, 16 High Street North, Dunstable, Bedfordshire, LU6 1JZ, United Kingdom We will send you an invoice for payment Payment by Credit Card: All card payments need to be made via our website using PayPal ADDITIONAL NOTES TERMS AND CONDITIONS Payments - All bookings made prior to the conference must be paid in full to guarantee registration. Once payment has been received, an confirmation and a receipted invoice will be sent. If payment is not made at the time of booking, registration will be provisional. Bookings received less than two weeks before the conference date can only be paid by credit card. Early Bird Rate - In order to qualify for any 'early bird' rates, booking must be received before the deadline date listed in the conference marketing material. Substitutions & Cancellations - Delegates may nominate an alternative person from their organisation to attend up to 24 hours prior to the start of the event, at no extra charge. Should substitution not be possible, cancellation charges apply as follows: 8 weeks or more prior to start of event: 10% of the delegate fee, 4 to 8 weeks prior to start of event: 50% of the delegate fee, 4 weeks or less prior to start of event: 100% of the delegate fee. All substitutions and cancellations must be received in writing Access Requirements - Delegates should advise of any special access requirements at the time of registration. Registration Information - Registration information will be sent to registered delegates by at least seven days prior to the event. Any delegate not receiving the registration information should contact us by to events@intelligence-sec.com Alterations to Programme - Cancellation/Postponement of Event - Intelligence-Sec reserves the right to make alterations to the conference programme, venue and timings. In the unlikely event of the programme being cancelled by Intelligence-Sec, a full refund will be made. Liability will be limited to the amount of the fee paid by the delegate. In the event of it being found necessary, for whatever reason, that the conference is being postponed or the dates being changed, the organisers shall not be liable for any expenditure, damage or loss incurred by the delegate. If by rearrangement or postponement the event can take place, the booking between the delegate and the organisers shall remain in force and will be subject to the cancellation schedule in paragraph 3 Speakers - Views expressed by speakers are their own. Intelligence-Sec cannot accept liability for advice given, or views expressed, by any speaker at the conference or in any material provided to delegates. Photography & Filming - For promotional purposes, there may be a professional photographer and video production taking place during the conference. Delegates who do not wish to be filmed or recorded should advise the organisers by to events@intelligence-sec.com prior to the event. Data Protection - By submitting registration details, delegates agree to allow Intelligence-Sec and companies associated with the conference to contact them regarding their services. Delegates who do not wish to receive such communications please events@intelligence-sec.com. The contact details of registered delegates will be placed on the attendee list which will be passed to sponsoring companies and to all attendees for them to see who is at the conference for the purpose of networking and meetings. Delegates who do not wish to be included on this list should advise at the time of booking. Websites & Links - The conference and associated Intelligence-Sec websites may link to other websites and networking tools provided for the convenience of the users. The contents of these websites are maintained by their owners, for which Intelligence-Sec takes no responsibility. Neither can responsibility be taken for contents of any website linking to this website. Insurance - It is the responsibility of the delegate to arrange appropriate insurance cover in connection with their attendance at the conference. Intelligence-Sec cannot be held liable for any loss, liability or damage to personal property. If you have any questions about these Terms & Conditions, please contact events@intelligence-sec.com For more information visit

Cyber Intelligence Asia 2014

Cyber Intelligence Asia 2014 Organized By: BOOK BY THE 31 st DECEMBER 2013 AND RECEIVE UP TO 20% OFF REGISTRATION FEE Official Endorsement By: Cyber Intelligence Asia 2014 11 th - 14 th March 2014, Grand Copthorne Waterfront Hotel,

More information

DEFENCE SATELLITES. Sponsors and Exhibitors. For more information visit

DEFENCE SATELLITES. Sponsors and Exhibitors. For more information visit Organized By: DEFENCE SATELLITES Conference and Exhibition 10 th 12 th May 2016 Brussels, Belgium Officially Endorsed By Sponsors and Exhibitors EVENT SCHEDULE Tuesday 10 th May 2016 09.00 16.00 Full Day

More information

GROUP REGISTRATION CONTRACT

GROUP REGISTRATION CONTRACT GROUP REGISTRATION CONTRACT Welcome to the American Diabetes Association s Group Registration Services for the 79th Scientific Sessions to be held on June 7-11, 2019, at the Moscone Center in San Francisco,

More information

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore 6 th annual CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore Organised By: Event Schedule Tuesday 20 th March 2018 Full Day Workshop

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

Workshop description

Workshop description Workshop description COBIT5 for Assurance With information and technology at the heart of creating value for enterprises, it is more important than ever for organizations to optimize their IT assurance

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

Spark Digital Energy Conference and Exhibition Explore the digital technologies transforming the energy sector CONFERENCE AND EXHIBITION

Spark Digital Energy Conference and Exhibition Explore the digital technologies transforming the energy sector CONFERENCE AND EXHIBITION Spark 2018 Digital Energy Conference and Exhibition Explore the digital technologies transforming the energy sector Tuesday 11th December 2018 Crowne Plaza, Santry, Dublin S P O N S O R E D B Y O R G A

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

FloCon Sponsorship Opportunities. January 11 14, 2016 Daytona Beach, FL

FloCon Sponsorship Opportunities. January 11 14, 2016 Daytona Beach, FL FloCon 2016 Sponsorship Opportunities January 11 14, 2016 Daytona Beach, FL 1 FloCon 2016 Sponsorship Opportunities The 12 th annual FloCon conference takes place at the Hilton Daytona Beach Hotel in Daytona

More information

Federal Information Sharing Resources for Small and Midsize Businesses

Federal Information Sharing Resources for Small and Midsize Businesses Federal Information Sharing Resources for Small and Midsize Businesses Hosted by the Department of Homeland Security s (DHS) Critical Infrastructure Cyber Community (C3) Voluntary Program October 31, 2017

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Global Security Exchange (GSX) 2019

Global Security Exchange (GSX) 2019 Global Security Exchange (GSX) 2019 InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, organizations, state

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032

Master the implementation and management of a Cybersecurity Program based on ISO/IEC 27032 ISO/IEC 27032 Lead Manager 23rd - 27th October 2017 Hilton Hotel, Sandton, Johannesburg Master the implementation and management of a Program based on ISO/IEC 27032 Why should you attend? Manager training

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector

More information

Venue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website:

Venue. Sheraton Oman Hotel. P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: Website: Venue Sheraton Oman Hotel Sheraton Oman Hotel P. O. Box 3260, Ruwi 112 Muscat, Sultanate of Oman Tel: +968 2237 7777 Website: http://www.sheratonoman.com For reservations, please contact: Ms. Mary Antonette

More information

Accelerating CCUS: A Global Conference to Progress CCUS

Accelerating CCUS: A Global Conference to Progress CCUS Accelerating CCUS: A Global Conference to Progress CCUS 28-29 November 2018 EDINBURGH, SCOTLAND, UNITED KINGDOM There is broad international consensus that CCUS has a vital role to play in meeting global

More information

A-LIST 2016 Event Sponsorship Form

A-LIST 2016 Event Sponsorship Form A-LIST 2016 Event Sponsorship Form Event Atlanta Local InfraGard Security Training (A-LIST) event Date February 10, 2016 Location Purchase and sponsorship contribution levels Kennesaw Center, Kennesaw

More information

The President s National Security Telecommunications. AGENCY: National Protection and Programs Directorate,

The President s National Security Telecommunications. AGENCY: National Protection and Programs Directorate, This document is scheduled to be published in the Federal Register on 05/01/2018 and available online at https://federalregister.gov/d/2018-09234, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY

More information

CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7)

CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7) CMI QUALIFICATIONS IN MANAGEMENT & LEADERSHIP (LEVEL 3, 5 AND 7) GLOBAL REACH The BIBF plays a vital role in the training and human capital development in the region. The BIBF qualifies over 20,000 learners

More information

UK-NL Cyber Security Showcase DIT The Netherlands

UK-NL Cyber Security Showcase DIT The Netherlands UK-NL Cyber Security Showcase 2017 DIT The Netherlands UK-NL Cyber Security Showcase 2017 World Trade Center, The Hague Event Details The Department for International Trade is organizing the second edition

More information

Corporate Governance and Accountability

Corporate Governance and Accountability The Barbados Stock Exchange presents the fifth annual conference on Corporate Governance and Accountability Join the Barbados Stock Exchange for their fifth annual Corporate Governance and Accountability

More information

5 th Annual Identity Management Symposium

5 th Annual Identity Management Symposium Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates

More information

FBI. National Security & Oil and Natural Gas. NOIA Conference April 11, 2014

FBI. National Security & Oil and Natural Gas. NOIA Conference April 11, 2014 FBI National Security & Oil and Natural Gas NOIA Conference April 11, 2014 Strategic Partnership Program Partnership with public and private sector entities to protect the national and economic security

More information

Cyber Security Series 5 th Cyber and SCADA Security for Oil & Gas Industry 2018

Cyber Security Series 5 th Cyber and SCADA Security for Oil & Gas Industry 2018 Cyber Security Series 5 th Cyber and SCADA Security for Shifting from what to do approach to how to make your cyber assets more secure SPEAKER PANEL Philippe Puyou-Lascassies TIGF France Gabor Szabo Head

More information

ASH Group Information and FAQ's

ASH Group Information and FAQ's TABLE OF CONTENTS 1. WHAT DO THE BADGES LOOK LIKE?... 2 2. REGISTRATION TYPE DEFINITION... 2 3. WHAT IS A GROUP ADMINISTRATOR?... 2 4. HOW DO I SUBMIT MY GROUP S REGISTRATIONS?... 3 5. WHAT ARE THE REGISTRATION

More information

Certification in ISO (3 day masterclasses)

Certification in ISO (3 day masterclasses) Certification in ISO 31000 (3 day masterclasses) Become a certified ISO 31000 risk management professional 14-16 April, 2014 Geneva, Switzerland Contacts:!! Alex Dali!! Email: Alex.Dali@G31000.org Phone:

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations Image Source: blueskyrotor.com 5-7 June 2018 Congrès Beaulieu, Lausanne Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations 2018 Exhibiting and ship Opportunities www.eweurope.com

More information

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities July-September 2018 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

BCS London Office Southampton Street, London, WC1.

BCS London Office Southampton Street, London, WC1. The British Computer Society Information Security Specialist Group Announce a Seminar Penetration Testing Day Thursday, 16 th July, 2009. BCS London Office Southampton Street, London, WC1. This event will

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

OpenStack Summit November 2013 Sponsorship Prospectus

OpenStack Summit November 2013 Sponsorship Prospectus OpenStack Summit November 2013 Sponsorship Prospectus Asia World-Expo Hong Kong November 5-8, 2013 Expected Attendees: 4,000-5,000 Thank you for your interest in sponsoring the OpenStack Summit! Your support

More information

DIGITAL MARKETING PARTNER. Spliced Knot

DIGITAL MARKETING PARTNER. Spliced Knot Organiser DIGITAL MARKETING PARTNER Spliced Knot In today's complex global business environment, having a transparent view of information and a coordinated approach to the governance, management and assurance

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE www.thalesgroup.com/uk SECURE COMMUNICATIONS AND INFORMATION SYSTEMS T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE An enterprise-level bespoke security service for the detection and response to cyber

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

GDC 2015 GROUP REGISTRATION DEADLINE FOR REGISTRATION» EARLY ENDS 1/21 REGULAR ENDS 2/25 W/GROUP DISCOUNT $1, $1,795 50

GDC 2015 GROUP REGISTRATION DEADLINE FOR REGISTRATION» EARLY ENDS 1/21 REGULAR ENDS 2/25 W/GROUP DISCOUNT $1, $1,795 50 STEP 1 GDC GROUP OPTIONS GDC group registration discount applies to any combination of 10 or more All Access, Main Conference, Summits, Tutorials & Bootcamps, and Audio Track Passes. The Expo Pass and

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

TERMS AND CONDITIONS OF THE REGISTRATION TO THE INVESTMENT FORUM

TERMS AND CONDITIONS OF THE REGISTRATION TO THE INVESTMENT FORUM TERMS AND CONDITIONS OF THE REGISTRATION TO THE INVESTMENT FORUM 16-17 April 2018 1. GENERAL CONDITIONS 1.1. Investment Forum hereinafter called THE FORUM takes place from 16 to 17 April in Tarnów, Poland.

More information

The Value of Bipartisanship

The Value of Bipartisanship About Vectis Vectis At Vectis Strategies we understand how to successfully and properly apply leverage in public relations, government stretch from the corridors of power in Washington, DC to international

More information

Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security

Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security Cyber Security Principles Mobile Devices Security Hazards And Threats 2nd Edition Computer Security We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks

More information

ATTENDEE REGISTRATION POLICY

ATTENDEE REGISTRATION POLICY ATTENDEE REGISTRATION POLICY This attendee Policy applies to the 19th Annual Green Chemistry & Engineering Conference (GC&E), administered by the ACS Green Chemistry Institute (ACS GCI), a part of the

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Abdulmohsin Al Omran and The Family Office

Abdulmohsin Al Omran and The Family Office Presented by: Syracuse University Syracuse University s College of Engineering and Computer Science The Maxwell School of Citizenship and Public Affairs at Syracuse University The Institute for National

More information

Training Opportunities

Training Opportunities July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Launch. Cyber. of the. 18th. CentreSecurity. September Sponsorship Opportunities

Launch. Cyber. of the. 18th. CentreSecurity. September Sponsorship Opportunities Launch Cyber of the CentreSecurity 18th September 2012 Sponsorship Opportunities www.softbox.co.uk 01347 812100 Welcome The launch of the Cyber Security Centre at De Montfort University will mark the opening

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE ABOUT ISACA For more than 50 years, ISACA (isaca.org) has been a pace-setting global professionals lead, adapt and assure trust in an evolving digital

More information

EXHIBITOR MANUAL Exhibitor Manual Conference web site. Contact Information ATMIA Event Staff

EXHIBITOR MANUAL Exhibitor Manual Conference web site. Contact Information ATMIA Event Staff EXHIBITOR MANUAL Exhibitor Manual Please read this manual carefully and completely. It contains important information relating directly to exhibit procedures. You will obtain prompt and efficient attention

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Phone: Phone: APPLICATION FORM. The 2017 ARCCOMS EBBS Sofia Workshop. 19th 21st November 2017

Phone: Phone: APPLICATION FORM. The 2017 ARCCOMS EBBS Sofia Workshop. 19th 21st November 2017 EBBS - Bery Group Bulgaria ARCCOMS Association Phone: 00359 2 9888 604 Phone: + 44 20 8133 40 40 Mobile: 00359887 099 730, 00359887 099 731 Website: www.arccoms.org Email: office@edu-fair.info Email: info@arccoms.org

More information

Telecommunication Development Bureau (BDT)

Telecommunication Development Bureau (BDT) Telecommunication Development Bureau (BDT) Ref.: BDT/IEE/RME/DM/006 Geneva, 18 December 2017 To: -ITU-D Sector Members -Administrations of ITU Member States -National Regulatory Authorities -Regional and

More information

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities April-June 2018 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities July-September 2015 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager 2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager NIST Cybersecurity Framework (CSF) Executive Order 13636 Improving Critical Infrastructure Cybersecurity tasked the National

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP)

COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP) COURSES LEADING TO THE BCS CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP) CISMP FROM AMBERHAWK TRAINING LIMITED MAY 2017 CERTIFICATE IN INFORMATION SECURITY MANAGEMENT PRINCIPLES (CISMP)

More information

MY PUBLIC ACCOUNTANT PRACTICE PROGRAM Preparation for practice success

MY PUBLIC ACCOUNTANT PRACTICE PROGRAM Preparation for practice success MY PUBLIC ACCOUNTANT PRACTICE PROGRAM 2017 Preparation for practice success tools for success The My Public Accountant (MPA) Practice Program is a fully interactive workshop which provides you with the

More information

Understanding the Changing Cybersecurity Problem

Understanding the Changing Cybersecurity Problem Understanding the Changing Cybersecurity Problem Keith Price BBus, MSc, CGEIT, CISM, CISSP Founder & Principal Consultant 1 About About me - Specialise in information security strategy, architecture, and

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Julie Gascon Assistant Commissioner Canadian Coast Guard Mikå Mered Managing Partner POLARISK Group Lonnie Kishiyama

Julie Gascon Assistant Commissioner Canadian Coast Guard Mikå Mered Managing Partner POLARISK Group Lonnie Kishiyama Advancements on Coastal State Regulations Adaption & Requirements Connecting to The Polar Code Developments of Operational Matters within the Arctic Commercial Shipping Activity in Arctic Regions Insurance

More information

ACIIA CAE Leadership Forum. Collaboration Innovation and Duplication: Making Great Things Happen

ACIIA CAE Leadership Forum. Collaboration Innovation and Duplication: Making Great Things Happen ACIIA CAE Leadership Forum Collaboration Innovation and Duplication: Making Great Things Happen 16-17 May 2019 Grand Hyatt Manila, Bonifacio Global City, Philippines Overview In today s ever-changing

More information

BASED INTERNAL AUDITING

BASED INTERNAL AUDITING ý Marketing Partner Content Partner BASED INTERNAL AUDITING IIA GL BAL TRAINING MATERIAL Mumbai 21 Dec 2018 8HOURS A bout This Course Course Description The COSO Internal Control Integrated Framework is

More information

TechTarget Event Sponsorship Terms and Conditions

TechTarget Event Sponsorship Terms and Conditions TechTarget Event Sponsorship Terms and Conditions TechTarget, Inc. ( TechTarget ) and the company listed on the applicable Insertion Order(s) as the sponsor of the Event(s) ( Sponsor ) each agree that

More information

safely connecting to future smart hospital & healthcare

safely connecting to future smart hospital & healthcare Organizer Funding Organization Sponsors CYBER SECURITY ON MEDICAL AND HEALTHCARE SYSTEM safely connecting to future smart hospital & healthcare SYMPOSIUM CUM WORKSHOP Workshop: 30 November 2017 Symposium:

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

Don t miss out pre-paid delegates who book at the conference hotel will be eligible for Early Bird Draws!

Don t miss out pre-paid delegates who book at the conference hotel will be eligible for Early Bird Draws! Assembly of First Nations National First Nations Infrastructure Conference and Tradeshow: Building for a Sustainable Future February 3-5, 2014 Toronto, Ontario The National First Nations Infrastructure

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

MELANI: Information exchange a story of success

MELANI: Information exchange a story of success Federal Strategy Unit for Information Technology FSUIT Federal Intelligence Service Reporting and Analysis Centre for Information Assurance MELANI MELANI: Information exchange a story of success Max Klaus,

More information

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

EXHIBIT BOOTH REQUEST & PERSONNEL REGISTRATION & HOTEL FORM

EXHIBIT BOOTH REQUEST & PERSONNEL REGISTRATION & HOTEL FORM EXHIBIT BOOTH REQUEST & PERSONNEL REGISTRATION & HOTEL FORM WSWA 76 TH ANNUAL CONVENTION & EXPOSITION March 31 - April 3, 2019 Grande Lakes Orlando This form is INTERACTIVE. You can type directly onto

More information

EXHIBITOR MANUAL. Exhibit Company: Stagevision, Inc

EXHIBITOR MANUAL. Exhibit Company: Stagevision, Inc EXHIBITOR MANUAL Exhibitor Manual Please read this manual carefully and completely. It contains important information relating directly to exhibit procedures. You will obtain prompt and efficient attention

More information

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process

RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process RISK BASED INTERNAL AUDIT (16 CPE) COSO ERM Framework - Risk Assessment Process Date 24-25 September 2018 Time: 09:00 17:00 Location Hotel Grand, Tirana, Albania Course director: Mr. Konstantinos P. Triantafyllidis,

More information

Data to Decisions Terminate, Tolerate, Transfer, or Treat

Data to Decisions Terminate, Tolerate, Transfer, or Treat I N S T I T U T E F O R D E F E N S E A N A L Y S E S Data to Decisions Terminate, Tolerate, Transfer, or Treat Laura A. Odell 25 July 2016 Approved for public release; distribution is unlimited. IDA Non-Standard

More information

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE PROJECT MANAGEMENT CERTIFICATE PROGRAM Further your career and gain an understanding of what it takes to lead a project to successful completion functional skills,

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

gridconnext provides an unprecedented

gridconnext provides an unprecedented Where Policy & Business Leaders Meet to Build the Next-Generation Grid 2017 gridconnext provides an unprecedented opportunity for diverse industry stakeholders to discuss evolving policies and share best

More information

IT TRAINING COURSE - JANUARY TO DECEMBER 2019

IT TRAINING COURSE - JANUARY TO DECEMBER 2019 IT TRAINING COURSE JANUARY TO DECEMBER In Collaboration with All courses are HRDF claimable is Microsoft WORD Microsoft Word (Fundamental & Discover The Techniques to A Professional Word Report 07 07 2

More information