Menu Shape 3 copy 2Created with Avocode.
webinara overview
Utilities and Energy

Securing the grid: Does open = Secure?

webinar description

Is information and experience sharing the ideal approach to cyber security on the grid? What does it take to get utilities around the table discussing freely and openly? Can a bond between stakeholders on the grid advance the grid security debate?

Ahead of the EE-ISAC Pre-Launch Cyber Security programme at EUW 2015 we assess current utility pain-points, lessons learnt from recent case studies and the opportunity to advance and accelerate the smart grid security debate via knowledge sharing!

You will also hear about EE-ISAC approach;
- why it is different and how this could advance the security debate
- what you can expect as energy professionals
- a teaser of some of the techniques and approaches

It will be Q&A chat style and moderated by Adam Malik, our director and in-house chief inquisitor, so send us your questions before hand if you wish to get involved...

Reasons to attend the webinar
  • Experiences from recent cyber security collaboration innitiatives

  • The state of information and knowledge sharing

  • What the optimal and realistic models would look like

Speakers:
Engerati
Jamie Barnes, Project Manager
Alliander
Johan Rambi, Privacy & Security Advisor
EDP DistribuiĆ§Ć£o
Nuno Medeiros, OT Architect and Cybersecurity Officer
26

Oct

2015

12:00 - 1:00 PM
(GMT +1)

(Duration - 60 minutes)

ATTENDANCE FEE - FREE

WEBINAR HAS ENDED
Organizer: Engerati

Engerati is the central destination for delegates from over 40 leading energy events - A global meeting place for energy professionals to network, collaborate, share and engage. ... Read More

Other webinars you may like
FREE
Jun 20, 12.00 PM (GMT -04:00)
Leveraging RPA, AI and Mobile Technology
Today’s customers expect unprecedented quality of service in an I-want-it-now economy. Amazon, Uber and other digital-native companies have created a customer demand for immediate, high quality, in-the-moment service from all providers in all industries. How traditional enterprises can meet this
IRPA AI
Speaker - Gregory North
More info
FREE
Jun 20, 1.00 PM (GMT -04:00)
Industrial Cybersecurity
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, creating risks
Blentech Corporation
Speaker - Matthew Hartman PE
More info
FREE
Jun 25, 1.30 PM (GMT -04:00)
Ensure Enterprise-Grade Security for Your Mobile Apps
5G promises to be a game changer for mobile. Technology has leaned forward to enable massive processing power at blistering speeds, yet the true value of mobile as not just a communication device, but a compute platform, has yet to be realized. Why? The number one gating factor for true edge compute
BankInfoSecurity
Speaker - Bank InfoSecurity
More info
Other webinars you may like
FREE
Jun 20, 12.00 PM (GMT -04:00)
Leveraging RPA, AI and Mobile Technology
Today’s customers expect unprecedented quality of service in an I-want-it-now economy. Amazon, Uber and other digital-native companies have created a customer demand for immediate, high quality, in-the-moment service from all providers in all industries. How traditional enterprises can meet this
IRPA AI
Speaker - Gregory North
More info
FREE
Jun 20, 1.00 PM (GMT -04:00)
Industrial Cybersecurity
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, creating risks
Blentech Corporation
Speaker - Matthew Hartman PE
More info
FREE
Jun 25, 1.30 PM (GMT -04:00)
Ensure Enterprise-Grade Security for Your Mobile Apps
5G promises to be a game changer for mobile. Technology has leaned forward to enable massive processing power at blistering speeds, yet the true value of mobile as not just a communication device, but a compute platform, has yet to be realized. Why? The number one gating factor for true edge compute
BankInfoSecurity
Speaker - Bank InfoSecurity
More info
Other webinars you may like
FREE
Duration: 30 Min
Business Data Onboarding Better By 10X With Large File Data Ingestion
Large volume of data is an old adversary of data integration and onboarding solutions. Enterprises relying on sub-par data exchange technology can barely handle files more than 1 GB, which is abominably low per today’s standards. Moreover, they consume a fair amount of money, time, and effort
Adeptia Inc.
Speaker - Raman Singh
More info
FREE
Duration: 60 Min
User Onboarding Emails that Drive Customer Success and Free-to-Paid Conversions
It’s time to dust off your user onboarding emails and make them your highest converting channel. Chameleon and Sendwithus are excited to host Alli Blum, a SaaS onboarding expert and conversion copywriter who will share her strategies for designing an onboarding email sequence that drives more
Chameleon
Speaker - Alli Blum
More info
FREE
Duration: 60 Min
Business Intelligence and Advanced Analytics
Why is your data important? Having an agile, modern Business Intelligence & Advanced Analytics platform enables fast & accurate access to critical insights across a range of analytics. Organizations in the global trade era must quickly and successfully navigate supply chains, converting data
nVision Global
Speaker - Luther Brown
More info
SHOW ALL WEBINARS
ARE YOU 100% SURE YOU WANT TO YOU WANT TO DISCONNECT ?

Yes No
ARE YOU 100% SURE YOU WANT TO REMOVE THIS SPEAKER ?

Yes No
THIS SPEAKER CANNOT BE REMOVED. YOU HAVE ALREADY SELECTED THIS SPEAKER ABOVE. SELECT ANOTHER SPEAKER ABOVE TO REMOVE IT.

OK
PLEASE TYPE A VALID KEYWORD IN THE SEARCH FIELD