Agenda Day 2

7:00 AM - 8:00 AM Successfully Implementing Incident Response Mechanisms

· Reacting vs. Responding to Incidents
· Creating a structure of tasks around responding to an incident
· Enhancing programs for prevention and detection to manage response time

8:45 AM - 9:30 AM Registration & Coffee

8:45 AM - 9:00 AM Chairperson’s Opening Remarks

9:00 AM - 9:45 AM Incident Response and Developing Integrated Method of Reaction

· Standardizing response techniques and management
· Understanding time frame to handle initial detection
· Implementation of protocol to contain malware from spreading and future planning in case of repeat offense.

9:45 AM - 10:30 AM Security Operations Center: A Case Study

· Determining need for formalized Cybersecurity Operations Center
· Developing and building operating model
· Proving results through metrics

10:30 AM - 11:00 AM Morning Refreshment Break- Demo Drive

Take a few minutes to recharge yourself before we jump into the next information packed session!

11:00 AM - 1:30 PM Implementing Framework for Improving Critical Infrastructure Cybersecurity

· Development of core organizational profile to keep up with U.S. Standards
· Alignment of business ventures with cyber security activity
· Rigorous planning of risk analysis to match company and government policy

11:00 AM - 1:30 PM Protection of ICS/PCS/SCADA Against Attacks: Early Detection and Reaction

· Building secure systems to combat against incidents of hacking
· Creating thorough plans for incident response to react quickly and efficiently when attack is detected
· Building up detection systems to limit break of information security

11:00 AM - 1:30 PM The Internet of Things and its Connection to Cyber Security

· Expanding the definition of cybersecurity to include simple devices not capable of protecting against malware
· BYOD and MDM policy in controlling and accessing the system remotely
· Increasing IoT security through stricter regulations and policy

2:30 PM - 3:15 PM Implementing Quantitative Risk Assessment Within Chevron

· Modeling risk in terms of annualized loss exposure in dollars rather than nebulous terms like “high” or “low”
· Understanding how to prioritize risks
· Enhacing risk preparation at all levels from upstream to downstream

3:15 PM - 4:00 PM Panel: Next Generation Cybersecurity Solutions/Technologies: What’s the Future of Cyber Solutions?

· Overview of future technologies designed to help alleviate and combat against hacking
· Developing an actionable plan to combat emerging threats in the cyber environment
· Sharing lessons learned from previous hacking incidents and predicting future risk analysis

4:00 PM - 4:15 PM Chairperson’s Closing Remarks/Break

4:15 PM - 5:00 PM End of Main Summit Day Two/ Networking Reception