Giving you the tools to prevent business interruption from internal or external digital disruptions
Agenda
8.30 Registration and morning refreshments
09:30 A Demonstration of How Easy it is to Hack into Your System
Invited Speaker: Ken Munro, Partner,
PenTest Partners
09:30 Quantifying Your Risk and Potential Loss: How much do you stand to lose from cyber attacks each year?
Presentation
- Beyond Dragonfly, BlackEnergy and KillDisk: how many cyber cases are there that don’t make the news headlines?
- Internal vs. External: How do the losses compare for business interruption caused by internal actors to losses caused by external actors?
Speaker: TBC
10:00 Setting the Scene: Examining the Legalities, Responsibilities and Case Studies of Cyber Security Attacks in the Wind Power Industry
Panel Discussion
- How are cyber attacks impacting the energy industry compared to other industries?
- What lessons can we learn from the USA where there seems to be more prominence of attacks?
- Examining and evaluating the physical and digital points of weakness for a wind farm. Why and how are they at risk?
- What is the business case to fund further security protection and specifically cyber security protection?
The panel discussion will provide a 360 view by being comprised of representatives from each sector of the industry: an owner-operator, a sponsoring OEM, a regulatory representative, a sponsoring consultant and sponsoring legal or insurance representative.
11:00 Networking Coffee Break
11:45 Ask the Experts: The NIS Guidelines: What is going to be their impact on the wind power industry?
An opportunity to put your questions to the experts on the NIS guidelines. You can either use slido to submit your question anonymously or raise your hand and ask your question directly.
Invited speakers: Paul Chichester, Director of Operations, NCSC
Michael John, Director of Operations, European Network for Cybersecurity (ENCS)
PROTECTING YOUR ASSETS
Two workshops to deliver refined and tailored content with a clear objective. In each room tables will be laid out in a boardroom style creating the atmosphere of a working group. With the leader of the workshop being the expert in the field, the attendees of the workshop will be able to engage, discuss and question the leader for their expert advice.
Protecting Your Assets Workshops | |||
---|---|---|---|
12:15: Sponsored Workshop ABelow topics are suggestions only, the sponsor is welcomed to nominate and host a new topic, with the WPM programming team working with the sponsor on a content framework.
|
12:15: Sponsored Workshop BBelow topics are suggestions only, the sponsor is welcomed to nominate and host a new topic, with the WPM programming team working with the sponsor on a content framework.
Speaker TBC |
13:15 Networking Lunch Break
14:30 Standardisation and Best Practice: How should suppliers store, share and protect your data? How should you store, share and protect your data?
Panel Discussion
- Should all SCADA communications from farms to centres be encrypted?
- How can you ensure that your OEM is securing your data and communications?
- How do you verify that your external supplier is protecting your asset as they work?
- Developing a best practice: the importance of incident reports, collaboration and lessons sharing across the industry
Speakers: TBC
The panel discussion will provide a 360 view by being comprised of representatives from each sector of the industry: an owner-operator, a sponsoring OEM, a regulatory representative, a sponsoring consultant and sponsoring legal or insurance representative.
15:30 - 17:00 Tailoring Your Cyber Security Strategy for Your Business
Roundtables
Maximum attendance of 10 seated delegates per table including the spokesperson, who will be drawn from the sponsoring institutions or industry experts. Spokesperson to give a five minute introduction to the topic, then chair the discussion among the delegates. Sessions will be pre-booked on a first come first served basis. There will be two rotations meaning each delegate gets to visit 3 tables, for 25 minutes each. Each delegate will be guaranteed a place at at least one of their top 3 choices.
Understanding the liabilities and responsibilities if you hold 3rd party data | How to build a recovery plan for low impact wind farm |
Securing your asset when contracting out to maintenance and repairs companies | How to build a recovery plan for a series of wind farms |
Assessing the vulnerabilities of low impact wind farms |
17:00 Close of Conference and Networking Drinks Reception
*Agenda subject to change