08:08 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Oil & Gas Critical Infrastructure & Asset Security Forum Set For Vienna Next Month

Designed to help oil and gas organizations working in highly vulnerable operational environments to optimise their security strategies

The security of key energy resources is fundamental to our welfare and prosperity. Many links along the global supply chain for oil and gas have been disrupted due to a variety of security threats in recent years, and the frequency of these attacks is increasing.

The Oil & Gas Critical Infrastructure & Asset Security Forum programme has been finalised for the 19 - 21 September 2012 in Vienna, Austria. The programme has been designed to help oil & gas organisations working in highly vulnerable operational environments to optimise their security strategies and to ensure 360degree(s) protection of their energy assets.

The forum spans 2.5 days of learning, best practice benchmarking, networking, partnership-building, and the best and latest thinking in global energy leadership. It will bring together senior-level security, business resilience, and safety personnel to the Austria Trend Park Royal Palace to address key challenges for the industry in the form of case studies, covering aspects of the value chain, particularly in upstream and midstream oil and gas operations, including:

- Overcoming Concerns of Theft to Gain Maximum Control Over your Critical Energy Assets - Jakub Ludvik, Chief Security Officer, RWE Transgas - Practical Strategies to Deal with Security Risks: Using Systematic Approaches in Complex and Dynamic Environments - A Case Study by Statoil - Oddmund Granli, Head of HSE and Risk Management, Statoil - Implementing Plans for Crisis and Emergency Situations in your Offshore Operations - R.P. Gupta, Chief Manager Offshore Security, Oil & Natural Gas Corporation of India - Ensuring Maritime Security in the Offshore Oil & Gas Industry - Peter Cook, Security Director & Founder, The Security Association for the Maritime Industry (SAMI) - Intelligence Lead Security Operations For Risk Management Business Optimisation - Christopher Taxis, Group Security Operations Manager, Centrica - Mitigating Damaging Risks by Defending Against the Complexity of Increasing Cyber Attacks - Dr. Frank Umbach, Associate Director, European Centre for Energy and Resource Security (EUCERS)

The Forum has also attracted support and sponsorship from security specialists including:

- G4S - DSIT - Ocean Protection Services - Global Unmanned Systems (GUS)

To view the full programme and find out more about attending, visit http://www.ogassetsecurity.com or contact Laurence Allen, Marketing Manager on laurenceallen@dmgevents.com or call +44(0)20-3615-0390

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web