Cybersecurity Forum 2016
Loews Chicago O'Hare
5300 N. River Road
Rosemont, IL 60018
By August 16, 2016: $895 for MAPI member company executives, $1,095 all others
August 16 through November 2, 2016: $995 for MAPI member company executives, $1,195 all others
After November 2, 2016: $1,095 for MAPI member company executives, $1,295 all others
Tuesday, November 15 Arrival Reception and Dinner: $125 per person
*** If registering 4 or more people from your company and would like to take advantage of a MAPI discount, please Contact Mary Pearson at 703.647.5139 or firstname.lastname@example.org
Click here for our registration and cancelation policies
MAPI has reserved a block of rooms at the Loews Chicago O'Hare ($159 per night plus taxes) for attendees arriving Tuesday, November 15 and departing Wednesday, November 16. Click here to access the MAPI room block at the hotel. The hotel cutoff is Tuesday, October 25, 2016. To avoid a cancellation fee, hotel reservations must be canceled no later than 4 p.m. 24 hours prior to the confirmed arrival date. Check-in time is 4:00 p.m. and check-out time is 12:00 p.m.
Cybersecurity continues to become more essential for manufacturers, as is evident by constant news of new attacks and threats. At MAPI we are acutely aware of the challenges facing manufacturing executives. Our 3rd annual Cybersecurity Forum will shed light on these ever-changing challenges and threats as well as solutions that have proven successful with other firms.
The one-day event will give participants the opportunity to hear presentations from leading cybersecurity experts and manufacturing executives. All attendees will leave better equipped to confront the escalating landscape of threats.
The forum is not limited to council members—your colleagues working on, or interested in, cybersecurity are welcome to participate. We offer a discount for companies that send 4 or more people to the event.
Who should attend?
Attendees are responsible for setting the corporate policy on cybersecurity, manage systems and software, monitor and address threats, develop products that connect to the outside world, and/or are responsible for the manufacturing equipment that is controlled by PLCs or connected to the outside world.
What makes MAPI forums different?
- Roundtable discussions: Rich dialogue on the issues you care about, moderated to keep discussions focused on the “so what.”
- Peer to peer sharing: There are no talking heads. Almost all of the content is delivered by your peers at global manufacturers, sharing experiences candidly.
- No death by PowerPoint: While our presenters deliver outstanding content, we schedule ample time for interaction and Q&A, so that you can dig deep on the topics that matter.
- No pitches: Our forums never have more than one sponsor, and there are no sales pitches. None.
- Balance of strategy and utility: Our forums deliver great content around strategy and peer-tested frameworks for putting those strategies into action.
We kick off at 6:00 p.m. on November 15 with a networking reception and dinner at the hotel (separate fee). Our day on November 16 starts with breakfast at 7:00 a.m.; the meeting starts promptly at 8:00 a.m. and wraps up by 4:00 p.m.
Questions & Contact
Located in the Hotel's Lobby
DFARS 252.204-7000, NIST 800-171, DHS Cyber Framework, UK Cyber Essentials+, and PCI-DSS are all regulations that are finding their way into our customer contracts. In the past three years, Kaman has moved from decentralized IT policy narratives to a single global policy based on the NIST framework that documents leadership’s maximum risk tolerance for IT. This presentation will focus on how Kaman drives regulatory compliance through the new IT policy by using a strong framework, succinct policy statements with specific references, and a strong partnership with internal audit and other compliance functions.
To sustain and enhance awareness of what a significant cyber event might entail and to give executives a first-hand sense of the related challenges and decisions that executive management might face, a demonstration cyber wargame will be conducted on November 16, 2016, as summarized below:
–Audience members will participate as a team and each person will assume various executive-level roles within a fictitious company. Together, the group will drive that company’s response to a simulated cyber incident.
–The 90-minute session will kick off with an overview of the session agenda, rules for the simulation portion of the exercise, and high-level leading cyber incident response practices.
–Role-players will then be exposed, through “injects,” to an evolving cyber incident scenario involving:
- Disruption to operations
- Internet presence defacement
- Media and public backlash
- Failure of communications systems
- Law enforcement / regulatory engagement
–After each “inject” is revealed, role-players will discuss appropriate response activities with facilitator guidance.
–After the final inject, a room-wide debrief of lessons learned and leading practices will be conducted.
Security incidents are becoming more commonplace and our ability to quickly react to these events is often a requirement by our stakeholders.
An effective incident response plan doesn’t have to be complex. A straightforward, planned approach that covers the six steps of incident response can put you ahead of the game when an incident occurs.
And just like our primary school fire drills, the key to success with incident response is not the plan, but practicing the plan so you will be able to respond without panic with what you already know. Let’s stop, drop, and roll through this process together.
Intellectual property can no longer be protected by locking your doors. A dynamic technology landscape contains your most sensitive information, and is now expanding beyond physical perimeters.
This presentation will walk you through an IP protection lifecycle, from managing insiders to evaluating third-party risks.
Knowing what to look for is the most difficult part of detecting credible threats. Elements of the dark web use deceptive tactics to obfuscate and conceal their activities. This discussion will be focused on determining what threats to look for and how to look for them.