Focused Conference & Exhibition Nuclear Knowledge Management & Cyber Security Conference 17th - 18th June 2015, The Hilton, Cardiff

Two days of business critical insight

25+ expert speakers, industry leading panel sessions and workshops, exclusive updates you won't get anywhere else...the nuclear knowldge management and cyber security conference will give you everything you need to enhance your information strategy.

Day One Day Two

Day One: 17th June 2015 - Knowledge Management Strategy

7:30-9:00 REGISTRATION, EXHIBITION & WELCOME COFFEE

09:00-09:10 Conference Welcome: Mike Vickery, Nuclear Energy Insider

09:10-09:30 Chairman’s Welcome

EDF
Melanie Sachar
Knowledge Management Lead
EDF NNB

09:30-10:00 NEED TO KNOW VS NEED TO SHARE

  • Develop strategies to deal with the tensions between competing business pressures within the nuclear industry
  • Understand what can be done to enhance knowledge and information transparency in line with increased security frameworks
  • Recognise the need to know vs need to share principle and how this will be an important concept for the UK’s civil nuclear industry
NDA
Rakesh Burgul
Security Manager
Nuclear Decommissioning Authority

10:00-10:30 NNB KNOWLEDGE MANAGEMENT STRATEGY

  • Gain an insight into the knowledge management programme for EDF NNB so you can understand how km can be used on the £16bn project
  • Understand the whole lifecycle approach for knowledge management and how this will identify and retain all relevant design, construction, operational and decommissioning records
  • Understand how NNB are leading the way in knowledge management strategy and are planning to maximise stakeholder and supply chain involvement
EDF
George Borlodan
Pre-Operations Director
EDF NNB

10:30-11:00 EXHIBITION & NETWORKING COFFEE BREAK

Get the Complete Post-Conference Materials Package Click Here

11:00-11:30 THE NDA’S GUIDE TO BEST PRACTICE IN KNOWLEDGE MANAGEMENT

  • Discover the NDA’s newly issued guide to best practice in knowledge management
  • Understand how this best practice was developed through soft system modelling, consultation and benchmarking
  • Discover how the best practice guides are being used to integrate and drive excellence in knowledge management across the NDA estate
Sellafield
John Day
Head of Knowledge Management and Intellectual Property
Sellafield

11:30-12:00 KNOWLEDGE MANAGEMENT AT MAGNOX

  • Discover the knowledge transfer techniques used within the knowledge management framework at Magnox during the transition of parent body organisation
  • Gain an insight into the best practice of knowledge management throughout the nuclear decommissioning sector
  • Understand the objectives of the C&M knowledge programme and how the capture, management and storage of company records and knowledge will ensure safer operation during care and maintenance and final site closure
Magnox
Bob Radford
Knowledge and Information Lead
Magnox

12:00-12:30 Approaches to Maintaining and Building Organisational Knowledge

  • Discover the approaches to maintaining and building organisational knowledge within the Finnish nuclear utility
  • Understand how Fortum have implemented a knowledge management strategy to develop business objectives for safety and reliability
  • Hear about the formal and informal practices within Fortum’s nuclear knowledge management strategy and how this helps to embed km in everyday tasks
Fortum
Tellervo Juurmaa
Knowledge Management Manager
Fortum Nuclear

12:30-14:00 EXHIBITION & NETWORKING LUNCH BREAK

Get the Complete Post-Conference Materials Package Click Here

14:00-14:30 DEVELOPING TRACTION WITH A KNOWLEDGE MANAGEMENT PROGRAMME

  • Gain an insight into the internal knowledge management framework developed for Lloyds Register
  • Gain an insight into processes to capture and transfer knowledge from leavers, movers and joiners so you can apply these techniques within your business
  • Understand how other operational activities within your organisation can help develop a knowledge management strategy within nuclear organisations
Lloyds Register
Clive Bright
Systems Development and Business Improvement Manager
Lloyds Register

14:30-15:00 Meeting the Challenges: Nuclear Information and Knowledge Security

  • Understand the critical challenges nuclear information and knowledge security faces in 2015 and beyond
  • Discover how we can meet these challenges given that we assess our critical vulnerability from a security perspective as information
  • Understand the key differences in physical and online security for our key components and how to best protect the knowledge of how they are made
Enrichment Technology
Peter Fraser-Hopewell
Head of Group Security
Enrichment Technology

15:00-15:30 EXHIBITION & NETWORKING

Get the Complete Post-Conference Materials Package Click Here

15:30-16:00 Providing Operators with a Diagnostic Monitoring System and the Company with a Secure Management Information System: The Issues and the Realisation

  • Exploring the issues around the safeguarding of information
  • Implementing a computer based plant SCADA and Management Information System
  • Providing secure plant information, locally and to the company
AMEC

Ivor Yule
Technical Lead C&I
Amec Foster Wheeler

16:00-16:30 Open Forum Discussion: Industry Lessons Learned

  • Engage in open and informal group discussion with the delegates on knowledge management experiences and how to best implement within your organisation

16:30-19:00 EXHIBITION & NETWORKING DRINKS RECEPTION

Get the Complete Post-Conference Materials Package Click Here

 

Day One Day Two Top

Day Two: 18th June 2015 - Cyber Security Strategy

SESSION 4: DEVELOPING A SECURITY CULTURE THROUGHOUT THE NUCLEAR SUPPLY CHAIN

08:00-09:15 REGISTRATION, EXHIBITION & WELCOME COFFEE

09:15-09:30 Chairman's Welcome

Davies Nuclear Associates
Ian Bonnett
Davies Nuclear Associates

09:30-10:00 CYBER SECURITY & INFORMATION ASSURANCE IN THE DIGITAL ERA: LEADERSHIP, MATURITY, AGILITY AND TRANSFORMATION

  • Discover the objectives, requirements, model standards and regulatory expectations for transformation of cyber security in the UK civil nuclear sector
  • Understand views on leadership, maturity and agility of information assurance;
  • Gain an insight into the need for cyber risk aware culture; continuous improvement planning; and the critical requirement to ensure and test robust resilience plans
ONR
Robert Orr
Head of Information and Cyber Security
Office for Nuclear Regulation

10:00-10:30 CYBER ESSENTIALS - THE UK GOVERNMENT SCHEME TO IMPROVE CYBER SECURITY

  • Understand the Cyber Essentials Scheme and how it identifies the security controls needed to mitigate the risk from internet-based threats
  • Gain an insight into the guidance on implementation as well as offering independent certification
  • Understand how the Government’s National Cyber Security Strategy is to make the UK a safer place to conduct business online
Department for Business Innovation and Skills
Richard Bach
Assistant Director Cyber Security
Department for Business, Innovation and Skills

10:30-11:00 EXHIBITION & NETWORKING COFFEE BREAK

Get the Complete Post-Conference Materials Package Click Here

11:00-11:30 CYBER ESSENTIALS IN CONTEXT

  • Discover the differences between the numerous cyber essentials schemes available so that you can identify the best option for your business
  • Understand the future of certification and how this is likely to develop for the nuclear industry going forward
  • Gain an insight into how the scheme will enable an independent assessment of the essential security controls that organisations should have in place
Crest
Ian Glover
President
CREST

11:30-12:00 Cybersecurity - A view from 2018

  • Hear what 60 Chief Information Security Officers see as the key challenges over the next few years
  • What are the 500 cyber security university research projects and over £500m of grant money spending their time on
  • The future of assessing cyber security risks: are you Triple A Rated?
Crossword Cybersecurity
Tom Ilube
CEO
Crossword Cybersecurity

12:00-12:30 Managing a Cyber Incident

  • See how the use of scenario based exercises can provide a valuable perspective on adequacy of an organisation’s cyber security controls and governance
  • Gain an insight into how exercising quickly links low level operational security to the boardroom and provides a valuable business context
  • Explore some different approaches to exercising in this increasingly important area of cyber defence.
CGI Ltd
Richard Holmes
Cyber Security Team Lead
CGI Ltd

12:30-14:00 EXHIBITION & NETWORKING LUNCH BREAK

Get the Complete Post-Conference Materials Package Click Here

14:00-14:30 Understanding the Cyber Threat: How Operational Technology Changes the Game

  • Take a look into the modern attacker, looking at motivations and capabilities and why we should be concerned about them
  • Understand what this will mean to those using Operational Technology whether that be Industrial Control Systems, SCADA, Building Management Systems, physical security systems
  • Get clarity on what is important in this space and some ideas on how to tackle the challenges that we face going forwards.
MWR Infosecurity
Martyn Ruks
Director
MWR Infosecurity

14:30-15:00 Nuclear Skills Workforce

  • Gain an insight into the unique work done by National Skills Academy for Nuclear to nuclear skills issues, with employers in a competitive market
  • Understand the plans in place to help attract new entrants into the nuclear workforce so you can develop a future human resources plan for your business going forward
  • Gain an insight into the challenges faced for the nuclear industry through the busy schedule of decommissioning, construction and operation of our NPPs
National Skills Academy for Nuclear
Charlie Bray
South West Regional Manager
National Skills Academy for Nuclear

15:00-15:30 Good Practice Framework for Security of Industrial Control Systems

  • Introduction to the CPNI good practice guidelines for Industrial Control Systems
  • Understand how the guides provide a framework for developing a successful approach as part of a cyber-security management system 
  • A case study that provides a real world example, experience and lessons learned when applying cyber security in an ICS environment 
PA Consulting
Karl Williams
Security Adviser
PA Consulting

15:30-16:00 Invisible Attacks from the Dark Net

  • Gain an insight into the new generation of DoS attacks emerging out of the Tor Network which are proving to be invisible to security information systems
  • Discover the anatomy of these fresh threats and how identifying them means bringing SOC and NOC closer together
  • Gain insights from ‘One of the most innovative cyber security companies in the UK’ and how South Wales is seen to be leading the charge in cyber security best practice
Pervade Software
John Davies, Director of Sales and Marketing, Pervade Software
Chairman, South Wales Cyber Security Cluster

16:00 END OF CONFERENCE

Get the Complete Post-Conference Materials Package Click Here

Day One Day Two Top

Michael Vickery
Michael Vickery
Industry Analyst
Nuclear Energy Insider
mvickery@nuclearenergyinsider.com
Direct: +44 (0) 207 375 7177
US Toll Free: 1 800 814 3459 ext 7177