We are a leading research driven, independent events media organiser, providing first class, exclusive networking opportunities for the Smart Infrastructure and Cyber Security B2B industry. Our vision is simple: Content is King. Our events deliver high value, topical insight and solutions to pressing industry challenges through interactive outreach platforms. We work diligently to deliver the best in public and private information sharing for next generation infrastructure leaders.
1) Our key objectives are on delivering the best content in the industry
We rely on and maintain relationships with senior level directors from leading operators through select steering committees and our Directors Clubs, ensuring our content is both timely and relevant
2) Our programs are developed with a core focus on delivering case studies
Some of the best events we have ever attended, have been packed with case studies, lessons learned, challenges and solutions. We understand this value and work hard to ensure you are given the same opportunity
3) Vendor presentations are limited, you wont hear sales pitches
We value our sponsors and our supporters, and work with them to ensure the content they deliver is in line with our program expectations. Our vendors are hand picked, and are actively engaged in transforming industry challenges, with real life case studies.
4) Our prices are competitive, ensuring we serve our industry and the conference is well attended.
Our shows are priced competitively to ensure maximum uptake and return on investment. We know events can consume the best part of a week out of the office, so we developed new show structures and prices based upon our feedback with leading operators.
This was the best conference focused on Cybersecurity that I’ve been to since last year’s Cyber Senate ICS Cybersecurity conference. The material and sessions were relevant and resonated with the audience. The addition of DHS, NERC and OT speakers provided much needed context for trends in critical infrastructure security. Ayman Al-Issa’s pre-conference message was also on target. I would highly recommend future Cyber Senate events to any asset owners that want information and introduction to technologies that can assist with both compliance and risk-based defensive strategies.
Mark Trump, Senior Cybersecurity Consultant | Critical Infrastructure | ICS | SCADA | LION |, BAE SYSTEMS APPLIED INTELLIGENCE
Great event and excellent to see ‘Asset Information’ in the title of a conference which marks a significant shift in the way major infrastructure organsations have been thinking for the last few years – I predict twice the number of subscribers for next years conference.”
Ross Dentten, Asset information and Configuration Manager, Crossrail
I was reflecting on the day on the train back and have to say it was an excellent event and I wish you all the best with the efforts. There is a huge potential and I commend you for booking good speakers.. I have made recommendations to my security colleagues that this is one to look out for as one with better structure and content than other conferences.
Henrik Magnusson -Enterprise Architect, SSE, Scottish and Southern Energy
“A great job organizing an event that is distinct from other cyber security events I have been to! I will definitely come to the next one.” Privacy & Security advisor | Governance, Risk & Compliance
I agree with you about the different approach of the current CBTC conference and I like Sagacity Media’s approach (from engineering/implementation perspective) more than other CBTC events, last March was absolutely inspiring!
Rob de Vries, ProSpoor
The various topics were meaningful and I praise you for gathering the SMEs to present. It was good to hear the open dialogue and injection of questions and comments. Making in roads to IT and OT discussing their concerns at the conference should go far to opening up more avenues to collaborate. I really enjoyed the conference and wish you success in future efforts.
Information Security Manager at Metropolitan Water District of So. CA, Cheyrl Santor
“I was really surprised about the huge presence of utility persons at the Industrial Control Cyber Security Europe event. Jamison has done a great job organizing an event that distinct from other cyber security events I have been to! I will definitely come to the next one.”
Johan Rambi, Privacy & Security advisor | Governance, Risk & Compliance
“I cannot tell you how valuable this has been, how rewarding and and how much I have learned over the past two days, it has been fantastic and thank you so much for inviting us”-
Water Utility, City and County of San Francisco
“Thanks so much for the work you put into the US show and providing the quality of presenters and material. I think as long as we can keep up the momentum, awareness, education and drive forward, great things are going to happen.”
– BAE Applied Intelligence Headline Sponsors
“A radical shift in infrastructure thinking” – Crossrail
“A practical and inspiring conference” – ProRail
Cyber security is a business enabler in the 21st century and getting it right provides a foundation that is necessary to move the business forward. Companies need to understand and manage risks before decisions can be made that are transformational, which are key to the rapidly changing aviation industry. Join… Read more
The security threats to U.S. critical infrastructure span the digital divide. Resent attacks, like those in the Ukraine, blend the cyber and physical environment to cause confusion within and damage to the production environment. Modern cyber defense requires sophisticated operational tactics and strategies. Although, cyber hygiene is essential for fending… Read more
As Operational Technology (OT) environments become increasingly interconnected and smarter, organizations face significant digital transformation challenges. The business demand for the raw data and information produced by OT systems is growing exponentially both from an internal and external perspective. As the demand for data increases, so has the volume of… Read more
This September in London and October in Sacramento, we learn from Honeywell why USB devices are still the #1 source of malware in ICS. This discussion will help you understand how USB devices can pose a threat even without malware, including: o Surprisingly effective HID attacks o More advanced threats… Read more