Logo API

10th Annual API Cybersecurity Conference & Expo

Nov 10, 2015 - Nov 11, 2015

 View the Preliminary Program - Available Soon

Protecting America's Energy Through Cybersecurity


The energy industry is under attack.

Learn how to fight back. Data from a 2012 Mandiant survey show that the energy industry, including oil and natural gas, is ranked 2nd highest of all industries most likely to suffer a cyber attack. And it’s not just intellectual property hacks either. It’s ALL cyber incidents from ALL sources. 

Join us at the 10th Annual API Cybersecurity Conference & Expo and discover methods for thwarting the bad guys, what the scene looks like over the horizon and how the latest technologies can help you counter cyber espionage, address cyber warfare, and make your cyber efforts secure.  

Data courtesy of Mandiant 

Conference Supporter


Explore the Leading Edge of Cybersecurity

  • Over 60 presentations in 3 tracks
  • Emerging Cyber Threats in the Oil & Natural Gas Industry
  • CIO Panel Discussion
  • Big Data & Security Analytics
  • Cloud Computing
  • Cyber Espionage
  • Cyber Warfare & Cyberspace Rules of Engagement
  • Advanced Persistent Threats / Next Generation / Advanced Evasive Techniques
  • Critical Infrastructure & Operational Technology Security
  • Cyber Threat Intelligence & Information Sharing
  • Oil & Natural Gas Information Sharing and Analysis Center (ONG-ISAC)
  • Legislative / Regulatory Activities
  • Data Privacy
  • Application Security
  • Information Protection Technologies / DRM / DLP
  • Incident Response Management
  • Information Protection Programs & Risk Management
  • Identity & Access Management
  • Endpoint Security
  • Bring-Your-Own-Device
  • Social Engineering - Panel Discussion
  • Insider Threat
  • CISO Panel Discussion

Industrial Control Systems Workshop

Sponsored by


This hands-on workshop will introduce tools and techniques used to identify vulnerabilities and exploits specific to the ICS environment. Attendees of this workshop will learn how to safely use IT and ICS security assessment tools in a SCADA or DCS environment. 

The workshop topics include:

  • How to safely scan and exploit a production ICS
  • Customizing Nessus and Nmap for use in ICS
  • Quick and dirty fuzz testing of ICS protocol ports
  • Demonstrating insecure by design PLC's and protocols
  • ICS protocol packet capture and what to do with it
  • Performing a wireless site survey
  • Additional custom ICS tools that you can develop

Workshop Schedule

November 9, 2015

7:30 AM - 8:00 AM  Registration 
8:00 AM - 12:00 PM Industrial Control Systems Workshop 
12:00 PM - 1:00 PM Lunch  

Symantec Cyber Readiness Challenge

Sponsored by


The Symantec Cyber Readiness Challenge is an immersive, interactive “capture the flag” competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants in the hacker's shoes to understand their targets, technology and thought processes so they can ultimately better protect their organization and themselves. Offered as both online and live onsite events at numerous locations around the world, participants will have the opportunity to test, practice and develop their security skills within a unique and real world inspired environment developed by Symantec. 

While participating in this event, you will have the opportunity to:

  • Sharpen skills such as forensics, ethical hacking and more
  • Expand your awareness of targets and threats
  • Learn and try new techniques and tools
  • Compete against your peers for prizes and bragging rights
  • Earn Continuing Professional Education, or CPE, credit

Workshop Schedule

November 9, 2015

11:30 AM - 12:00 PM  Registration 
12:00 PM - 1:00 PM Lunch
1:00 PM - 5:00 PM Symantec Cyber Readiness Challenge 


Westin Houston Memorial City
945 Gessner Road
Houston, Texas
Online Reservations
Room Rate: $229 Mention API Group Rate
Reservation Deadline: October 20, 2015

Who Should Attend

  • IT Management 
  • IT Security Professionals
  • Operational Technology/PCS/ICS/SCADA Professionals 
  • System Administrators 
  • Database Administrators 
  • Data Privacy Specialists 
  • Application Support Personnel 
  • Legal 
  • Human Resources Professionals 
  • Operational Technology Auditors 
  • Compliance Officers 
  • Corporate Security Professionals
  • Anyone interested in learning about state of the art security practices and their practical implementation as well as securing their enterprise and its core processes.