Security for Energy Conference

On September 7th, I’ll be heading to the 1st Annual Critical Infrastructure Protection Conference  conference in Calgary, Alberta.  This is the first edition of this conference, subtitled “Cyber Security for Energy and Communications” .  With our oil sands attracting wide-spread internation attention — Warren Buffet and Bill Gates visited last week — the protection of these assets is obviously a top priority for both government and industry.

I’ll be helping to staff the Seccuris booth in the trade show, and catching whatever speakers I can.  It should be rather interesting to hear Dr. Steven Flynn, the Homeland Security Advisor to Barack Obama speak on infrastructure security — even if this topic is not related to my direct interests of identity, information security and privacy.

Michael Legary from Seccuris will also be speaking on “Virtually Secure: Uncovering the Risks of Virtualization”, a look at the security of virtual server environments.

Always interesting, too, to visit Calgary.  It is a rare example of how a city can be sophisticated and thriving, while still retaining its prairie town roots.


Author: code

Mike Waddingham is senior Information Technology management consultant with over 30 years of industry experience. He is the owner of Code Technology Corp.

One thought on “Security for Energy Conference”

  1. Hi Mike,

    Glad to see that you are publishing again. I took a read through the agenda for the conference and I highly suggest you attend Barry Kokatailo’s talk. He is always entertaining and informative.

    From the web-site (

    Technical Track – Barry Kokotailo, Systems Security Specialist, CSA/CSNA/CISSP/CEH/EnCE

    Anti-Surveillance or How Not To Get Caught
    In today’s environment corporations and government are implementing technology to monitor and curtail the activities of employees, contractors and other entities. Reasons range from legal ramifications such as lawsuits to regulatory requirements such as FOIP. This presentation will demonstrate how people use technology to circumvent the current monitoring and forensics capabilities of corporate Canada. These techniques can be applied by people with little to no technical background and is highly effective in eliminating detection, identification and prosecution.

Comments are closed.