Home
Cyber Security for the Military and Defence Sector
19 June - 20 June 2013
Cyber Security for the Military and Defence Sector

With a greater dependence on computer systems and a reliance on integrated networking, today’s armed forces are faced with an ever changing set of challenges in maintaining cyber security from the threat of attack. Rapid evolution in technology has forced governments and industry alike to continually develop secure systems that remain one step ahead of the enemy. As cyber systems become increasingly integrated the requirement for a multi-layered, adaptive and self learning security system becomes imperative. With the prevalence of electronic communications, the growth of social media, a widespread access to mobile networked devices and the defence industry's increasing reliance on "Big Data", the cyber threat to today's defence sector has never been more apparent. The 'cyber landscape' is both dynamic and borderless and forces us to address our security in terms of technology, international cooperation as well as individual user awareness.

This year’s conference will focus on the military as well as the industrial defence sector itself; establishing what the current threats are, in terms of both state-sponsored intrusion as well as independent hackers and terrorist cells, what technology is currently available and where the gaps in our protection are. Additionally, with increasingly networked systems the defence sector has been presented with a whole array of emerging challenges in cyber defence. Cyber Security for the Military and the Defence Sector 2013 will tackle this by gathering senior experts from both industry and the military to discuss and ideas share to ensure that our governments remain educated, up-to-date and secure. 

If you are interested in speaking at this conference, please get in touch with the producer at smiproduction@smi-online.co.uk


If you are interested in sponsoring this conference, please get in touch with our sponsorship team at sponsorshipdept@smi-online.co.uk
 

Conference agenda

clock

8:30

Registration & Coffee

clock

9:00

Chairman's Opening Remarks

Geoff  Harris

Geoff Harris, Director, Alderbridge Consulting Ltd

clock

9:10

Learning cyber control & denial from contemporary conflict

Richard Crowell

Richard Crowell, Associate Professor Information and Cyberspace Operations, Naval War College

  • The forces of content & code and how they have been employed in recent conflicts
  • Developing concepts and capabilities to manoeuver in and through cyberspace to achieve objectives
  • Narrowing the Preparation / Execution Gap
  • Working partnerships in a domain in which there is nearly equal access
  • clock

    9:50

    Technical aspects of cyber security as seen by the Austrian military and the local milCERT

    Ulrich Poeschl

    Ulrich Poeschl, Chief Security Architect, Ministry of Defence, Austria

  • What is as an "advanced threat"?
  • (Scary) ways around conventional defence mechanisms
  • Live-Demo of a target-system infection with conventional defence
  • Emerging cyber threats - strategies to cope with them
  • Optional: Further live-demos (Fighting back the malware from 1st demo, create custom anti-virus signatures
  • clock

    10:30

    Morning Coffee

    clock

    10:50

    Adversity, risk and trustworthiness

    Ian Bryant

    Ian Bryant, Technical Director, Trustworthy Software Initiative

  • Why there is a need for a consensus on adversity, risk and trustworthiness
  • The role of Standards Development Organisations (SDO) in achieving such a consensus
  • Achieving the desired outcome with the Trustworthy Software Framework (TSF)
  • clock

    11:30

    Speed up the velocity of investigation with behaviour analysis of malware

  • Identify and  capture the signature of suspicious  files
  • Behavioural Analysis  with  correlation of  other artefact
  • Importance of Multiple Analysis Platform
  • How to correlate multiple malware and find the similar ones?
  • Result: Malware activity graphs
  • Hasan Yasar

    Hasan Yasar, Technical Manager , Carnegie Mellon University

    clock

    12:10

    Networking Lunch

    clock

    13:10

    Voluntary participation in national cyber defence: The example of the Estonian cyber defence unit

    Kadri Kaska

    Kadri Kaska, Senior Analyst, Cooperative Cyber Defence Centre of Excellence, Estonia

  • Legal and policy framework for using volunteers in national cyber defence
  • Functioning and roles of the CDU: Estonian case study
  • Legal implications arising from using volunteers in national cyber defence
  • clock

    13:50

    Risks of Social Media to Organizations and Personnel

    John Wayne Ross

    John Wayne Ross, Strategic Analyst, Defence Research & Development Canada (DRDC), Department of National Defence Canada (DND)

  • Insight into potentially disruptive effect of social media on defence and security
  • Insight into personnel implications from work-related to personal issues
  • Insight into organizational implications including cyber-vetting, trust and potential effects on organizational management
  • Using example from real-world and potential scenarios
  • clock

    14:30

    Cyber Defence Capability Building in EU

    Wolfgang Roehrig

    Wolfgang Roehrig, Project Officer Cyber Defence, European Defence Agency

  • Military aspects of the cyber security strategy for the European Union
  • Military capability development in EU cyber defence
  • Pooling & Sharing in Cyber Defence
  • A stock-take of EU cyber defence capability
  • clock

    15:10

    Afternoon Tea

    clock

    15:30

    Cyber Security and the UK's Critical National Infrastructure

    Dave Clemente

    Dave Clemente, Research Analyst, Royal Institute Of International Affairs

  • Identifying what elements are ‘critical’
  • Benefits and risks of international commercial cooperation
  • Creating and maintaining a stable cyber policy for protecting CNI
  • clock

    16:10

    Defending the UK defence industry against cyber attack

    Vincent Blake

    Vincent Blake, Head of Cyber Security, Raytheon Systems Ltd

  • The changing landscape of the cyber threat to the UK Defence Industry
  • Understanding your cyber resilience maturity in the face of the cyber threat?
  • How the UK Defence industry is working together to detect, analyse and respond to threats
  • What does the cyber future bring for the UK Defence Industry?

     

  • clock

    16:50

    International Law and Cyber Warfare

    Michela Menting

    Michela Menting, Senior Analyst, ABI Research

  • Jus in Bello (Laws of War)
  • Applying the Cyber Context
  • Codification vs. Customary Law
  • National Cyber Defence Strategies
  • clock

    17:30

    Chairman’s Closing Remarks and Close of Day One

    Geoff  Harris

    Geoff Harris, Director, Alderbridge Consulting Ltd

    clock

    8:30

    Registration & Coffee

    clock

    9:00

    Chairman's Opening Remarks

    Geoff  Harris

    Geoff Harris, Director, Alderbridge Consulting Ltd

    clock

    9:10

    The FBI's role in the advancement of cyber security

    Mr Kurt Pipal

    Mr Kurt Pipal, Special Agent, Cyber ALAT, Federal Bureau Of Investigation

  • FBI's Cyber Mission and Priority
  • APT Threats
  • Collaborative Investigative Efforts
  • Cyber Mitigation Best Practices Based on Investigations
  • clock

    9:50

    Cyber security and incident management

    Natalie Black

    Natalie Black, Deputy Director of Cyber Defence and Public Networks , Office of Cyber Security & Information Assurance

  • The evolving cyber threat
  • How the Government is responding
  • The national approach to cyber incident management
  • New initiatives including the Cyber Information Sharing Partnership and the national CERT
  • clock

    10:30

    Morning Coffee

    clock

    10:50

    Sharing sensitive information securely- times are changing

    Patrick Curry OBE

    Patrick Curry OBE, Director, British Business Federation Authority - BBFA Ltd

  • What business and cyber information is being shared securely and the strategic drivers for it?
  • What are the collaborative mechanisms, technologies and standards enabling such sharing, and the threats to success?
  • Where is such information sharing happening in UK and internationally?
  • What's likely to happen in the next 3 years and what should my organisation be doing?
  • clock

    11:30

    Japanese cyber security update

    Akira Yamada

    Akira Yamada, Senior Security Analyst, Cyber defense institute Incident Response Team

  • Cyber threats/attacks in Japan
  • Response activities
  • Findings from massive cyber attacks
  • Activities on digital Forensics
  • clock

    12:10

    NATO’s policy on cyber defence and the evolution of the cyber challenge

    Jamie Shea

    Jamie Shea, Deputy Assistant Secretary General , NATO HQ

  • How cyber is changing the nature of conflict and crisis management
  • NATO's perception of the cyber threat
  • How NATO is constructing its cyber defence organization
  • Future tasks and challenges
  • clock

    12:50

    Networking Lunch

    clock

    13:50

    Achieving Global Cyber Security Through Cooperation

    Steven Purser

    Steven Purser, Head of Core Operations Department, ENISA (European Network and Information Security Agency)

  • About ENISA
  • Protecting Critical Information Infrastructure
  • Input to EU & MS Cyber Security Strategies
  • Assisting Operational Communities
  • Security & Data Breach Notification
  • Data Protection
  • Future Direction
  • clock

    14:30

    Building and managing a comprehensive computer Incident response capability

  • Don't start when the horse has bolted; Starting with Protection and Defence
  • Scope and ambition 
  • Appetite for Interoperability 
  • What tools are out there? 
  • The need for integration and cooperation
  • Jeremy O'Connor

    Jeremy O'Connor, Client Industry Executive, Selex ES

    Jonathan Fulkerson

    Jonathan Fulkerson , Systems Engineering Associate, Northrop Grumman Corporation

    clock

    15:10

    Cyber security incident response

    Ian Glover

    Ian Glover, President, CREST

  • The security services industry’s response to cyber security threats; how do you prepare for an incident and what are the immediate steps and decision making process that you will have to go through following an incident
  • Government and private sector initiatives for validating third party security services providers
  • How to identifying suitable cyber security incident response service suppliers and what should be considered in contracts for their services
  • clock

    15:50

    Afternoon Tea

    clock

    16:10

    Cyber Science: Future Trends

    Irene Moulitsas

    Irene Moulitsas , Lecturer in Scientific Computing, Cranfield University

  • Graphs are everywhere, with an unprecedented, massive, and ever-growing amount of data.
  • Are science and technology prepared to deal with such an information explosion?
  • Are modern High Performance Computing infrastructures effectively utilised? Are we prepared to reinvent the wheel?
  • clock

    16:50

    Security on Social Network Sites: The Case of the British Army

  • Social Network Sites (SNSs) and security risks
  • The Army perspective and issues for consideration
  • Research and findings
  • Being or working in the Army and risk perception; Individual and group dynamics on   SNSs
  • The future … SNSs and the Army
  • Social Network Sites (SNSs) and security risks
  • The Army perspective and issues for consideration
  • Research and findings
  • Being or working in the Army and risk perception; Individual and group dynamics on   SNSs
  • The future … SNSs and the Army
  • clock

    17:30

    Chairman’s Closing Remarks and Close of Day Two

    Geoff  Harris

    Geoff Harris, Director, Alderbridge Consulting Ltd

    Workshops

    Threat Intelligence, Threat Horizons
    Workshop

    Threat Intelligence, Threat Horizons

    Copthorne Tara Hotel
    18 June 2013
    London, United Kingdom

    Copthorne Tara Hotel

    Scarsdale Place
    Kensington
    London W8 5SR
    United Kingdom

    Copthorne Tara Hotel

    The Copthorne Tara Hotel London Kensington is an elegant contemporary four-star hotel in prestigious Kensington, located just a two minutes walk from High Street Kensington underground station, making exploring easy. The hotel offers well-appointed and comfortable guest rooms combining Standard, Superior and Club accommodation. Club rooms offer iconic views over the city and include Club Lounge access for complimentary breakfast and refreshments. Guests can sample the authentic Singaporean, Malaysian and Chinese cuisine at Bugis Street, traditional pub fare at the Brasserie Restaurant & Bar or relax with a delicious drink at West8 Cocktail Lounge & Bar.

    The Copthorne Tara Hotel boasts 745 square meters of flexible meeting space, consisting of the Shannon Suite and the Liffey Suite, ideal for hosting conferences, weddings and social events. Facilities include access to the business centre 24 hours a day, fully equipped fitness room, gift shop, theatre desk and Bureau de Change. With ample onsite parking outside the London congestion charge zone and excellent transport links via Heathrow Airport, the hotel is the perfect location for business or leisure stays. The hotel is within close proximity to the shops of High Street Kensington, Knightsbridge and Westfield London, Olympia Conference Centre, Royal Albert Hall, Kensington Palace and Hyde Park.

     

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download

    Title


    Description

    Download

    Title


    Description


    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By submitting this form you agree to our privacy policy and consent to receiving communications, you may opt out at any time.