Home
Cyber Defence
13 May - 14 May 2009
Cyber Defence

SAE Media Group’s Cyber Defence is well timed to provide you with updates on the latest international developments. Assess the most up-to-date technological threats and consider the lessons learned based on case studies from Estonia and Georgia.

The event will bring together key international policy and decision makers. Attend and network with distinguished speakers and attendees who will update you on the global cyber security challenge.

For more information please contact Zain Philbey on +44 (0) 207 827 6722

Cyber Security
  • Major General David Senty, Commander, Air Force Network Operations, Vice Commander, Air Force Cyberspace Command (Provisional), United States Air Force
  • Rear Admiral Thomas Engevall, Lower Half, Swedish Armed Forces
  • Heli Tiirma-Klaar, Senior Advisor, Ministry of Defence, Estonia
  • Rain Ottis, Scientist, Cooperative Cyber Defence (CCD) Centre of Excellence (COE), Estonia

Conference agenda

clock

8:30

Registration & Coffee

clock

9:00

Chairman's Opening Remarks

Geoff Harris

Geoff Harris, President, Information Systems Security Association (ISSA), UK

clock

9:10

OPENING ADDRESS

  • Update of current capabilities
  • Cyberspace as a war fighting environment
  • Formulating an offensive cyber warfare policy
  • Protecting critical infrastructure against the latest cyber attack methods
  • Is this the battlefield of the future?
  • Rear Admiral Thomas Engevall

    Rear Admiral Thomas Engevall, Lower Half, Swedish Armed Forces

    clock

    9:50

    KEYNOTE ADDRESS

    Major General David Senty

    Major General David Senty, Commander, Air Force Network Operations, Vice Commander, Air Force Cyberspace Command, United States Air Force

  • Overview of activities to date
  • Identifying the enemy
  • Assessing the evolving threat
  • Are we at war in cyberspace?
  • Meeting warfighting requirements
  • Future system evolution
  • clock

    10:30

    Morning Coffee

    clock

    11:00

    Jointly Assuring IT Security in Critical Infrastructure in Germany – Strategic Approaches and their Implementation

    Heinz-Jürgen Treib

    Heinz-Jürgen Treib, Division of IT Security, Federal Ministry of Interior, Germany

  • German National Plan for Information Infrastructure
    Protection
  • Implementation Plan for the Federal Administration
  • CIP Implementation Plan
  • International activities
  • clock

    11:40

    Emerging Trends in Software Architecture to Defend Against Cyber Attack

  • Examining the risk factors
  • Attitudes to risk
  • Partitioned (MILS) architecture
  • International Security Certification Process
  • Trapping malicious attacks
  • Jeremy Flann

    Jeremy Flann, Vice President EMEA, Green Hills Software

    clock

    12:20

    Networking Lunch

    clock

    13:50

    IPv6 – Exploiting the Weaknesses

    Ronald Broersma

    Ronald Broersma, Chief Engineer of the Defense Research Engineering Network (DREN), SPAWAR, USA

  • Vulnerabilities of the IPv6 system
  • The configurations IPv6 that are more vulnerable than others
  • How much malicious IPv6 Traffic will high profile sights see?
  • Future challenges and evolution
  • clock

    14:30

    Leveraging Network Intelligence Technology to Develop Next-Generation Cyber Security Solutions

  • The challenges of government cyber security
  • Leveraging network intelligence technology to take back control over security
  • Tracking anomalies in network behavior and enhancing situational awareness
  • Examples of technical implementations
  • Patrick Paul

    Patrick Paul, VP, Customer Operations, QOSMOS

    Erik Larsson

    Erik Larsson, VP, Marketing, QOSMOS

    clock

    15:10

    Afternoon Tea

    clock

    15:40

    The SCADA Security Programme

    Ganesh Devarajan

    Ganesh Devarajan, Security Researcher, Tipping Point, 3Com, USA

  • Overview and update of achievements to date
  • What is the difference between IT security and SCADA?
  • SCADA security for the EU
  • Understanding the SCADA security threats
  • Protect your critical infrastructure - Prevention, detection and recovery methods
  • Lessons learned and future roadmap
  • clock

    16:20

    Insider Threats - Deja Vu

  • Lessons learned from practical case studies
  • Using system thinking to conceptualize insider attack
  • How do you guard against insider attack?
  • Threat faced to critical infrastructure
  • Christian Probst

    Christian Probst, Language-based Technology, Technical University of Denmark

    Professor Dieter Gollmann

    Professor Dieter Gollmann, Institute for Security in Distributed Applications, Hamburg University of Technology

    clock

    17:00

    Chairman’s Closing Remarks and Close of Day One

    clock

    8:30

    Registration & Coffee

    clock

    9:00

    Chairman's Opening Remarks

    Geoff Harris

    Geoff Harris, President, Information Systems Security Association (ISSA), UK

    clock

    9:10

    SPECIAL ADDRESS

    Rain Ottis

    Rain Ottis , Scientist, Cooperative Cyber Defence Centre of Excellence

  • Update on current developments
  • Research and training being carried out at the centre
  • Countering a cyber attack
  • How important is long term interoperability and information sharing?
  • Obstacles and challenges
  • Lessons Learned
  • clock

    9:50

    KEYNOTE ADDRESS

    Heli Tiirma-Klaar

    Heli Tiirma-Klaar, Senior Advisor, Ministry of Defence, Estonia

  • Overview of events May – June 2007
  • War in cyberspace – the practical repercussions
  • How do you respond to a cyber attack?
  • Interoperability and support – Countering the threat
  • What have we learned and the new safeguards that have been put in place
  • clock

    10:30

    Morning Coffee

    clock

    11:00

    Cyber Warfare Used Against Georgia – An Operational Account

  • Understanding the environment of July 2008
  • How did the threat migrate?
  • What damage did the cyber attacks have?
  • Lessons learned for the future
  • Dimitri Katsiashvili

    Dimitri Katsiashvili, Head of Network and System Administration Division, Information Technology Support Department, Ministry of Defence, Georgia

    clock

    11:40

    Global Law Enforcement Collaboration

    Jeffrey Troy

    Jeffrey Troy, Chief, Cyber Criminal Section, Federal Bureau of Investigation

    clock

    12:20

    Networking Lunch

    clock

    13:50

    DDoS Mitigation – The Case for a Shared National and Private DDoS Mitigation Infrastructure

  • Why are DDoS attacks being perpetrated?
  • Identifying the attack pattern
  • How far back do DDoS attacks go?
  • Switching from individuals to government entities
  • Marino Zini

    Marino Zini, Managing Director, Sentor Managed Security Services, Sweden

    Paul Sop

    Paul Sop, Chief Technology Officer , Prolexic

    clock

    14:30

    Information Sharing and Interoperability in an Information Sensitive Environment

    Bernard Roussely

    Bernard Roussely, Chief, Information Assurance and Service Control Team, NC3 Agency, NATO

  • The need for effective information sharing in an operational environment
  • Adapting to your surroundings – Interoperability and Information requirements in new surroundings
  • The risk of information exploitation
  • Importance of effective training
  • Future interagency applications
  • clock

    15:10

    Chinese Cyber Nationalism

  • What are the threats?
  • Countering the security challenge – Countermeasures that have been put in place
  • Modern warfare and the need to control information
  • Lessons learned from the war in cyberspace
  • Future development
  • Dr Xu Wu

    Dr Xu Wu, Assistant Professor, Arizona State University, USA

    clock

    15:50

    Chairman’s Closing Remarks and Close of Conference Followed by Afternoon Tea

    Sheraton Stockholm Hotel and Towers

    Tegelbacken 6
    PO Box 195
    Stockholm SE-101 23
    Sweden

    Sheraton Stockholm Hotel and Towers

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download

    Title


    Description

    Download

    Title


    Description


    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By submitting this form you agree to our privacy policy and consent to receiving communications, you may opt out at any time.