Home
overview

QOSMOS   

“Cyber threats are asymmetric because attacks may be perpetrated by the few upon the many, with little cost and resources. Cyber attacks are typically anonymous, launched from any of billions of sources worldwide. Impacts may be immediate and obvious, or dormant and subtle, eluding recognition for years. Degrees of damage can range from inconvenient downtime of personal systems to the life-threatening destruction of critical infrastructures." - U.S. Naval Institute, Cyber Threats to National Security, July 2010
CSFI

SMi's Cyber Defence 2011...

Keeping cyber space secure is an increasingly complex challenge. We face threats not only to ourselves as individuals; but to businesses, governments and national security.

Cyber Defence 2011 will be held for the first time in Istanbul and will explore the explosive issue of cyber security the world over. Bringing together an extensive list of cyber security professionals from across Europe, the US and Asia – Cyber Defence 2011 will deliver a packed 2 days of presentations.

This event offers you the chance to hear from a diverse speaker faculty representing an array of military, civil and commercial organisations – don’t miss the opportunity to meet them and discuss the latest developments in Cyber Defence.
 

 

  • Enjoy a Keynote presentation from TUBITAK - the leading Cyber Defence agency in Turkey
  • Hear from a diverse speaker faculty including representatives from India, Malaysia, Estonia, Italy, Netherlands and Israel
  • Network with key industry leaders on the latest Cyber Defence strategies
  • Analyse and understand recent attacks such as the Stuxnet Virus

 

 

 

 

   

Industry Profile Includes:
Presidents, CEOs, Vice Presidents, Directors, Managers, Analysts and Officers for:
 

  • Information Assurance Experts
  • Information Technology Experts
  • Concept Directors
  • Security Researchers
  • System Architecture and System Design
  • Project and Programme Management
  • Sales and Marketing
  • Business Development

Military Profile Includes:
Commanders, Branch Chiefs, Directors, Assistant Directors, Staff Officers, Project & Programme Managers, Engineers for:

  • J6/G6
  • Information Systems
  • Equipment Capability
  • Cyberspace Branch
  • Technical Systems
  • Plans and Requirements
  • Policy Planning Department
  • Joint C4I
  • Procurement and Acquisition

 

Previous attendees includes representatives from:
Green Hills, Thales Raytheon Systems, SAIC, PTN Consulting, Front End AB, Prevx, IntelliGuard, Sentor, Prolexic, Advanced Programmes, EADS Defence & Security, XAG Conseil, Janes Defence Weekly, QOSMOS, 3Com, Pod Venture Partners, United Airlines, NetWitness, Argent Consulting, Ultimum, Napatech, Logica, Breaking Point

Plus over 50 military, government and civil delegations from:
UK Ministry of Defence, US Federal Bureau of Investigation, Swedish Armed Forces, United States Department of Defence, United States Airforce, United States Government, Netherlands Ministry of Foreign Affairs, Norwegian Armed Forces, SPF Justice Belgium,  Belgian Armed Forces, Singapore Armed Forces, Estonian Ministry of Defence and the Georgian Ministry of Defence 

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Louis Giannelli CISSP

Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

9:10 OPENING KEYNOTE ADDRESS

Brigadier General Robert Rego

Brigadier General Robert Rego, Chief, Space and Cyberspace Operational Integration, US Air Force Space Command

  • The world continues to increase its reliance on cyber infrastructure in every aspect of daily life
  • Bad actors recognize the low-cost opportunity this presents leading to an exponential increase in the threats we face
  • Mission assurance identifies mission critical cyber pathways, and provides mitigation alternatives and contributes to mission success
  • 9:40 Best Practice Cyber Defense, Based on Network Intelligence and Communications Metadata

    Erik Larsson

    Erik Larsson, VP, Marketing, QOSMOS

  • The challenges of government cyber defence
  • Detecting cyber threats by scanning traffic
  • Using DPI & Network Intelligence to build a second line of cyber defence
  • Examples of technical implementations
  • Using communication metadata to detect suspicious traffic
  • 10:20 Turkish Cyber Defence & Malware threat trends

    Mehmet Eris

    Mehmet Eris, Senior Researcher, National Research Institute of Electronics and Cryptology (Tubitak UEKAE), Turkey

  • Malware problem
  • History of fight between computer virus authors and antivirus researchers
  • Current scale of malware problem
  • Malware ecosystem
  • Upcoming threats and research at TUBITAK
  • 10:50 Morning Coffee

    11:10 Setting up a National Cyber Defence Programme

    Colonel Gérald Vernez

    Colonel Gérald Vernez, Deputy Director, National Cyber Defence Project, Swiss Armed Forces

  • About what threat characteristics are we talking about? Is it really only about IT?
  • Which level/part of the society is concerned? Can we separate civilian and military stakes?
  • Who are the players we should talk to? Can we limit our effort to the national level?
  • How does the threat evolve? Are today’s solutions still valuable for tomorrow?
  • 11:40 Georgia, Russia and Cyber Wars to come

  • 2008: The Cyber Attack on Georgia
  • Growing Russian Cyber Capabilities
  • Message from Georgia: Protect Critical Infrastructure
  • Cyberspace: The Fifth Operational Theatre
  • David Smith

    David Smith, Director, Georgian Security Analysis Center, GFSIS

    Khatuna Mshvidobadze

    Khatuna Mshvidobadze, Senior Associate, Georgian Security Analysis Center, GFSIS

    12:10 DDoS as a Cyber Threat

  • Rising threat in 2010 of DDoS attacks
  • The fall-out from the Wikileaks attacks
  • Specific DDoS threats to Turkey
  • Precautions to prevent DDoS and BotNets
  • Huzeyfe Onal

    Huzeyfe Onal, Information Security Specialist, Information Security Academy, Turkey

    Gokay Beksen

    Gokay Beksen, Information Security Consultant, Information Security Academy (BGA)

    12:40 Networking Lunch

    13:40 Cyber Network Operations

    Roger Kuhn

    Roger Kuhn, Science Advisor to Fleet Cyber Command (FLTCYBERCOM)/Commander, 10th Fleet (C10F), US Navy

    14:10 Fighting Cyber Terrorism - An Indian Approach

    Major (Ret'd) Manik Jolly

    Major (Ret'd) Manik Jolly, Business Manager, SunEdison

  • Cyber terrorism - Definition, scope and effects
  • Where the real problem lies
  • Moving beyond technology
  • Need for training - how, who and what
  • Strategy required at Global and regional levels
  • 14:40 Afternoon Tea

    15:00 Fourth-Generation Warfare: Terrorism and Counter-Terrorism in Cyber Space

    Yael Shahar

    Yael Shahar, Director, Database Project, Institute for Counter-Terrorism, IDC Herzliya, Israel

  • The changing nature of warfare
  • Growing emphasis on perception and psychology
  • Are non-state actors the necessary ‘victors’ in a Fourth Generation War?
  • What role does intervention on the part of third parties have on the outcome of Fourth Generation Conflicts?
  • 15:30 Preparing for Stuxnet II: Is your infrastructure safe?

    Joel Langill

    Joel Langill, CSO - SCADAhacker, Director of Critical Infrastructure, Cyber Security Forum Initiative

  • Why control systems are an important part of critical infrastructure.
  • A look at why control systems are an easy target.
  • Understanding how a cyber attack can target a control system and the equipment it controls
  • What can be done to improve control system cyber resilience
  • 16:00 Chairman’s Closing Remarks and Close of Day One

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

    9:10 KEYNOTE ADDRESS

    Zahri Yunos

    Zahri Yunos, Chief Operating Officer, CyberSecurity Malaysia

  • Current cyber security threats posed in Malaysia
  • Terrorism vs cyber terrorism
  • Malaysia’s Critical National Information Infrastructure
  • The use of ICT and cyberspace by terrorist
  • Malaysia’s National Cyber Security Policy
  • 9:40 The Economy of Cybercrime

    Roger Halbheer

    Roger Halbheer, Worldwide Chief Security Advisor, Microsoft

  • What are the general IT trends that impact cyber security?
  • What is the economy behind Cybercrime?
  • What can we as societies/industries/governments do to fight it?
  • 10:10 Introduction to ENISA and its Activities

    Udo Helmbrecht

    Udo Helmbrecht , Executive Director, European Network and Information Security Agency (ENISA)

  • Key activities for 2011
  • ENISA’s role in protecting Critical Information Infrastructure
  • The European Cybersecurity Exercise – conclusions and further development
  • ENISA and Cloud Computing
  • Conclusions
  • 10:40 Morning Coffee

    11:00 The Global Risk to Financial Services

    Tim Hind

    Tim Hind, Head of Intelligence, Barclays Global Retail Bank (Technology)

  • The threats posed to banks
  • The need to develop more intelligence sharing between critical national infrastructure and government
  • Solutions - working together on common threats
  • 11:30 Internet Protocol Version 6

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

  • Main design goals and features
  • Implementation hurdles
  • Security issues
  • IPv6 attack scenarios
  • 12:00 German IT Security Architecture

    Dr. Markus Durig

    Dr. Markus Durig, Head of Division, IT Security, Federal Ministry of the Interior, Germany

    12:30 Networking Lunch

    13:30 The German Anti Botnet Initiative

    Heinz-Jürgen  Treib

    Heinz-Jürgen Treib, Division of IT Security, Federal Ministry of the Interior, Germany

  • Benefits of the programme
  • The role of ISPs in order to curb malware and particularly Botnets
  • The role of the government in setting incentives
  • Collaboration with German Internet industry
  • 14:00 Automated Run-Time Analysis of Malicious Codes

    Hasan Yasar

    Hasan Yasar, Engineering and Development, Digital Investigations and Intelligence, US-CERT, Carnegie Mellon University

  • Benefits of automated system in a  massive file analysis problem,
  • Observe malware on simulated internet (Anexa, Product of SEI)
  • Provide analytical results of the behaviour of malware,
  • Create classification of the malware to address the source
  • 14:30 Chairman’s Closing Remarks and Close of Day Two

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

    14:40 Afternoon Tea

    +

    Marriott Istanbul

    Kayisdagi Caddesi No 1/1, Atasehir
    Istanbul 34750
    Turkey

    Marriott Istanbul

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.