Home
overview
Following the success of our Information Warfare events, SMi have produced this timely conference which will look at the importance to military organisations of guarding themselves from the ever-increasing threat to their most critical assets - the ability to communicate and store information. The conference will also look at the technical nature of the threat but also the emerging technologies that are available to counter the cyber threat as well as protecting the critical infrastructure.

As a senior industry executive, you will be aware of the importance and potential of this field. We would therefore like to invite you to register for Information Assurance and Data Security, as organised by SMi conferences

Key addresses from:

  • John Davis, Director, National Computer Security Center, National Security Agency
  • John Doody, Head of the Government Secure Intranet, Communications Electronic Security Group
  • Commodore Patrick Tyrrell OBE, Deputy Chief Executive/Director Operations, Defence Communication Services Agency

The conference offers you the opportunity to network with key Government officials and industry experts. Attend to discover how to tackle the cyber threat and learn from the experts implementing these solutions to overcome the problems encountered within the information systems arena.

Conference programme

8:30 Registration and Coffee

9:00 Chairman's Opening Remarks

Dewar Donnithorne-Tait

Dewar Donnithorne-Tait, Head, UK Operations, Federal International Government Operations, Sun Microsystems

9:10 OPENING ADDRESS - INFORMATION SECURITY FOR THE UNITED KINGDOM

John Doody

John Doody, Head of the Government Secure Intranet, Communications Electronic Security Group

  • The role of InfoSec in defining security policy
  • Creating a public private partnership against the IW threat
  • The responsibilities of government in defining IS policy
  • The responsibilities of the private sector in implementing IS policy
  • How can the military assist in development of IS policy?
  • Creating IS initiatives for the next millennium
  • 9:40 KEYNOTE ADDRESS - US NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION

    John Davis

    John Davis, Director, National Computer Security Center, National Security Agency

  • US Government is highly dependant on cyberspace
  • The threat to cyberspace is growing
  • Prepare and prevent the possibility of a significant attack on information networks
  • Build strong foundations to make the infrastructure resilient to attack
  • The National Security Agency’s blueprint for the future of information assurance
  • 10:20 SPECIAL ADDRESS - THE IMPORTANCE OF INFORMATION ASSURANCE IN THE JOINT BATTLESPACE

    Commodore Patrick Tyrrell OBE

    Commodore Patrick Tyrrell OBE, Deputy Chief Executive/Director Operations, Defence Communication Services Agency

  • The environment of change in the defence IT community
  • The increasing relevance of interconnectivity for international military organisations
  • The importance of e-commerce, digitisation and information flow management systems
  • The importance of security in the information environment
  • The DCSA’s blueprint for the future of information assurance
  • 11:00 Morning Coffee

    11:20 INFORMATION ASSURANCE FOR THE UNITED STATES NAVY

    Captain James Newman

    Captain James Newman, Director for Information Warfare, United States Navy

  • The role of information operations in navy operations
  • The threat posed by Information warfare systems
  • The importance of effective computer network defense systems
  • The part that information assurance plays in establishing information superiority
  • The importance of IA in Joint Vision 2010
  • Future initiatives
  • 12:00 INFORMATION RESILIENCY

    Paul Zavidniak

    Paul Zavidniak, Program Manager, IW Advanced Concepts, Logicon, a Northrop Grumman Company

  • The overall model of a cyber attack
  • Reaping the benefits of the military approach to IW
  • Achieving information resiliency during an IW attack
  • Understanding the cyber attack cycle in the process of achieving information assurance
  • The information warfare timeline
  • The goal of information resiliency
  • 12:40 Lunch

    14:00 MAINTAINING INFORMATION ASSUARANCE THROUGH INFORMATION RESILLIENCY

    Dennis McCallam

    Dennis McCallam, Technical Director, Information Assurance Program, Logicon, a Northrop Grumman company

  • Describing the 10 point scale of information resiliency
  • The importance of achieving seamless system operation and full dimensional information resiliency
  • The difference between a reactive and proactive defence IW stance
  • Integrating and managing IA in order to gain system resilience
  • Exploiting the IW timeline to enhance IA
  • Using interactive, sequentially built defensive layers to maintain the integrity and availability of the systems and information
  • 14:40 THE ROLE OF THE INFRASTRUCTURE ENGINE

    Dewar Donnithorne-Tait

    Dewar Donnithorne-Tait, Head, UK Operations, International Government Operations, Sun Microsystems Government

  • The increased awareness of the need for an effective infrastructure
  • Overview of the available technologies and techniques
  • The use of commercial off the shelf (COTS) products in secure systems
  • The problems posed by hackers and others to secure systems
  • The need for in-house and domestic support
  • Future Initiatives
  • 15:20 Afternoon Tea

    15:40 STRATEGIES AND TECHNIQUES FOR INFORMATION ASSURANCE

    Derek Long

    Derek Long, Co-Founder, CISA, Corp for Information Security Assurance

  • The effective management and delivery of client information
  • Providing a comprehensive capability to assure accurate information
  • Implementing an effective authorisation process
  • The importance of an effective information assurance system
  • The importance of training in implementing new information assurance systems
  • Preparing for future developments in technology
  • 16:20 INFRASTRUCTURE PROTECTION

    Dr Steven Bryan

    Dr Steven Bryan, Senior Vice President, L-3 Network Security Systems

  • Protecting critical infrastructures against computer and physical attacks
  • The development of the ESP network to track criminal computer hackers and terrorists
  • Sharing information through highly secure electronic mail, web pages and databases
  • Encryption as a method for protecting information
  • The advantages of the ESP network to enhance national information security
  • Bringing the ESP system to maturity
  • 17:00 Chairman’s Closing Remarks and Close of Day One

    17:10 Drinks Reception for Speakers and Delegates

    8:30 Re-registration and Coffee

    9:00 Chairman's Opening Remarks

    Paul Robinson

    Paul Robinson, Editor, Secure Computing

    9:10 INFORMATION ASSURANCE UNDER FIRE

    Eric Luijif

    Eric Luijif, Principal Consultant, Physics and Electronics Laboratory, TNO (Norway)

  • By whom and why are our systems and networks attacked?
  • Intruder undetection and insider delight
  • Uncoordinated defences - split responsibilities between defence and government / civil authorities
  • Who cares about the information assurance of entangled and converged information Infrastructures?
  • Commercial - off-the-shelf: mass market protection or mass-market vulnerability?
  • 9:40 IT SECURITY HEALTHCHECK

    Andrew Jones

    Andrew Jones, Group Manager CIS3, DERA

  • The increased awareness of the need for an effective information assurance system
  • Overview of the available technologies and techniques
  • The use of commercial off the shelf (COTS) products in secure systems
  • The problems posed by hackers and others to secure systems
  • The need for in-house and domestic support
  • Future Initiatives
  • 10:20 INFORMATION DOMINANCE

    Dick Ugolini

    Dick Ugolini, Program Manager Information Dominance Systems, Sanders, A Lockheed Martin Company

  • The overall model of a cyber attack
  • Reaping the benefits of the military approach to information dominance
  • Dealing with the threat to the information systems in place
  • Understanding the cyber attack cycle in the process of achieving information dominance
  • The technologies available to assist in the pursuit of information dominance
  • Achieving the goal of information dominance
  • 11:00 Morning Coffee

    11:20 SMART SECURITY FOR SMARTER WORLD

    Dr David Brewer

    Dr David Brewer, Director of International Standards and Policies, Gamma Secure Systems

  • Evolution of using the Internet as a means of defence communication in peace and in theatre
  • Business benefits of e-business solutions as an aid to Smart Procurement and Smart Operations
  • The security demon: why security risk management is better than risk avoidance on a shoe-string
  • Modern risk management solutions, four generations of risk assessment technology and the role of BS 7799
  • Advances in information assurance technology in defence and commerce
  • 12:00 OPERATIONAL ANALYSIS

    Lt Commander David Stephens

    Lt Commander David Stephens, Naval Scientist, Maritime Warfare Centre

  • The importance of operational analysis
  • The protective philosophy on secure data
  • The development of OA for frontline support
  • Learning from the past, preparing for the future
  • 12:40 Lunch

    14:00 INTERNET SECURITY

    Michael Brady

    Michael Brady, Chief Technical Officer, SSE

  • Identifying the threats to security of the internet
  • The external of internal risks to the internet and intranet
  • Protecting against the risks of remote access to the internet
  • Balancing confidentially within an essentially open network
  • Costs and benefits of securing access to the internet
  • Ensuring the customer receives value for money
  • 14:40 NETWORK SECURITY

    Simon Milford

    Simon Milford, Principal Consultant, Logica Security

  • Evolution of using the internet in business
  • Business benefits of network computing within an organisation
  • Cost of ownership benefits of network computers
  • Using the intranet as a method of communication within your organisation
  • Protecting and improving return from past investments in IT services and skills
  • Network opportunities in the future
  • 15:20 Afternoon Tea

    15:40 CONVERGANCE TECHNOLOGIES

    Peter Collins

    Peter Collins, Managing Director, DC-Inter.net

  • Using satellite IP multicast technology in the secure transmission of data
  • Examples of situations where IP applications can be used
  • How IP multicast streaming can enable users to continuously transmit data and multimedia to a PC network
  • Incorporating satellite technology into security systems
  • 16:20 DEVELOPING INTRANET TECHNOLOGIES

    Alan Swann

    Alan Swann, Managing Director, Intranet Solutions

  • Enterprise functions that can be entrusted to the intranet
  • The importance of security in establishing a corporate intranet
  • Using corporate intranets as a platform for mission-critical multi-tier distributed client/server applications
  • Making company documents widely but securely available on the corporate intranet
  • The role of the IT department in developing a corporate intranet
  • Adapting web-based tools to internal business use
  • 17:00 Chairman's Closing Remarks and Close of Conference

    +

    The Hatton, at etc. venues

    51/53 Hatton Garden
    London EC1N 8HN
    United Kingdom

    The Hatton, at etc. venues

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.