In Partnership with:


Cyber warfare has become a major concern for international governments, militaries and civil agencies over the last few years. Recently a wave of cyber attacks against NATO member Estonia in 2007, and then Georgia in 2008 have highlighted the crippling impact cyber warfare can have against a nation’s critical national infrastructure.

How do you protect national security in a borderless world?

SMi’s Cyber Defence 2010 is well timed and brings together international experts from across the cyber security sector. Being run in partnership with the Estonian MoD the event will examine the threats you face in cyberspace. Take the opportunity to attend our most interactive conference to date where you will have the chance to take part in panel discussions and multiple stream sessions.


  • Hear a welcome address from the Estonian Minister for Defence
  • Assess key international military, government and civil programmes
  • Explore cyber defence during multiple stream sessions
  • Understand Russia and China’s cyber defence strategies
  • Analyse e-crime and identity and screening
  • Take part in an interactive workshop led by the Cyber Security Forum Initiative


Industry Profile Includes:

Presidents, CEOs, Vice Presidents, Directors, Managers, Analysts and Officers for:

  • Information Assurance Experts
  • Information Technology Experts
  • Concept Directors
  • Security Researchers
  • System Architecture and System Design
  • Project and Programme Management
  • Sales and Marketing
  • Business Development

Military Profile Includes:

Commanders, Branch Chiefs, Directors, Assistant Directors, Staff Officers, Project & Programme Managers, Engineers for:

  • J6/G6
  • Information Systems
  • Equipment Capability
  • Cyberspace Branch
  • Technical Systems
  • Plans and Requirements
  • Policy Planning Department
  • Joint C4I
  • Procurement and Acquisition

Cyber Defence 2009:

Very interesting conference, valuable information & a good opportunity to meet & network - EADS Deutschland

SMi Staff have provided us with a fantastic & extremely interesting 2 days of cyber defence presentations - Ministry of Defence, UK

Very good, an excellent overview, both broad & specific - Jane’s Defence Weekly

A good mix of topics & speakers - NC3A, NATO


Organisations in attendance in 2009 include:

Green Hills, Thales Raytheon Systems, SAIC, PTN Consulting, Front End AB, Prevx, IntelliGuard, Sentor, Prolexic, Advanced Programmes, EADS Defence & Security, XAG Conseil, Janes Defence Weekly, QOSMOS, 3Com, Pod Venture Partners, United Airlines and NetWitness

Plus over 50 military, government and civil delegations from:

UK Ministry of Defence, US Federal Bureau of Investigation, Swedish Armed Forces, United States Department of Defence, United States Airforce, United States Government, Netherlands Ministry of Foreign Affairs, Norwegian Armed Forces, SPF Justice Belgium,  Belgian Armed Forces, Singapore Armed Forces, Estonian Ministry of Defence and the Georgian Ministry of Defence


Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Geoff Harris

Geoff Harris, President, Information Security Systems Association (ISSA), UK

9:10 Welcome Address

Minister Jaak Aviksoo

Minister Jaak Aviksoo, Defence Minister, Ministry of Defence, Estonia


Heli Tiirma-Klaar

Heli Tiirma-Klaar, Senior Advisor to the Undersecretary, Ministry of Defence, Estonia

  • Update and overview on the Estonian Cyber Defence Programme
  • What’s new – developments in the last 12 months
  • Interoperability and information sharing with civil and governmental organisations
  • Vision for the future

    Wing Commander Tom Parkhouse

    Wing Commander Tom Parkhouse, Cyber Security Staff Officer, Ministry of Defence, UK

    10:30 Morning Coffee

    11:00 NATO’s Cyber Defence Strategy

    Frederic Jordan

    Frederic Jordan, CAT-8, Information Assurance Service Control, NATO C3 Agency

  • Coordinating NATO members defences from a central command – the NATO CDMA
  • Shifting policies – employing the NATO Computer Incident Response Capability (NCIRC) unit
  • Strengthening NATO Cyber Defence Capabilities – The NCIRC Full Operational Capability (FOC) project
  • Thinking the future – NATO cyber defence R&D activities
  • 11:30 Today’s Reality: Living in Compromise to Advanced Persistent Threats

    Amit Yoran

    Amit Yoran, CEO, NetWitness

  • Nature and sources of threats facing public and private organizations and the gaps in current network visibility
  • Technical reasons that advanced persistent threats are evading current perimeter-based point solutions such as IDS, log monitoring and flowbased technologies
  • Advanced techniques for next generation network monitoring using advanced analytics of full packet captures, and the network visibility improvements provided by this approach
  • Specific examples of adversary exploits (demonstrations) similar to trends observed within organized crime groups and state-sponsored attacks
  • 12:00 Public/Private Partnerships and Implications for a Global Construct

    Major General (ret'd) Barbara Fast

    Major General (ret'd) Barbara Fast, Vice President Cyber Solutions, Intelligence and Security Systems, Network and Space Systems, The Boeing Company

  • An overview of the current global environment
  • Creating a top down and bottom up approach to critical, legal, policy and business issues
  • Educating users
  • What are the long term implications?
  • 12:30 From Desktops to the Data Centre- Countermeasures to Combat Cyber Attacks

    Sean Berg

    Sean Berg, Director, EMEA Defence & Public Security, Dell Corporation

    13:00 Networking Lunch

    14:15 STREAM ONE

    Geoff Harris

    Geoff Harris, President, Information Security Systems Association (ISSA), UK

    14.30    IPv6 - The Latest Security Challenges
    Vulnerabilities of the IPv6 system
    the configurations IPv6 that are more vulnerable than others
    How much malicious IPv6 traffic will high profile sights see?
    Future challenges and evolution
    Ronald Broersma, Chief Engineer of the Defence Research and Engineering Network (DREN), SPAWAR, US Navy

    15.00   Cloud Computing – Identifying the Security Risks
    Introduction to cloud computing
    Understanding the benefits
    What are the risks and security challenges?
    Recent case studies
    Lessons learned and improving procedures
    Jim Reavis, Executive Director, Cloud Security Alliance

    15.30   Afternoon Tea

    16.00   Why the Private Sector is Key to Cyber Defence?
    The private sector and critical national infrastructure
    Why is the sector key to cyber defence?
    Information sharing between private sectors and government
    Private sector support for cyber defence and investigations
    Lessons learned and how collaboration may be improved
    Gareth Niblett, Chairman, BCS Information Security Specialist Group, UK

    14:15 STREAM TWO

    Paul de Souza

    Paul de Souza, Founder, Cyber Security Forum Initiative

    14.30   Protecting Global Vital National Infrastructure
    The crippling impact a cyber attack can have on the vital national infrastructure
    Leaving your victim defenceless against different forms of attack
    Leaving the door open to a whole realm of other possibilities
    Ensuring people are properly trained and the right safeguards are in place
    John Bumgarner, Research Director for Security Technology, Cyber Consequences Unit, USA

    15.00   Hardening Government Cyber Defence
    The challenges of government cyber defence
    The limitations of COTS solutions
    Adding an additional, custom-built, cyber defence barrier
    Complementarities between custom developments and
    COTS solutions
    Examples of technical implementations
    Eric Larsson, VP, Marketing, Qosmos

    15.30   Afternoon Tea

    16.00   Mobile Ad hoc Networks and Delay Disconnection Tolerant Networks
    What are the security threats in MANETs and DTNS?
    What are the application domains that would be affected?
    Why traditional security approaches can’t help? 
    What are the approaches that can improve MANET and
    DTN vulnerabilities?
    Milena Radenkovic, Director of Software Systems Course, University of Nottingham, UK



    Tim Thomas

    Tim Thomas, Analyst, Foreign Military Studies Office

  • Cyber Warfare - The 21st century battlefield
  • What does the information blockade hide?
  • Russian and Chinese cyber armies – preparing for the modern security challenge
  • Are we at risk of a cyber cold war?
  • Taking full advantage of your cyber warfare arsenal
  • Where does future evolution take us next?
  • 17:00 Chairman’s Closing Remarks and Close of Day One

    17:10 Networking Drinks Reception Sponsored by NetWitness

    8:30 Registration & Coffee

    Geoff Harris

    Geoff Harris, President, Information Security Systems Association (ISSA), UK

    9:00 Chairman's Opening Remarks


    Rain Ottis

    Rain Ottis, Scientist, Cooperative Cyber Defence Centre of Excellence

  • Overview of the CCD COE programme and capabilities
  • Developments and activities at the centre
  • Assessing the requirements for meeting the global cyber security challenge
  • How do we improve moving forward?

    Gareth Niblett

    Gareth Niblett, Chairman, Information Security Specialist Group, BCS

    Paul de Souza

    Paul de Souza, Founder, Cyber Security Forum Initiative

    Michael Kolessar

    Michael Kolessar, Supervisory Special Agent, Cyber Division, Federal Bureau of Investigation, USA

    10:50 Morning Coffee

    11:20 Cyber Tomography: Find the Hidden Stress Fractures within a Cyber Infrastructure and Measure its Resiliency to Attack and High-Stress Traffic Load

    Gregory Fresnais

    Gregory Fresnais, Director of International Business Development, BreakingPoint

  • Cyber infrastructure is riddled with hidden stress fractures that can be exploited with malicious intent or ruptured through high-stress traffic load
  • Validating the resiliency of cyber infrastructure components and systems is critical in determining that your solutions for Lawful Intercept and Data Loss Prevention will work accurately
  • Resiliency measurement provides a repeatable and scientific method to evaluating and measuring the performance, security and stability of network and IT equipment
  • Emitting real-world applications, real-time security attacks and maximum user load at a cyber infrastructure is the only way to identify vulnerabilities and weaknesses before they are exploited
  • 12:00 Law Enforcement Collaboration in Response to the Global E-Crime challenge

    Michael Kolessar

    Michael Kolessar, Supervisory Special Agent, Cyber Division, Federal Bureau of Investigation, USA

  • Overview and assessment of the global challenge
  • The FBI’s role in response to the international e-crime challenge
  • Creating a more joined up approach – information sharing at all levels
  • 12:40 Networking Lunch


    Robert Siciliano

    Robert Siciliano, CEO, IDTheftSecurity.com

  • Understanding cyber fraud
  • How do thieves collect personal information?
  • Recent case studies and tricks used by cyber criminals
  • Guarding against identify theft
  • How is cyber terrorism changing?
  • 14:40 Risk Analysis in Cyber Security

    Christian Probst

    Christian Probst, Language-based Technology, Technical University of Denmark

  • An overview of risk factors
  • Risk and trust
  • Development and increase of risk
  • How do we adopt risk, and how do we develop trust
  • 15:20 Chairman’s Closing Remarks and Close of Day Two Followed by Afternoon Tea



    The Cyber Warfare Battlefield

    The Cyber Warfare Battlefield

    19th May 2010
    Tallinn, Estonia


    Tornimäe 3
    Tallinn 10145




    speaker image






    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.


    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.


    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.


    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title


    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event


    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71

    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SMi.
    Full details of our privacy policy can be found here https://www.smi-online.co.uk/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smi-online.co.uk.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smi-online.co.uk/opt-out