Home
Cyber Defence
17 May - 18 May 2010
Cyber Defence

In Partnership with:


 

Cyber warfare has become a major concern for international governments, militaries and civil agencies over the last few years. Recently a wave of cyber attacks against NATO member Estonia in 2007, and then Georgia in 2008 have highlighted the crippling impact cyber warfare can have against a nation’s critical national infrastructure.

How do you protect national security in a borderless world?

SAE Media Group’s Cyber Defence 2010 is well timed and brings together international experts from across the cyber security sector. Being run in partnership with the Estonian MoD the event will examine the threats you face in cyberspace. Take the opportunity to attend our most interactive conference to date where you will have the chance to take part in panel discussions and multiple stream sessions.
 

  • Minister Jaak Aaviksoo, Defence Minister, Ministry of Defence, Estonia
  • Heli Tiirmaa-Klaar, Senior Advisorto the Undersecretary, Ministry of Defence, Estonia
  • Rain Ottis, Scientist, Cooperative Cyber Defence (CCD) Centre of Excellence (COE), Estonia
  • Robert Siciliano, CEO, IDTheftSecurity.com
  • Timothy L Thomas, Analyst, Foreign Military Studies Office, USA

     

Conference agenda

clock

8:30

Registration & Coffee

clock

9:00

Chairman's Opening Remarks

Geoff Harris

Geoff Harris, President, Information Security Systems Association (ISSA), UK

clock

9:10

Welcome Address

Minister Jaak Aviksoo

Minister Jaak Aviksoo, Defence Minister, Ministry of Defence, Estonia

clock

9:30

OPENING ADDRESS

Heli Tiirma-Klaar

Heli Tiirma-Klaar, Senior Advisor to the Undersecretary, Ministry of Defence, Estonia

  • Update and overview on the Estonian Cyber Defence Programme
  • What’s new – developments in the last 12 months
  • Interoperability and information sharing with civil and governmental organisations
  • Vision for the future
  • clock

    10:00

    KEYNOTE ADDRESS

    Wing Commander Tom Parkhouse

    Wing Commander Tom Parkhouse, Cyber Security Staff Officer, Ministry of Defence, UK

    clock

    10:30

    Morning Coffee

    clock

    11:00

    NATO’s Cyber Defence Strategy

    Frederic Jordan

    Frederic Jordan, CAT-8, Information Assurance Service Control, NATO C3 Agency

  • Coordinating NATO members defences from a central command – the NATO CDMA
  • Shifting policies – employing the NATO Computer Incident Response Capability (NCIRC) unit
  • Strengthening NATO Cyber Defence Capabilities – The NCIRC Full Operational Capability (FOC) project
  • Thinking the future – NATO cyber defence R&D activities
  • clock

    11:30

    Today’s Reality: Living in Compromise to Advanced Persistent Threats

    Amit Yoran

    Amit Yoran, CEO, NetWitness

  • Nature and sources of threats facing public and private organizations and the gaps in current network visibility
  • Technical reasons that advanced persistent threats are evading current perimeter-based point solutions such as IDS, log monitoring and flowbased technologies
  • Advanced techniques for next generation network monitoring using advanced analytics of full packet captures, and the network visibility improvements provided by this approach
  • Specific examples of adversary exploits (demonstrations) similar to trends observed within organized crime groups and state-sponsored attacks
  • clock

    12:00

    Public/Private Partnerships and Implications for a Global Construct

    Major General (ret'd) Barbara Fast

    Major General (ret'd) Barbara Fast, Vice President Cyber Solutions, Intelligence and Security Systems, Network and Space Systems, The Boeing Company

  • An overview of the current global environment
  • Creating a top down and bottom up approach to critical, legal, policy and business issues
  • Educating users
  • What are the long term implications?
  • clock

    12:30

    From Desktops to the Data Centre- Countermeasures to Combat Cyber Attacks

    Sean Berg

    Sean Berg, Director, EMEA Defence & Public Security, Dell Corporation

    clock

    13:00

    Networking Lunch

    clock

    14:15

    STREAM ONE

    Geoff Harris

    Geoff Harris, President, Information Security Systems Association (ISSA), UK

    14.30    IPv6 - The Latest Security Challenges
    Vulnerabilities of the IPv6 system
    the configurations IPv6 that are more vulnerable than others
    How much malicious IPv6 traffic will high profile sights see?
    Future challenges and evolution
    Ronald Broersma, Chief Engineer of the Defence Research and Engineering Network (DREN), SPAWAR, US Navy

    15.00   Cloud Computing – Identifying the Security Risks
    Introduction to cloud computing
    Understanding the benefits
    What are the risks and security challenges?
    Recent case studies
    Lessons learned and improving procedures
    Jim Reavis, Executive Director, Cloud Security Alliance

    15.30   Afternoon Tea

    16.00   Why the Private Sector is Key to Cyber Defence?
    The private sector and critical national infrastructure
    Why is the sector key to cyber defence?
    Information sharing between private sectors and government
    Private sector support for cyber defence and investigations
    Lessons learned and how collaboration may be improved
    Gareth Niblett, Chairman, BCS Information Security Specialist Group, UK
     

    clock

    14:15

    STREAM TWO

    Paul de Souza

    Paul de Souza, Founder, Cyber Security Forum Initiative

    14.30   Protecting Global Vital National Infrastructure
    The crippling impact a cyber attack can have on the vital national infrastructure
    Leaving your victim defenceless against different forms of attack
    Leaving the door open to a whole realm of other possibilities
    Ensuring people are properly trained and the right safeguards are in place
    John Bumgarner, Research Director for Security Technology, Cyber Consequences Unit, USA

    15.00   Hardening Government Cyber Defence
    The challenges of government cyber defence
    The limitations of COTS solutions
    Adding an additional, custom-built, cyber defence barrier
    Complementarities between custom developments and
    COTS solutions
    Examples of technical implementations
    Eric Larsson, VP, Marketing, Qosmos

    15.30   Afternoon Tea

    16.00   Mobile Ad hoc Networks and Delay Disconnection Tolerant Networks
    What are the security threats in MANETs and DTNS?
    What are the application domains that would be affected?
    Why traditional security approaches can’t help? 
    What are the approaches that can improve MANET and
    DTN vulnerabilities?
    Milena Radenkovic, Director of Software Systems Course, University of Nottingham, UK

     

    clock

    16:30

    CLOSING KEYNOTE

    Tim Thomas

    Tim Thomas, Analyst, Foreign Military Studies Office

  • Cyber Warfare - The 21st century battlefield
  • What does the information blockade hide?
  • Russian and Chinese cyber armies – preparing for the modern security challenge
  • Are we at risk of a cyber cold war?
  • Taking full advantage of your cyber warfare arsenal
  • Where does future evolution take us next?
  • clock

    17:00

    Chairman’s Closing Remarks and Close of Day One

    clock

    17:10

    Networking Drinks Reception Sponsored by NetWitness

    clock

    8:30

    Registration & Coffee

    Geoff Harris

    Geoff Harris, President, Information Security Systems Association (ISSA), UK

    clock

    9:00

    Chairman's Opening Remarks

    clock

    9:10

    OPENING ADDRESS

    Rain Ottis

    Rain Ottis, Scientist, Cooperative Cyber Defence Centre of Excellence

  • Overview of the CCD COE programme and capabilities
  • Developments and activities at the centre
  • Assessing the requirements for meeting the global cyber security challenge
  • How do we improve moving forward?
  • clock

    9:50

    INTERACTIVE PANEL DISCUSSION

    Gareth Niblett

    Gareth Niblett, Chairman, Information Security Specialist Group, BCS

    Paul de Souza

    Paul de Souza, Founder, Cyber Security Forum Initiative

    Michael Kolessar

    Michael Kolessar, Supervisory Special Agent, Cyber Division, Federal Bureau of Investigation, USA

    clock

    10:50

    Morning Coffee

    clock

    11:20

    Cyber Tomography: Find the Hidden Stress Fractures within a Cyber Infrastructure and Measure its Resiliency to Attack and High-Stress Traffic Load

    Gregory Fresnais

    Gregory Fresnais, Director of International Business Development, BreakingPoint

  • Cyber infrastructure is riddled with hidden stress fractures that can be exploited with malicious intent or ruptured through high-stress traffic load
  • Validating the resiliency of cyber infrastructure components and systems is critical in determining that your solutions for Lawful Intercept and Data Loss Prevention will work accurately
  • Resiliency measurement provides a repeatable and scientific method to evaluating and measuring the performance, security and stability of network and IT equipment
  • Emitting real-world applications, real-time security attacks and maximum user load at a cyber infrastructure is the only way to identify vulnerabilities and weaknesses before they are exploited
  • clock

    12:00

    Law Enforcement Collaboration in Response to the Global E-Crime challenge

    Michael Kolessar

    Michael Kolessar, Supervisory Special Agent, Cyber Division, Federal Bureau of Investigation, USA

  • Overview and assessment of the global challenge
  • The FBI’s role in response to the international e-crime challenge
  • Creating a more joined up approach – information sharing at all levels
  • clock

    12:40

    Networking Lunch

    clock

    14:00

    SPECIAL ADDRESS

    Robert Siciliano

    Robert Siciliano, CEO, IDTheftSecurity.com

  • Understanding cyber fraud
  • How do thieves collect personal information?
  • Recent case studies and tricks used by cyber criminals
  • Guarding against identify theft
  • How is cyber terrorism changing?
  • clock

    14:40

    Risk Analysis in Cyber Security

    Christian Probst

    Christian Probst, Language-based Technology, Technical University of Denmark

  • An overview of risk factors
  • Risk and trust
  • Development and increase of risk
  • How do we adopt risk, and how do we develop trust
  • clock

    15:20

    Chairman’s Closing Remarks and Close of Day Two Followed by Afternoon Tea

    Workshops

    The Cyber Warfare Battlefield
    Workshop

    The Cyber Warfare Battlefield

    Swissôtel
    19 May 2010
    Tallinn, Estonia

    Swissôtel

    Tornimäe 3
    Tallinn 10145
    Estonia

    Swissôtel

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download

    Title


    Description

    Download

    Title


    Description


    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By submitting this form you agree to our privacy policy and consent to receiving communications, you may opt out at any time.