Home
Cyber Defence
16 May - 17 May 2011
Cyber Defence

QOSMOS   

“Cyber threats are asymmetric because attacks may be perpetrated by the few upon the many, with little cost and resources. Cyber attacks are typically anonymous, launched from any of billions of sources worldwide. Impacts may be immediate and obvious, or dormant and subtle, eluding recognition for years. Degrees of damage can range from inconvenient downtime of personal systems to the life-threatening destruction of critical infrastructures." - U.S. Naval Institute, Cyber Threats to National Security, July 2010
CSFI

SAE Media Group's Cyber Defence 2011...

Keeping cyber space secure is an increasingly complex challenge. We face threats not only to ourselves as individuals; but to businesses, governments and national security.

Cyber Defence 2011 will be held for the first time in Istanbul and will explore the explosive issue of cyber security the world over. Bringing together an extensive list of cyber security professionals from across Europe, the US and Asia – Cyber Defence 2011 will deliver a packed 2 days of presentations.

This event offers you the chance to hear from a diverse speaker faculty representing an array of military, civil and commercial organisations – don’t miss the opportunity to meet them and discuss the latest developments in Cyber Defence.
 

 

TUBITAK Microsoft   Malaysia
Brigadier General Robert Rego, Chief, Space and Cyberspace Operational Integration, Headquarters USAF Space Command Mehmet Eris, Senior Researcher, National Research Institute of Electronics and Cryptology (TUBITAK), Turkey Roger Halbheer, Worldwide Chief Security Advisor, Microsoft   Zahri Hj Yunos, Chief Operating Officer, CyberSecurity Malaysia

Conference agenda

clock

8:30

Registration & Coffee

clock

9:00

Chairman's Opening Remarks

Louis Giannelli CISSP

Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

clock

9:10

OPENING KEYNOTE ADDRESS

Brigadier General Robert Rego

Brigadier General Robert Rego, Chief, Space and Cyberspace Operational Integration, US Air Force Space Command

  • The world continues to increase its reliance on cyber infrastructure in every aspect of daily life
  • Bad actors recognize the low-cost opportunity this presents leading to an exponential increase in the threats we face
  • Mission assurance identifies mission critical cyber pathways, and provides mitigation alternatives and contributes to mission success
  • clock

    9:40

    Best Practice Cyber Defense, Based on Network Intelligence and Communications Metadata

    Erik Larsson

    Erik Larsson, VP, Marketing, QOSMOS

  • The challenges of government cyber defence
  • Detecting cyber threats by scanning traffic
  • Using DPI & Network Intelligence to build a second line of cyber defence
  • Examples of technical implementations
  • Using communication metadata to detect suspicious traffic
  • clock

    10:20

    Turkish Cyber Defence & Malware threat trends

    Mehmet Eris

    Mehmet Eris, Senior Researcher, National Research Institute of Electronics and Cryptology (Tubitak UEKAE), Turkey

  • Malware problem
  • History of fight between computer virus authors and antivirus researchers
  • Current scale of malware problem
  • Malware ecosystem
  • Upcoming threats and research at TUBITAK
  • clock

    10:50

    Morning Coffee

    clock

    11:10

    Setting up a National Cyber Defence Programme

    Colonel Gérald Vernez

    Colonel Gérald Vernez, Deputy Director, National Cyber Defence Project, Swiss Armed Forces

  • About what threat characteristics are we talking about? Is it really only about IT?
  • Which level/part of the society is concerned? Can we separate civilian and military stakes?
  • Who are the players we should talk to? Can we limit our effort to the national level?
  • How does the threat evolve? Are today’s solutions still valuable for tomorrow?
  • clock

    11:40

    Georgia, Russia and Cyber Wars to come

  • 2008: The Cyber Attack on Georgia
  • Growing Russian Cyber Capabilities
  • Message from Georgia: Protect Critical Infrastructure
  • Cyberspace: The Fifth Operational Theatre
  • David Smith

    David Smith, Director, Georgian Security Analysis Center, GFSIS

    Khatuna Mshvidobadze

    Khatuna Mshvidobadze, Senior Associate, Georgian Security Analysis Center, GFSIS

    clock

    12:10

    DDoS as a Cyber Threat

  • Rising threat in 2010 of DDoS attacks
  • The fall-out from the Wikileaks attacks
  • Specific DDoS threats to Turkey
  • Precautions to prevent DDoS and BotNets
  • Huzeyfe Onal

    Huzeyfe Onal, Information Security Specialist, Information Security Academy, Turkey

    Gokay Beksen

    Gokay Beksen, Information Security Consultant, Information Security Academy (BGA)

    clock

    12:40

    Networking Lunch

    clock

    13:40

    Cyber Network Operations

    Roger Kuhn

    Roger Kuhn, Science Advisor to Fleet Cyber Command (FLTCYBERCOM)/Commander, 10th Fleet (C10F), US Navy

    clock

    14:10

    Fighting Cyber Terrorism - An Indian Approach

    Major (Ret'd) Manik Jolly

    Major (Ret'd) Manik Jolly, Business Manager, SunEdison

  • Cyber terrorism - Definition, scope and effects
  • Where the real problem lies
  • Moving beyond technology
  • Need for training - how, who and what
  • Strategy required at Global and regional levels
  • clock

    14:40

    Afternoon Tea

    clock

    15:00

    Fourth-Generation Warfare: Terrorism and Counter-Terrorism in Cyber Space

    Yael Shahar

    Yael Shahar, Director, Database Project, Institute for Counter-Terrorism, IDC Herzliya, Israel

  • The changing nature of warfare
  • Growing emphasis on perception and psychology
  • Are non-state actors the necessary ‘victors’ in a Fourth Generation War?
  • What role does intervention on the part of third parties have on the outcome of Fourth Generation Conflicts?
  • clock

    15:30

    Preparing for Stuxnet II: Is your infrastructure safe?

    Joel Langill

    Joel Langill, CSO - SCADAhacker, Director of Critical Infrastructure, Cyber Security Forum Initiative

  • Why control systems are an important part of critical infrastructure.
  • A look at why control systems are an easy target.
  • Understanding how a cyber attack can target a control system and the equipment it controls
  • What can be done to improve control system cyber resilience
  • clock

    16:00

    Chairman’s Closing Remarks and Close of Day One

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

    clock

    8:30

    Registration & Coffee

    clock

    9:00

    Chairman's Opening Remarks

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

    clock

    9:10

    KEYNOTE ADDRESS

    Zahri Yunos

    Zahri Yunos, Chief Operating Officer, CyberSecurity Malaysia

  • Current cyber security threats posed in Malaysia
  • Terrorism vs cyber terrorism
  • Malaysia’s Critical National Information Infrastructure
  • The use of ICT and cyberspace by terrorist
  • Malaysia’s National Cyber Security Policy
  • clock

    9:40

    The Economy of Cybercrime

    Roger Halbheer

    Roger Halbheer, Worldwide Chief Security Advisor, Microsoft

  • What are the general IT trends that impact cyber security?
  • What is the economy behind Cybercrime?
  • What can we as societies/industries/governments do to fight it?
  • clock

    10:10

    Introduction to ENISA and its Activities

    Udo Helmbrecht

    Udo Helmbrecht , Executive Director, European Network and Information Security Agency (ENISA)

  • Key activities for 2011
  • ENISA’s role in protecting Critical Information Infrastructure
  • The European Cybersecurity Exercise – conclusions and further development
  • ENISA and Cloud Computing
  • Conclusions
  • clock

    10:40

    Morning Coffee

    clock

    11:00

    The Global Risk to Financial Services

    Tim Hind

    Tim Hind, Head of Intelligence, Barclays Global Retail Bank (Technology)

  • The threats posed to banks
  • The need to develop more intelligence sharing between critical national infrastructure and government
  • Solutions - working together on common threats
  • clock

    11:30

    Internet Protocol Version 6

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

  • Main design goals and features
  • Implementation hurdles
  • Security issues
  • IPv6 attack scenarios
  • clock

    12:00

    German IT Security Architecture

    Dr. Markus Durig

    Dr. Markus Durig, Head of Division, IT Security, Federal Ministry of the Interior, Germany

    clock

    12:30

    Networking Lunch

    clock

    13:30

    The German Anti Botnet Initiative

    Heinz-Jürgen  Treib

    Heinz-Jürgen Treib, Division of IT Security, Federal Ministry of the Interior, Germany

  • Benefits of the programme
  • The role of ISPs in order to curb malware and particularly Botnets
  • The role of the government in setting incentives
  • Collaboration with German Internet industry
  • clock

    14:00

    Automated Run-Time Analysis of Malicious Codes

    Hasan Yasar

    Hasan Yasar, Engineering and Development, Digital Investigations and Intelligence, US-CERT, Carnegie Mellon University

  • Benefits of automated system in a  massive file analysis problem,
  • Observe malware on simulated internet (Anexa, Product of SEI)
  • Provide analytical results of the behaviour of malware,
  • Create classification of the malware to address the source
  • clock

    14:30

    Chairman’s Closing Remarks and Close of Day Two

    Louis Giannelli CISSP

    Louis Giannelli CISSP, Senior Adversary Cyber Threat Analyst, US Air Force

    clock

    14:40

    Afternoon Tea

    Marriott Istanbul

    Kayisdagi Caddesi No 1/1, Atasehir
    Istanbul 34750
    Turkey

    Marriott Istanbul

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download

    Title


    Description

    Download

    Title


    Description


    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By submitting this form you agree to our privacy policy and consent to receiving communications, you may opt out at any time.