Home
overview

A rapid, fundamental shift has seen defence agencies become increasingly reliant on information systems to provide capabilities across all areas. However, as IT grows more sophisticated and complex, so too do the threats.

For the first time, brand new models for attack and their consequences will be revealed to the public domain from the authors of the Borg & Bumgarner study, due to be released by the US Cyber Consequences Unit( USCCU), an advisory group of the Department of Homeland Security. In addition, top industry experts will disseminate information regarding the latest technologies for various elements of information security  such as identity assurance and cryptography.

SMi’s Inaugural Information Assurance and Security Conference offers military and commercial IA practitioners the opportunity to gain an insight into the key strategic and technical challenges faced when attempting to create safe infrastructures, integrate domestic and military networks and instigate transnational information-sharing.

The event will provide a unique opportunity to:

  • EVALUATE national information programmes and developments in national cyber defense capabilities
  • LEARN from the knowledge and experience of NATO, US EUCOM, US DoD, and UK MoD
  • NETWORK with your peers in the industry
  • FORGE relationships with potential business partners
  • WITNESS technical demonstrations of the latest information assurance software

The expert speaker line-up includes:

  • Captain David Simpson, Deputy Director, C3 and Warfighting Integration, EUCOM, US Air Force
  • Dr Gert Retzer, Director of Command and Control Systems, NATO C3 Agency
  • Mark Hall, Director, International Information Assurance Program (IIAP), Office of the Secretary of Defense (OSD), USA
  • Michael Coomes, European Coordinator, International Information Assurance Programs, US European Command (US EUCOM)/J9, Department of Defense
  • Scott Borg, Director and Chief Economist, US Cyber Consequences Unit
  • Ferenc Suba, Vice-Chair, European Network Integrated and Security Agency (ENISA), Special Envoy of the Minister, General Manager, CERT, Hungary
  • Ricardo Sibilia, Head, Command and Control Laboratory, Science and Technology, Swiss Army
  • Jeffrey Bialos, Executive Director, Transatlantic Security and Industrial Programs, Johns Hopkins SAIS

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Brian  Collins

Brian Collins, Head of Department of Information Systems, DCMT, Defence Academy of the UK, Cranfield University

9:10 KEYNOTE ADDRESS

Lieutenant Colonel Sean  Broderick

Lieutenant Colonel Sean Broderick , Director, Network Warfare Center, US European Command

  • The new strategic environment
  • Phase zero for Africa
  • Cyber security and info-sharing
  • 9:50 THE COMPLEXITY OF COMBINING INFORMATION MANAGEMENT WITH INFORMATION ASSURANCE

    Brian  Collins

    Brian Collins, Head of Department of Information Systems, DCMT, Defence Academy of the UK, Cranfield University

  • Procedures for and implementation of secure data and information handling
  • Information assurance - value assessment
  • Agility of assurance and management procedures
  • Impact on organizational structures – web-based working versus hierarchical command and control
  • 10:30 Morning Coffee

    11:00 SHARING INFORMATION ACROSS INTERNATIONAL ORGANISATIONS

    Dr Gert Retzer

    Dr Gert Retzer, Director, Command and Control Systems, NATO C3 Agency

  • Lessons learnt from past operations
  • Why the drive for interoperable systems?
  • Where are we now? Are we interoperable? Are we secure?
  • Novel technologies available
  • Future requirements
  • 11:40 THE RISKS OF INTEROPERABILITY WITH DOMESTIC INFRASTRUCTURE

    Ferenc Suba

    Ferenc Suba , Vice-Chair, European Network and Information Security Agency ( ENISA )

  • What kinds of attack should be considered?
  • Measures of calculating risk
  • How do cyber attacks facilitate physical attacks?
  • The way forward
  • 12:20 Networking Lunch

    13:50 SHARING INFORMATION: THE CRITICAL PATH TO ACHIEVING COALITION INTEROPERABILITY IN 21st CENTURY WARFARE

    Jeffrey Bialos

    Jeffrey Bialos, Executive Director, Transatlantic Security and Industry Programs, Johns Hopkins SAIS

    14:30 APPROACHES FOR A SECURE, REDUNDANT AND INTEROPERABLE NETWORKED OPERATION CONDUCT

  • Integration of legacy and new systems
  • Graceful degradation and redundancy as a build-in capability
  • Top-down vs. bottom-up development approaches
  • Open architectures and standards for ensuring interoperability
  • Integration in the Computer Network Defense framework
  • Riccardo Sibilia

    Riccardo Sibilia , Head, Command and Control Lab, Swiss department of defence

    15:10 INTERNATIONAL INTEROPERABILITY STRATEGIES USING RE-PROGRAMMABLE CRYPTOGRAPHY

  • Using Programmable Cryptography in IA Products
  • Key Technical Challenges
  • The Drivers for Change
  • Business Model for International Acquisition of embedded cryptography
  • Application case study - UK MoD Common-Good High-Grade Infosec Module (Programmable) - CHIM(P)

  • Paul Taylor

    Paul Taylor, Secure Products Business Manager , Harris Systems

    Todd Moore

    Todd Moore, Engineering Director, Communication Secure Products, Harris Corporation

    15:50 Chairman’s Closing Remarks and Close of Day One

    Brian  Collins

    Brian Collins, Head of Department of Information Systems, DCMT, Defence Academy of the UK, Cranfield University

    16:00 Afternoon Tea

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Brian  Collins

    Brian Collins, Head of Department of Information Systems, DCMT, Defence Academy of the UK, Cranfield University

    9:10 INFORMATION ASSURANCE IN A NETWORK CENTRIC WORLD: BEYOND INFORMATION SECURITY

    Neil Robinson

    Neil Robinson, Analyst, RAND Europe

  • The changing environment
  • Evolving threats
  • Establishing requirements for information assurances challenges
  • 9:50 DEVELOPING AN INFORMATION ASSURANCE STRATEGY

    Mark Hall

    Mark Hall, Director, International Information Assurance Program (IIAP), Office of the Secretary of Defense (OSD)

  • Shoring up current defenses
  • Focus on the future
  • Mission assurance

  • 10:30 Morning Coffee

    11:00 THE DEPARTMENT OF DEFENSE'S INTERNATIONAL INFORMATION ASSURANCE PROGRAMME (IAAP)

    Michael  Coomes

    Michael Coomes , European Co-ordinator, International Information Assurance Programs, Booz Allen Hamilton

  • The sharing of situational awareness
  • Developing response capabilities
  • The mechanics of how the DoD structure's the program with other nation's militaries
  • Partnerships (industry and national)
  • 11:40 BATTLELINES INSIDE NATIONAL INFRASTRUCTURES – PART I

    Scott Borg

    Scott Borg, Director and Chief Economist, US Cyber Consequences Unit

  • An economic model of cyber attacks
  • The economic and strategic consequences
  • Case studies
  • 12:20 Networking Lunch

    13:50 BATTLELINES INSIDE NATIONAL INFRASTRUCTURES – PART II

    John Bumgarner

    John Bumgarner, Research Director, Security Technology, US Cyber Consequences Unit

  • The present nature of targeted attacks
  • What is wrong with present models
  • The theory of value destruction and it’s application in the analysis of cyber attacks
  • Other types of cyber-attack
  • Case studies
  • 14:30 CYBER SECURITY OF MILITARY INFRASTRUCTURE

    John Saunders

    John Saunders, Director, Center for Information Assurance, National Defense University

  • Securing entities such as security cameras, alarms, fire suppression, lighting, HVAC, electric power production and distribution, natural gas supply, and water storage and distribution
  • Weaknesses in cyber security within the CS arena
  • The impact on the readiness of a military unit
  • The development of CS security standards efforts internationally
  • Countermeasure development efforts within the commercial sector
  • A live demonstration of a cyber attack on a control system will be conducted
  • 15:10 SMARTCARDS AND PUBLIC KEY INFRASTRUCTURES

    Tim Dean

    Tim Dean, Senior Consultant, QinetiQ

  • Why are virtual Communities of Interest increasingly important?

  • How Smartcards and PKI can be combined with new computing paradigms of virtualisation to support CoIs.

  • Technical Demonstration

  • 15:50 Chairman’s Closing Remarks and Close of Day Two

    Brian  Collins

    Brian Collins, Head of Department of Information Systems, DCMT, Defence Academy of the UK, Cranfield University

    16:00 Afternoon Tea

    +

    Royal Windsor Hotel Grand Place

    5 Rue Duquesnoy
    Brussels 1000
    Belgium

    Royal Windsor Hotel Grand Place

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.