SMi’s Cyber Defence Conference is a practical and strategic networking event for military communication and critical infrastructure protection practitioners.

This conference will provide you with an overview on how cyber attacks are evolving, and which technologies have been developed to counter these threats. In addition security experts will discuss how state-of-the-art technologies are exposed to cyber threats and which preventative measures to take. Reviewing and evaluating recent attacks will allow you to discuss network resilience and best practices in a crisis situation. 

Key Topics Include :

  • Evolving Cyber Security & Information Assurance threats to military communication networks and critical infrastructure 
  • Vulnerabilities of state-of-the-art technologies including Voice over IP, IPV6 and Wireless Communication Networks
  • Estonian Cyber attack - lessons learnt and best practices
  • Military-civil cooperation in protecting national security and critical infrastructure
  • Latest developments in SCADA Security, intrusion detections and resilient systems

   Keynote Addresses include:
  • Major General William T. Lord, Director, Cyberspace Transformation and Strategy, US Air Force Headquarters
  • Mikhel Tammet, Director, Communications and IT, Department, Estonian Ministry of Defence
  • Ronald Broersma, Chief Engineer of the Defense Research and Engineering Network (DREN), SPAWAR, US Navy
  • Douglas C Towers, Director, Defence Security Standards Organisation, UK MoD
  • John Bumgarner, Research Director for Security Technology, US Cyber Consequences Unit
  • Thomas Ramsauer, Division of IT Security, Federal Ministry of Interior, Germany
  • Ian Henderson, Manager Architecture & Strategy, BP Enterprise Security & Continuity, BP International
  • Dr Robert Ghanea-Hercock, Chief Researcher, Future Technologies Group, British Telecom (BT), UK

If you want to be informed about the progress of the conference.  E-mail Marita Jünemann on mjunemann@smi-online.co.uk or call +44 (0)207 827 6026.

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Geoff Harris

Geoff Harris, President, Alderbridge Consulting Ltd

9:10 Lessons Learnt from the Estonian Cyber Crisis and How to Respond

Toomas Viira

Toomas Viira, Information Security Manager, Estonian Informatics Centre

  • An overview of events in May-June 2007
  • Attacks on our “Way of Life” - How serious are they?
  • Potential threats to society
  • Cyber threats perceived by communities
  • Who will respond to an attack and how to respond
  • Lessons learnt for the future
  • 9:50 Cyber Defense Decision Support System

    Heidi  Bisch

    Heidi Bisch, Scientist, NATO C3 Agency

  • Areas where INFOSEC & Cyber Defence occur in NATO
  • Security and Cyber Defence as an enabler for Network Centric Warefare
  • Security communication challenges
  • Future initiatives
  • 10:30 Morning Coffee

    11:00 How to Secure E-mail: Setting the Trust Standard for Collaboration

    Marc  Speltens

    Marc Speltens , Outreach Director, Transglobal Secure Collaboration Program

  •   How to evaluate their own security risks when collaborating online
  • The processes and policies to secure e-mail correspondence among global partners
  •  Real-life examples of how A&D organizations have benefited from Secure E-mail
  •  Future examples of data security throughout the supply chain, including document federation
  • 11:40 Napping in the Guardhouse: A Wakeup Call for Protecting Vital National Infrastructures

    John Bumgarner

    John Bumgarner, Research Director, US Cyber Consequences Unit

  • Implications of cyber-attacks against critical infrastructures
  • Increasing effectiveness of infrastructures attacks
  • Infrastructures attacks as force multiplier
  • 12:20 Networking Lunch

    13:30 National Plan for Information Infrastructure Protection/CIP Implementation Plan - Organising Security Jointly

    Thomas  Ramsauer

    Thomas Ramsauer , , German Ministry of Interior

  • Challenges and joint responsibility
  • Overview national plan for information infrastructure protection
  • CIP implementation plan
  • Roadmap and next steps
  • 14:10 An Outline of the Vulnerabilities of Industrial Control Systems

    Marcelo  Masera

    Marcelo Masera, , Institute for the Protection and Security of the Citizen Joint Research Centre (JCR) - European Commission

  • Requirements for a fully integrated and sustainable vulnerability assessment of systems
  • Processes and methodologies
  • Experimental platforms for security assessment
  • 14:50 Implementing IPv6- What are the new security challenges

    Ronald  Broersma

    Ronald Broersma, Chief Engineer of the Defense Research Engineering Network (DREN), Spawar

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Geoff Harris

    Geoff Harris, President, Alderbridge Consulting Ltd

    9:10 Using Secure Software to Manage Classified Data and Cross-Domain Information Transfer

    Jeremy  Flann

    Jeremy Flann, Director of Business Development, Green Hills Software

  • Using a SKPP EAL6+ certified operating system/ hypervisor for software control of security applications and classified data
  • Keep secret and unclassified data securely on the same computer
  • Policy-based upgrading and downgrading of information
  • Connect computers to secret and restricted networks simultaneously
  • Undergoing evaluation for CWID networks
  • 9:50 Computing ‘Environment’: It’s more than Binary Code – It’s About Criminals!!

    Ole  Tom Seierstad

    Ole Tom Seierstad, Chief Security Adviser , Microsoft Norway

  • Overview of mutated risks of cyber attacks
  • Changing cyber attack awareness in the community
  • Challenges for responding to attacks
  • Microsoft’s initiatives and solutions – and sometimes they are free!
  • 10:30 Morning Coffee

    11:00 Wi-Fi Security or Where are the Threats?

    Franck  Veysset

    Franck Veysset , Senior Expert, Internet/Intranet Security, France Telecom

  • Short review of Wi-Fi security
  • Threats on infrastructures
  • Client-side attacks
  • New challenges: how to secure Wi-Fi based new technologies (UMA, IWLAN...)
  • New threats, fuzzing techniques...
  • Towards new attacks?
  • 11:40 Securing IP Telephony – What are the issues and how to solve them?

    Steinthor  Bjarnason

    Steinthor Bjarnason, Consulting Engineer Security, Cisco Systems

    IP telephony in a nutshell
    Risk analysis, what are the threats?
    How to secure the infrastructure
    How to design secure IP telephony networks
    Securing voice communications: methods and issues

    12:20 Networking Lunch

    13:30 Firewall Technologies – For Military & Public Sector Security

    Dr Anders  Fongen

    Dr Anders Fongen , Senior Scientist, Information Management Division, Norwegian Defence Research Establishment (FFI)

  • Scenarios and threat model
  • What is state-of-the-art and how does it meet the requirements?
  • Military requirements: multi-level/multi-domain information security
  • Firewalls in the tactical domain
  • A SOA (Service Oriented Architecture) perspective on firewalls
  • 14:10 Autonomous Cyber Defence Systems

    Robert  Ghanea-Hercock

    Robert Ghanea-Hercock, Chief Researcher, Future Technologies Group, British Telecom

  • Software agents in cyber security
  • Bio-inspired cyber defence capabilities
  • Adaptive and self* systems for security
  • Intelligent systems in defence
  • 15:00 Chairman’s Closing Remarks followed by Afternoon Tea


    Copenhagen Marriott

    5 Kalvebod Brygge

    Copenhagen Marriott



    speaker image






    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.


    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.


    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.


    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title


    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event


    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71

    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SMi.
    Full details of our privacy policy can be found here https://www.smi-online.co.uk/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smi-online.co.uk.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smi-online.co.uk/opt-out