For the latest COVID-19 Travel restrictions and recommendations please click here

SMi’s Cyber Defence is well timed to provide you with updates on the latest international developments. Assess the most up-to-date technological threats and consider the lessons learned based on case studies from Estonia and Georgia.

The event will bring together key international policy and decision makers. Attend and network with distinguished speakers and attendees who will update you on the global cyber security challenge.

For more information please contact Zain Philbey on +44 (0) 207 827 6722

Cyber Security
  • Assess the lessons learned based on the cyber attacks launched against Estonia and Georgia
  • Hear the latest update from NATO’s Estonian Cyber Centre of Excellence
  • Analyse the growing threat posed by the Chinese and Russian Militaries – Are we at war in cyberspace?
  • Evaluate current and future developments at the US Air Force Cyber Operations Command and the Federal Bureau of Investigation
  • Discuss the latest technologies and attack methods including cyber warfare using USB’s, security in a wireless environment, IPV6, SCADA security threats and guarding against insider attack


  • Information Management Security Professionals
  • Head of Cyber Security
  • Network Engineers
  • Infrastructure Security Planners
  • Computer Forensics Managers
  • Civil Responders
  • Emergency Response Planners
  • Intelligence Units
  • International Ministries of Defence

Feedback from Cyber Defence 2008

“Very informative, fantastic value for money” Senior Representative, EADS

“Highly qualified and high ranking speakers. Very good networking possibilities" Senior Representative, Thales

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Geoff Harris

Geoff Harris, President, Information Systems Security Association (ISSA), UK


  • Update of current capabilities
  • Cyberspace as a war fighting environment
  • Formulating an offensive cyber warfare policy
  • Protecting critical infrastructure against the latest cyber attack methods
  • Is this the battlefield of the future?
  • Rear Admiral Thomas Engevall

    Rear Admiral Thomas Engevall, Lower Half, Swedish Armed Forces


    Major General David Senty

    Major General David Senty, Commander, Air Force Network Operations, Vice Commander, Air Force Cyberspace Command, United States Air Force

  • Overview of activities to date
  • Identifying the enemy
  • Assessing the evolving threat
  • Are we at war in cyberspace?
  • Meeting warfighting requirements
  • Future system evolution
  • 10:30 Morning Coffee

    11:00 Jointly Assuring IT Security in Critical Infrastructure in Germany – Strategic Approaches and their Implementation

    Heinz-Jürgen Treib

    Heinz-Jürgen Treib, Division of IT Security, Federal Ministry of Interior, Germany

  • German National Plan for Information Infrastructure
  • Implementation Plan for the Federal Administration
  • CIP Implementation Plan
  • International activities
  • 11:40 Emerging Trends in Software Architecture to Defend Against Cyber Attack

  • Examining the risk factors
  • Attitudes to risk
  • Partitioned (MILS) architecture
  • International Security Certification Process
  • Trapping malicious attacks
  • Jeremy Flann

    Jeremy Flann, Vice President EMEA, Green Hills Software

    12:20 Networking Lunch

    13:50 IPv6 – Exploiting the Weaknesses

    Ronald Broersma

    Ronald Broersma, Chief Engineer of the Defense Research Engineering Network (DREN), SPAWAR, USA

  • Vulnerabilities of the IPv6 system
  • The configurations IPv6 that are more vulnerable than others
  • How much malicious IPv6 Traffic will high profile sights see?
  • Future challenges and evolution
  • 14:30 Leveraging Network Intelligence Technology to Develop Next-Generation Cyber Security Solutions

  • The challenges of government cyber security
  • Leveraging network intelligence technology to take back control over security
  • Tracking anomalies in network behavior and enhancing situational awareness
  • Examples of technical implementations
  • Patrick Paul

    Patrick Paul, VP, Customer Operations, QOSMOS

    Erik Larsson

    Erik Larsson, VP, Marketing, QOSMOS

    15:10 Afternoon Tea

    15:40 The SCADA Security Programme

    Ganesh Devarajan

    Ganesh Devarajan, Security Researcher, Tipping Point, 3Com, USA

  • Overview and update of achievements to date
  • What is the difference between IT security and SCADA?
  • SCADA security for the EU
  • Understanding the SCADA security threats
  • Protect your critical infrastructure - Prevention, detection and recovery methods
  • Lessons learned and future roadmap
  • 16:20 Insider Threats - Deja Vu

  • Lessons learned from practical case studies
  • Using system thinking to conceptualize insider attack
  • How do you guard against insider attack?
  • Threat faced to critical infrastructure
  • Christian Probst

    Christian Probst, Language-based Technology, Technical University of Denmark

    Professor Dieter Gollmann

    Professor Dieter Gollmann, Institute for Security in Distributed Applications, Hamburg University of Technology

    17:00 Chairman’s Closing Remarks and Close of Day One

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Geoff Harris

    Geoff Harris, President, Information Systems Security Association (ISSA), UK


    Rain Ottis

    Rain Ottis , Scientist, Cooperative Cyber Defence Centre of Excellence

  • Update on current developments
  • Research and training being carried out at the centre
  • Countering a cyber attack
  • How important is long term interoperability and information sharing?
  • Obstacles and challenges
  • Lessons Learned

    Heli Tiirma-Klaar

    Heli Tiirma-Klaar, Senior Advisor, Ministry of Defence, Estonia

  • Overview of events May – June 2007
  • War in cyberspace – the practical repercussions
  • How do you respond to a cyber attack?
  • Interoperability and support – Countering the threat
  • What have we learned and the new safeguards that have been put in place
  • 10:30 Morning Coffee

    11:00 Cyber Warfare Used Against Georgia – An Operational Account

  • Understanding the environment of July 2008
  • How did the threat migrate?
  • What damage did the cyber attacks have?
  • Lessons learned for the future
  • Dimitri Katsiashvili

    Dimitri Katsiashvili, Head of Network and System Administration Division, Information Technology Support Department, Ministry of Defence, Georgia

    11:40 Global Law Enforcement Collaboration

    Jeffrey Troy

    Jeffrey Troy, Chief, Cyber Criminal Section, Federal Bureau of Investigation

    12:20 Networking Lunch

    13:50 DDoS Mitigation – The Case for a Shared National and Private DDoS Mitigation Infrastructure

  • Why are DDoS attacks being perpetrated?
  • Identifying the attack pattern
  • How far back do DDoS attacks go?
  • Switching from individuals to government entities
  • Marino Zini

    Marino Zini, Managing Director, Sentor Managed Security Services, Sweden

    Paul Sop

    Paul Sop, Chief Technology Officer , Prolexic

    14:30 Information Sharing and Interoperability in an Information Sensitive Environment

    Bernard Roussely

    Bernard Roussely, Chief, Information Assurance and Service Control Team, NC3 Agency, NATO

  • The need for effective information sharing in an operational environment
  • Adapting to your surroundings – Interoperability and Information requirements in new surroundings
  • The risk of information exploitation
  • Importance of effective training
  • Future interagency applications
  • 15:10 Chinese Cyber Nationalism

  • What are the threats?
  • Countering the security challenge – Countermeasures that have been put in place
  • Modern warfare and the need to control information
  • Lessons learned from the war in cyberspace
  • Future development
  • Dr Xu Wu

    Dr Xu Wu, Assistant Professor, Arizona State University, USA

    15:50 Chairman’s Closing Remarks and Close of Conference Followed by Afternoon Tea


    Sheraton Stockholm Hotel and Towers

    Tegelbacken 6
    PO Box 195
    Stockholm SE-101 23

    Sheraton Stockholm Hotel and Towers



    speaker image






    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.


    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.


    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.


    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title


    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event


    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71

    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SMi.
    Full details of our privacy policy can be found here https://www.smi-online.co.uk/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smi-online.co.uk.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smi-online.co.uk/opt-out