View
564
Download
0
Category
Preview:
DESCRIPTION
SMi Groups inaugural Cyber Security for the Military & Defence Sectors
Citation preview
CYBER SECURITY FOR THE MILITARY ANDDEFENCE SECTOR
19 - 20 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK
www.cyberdefenceevent.comRegister online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
WHY SHOULD YOU ATTEND
• LEARN- about emergingthreats, current initiatives andthe recent technicaldevelopments in network,firewall, and databasesecurity
• ASSESS- the experiences ofcurrent military operators andshare ideas with civilianindustrial peers
• ANALYSE- the latest cyberdefence solutions, trainingand network threats
• ENGAGE- with internationalmilitary and inductrialrepresentatives in dedicatedquestion & answer sessions.Communicate directly withmilitary operators, defencecontractors tasked withsupplying secure equipment,as well as experts at theforefront of producing cybersecurity solutions.
SPEAKER PANEL INCLUDES
CONFIRMED CHAIRMAN:
Commander Wolfgang Roehrig, Project Officer Cyber Defence,European Defence Agency
Dr Jamie Shea, Deputy Assistant Secretary General, EmergingSecurity Challenges Division, NATO
Mr Ulrich Poeschl, Chief Security Architect, Infosec Planning &Implementation Authority, Austrian MoD
Mr John Ross, Strategic Analyst, Canadian Department ofNational Defence
Ms Heli Tiirma Klaar, Cyber Security Policy Advisor, ConflictPrevention and Security Policy Directorate, European ExternalAction Service
Hasan Yasar, Technical Manager, CERT, Digital Intelligence andInvestigations, Software Engineering Institute
Mr Akira Yamada, Senior Security Analyst, Cyber DefenceInstitute Japan
Special Agent representative, FBI Cyber ALAT, Cyber Division,Federal Bureau of Investigation
Mr Patrick Curry OBE, Director, British Business FederationAuthority
Mr Geoff Harris, Management Council, Information
Security Systems Associations UK
BOOK
BY
28TH FE
BRUA
RY TO
SAVE £3
00
BOOK
BY 28
TH MAR
CH TO
SAVE £1
00
A: Threat Intelligence, Threat HorizonsWORKSHOP LEADER: Mr Cristiano Lincoln Mattos, SEO,
Tempest Security Intelligence09.00-12.30
B: Process Modelling for Information SecurityEngineering (PROMISE) in the UKCNI
WORKSHOP LEADER: Dr Howard Thompson, Managing Director, NAS Defence13.00-17.00
PLUS TWO INTERACTIVE HALF-DAY PRE-CONFERENCE WORKSHOPS18 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK
SMi Presents their 6th annual
DAY ONE I 19 JUNE 2013 www.cyberdefenceevent.com
Register online at www.cyberdefenceevent.com • Fax: +44 (0) 870 90 Supported by
08.30 REGISTRATION & COFFEE
09.00Chairman's Opening Remarks
Mr Geoff Harris, Management Council, InformationSecurity Systems Associations UK
OPENING ADDRESS 09.10NATO’s policy on cyber defence and the evolution of the cyberchallenge• How cyber is changing the nature of conflict and crisis
management• NATO's perception of the cyber threat • How NATO is constructing its cyber defence organization• Future tasks and challenges
Dr Shea, Deputy Assistant Secretary General, EmergingSecurity Challenges Division, NATO
09.50Technical aspects of cyber security as seen by the Austrianmilitary and the local milCERT• What is as an "advanced threat"?• (Scary) ways around conventional defence mechanisms• Live-Demo of a target-system infection with conventional
defence• Emerging cyber threats - strategies to cope with them• Optional: Further live-demos (Fighting back the malware from
1st demo, create custom anti-virus signatures)Mr Ulrich Poeschl, Chief Security Architect, InfosecPlanning & Implementation Authority, Austrian MoD
10.30 MORNING COFFEE
11.00Adversity, risk and trustworthiness• Why there is a need for a consensus on adversity, risk and
trustworthiness• The role of Standards Development Organisations (SDO) in
achieving such a consensus• Achieving the desired outcome with the Trustworthy Software
Framework (TSF)Mr Ian Bryant, Technical Director, Trustworthy SoftwareInitiative
11.40Speed up the velocity of investigation with behaviour analysis ofmalware• Identify and capture the signature of suspicious files,• Behavioural Analysis with correlation of other artefact, • Importance of Multiple Analysis Platform,• How to correlate multiple malware and find the similar ones?• Result: Malware activity graphs.
Hasan Yasar, Technical Manager, CERT, DigitalIntelligence and Investigations, Software EngineeringInstitute
12.20 NETWORKING LUNCH
13.40
Risks of Social Media to Organizations and Personnel • Insight into potentially disruptive effect of social media on
defence and security
• Insight into personnel implications from work-related to
personal issues
• Insight into organizational implications including cyber-vetting,
trust and potential effects on organizational management
• Using example from real-world and potential scenarios
John Ross, Strategic Analyst, Canadian Department of
National Defence
14.20
Sharing sensitive information securely- times are changing• What business and cyber information is being shared securely
and the strategic drivers for it?
• What are the collaborative mechanisms, technologies and
standards enabling such sharing, and the threats to success?
• Where is such information sharing happening in UK and
internationally?
• What's likely to happen in the next 3 years and what should
my organisation be doing?
Mr Patrick Curry OBE, Director, British Business Federation
Authority
15.00 AFTERNOON TEA
15.30
Cyber Security and the UK's Critical National Infrastructure• Identifying what elements are ‘critical’
• Benefits and risks of international commercial cooperation
• Creating and maintaining a stable cyber policy for protecting
CNI
Mr Dave Clemente, Research Associate, International
Security, Royal Institute of International Affairs
16.10
Defending the UK defence industry against cyber attack • The changing landscape of the cyber threat to the UK
Defence Industry
• Understanding your cyber resilience maturity in the face of the
cyber threat?
• How the UK Defence industry is working together to detect,
analyse and respond to threats
• What does the cyber future bring for the UK Defence Industry?
Mr Vincent Blake, Head of Cyber Security,
Raytheon UK
16.50
Chairman's Closing Remarks and Close of Day One
DAY TWO I 20 JUNE 2013 www.cyberdefenceevent.com
090 712 • Call: +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE
Are you interested in promoting your defence services to atargeted industry sector? SMi offer tailored marketing
packages so that your association / publication can gainaccess to a global market and key decision makers in the
defence market. Contact Sonal Patel, SMi Marketing on +44 (0) 20 7827 6106
or email: spatel@smi-online.co.uk
SPONSORSHIP AND EXHIBITION OPPORTUNITIESSMi offer sponsorship, exhibition, advertising and branding packages,uniquely tailored to complement your company's marketing strategy. Primenetworking opportunities exist to entertain, enhance and expand your clientbase within the context of an independent discussion specific to yourindustry. Should you wish to join the increasing number of companiesbenefiting from sponsoring our conferences please call: Simon Wright, SMiSponsorship +44 (0) 20 7827 6732 or email: swright@smi-online.co.uk
08.30 REGISTRATION & COFFEE
09.00
Chairman's Opening Remarks
Mr Geoff Harris, Management Council, Information
Security Systems Associations UK
OPENING ADDRESS
09.10
The FBI's role in the advancement of cyber security
Special Agent representative, FBI Cyber ALAT, Cyber
Division, Federal Bureau of Investigation
09.50
Strategies for cyber security and defence: Organisational
perspective
• Presentation will offer a blueprint what constitutes a successful
cyber strategy
• Comparison of national cyber strategies
• Basic elements of a cyber defence policy of a multinational
organisation
• Major elements for a successful national cyber security and
defence strategy
Ms Heli Tiirma Klaar, Cyber Security Policy Advisor,
Conflict Prevention and Security Policy Directorate,
European External Action Service
10.30 MORNING COFFEE
11.00
Cyber Defence Capability Building in EU
• Military aspects of the cyber security strategy for the European
Union
• Military capability development in EU cyber defence
• Pooling & Sharing in Cyber Defence
• A stock-take of EU cyber defence capability
Commander Wolfgang Roehrig, Project Officer Cyber
Defence, European Defence Agency
11.40
Japanese cyber security update
• Cyber threats/attacks in Japan
• Response activities
• Findings from massive cyber attacks
• Activities on digital Forensics
Mr Akira Yamada, Senior Security Analyst,
Cyber Defence Institute Japan
12.20 NETWORKING LUNCH
13.40Achieving global cyber security through cooperation• About ENISA• Protecting Critical Information Infrastructure• Input to EU & MS Cyber Security Strategies• Assisting Operational Communities• Security & Data Breach Notification• Data Protection• Future Direction
Dr Steven Purser, Head of Core Operations Department,European Network and Information Security Agency(ENISA)
14.20Voluntary participation in national cyber defence: The exampleof the Estonian cyber defence unit• Legal and policy framework for using volunteers in national
cyber defence• Functioning and roles of the CDU: Estonian case study• Legal implications arising from using volunteers in national
cyber defence Senior Scientist, Legal & Policy Branch, NATO CCD COE
15.00 AFTERNOON TEA
15.30Cyber security incident response • The security services industry’s response to cyber security
threats; how do you prepare for an incident and what are theimmediate steps and decision making process that you willhave to go through following an incident
• Government and private sector initiatives for validating thirdparty security services providers
• How to identifying suitable cyber security incident responseservice suppliers and what should be considered in contractsfor their services
Mr Ian Glover, President, CREST
16.10Building and managing a comprehensive computer Incidentresponse capability• Don't start when the horse has bolted; Starting with protection
and defence• Scope and ambition • Appetite for Interoperability
- Are you prepared to share with other nations?• What tools are out there?• The need for integration and cooperation
Mr Jeremy O’Connor, Security & Smart Solutions, Selex ES
16.50Chairman's Closing Remarks and Close of Day Two
Threat Intelligence, Threat Horizons
OverviewThis workshop will give delegates a valuableinsight in to the actions and motivations ofpotential attackers and understand the number,diversity and speed of actual attacks on theirsystems and the motivation, techniques, strategiesand operations of the attackers as well as theimplications of changing IT trends such as BYOD,cloud computing and mobile technology. For toolong we have been playing ‘catch up’ with thecyber criminals – it’s time to get ahead of thegame and give ourselves an intelligentadvantage.
Agenda08.30 Registration & Coffee
09.00 Global cyber threat outlook (recentdiscoveries/attacks and operations withtheir likely background andimpact/international implications)
09.45 Morning Coffee
10.30 Sector specific cyber threat outlook (financial sector/CNI/aviation/pharma etc)
11.15 Collateral damage from malware used onan international base(examples for Flame, Duqu, Stuxnet andhow they are being exploited by cybercriminals)
12.00 End of Workshop
About the Workshop LeaderMr Cristiano Lincoln Mattos, SEO, TempestSecurity IntelligenceCEO Cristiano Lincoln Mattos has been active inInformation Security since being introduced to theinternet in 1993, and has accumulated significantexperience in both engineering and testingsecurity defences. As one of Tempest’s founders,Lincoln has fulfilled a critical role in creating anddeveloping the company’s expertise, productsand strategy over the past 12 years. Anexperienced consultant, he has assumed avariety of roles within Tempest, includingpenetration testing and vulnerability researchprojects, developing software tools, and buildingand leading top-notch teams through complextechnical projects.
About Tempest Security IntelligenceTempest Security Intelligence has been deliveringexceptional service quality to Clients in Brazil andEurope for the past 12 years. Tempest delivershighly specialised information security consultingservices to large and medium-sized organisationsin the private and public sectors, and is relied onto protect some of the largest global financialinstitutions. Our focus on information securitymanagement allows us to build long-term,strategic relationships with our clients that result instable and continuous service. Our in-depthknowledge, expertise and extensive R&D efforts,have given Tempest an authoritative position inthe cyber security market.
HALF-DAY PRE-CONFERENCE WORKSHOP A
9.00 – 12.30 I 18 JUNE 2013
COPTHORNE TARA HOTEL I LONDON, UK
In association with
Process Modelling forInformation Security Engineering
(PROMISE) in the UKCNI
OverviewThe UK Critical National Infrastructure (UKCNI) iscrucial to the safetl and defence of the UK,however, they are not always Governmentowned, are often in the hands of foreign ownersand are not subject to a consistent or supervisedlevel of information security. This workshop willaddress this issue by presenting a model for thedesign of a socio-technical information securityengineering management design methodologyfor the purpose of reconciling technicalrequirements with human and social factorsinherent in any management system. The method,called PROMISE (Process Modelling for InformationSystems Engineering), is intended to provide amodel for a researched platform of ideas,expressed as processes, in order to better informinformation security decisions with the aim ofmaking those decisions better suited to the needsof the information security manager operating ina UKCNI organisation.
Agenda13.30 Registration & Coffee
14.00 Security management in the UKCNI- It’s notjust technology
15.00 Afternoon Tea
15.30 How can Information security managementprocesses in the UKCNI be better designed,developed and implemented?
16.30 Question & Answer Discussion
17.00 End of Workshop
About the Workshop LeaderDr Howard Thompson, ManagingDirector, NAS DefenceAfter a career in policing, security andcounter-intelligence work in governmentservice, a number of years of whichwere spent in IT and Communications
Security, Dr Howard Thompson moved into theprivate sector where he built on his technicalexpertise by gaining commercial and industrialsector skills and knowledge. Since then, he hasundertaken a number of IT security consultancy andmanagement roles in various international industriesincluding aerospace, defence and systems, andnow practices as an IT Security Consultant,providing services to many companies andorganisations that now comprise the UKCNI.
About NAS CyberDefenceNAS CyberDefence consultancy services aredesigned to help organizations to realize the secureand safe management of corporate governance,manage operational risk, maintain legal, regulatoryand standards compliance, protect intellectualproperty and secure business communications.
HALF-DAY PRE-CONFERENCE WORKSHOP B
13.30-17.00 I 18 JUNE 2013
COPTHORNE TARA HOTEL I LONDON, UK
In association with
If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk
CYBER SECURITY FOR THE MILITARY AND DEFENCE SECTORCONFERENCE: 19 - 20 JUNE 2013 COPTHORNE TARA HOTEL, LONDON, UK | WORKSHOPS: 18 JUNE 2013
4 WAYS TO REGISTER
FAX your booking form to +44 (0) 870 9090 712PHONE on +44 (0) 870 9090 711
ONLINE at www.cyberdefenceevent.com
□ Book by 28 February and receive a £300 discount
□ Book by 28 March and receive a £100 discount EARLY BIRDDISCOUNT
Payment must be made to SMi Group Ltd, and received before the event, by one ofthe following methods quoting reference D-031 and the delegate’s name. Bookingsmade within 7 days of the event require payment on booking, methods of paymentare below. Please indicate method of payment:□ UK BACS Sort Code 300009, Account 00936418□ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Swift (BIC): LOYDGB21013, Account 00936418IBAN GB48 LOYD 3000 0900 9364 18
□ Cheque We can only accept Sterling cheques drawn on a UK bank.□ Credit Card □ Visa □ MasterCard □ American Express
All credit card payments will be subject to standard credit card charges.
Card No: □□□□ □□□□ □□□□ □□□□Valid From □□/□□ Expiry Date □□/□□CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card
Cardholder’s Name:
Signature: Date:I agree to be bound by SMi's Terms and Conditions of Booking.
Card Billing Address (If different from above):
CONFERENCE PRICES GROUP DISCOUNTS AVALABLE
DOCUMENTATION (Shipped 10-14 days after the event)I cannot attend but would like to purchase access to the following DocumentPortal/paper copy documentation: Price Total□ Access to the conference documentation
on the Document Portal £499.00 + VAT £598.80□ The Conference Presentations - paper copy £499.00 - £499.00
(or only £300 if ordered with the Document Portal)
VENUE□ Please contact me to book my hotelAlternatively call us on +44 (0) 870 9090 711, email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
VATVAT at 20% is charged on the attendance fees for all delegates. VAT is also charged onDocument Portal and Literature Distribution for all UK customers and for those EU customers notsupplying a registration number for their own country here: _______________________
PAYMENT
POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor South,Harling House, 47-51 Great Suffolk Street, London, SE1 0BS
Payment: If payment is not made at the time of booking, then an invoice will be issued and mustbe paid immediately and prior to the start of the event. If payment has not been received thencredit card details will be requested and payment taken before entry to the event. Bookings within7 days of event require payment on booking. Access to the Document Portal will not be given untilpayment has been received.
Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, anotherdelegate to take your place at any time prior to the start of the event. Two or more delegates maynot ‘share’ a place at an event. Please make separate bookings for each delegate.
Cancellation: If you wish to cancel your attendance at an event and you are unable to send asubstitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providingthat cancellation is made in writing and received at least 28 days prior to the start of the event.Regretfully cancellation after this time cannot be accepted. We will however provide theconferences documentation via the Document Portal to any delegate who has paid but is unableto attend for any reason. Due to the interactive nature of the Briefings we are not normally able toprovide documentation in these circumstances. We cannot accept cancellations of ordersplaced for Documentation or the Document Portal as these are reproduced specifically to order.If we have to cancel the event for any reason, then we will make a full refund immediately, butdisclaim any further liability.
Alterations: It may become necessary for us to make alterations to the content, speakers, timing,venue or date of the event compared to the advertised programme.
Data Protection: The SMi Group gathers personal data in accordance with the UK Data ProtectionAct 1998 and we may use this to contact you by telephone, fax, post or email to tell you aboutother products and services. Unless you tick here □ we may also share your data with third partiesoffering complementary products or services. If you have any queries or want to update any ofthe data that we hold then please contact our Database Manager databasemanager@smi-online.co.uk or visit our website www.smi-online.co.uk/updates quoting the URN as detailed aboveyour address on the attached letter.
Unique Reference Number
Our Reference LV D-031
Terms and Conditions of Booking
DELEGATE DETAILSPlease complete fully and clearly in capital letters. Please photocopy for additional delegates.
Title: Forename:
Surname:
Job Title:
Department/Division:
Company/Organisation:
Company VAT Number:
Email:
Address:
Town/City:
Post/Zip Code: Country:
Direct Tel: Direct Fax:
Mobile:
Switchboard:
Signature: Date:I agree to be bound by SMi's Terms and Conditions of Booking.
ACCOUNTS DEPT
Title: Forename:
Surname:
Email:
Address (if different from above):
Town/City:
Post/Zip Code: Country:
Direct Tel: Direct Fax:
Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.
I would like to attend: (Please tick as appropriate) Fee TotalMILITARY, GOVERNMENT & PUBLIC SECTOR RATE□ Conference and both Workshops £2097.00 + VAT £2516.40□ Conference & Interactive Workshop £1498.00 + VAT £1797.60□ Conference only £899.00 +VAT £1078.80□ Interactive Workshop only £599.00 +VAT £718.80
COMMERCIAL ORGANISATIONS□ Conference and both Workshops £2697.00 + VAT £3236.40□ Conference & Interactive Workshop £2098.00 +VAT £2517.60□ Conference only £1499.00 +VAT £1798.80□ Interactive Workshop only £599.00 +VAT £718.80
PROMOTIONAL LITERATURE DISTRIBUTION □ Distribution of your company’s promotional
literature to all conference attendees £999.00 + VAT £1198.80
The Conference fee includes refreshments, lunch, conference papers and CD ROM containing all of the presentations.
Recommended