Cyber Defence and Network Security 2012 is the seminal and leading conference focusing on information operations, cyber attacks, defence, exploitation, network security and information assurance.
2012 will be Defence IQ’s 6th annual conference in the series making Cyber Defence and Network Security one of the most established events of its kind. All of our cyber events attract a truly international delegation with only the leading authorities and programmes on the speaker faculty.
Held in London, 24th-27th January, Cyber Defence and Network Security, aims to discuss solutions to the following problems affecting industry, military, government and intelligence services:
• Defending networks against state sponsored cyber attacks
• Information assurance
• What security measures can be implemented to protect the Cloud
• Monitoring networks to sift out intruders
• Protecting customer records and ensuring access to systems with confidence
• Using cyber weapons as a game changing approach to warfare
• Validating and assessing networks for vulnerabilities
• Use of cyber test ranges to improve network security
• And much, much more….
For further details about the conference, please download the agenda at http://www.cdans.org/redForms.aspx?id=598084&pdf_form=1 or visit the media centre at http://www.cdans.org/Event.aspx?id=598076 for complimentary articles, podcasts, and reports.
Please note that complimentary passes are available to all serving Flag Officers 1 Star and above.
TeamStation AI System Report LATAM IT Salaries 2024
Cyber Defence & Network Security
1. BOOK AND PAY by
DeCeMbeR 16TH TO
SAvE UP TO £499!
WITH A DEDICATED
FOCUS DAY AND
WORKSHOPS ON
PROTECTING BIG
BUSINESS AND
THE ONLY CYBER CONFERENCE INCORPORATING MILITARIES, CRITICAL NATIONAL
CRITICAL NATIONAL INFRASTRUCTURE AND BIG BUSINESS AT INFRASTRUCTURE
THE HIGHEST DECISION-MAKING LEvEL
EvENT DATES: vENUE:
24TH-27TH JAnUARy 2012 THe RADISSOn bLU PORTMAn HOTeL, LOnDOn, UK
EXPERT SPEAKERS INCLUDE:
Mr Christopher Painter Lieutenant General Rhett Lieutenant General Kurt
Coordinator for Cyber Issues, US Hernandez Herrmann
Department of State Commander, US Army Cyber Director, NATO Communication
Command (ARCYBER) and Information Systems
Lieutenant General José Services Agency
Carlos dos Santos Major General Jonathan
Head of the Army Cybernetic Centre Shaw Major General Zaidi
(CDCiber), Brazilian Army Commander, UK Cyber Policy and DG Technical, Deputy Commander of
Plans Team, UK MoD the ISI, Pakistan
Rear Admiral Arnaud
Coustillière Mr David Ferbrache Mr John Stubley
Cyber Defence General Officer, French Director, UK Cyber Policy and Plans Director of the Public Sector
Armed Forces and French MoD Team, UK MoD Network Cabinet Office, UK
Dr John Meakin Mr Mark Field MP Brigadier General Helmut
CISO and Director, Digital Security, Intelligence and Security Committee, Habermayer
BP UK Government Head of Military Strategy (Lead on
Cyber), Austrian MoD
Mr Peter Gibbons The Rt Hon The Lord Reid
Head of Information Security, of Cardowan PhD PC
Network Rail Chair, Institute for Security and
Resilience Studies, University College
Mr Andro Barnovi London, Former Home and Defence
Deputy Defence Minister,
Secretary
Georgia
ATTenD CybeR DefenCe AnD neTwORK SeCURITy 2012 AnD See THe fOReMOST AUTHORITIeS In CRITICAL NATIONAL
INFRASTRUCTURE, MILITARY CYBER COMMANDS, INTELLIGENCE SERvICES AND GOvERNMENTAL DEPARTMENTS GIve HIGH-
LeveL STRATeGIC AnD OPeRATIOnAL bRIefS On SeCURInG neTwORKS fROM CybeR ATTACK.
24TH JANUARY 2012: 25TH - 26TH JANUARY 2012: 27TH JANUARY 2012:
PRE-CONFERENCE FOCUS DAY MAIN CONFERENCE DAYS POST-CONFERENCE WORKSHOPS
Critical national Infrastructure and Large businesses: The foremost authorities in military, big business, The cyber threats to critical national infrastructure,
what are the current threats from cyber space; what intelligence and government give high level strategic businesses and the military. Classes led by a former US
can the military learn from these sectors and vice briefs on cyber security and network defence. intelligence officer and leading researchers from the
versa; how can information remain ubiquitous and team responsible for taking down the Meriposa botnet.
uncompromised at the same time?
REGISTER ONLINE AT Sponsors The bbC was one of many media outlets covering 2011’s event
WWW.CDANS.ORG OR CONTACT
US AT DEFENCE@IqPC.CO.UK
OR +44 (0)20 7368 9737
2. 02
Dear Colleague
We’ve changed the name from Cyber
ATTEND CYBER DEFENCE AND NETWORK
Warfare to Cyber Defence and Network SECURITY IN ORDER TO:
Security – and that’s because this year,
we’ve changed the scope in a big way.
Welcome to CDANS, with an international
1 Hear US Departmentthe State, US the world’s most MoD and french MoD so you can learn
from
briefings from heads of
of Army, nATO, UK
significant cyber departments including
speaker faculty including leaders of the what the most advanced methods in cyber defence are.
most prominent military cyber commands,
intelligence services, government and critical 2 Meet with those responsibletheycyber security in big business andand process controls from
infrastructure and hear how
for
intend to protect their networks
critical national
national infrastructure. cyber attack. Apply this knowledge to your own organisation’s defences.
From the conference that made international
news last year, our speaker faculty has 3 Learn from a truly international speaker faculty and network with an audience of senior cyber
decision makers from every continent so you can gauge where the next breakthrough in
broadened to include presentations ranging
technology is coming from.
from operational cyber discussions, high-
level strategic briefings and audience-
engaged debates. 4 Benefit from dedicatedbusiness andand an entire focus day on cyber get told byand their
application against big
workshops
critical national infrastructure –
weapons
the hackers
Is your organisation looking to enhance its and experts about how they would penetrate your networks.
cyber security, could you learn from the
foremost militaries and businesses on how 5 Expand your clientintelligence contacts togovernment and international industry so cybercan
from the military,
base and
services,
include international representatives in
you
defence
to do this? Are you concerned about the penetrate new markets or develop partnerships.
threat to your networks from mercenary
hackers? Do you have a ground-breaking
solution you want to show the biggest
6 Meet with the leading and network security whilstintegrated solutions forthe directors of small
information assurance
global companies offering
also networking with
cyber defence,
budget holders in the cyber world? to medium sized firms offering innovative and unique methods to counteract cyber attacks.
If the answer is “yes” to any of these then
CDANS is a must-attend conference for
you. Based in the heart of London, join our
flagship and seminal cyber event – none
other have such an impressive line-up as this.
CDANS will bring together many of the
world’s experts and decision makers in
what is already considered a priority Tier-1
threat to most countries and organisation’s
interests. Be a part of this exciting and
booming market in London 24th January – “Excellent mix of speakers, all were highly qualified. Very high value.”
right in the hub of its key players so you can Brigadier General Karl Schreiner, German Armed Forces
learn about the most advanced methods in (Cyber warfare 2011)
cyber defence..
Yours Faithfully, “Cyber Warfare 2010 was invaluable to its participants to begin understanding
cyberspace and how warfare might take place in and through this global domain.”
Dick Crowell, Associate Professor, Information Operations & Cyberspace
Operations, Joint Military Operatios Department, US Naval War College
Michael Champion – Conference (Cyber warfare 2010)
Producer
Cyber Defence and Network Security 2012
ABOUT DEFENCEIq.COM
Defence IQ is an authoritative news source for high quality and exclusive commentary
and analysis on global defence and military-related topics. Sourcing interviews and
Dedicated focus day and insights directly from senior military and industry professionals on air defence, cyber
workshops on the cyber threat to warfare, armoured vehicles, naval defence, land defence and many more topics, Defence
IQ is a unique multimedia platform to discuss and learn about the latest developments
critical national infrastructure within the defence sector. So join over 45,000 defence professionals today to claim your
and the emerging solutions to exclusive video interviews, podcasts, articles and whitepapers that are updated on a
daily basis at www.defenceiq.com - and all for free.
secure networks Join the community: www.defenceiq.com/join.cfm
vISIT OUR MEDIA RESOURCE CENTRE AT WWW.CDANS.ORG FOR ARTICLES, PODCASTS, vIDEOS, REPORTS AND MORE
3. 03
CNI FOCUS DAY: 24TH JANUARY 2012
FOCUS DAY RATIONALE
Critical national Infrastructure and big business face daily cyber attacks in
their thousands. This focus day will challenge your existing methods of cyber
defence by revealing its weaknesses, it will reveal the latest methods of attack
and discuss possible future ones. Through this exciting array of seminars
and discussion panels learn from the leading global experts and some of
the largest operators in big business how to develop a truly robust and secure
set of cyber defences.
BENEFITS OF ATTENDING:
t be a part of the one of the best attended and high-profile focus days in t Learn from the Director of one of the UK government’s most ambitious
Cyber, led by the former Defence and Home Secretary and current projects, the Public Sector network
Chairman of UCL’s ISRS, Lord Reid t engage with all the speakers and your fellow delegates during a special
t Hear from leading experts in cyber defence, including Ian west (Head of round-table session, discuss your ideas with them, query their’s, make
nATO CIRC) and Dr Steve Purser (Director, Technical Department, enISA) longlasting partnerships with people at the forefront of cyber defence.
t network with some of the most important operators in Critical national
Infrastructure including bP, Severn Trent water and network Rail
DEFENDING CRITICAL INFRASTRUCTURE AND BUSINESSES FROM COMPUTER NETWORK
EXPLOITATION, INDUSTRIAL ESPIONAGE AND INTELLECTUAL PROPERTY THEFT
08.30 COFFEE AND REGISTRATION
09.00 CHAIRMAN’S INTRODUCTION WITH AN OvERvIEW OF THE INSTITUTE OF SECURITY AND RESILIENCE STUDIES’ CYBER DOCTRINE
CONFIRMED: The Rt Hon The Lord Reid of Cardowen, Chair ISRS, University College London. Former Home Secretary and Secretary of Defence, UK
09.30 TRANSFORMING THE SECURITY AND INTEGRITY OF GOvERNMENTAL COMMUNICATIONS THROUGH THE PUBLIC SECTOR NETWORK (PSN) PROJECT
CONFIRMED: John Stubley, Director, PSn project, Cabinet Office
10.15 INCIDENT RESPONSE HANDLING FOR THE PROTECTION OF CRITICAL NATIONAL INFRASTRUCTURE
CONFIRMED: Michael Boyer, Director Regional Computer emergency Response Team – europe, US Army Cyber Command
11.00 COFFEE AND NETWORKING BREAK
11 30 PANEL DISCUSSION: LEARNING FROM CRITICAL NATIONAL INFRASTRUCTURE ON HOW TO DEFEND YOUR ORGANISATION FROM CYBER ATTACK SO YOU CAN
MINIMISE THE CHANCES OF ESPIONAGE
CONFIRMED: Lord Reid of Cardowan as Chair
CONFIRMED: Dr John Meakin, CISO and Director, Digital Security, BP
CONFIRMED: Peter Gibbons, Head of Information Security, Network Rail
CONFIRMED: Major multination bank representative (date embargo)
13.00 LUNCH
14.15 TRANSFORM YOUR ORGANISATION’S CYBER DEFENCES BY EXPLORING THE EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY’S (ENISA) CRITICAL
INFRASTRUCTURE INFORMATION PROTECTION PLAN (CIIP)
CONFIRMED: Dr Steve Purser, Director, Technical Department, ENISA
15.00 AN UPDATE FROM DENMARK’S CERT PROGRAMME: MAXIMISING CYBER DEFENCES IN MILITARY, INDUSTRY AND GOvERNMENT
CONFIRMED: Thomas Kristmar, Director, GovCERT Denmark
15.45 COFFEE AND NETWORKING BREAK
16.20 ROUND TABLE DISCUSSIONS – MEET THE SPEAKERS AND FELLOW DELEGATES AND ENGAGE IN DIRECT CONvERSATION ABOUT YOUR CYBER REqUIREMENTS
Your Round Table Hosts.
John Stubley, Director, PSn project, Cabinet Office
Peter Gibbons, Head of Information Security, Network Rail
Thomas Kristmar , Director, GovCERT Denmark
Dr Steve Purser, Director, Technical Department, ENISA
Michael W. Boyer, Director Regional Computer emergency Response Team – europe, US Army Cyber Command
EvENING RECEPTION
INTERESTED IN LEARNING MORE ABOUT THIS YEAR’S EvENT? vISIT US AT WWW.CDANS.ORG
4. 04
AGENDA AT A GLANCE
MAIN CONFERENCE DAY 1 (25TH JANUARY) MAIN CONFERENCE DAY 2 (26TH JANUARY)
07.30 COFFEE AND REGISTRATION 07.30 COFFEE AND REGISTRATION
08.45 CHAIRMAN’S INTRODUCTION 08.45 CHAIRMAN’S INTRODUCTION FOLLOWED BY INTERNATIONAL KEYNOTE
SPEECHES
09.00 UK MOD KEYNOTE SPEECHES 09.00 KEYNOTE SPEECH
INvITED: Minister Nick Harvey MP, Minister for the Armed forces, UK CONFIRMED: Mr Andro Barnovi, Deputy Defence Minister, Georgia
Ministry of Defence
09.30 NATO COMMUNICATION AND INFORMATION SYSTEMS SERvICES
09.20 UK CYBER POLICY AND PLANS TEAM: ENGAGING WITH INDUSTRY TO AGENCY (NCSA): OvERvIEW OF NCSA, SUPPORTING THE FRONTLINE
DEvELOP INNOvATIvE CYBER SECURITY SOLUTIONS WITH SECURE CIS TECHNOLOGY IN ORDER TO MAINTAIN RELIABILITY
CONFIRMED: Major General Jonathan Shaw, Commander, UK Cyber Policy OF MISSIONS
and Plans Team (MoD), CONFIRMED: Lieutenant General Kurt Herrmann, Director, nCSA, NATO
CONFIRMED: David Ferbrache, Director, UK Cyber Policy and Plans Team (MoD)
10.10 THE FRENCH CYBER STRATEGY: IS CYBER THE NEW TOWER OF BABEL,
10.00 US DEPARTMENT OF STATE KEYNOTE SPEECH THE NEW THERMOPYLAE? IF SO, WHAT MEASURES CAN BE TAKEN TO
CONFIRMED: Christopher Painter, Coordinator for Cyber Issues, US SURMOUNT CRYPTOLOGY AND SECURITY PROBLEMS?
Department of State CONFIRMED: Rear Admiral Arnaud Coustillière, Cyber General Officer, French
Integrated Defence Staff
10.40 COFFEE AND NETWORKING BREAK 10.40 COFFEE AND NETWORKING BREAK
11.10 AN UPDATE ON BRAZIL’S CYBERNETIC CENTRE AND THE ARMY’S 11.10 SPECIAL KEYNOTE DISCUSSION – LOMONOSOv UNIvERSITY MOSCOW,
REqUIREMENT FOR CYBER SECURITY INFORMATION SECURITY INSTITUTE (IISI)
CONFIRMED: Lieutenant General José Carlos dos Santos, Head of the Army INvITED: Colonel General vladislav Petrovich Sherstyuk, IISI, Russian
Cybernetic Centre (CDCiber), Brazilian Army federation(pending final approval)
CONFIRMED: Interviewed by Keir Giles, Conflict Studies Research Centre
11.50 US ARMY CYBER COMMAND (ARCYBER): PROTECTING INFORMATION
SYSTEMS FROM CYBER ATTACK IN ORDER TO ENSURE INTEGRITY OF 11.40 COUNTRY UPDATE: CHINA
SYSTEMS IN BATTLE INvITED: Major General (Retd) Wang Baocun, former People’s Liberation
CONFIRMED: Lieutenant General Rhett Hernandez, Commander, ARCYBER Army, People’s Republic of China (pending final approval)
12.10 MAXIMISING THE CYBER CAPABILITIES OF THE ISI IN ORDER TO
12.20 AN UPDATE ON AUSTRIA’S CYBER SECURITY PLANS LAWFULLY INTERCEPT AND REDUCE THE CHANCES OF INTERNATIONAL
CONFIRMED: Brigadier General Helmut Habermayer, Head of Military Strategy, TERRORISM
Austrian MoD CONFIRMED: Major General Zaidi, Director General (Technical), Deputy
Commander Inter Services Intelligence Agency (ISI), Pakistan
12.40 LUNCH
12.30 LUNCH
STREAM A STREAM B
INTELLIGENCE AND PREPARING FOR FUTURE CYBER
COUNTER-TERRORISM WARS STREAM A STREAM B
OPTIONS FOR FRONTLINE CYBER OFFENSE CAPABILITIES
14.10 CHAIRMAN’S INTRODUCTION CHAIRMAN’S INTRODUCTION NETWORK SECURITY
14.25 HOLDING THE INTELLIGENCE AND CYBER WARFARE: THEORY 14.00 CHAIRMAN’S INTRODUCTION CHAIRMAN’S INTRODUCTION
SECURITY SERvICES TO ACCOUNT AND PRACTICE - WHAT GAPS 14.40 PREvENTING ATTACKS ON CURRENT AND PROJECTED
OvER IMPLEMENTING A ROBUST ARE THERE BETWEEN THEORY COMMUNICATIONS SYSTEMS THREATS TO CYBER ASSETS –
CYBER STRATEGY AND PRACTICE? HOW HAvE CONFIRMED: Lt Col Chris AN OPERATIONAL PERSPECTIvE
CONFIRMED: Mr Mark Field MP, CYBERSPACE OPERATIONS Barrington-Brown, Senior Officer in CONFIRMED: Jerry Webb,
Member of the Intelligence and CHANGED THE CHARACTER OF Charge, Land Information Assurance Director, 35th Intelligence
Security Committee reporting to the WAR? THE EvOLvING THREAT OF Group, Specialist Group Royal Signals, Squadron, USAF
UK Prime Minister CYBER WARFARE. British Army
CONFIRMED: Dick Crowell,
Information Operations and Cyber 15.20 DEvELOPING PROTECTED SPEECH TBC: OvERvIEW OF
Space Operations, US Navy War NETWORKS WITHIN C4ISTAR CYBER WEAPONS AND SOLUTIONS
College SOLDIER EqUIPMENT TO COUNTERACT THEM
INvITED: Prof Bob Madahar, Chief CONFIRMED: Steven Moulton
15.05 COUNTERING CYBER TERRORISM DEFENDING UKRAINE’S CRITICAL Technologist, DSTL, UK Chris Smoak, Georgia Tech
CONFIRMED: Maajid Nawaz, INFRASTRUCTURE AND SUPPLY Research Institute
Chairman and co-founder, quilliam OF GAS FROM CYBER ATTACKS:
Foundation AN OvERvIEW OF UKRAINIAN
REqUIREMENTS
INvITED: Col Pavlo Tertystkyi, 16.00 COFFEE AND NETWORKING BREAK
Defence and Air Attache, Ukraine
Embassy, London 16.30 DEvELOPING SECURE MILITARY NETWORKS WHICH ALLOW SAFE
COMMUNICATIONS AND SHARE OF INFORMATION WITH ALLIES BUT
15.45 COFFEE AND NETWORKING BREAK SUCCESSFULLY DEFEND AGAINST ENEMY INFILTRATION
INvITED: Brigadier General Greg Loos, Commanding Officer, Canadian
16.30 INTEGRATING CYBER DEFENCES INTO ALL MILITARY PLATFORMS Forces Network Operations Centre
INvITED: Brig Gen A Basu, Director of Cyber warfare, Integrated Defence Staff,
Indian Army 17.00 SPECIAL DEBATE: IS CYBER REvOLUTIONISING WARFARE? PANEL
DEBATE WITH AUDIENCE PARTICIPATION
17.10 CLOSING KEYNOTE SPEECH: BP CONFIRMED: Dr David Betz, King’s College London
CONFIRMED: Dr. John Meakin, CISO and Director, Digital Security, BP CONFIRMED: Prof Giampiero Giacomello, Universita di Bologn
CONFIRMED: Maajid Nawaz, Co-founder and Chairman, quilliam Foundation
17.50 CHAIRMAN’S CLOSING REMARKS 18.00 CHAIRMAN’S CLOSING REMARKS
EvENING GALA DINNER 18.15 END OF CONFERENCE
JOIN OUR CYBER STRATEGY LINKEDIN GROUP FOR THE LATEST DISCUSSIONS ON CYBER AND NETWORK SECURITY
5. 05
POST CONFERENCE WORKSHOPS: 27TH JANUARY
9AM-12PM WORKSHOP 1
CONFIRMED: Dr Chris Smoak, Cyber Technology and Information Security Laboratory, Georgia Tech Research Institute
q Botnets and Malware: An overview of understanding the threat to CnI; Tool discussion – evaluating off the shelf solutions; techniques on capturing
malware and analysing it
q Penetration testing: Assessing vulnerability testing tools; techniques of physical intrusion and offensive information operations and solutions to defend
against it.
Delivered by the department that collaborated with the FBI to successfully dismantle the Meriposa Botnet.
LUNCH
1.30 3.30PM WORKSHOP 2
CONFIRMED: John Bumgarner, Research Director for Security Technology, US Cyber Consequences Unit
q Critical National Infrastructure: How can process controls be manipulated to cause catastrophic damage to CnI? what solutions should be enacted to
counteract risks to CnI?
q Consequences of cyber attacks: what exactly is the level of threat facing your organisation; how can cyber attacks exfiltrate your company secrets
and undermine your competitiveness; solutions to mitigate the effects
John Bumgarner is a retired U.S. Army special operations veteran, former intelligence officer and professional hacker
4.00 – 7.00PM WORKSHOP 3
CONFIRMED: Lt Col (Ret’d) William Hagestad II, Red Dragon Rising
Current Communist Chinese Military electronic warfare (ew) & Information warfare (Iw)
1. focus of the 11 year History of Chinese ew
2. Origins of Chinese Iw - Protagonists & Theorists
3. examination of “war beyond Limits”
4. 21st Century Chinese Cyber warfare - Communist Party of China (CPC), People’s Liberation Army (PLA), State Owned enterprises (SOe) and Citizen
Hacktivists (CH)
5. forward Looking Statements - what will happen next?
William is an internationally recognized subject matter expert on the Chinese People’s Liberation Army & Government Information Warfare. He advises international intelligence
organizations, military flag officers, and multi-national commercial enterprises with regard to their internal IT security governance and external security policies.
Meet with some of the greatest minds in cyber security at Defence IQ’s networking with the cyber community at Cyber warfare 2011
cyber conferences
REGISTER ONLINE AT WWW.CDANS.ORG OR CONTACT US AT DEFENCE@IqPC.CO.UK OR +44 (0)20 7368 9737
6. 06
FEATURED SPEAKERS
FOCUS DAY CHAIRMAN – THE RT HON THE LORD REID OF CARDOWAN PHD PC
“Cyberspace is a manufactured environment, comprised of ones and zeros, not bodies and mass.
Its infrastructure depends on a nano-scale innovation, not industrial-scale production. The rules of
engagement- both civilian and military- developed for land, sea and air, over the centuries and millennia,
require unprecedented adaptation”.
John Reid is the most experienced Cabinet minister of modern times and is also the Principal of the Chertoff Group. He has held more ministerial posts at Cabinet level than any
other politician in recent history. In range of portfolios and in breadth and intensity of change management across departments, his experience is unparalleled.
In particular he has served in leadership across a range of security-related portfolios in the UK Government including Home Secretary, Defence Secretary, northern Ireland
Secretary, Minister for Transport and Armed forces Minister.
following almost quarter of a century as a Member of Parliament Dr Reid was honoured with a nomination to the UK Upper Chamber as a Member of the House of Lords. He is a
Principal of The Chertoff Group, serves as a Senior Advisor to a number of major commercial companies and is presently Hon Professor and Chair of the Institute for Security and
Resilience Studies at University College London; and Patron of Painting and Patronage, (Saudi-UK cultural and educational exchange Programme 2010-).
MR CHRISTOPHER PAINTER
Mr. Painter has been on the vanguard of cyber issues for twenty years. Most recently, Mr. Painter served in the white House as Senior Director for Cybersecurity
Policy in the national Security Staff. During his two years at the white House, Mr. Painter was a senior member of the team that conducted the President’s
Cyberspace Policy Review and subsequently served as Acting Cybersecurity Coordinator. He coordinated the development of a forthcoming international strategy
for cyberspace and chaired high-level interagency groups devoted to international and other cyber issues.
LIEUTENANT GENERAL KURT HERRMANN
Lieutenant General Kurt Herrmann was born in wetzlar, Germany in 1950. He joined the German Air force (GAf) in 1969 and was commissioned at the Air force
Officer School at fürstenfeldbruck and neubiberg (bavaria) in March 1971. After pursuing an education in aeronautical and space engineering at the Air force
Technical Academy (later the federal Armed forces University, Munich), he studied computer science at the Technical University in Munich and received his
diploma in 1977.
In early assignments he served as Technical Officer, Aircraft electronics, for the f-104G “Starfighter” and as deputy squadron leader of the electronics and
weapons Unit of a fighter bomber wing. Later on, he became a Software engineering Officer for the TORnADO PA-200.
LIEUTENANT GENERAL RHETT HERNANDEZ
Lt. Gen. Rhett A. Hernandez was commissioned as a second lieutenant of Artillery from the United States Military Academy, west Point, new york on 2 June 1976.
His commands have ranged from the battery level with 2nd battalion, 33rd field Artillery and 1st battalion, 5th field Artillery to battalion level with 1st battalion, 14th
field Artillery, later re-designated 3rd battalion, 16th field Artillery to brigade level command as the Commander of Division Artillery, 4th Infantry Division (Mechanized),
fort Hood, Texas. He also served as the Assistant Division Commander (Support), 1st Armored Division, United States Army europe and Seventh Army, Germany and
OPeRATIOn IRAQI fReeDOM, and the Commanding General, United States Army Human Resources Command, Alexandria, virginia. His current assignment is as the
Commanding General, U.S. Army Cyber Command / Second Army at fort belvoir, virginia.
MAJOR GENERAL JONATHAN SHAW
Jonathan Shaw joined the Parachute Regiment in 1981. He was a platoon commander in 3 PARA through the falklands war. He has commanded at every level
upto 2*, including 2nd battalion The Parachute Regiment (1997-9), 12 (Mechanized) brigade, Multi-national brigade (Centre) in Kosovo, and most recently, Multi-
national Division (South east) in Iraq (2007), for which he was awarded the US Legion of Merit (Degree of Officer). He also holds the demanding position of Colonel
Commandant of the Parachute Regiment. His staff appointments have been mainly in the Ministry of Defence: beginning in the resources and programming area
(Army Plans), but latterly focusing on operations and policy (Commitments), including disaster relief, Military Assistance to Civil Authorities, northern Ireland and global
counter terrorism.
General Shaw was Chief of Staff, UK Land forces from September 2007 until March 2009. He then became Assistant Chief of Defence Staff (International Security
Policy) and was appointed to his current role as Assistant Chief of Defence Staff (Global Issues) in January 2011. His responsibilities include Chemical biological
Radiological & nuclear Policy, Arms Control and Counter Proliferation and Cyber.
REAR ADMIRAL ARNAUD COUSTILLIèRE
Rear Admiral Arnaud Coustillière was born in Toulon in 1960 and promoted rear admiral since the 1th of July, he is appointing as “Cyberdefence General Officer” for
french armed forces and fr MoD, a new appointment just created in the Directorate of Joint Operations, but he was responsible of this domain since february 2011.
He is an above warfare officer issued from the naval Academy (1981-83). between 1984 and 1999, he spent many times at sea and participated in many navy
operations mainly in Indian Ocean and Mediterranean areas. He was Commanding Officer of four ships, the last one was the DDG DUQUeSne (2004-2006).
MARK FIELD MP
Mark was elected as the MP for the Cities of London and westminster constituency in 2001, and was re-elected with an increased majority in 2005. In the 2010
General election he was returned to parliament once more having been re-elected in the revised constituency (bearing the same name) with a further increased
majority of 11,076. This result took Mark’s share of the vote locally to over 50% for the first time.
He takes a special interest in economic matters, foreign trade and international development, and is currently Chairman of the All-Party Parliamentary Groups on
business Services, venture Capital and Private equity and Azerbaijan. He is also vice Chairman of the All Party Parliamentary Groups on bangladesh and football.
In September 2010 Mark was appointed by the Prime Minister to the prestigious Intelligence and Security Committee, chaired by Sir Malcolm Rifkind. He is the
youngest MP ever to serve on the Committee which oversees and scrutinises the work of britain’s intelligence services.
T: +44 (0)20 7368 9737 F: +44 (0)207 368 9301 E: DEFENCE@IqPC.CO.UK WWW.CDANS.ORG
7. 07
CYBER DEFENCE & NETWORK SECURITY BUSINESS OPPORTUNITIES
HOW CAN YOU MEET YOUR MARKETING AND 7 REASONS WHY YOU SHOULD SPONSOR
BUSINESS DEvELOPMENT OBJECTIvES AT CYBER DEFENCE & NETWORK SECURITY
CYBER DEFENCE & NETWORK SECURITY?
NETWORKING 01 Generate new sales leads: Our event will bring together the global decision
makers, all of whom have strong business reasons for attending the event. by
exhibiting and presenting, you can impact on these buyers. by the very nature
ensure that you have the opportunity to engage with the key decision makers within
your industry. we can create a platform for you to effectively interact with your top of the high quality of delegate attendance, the contacts generated will lead to
customers and prospects in the environment of your choice. This can range from very high conversion rates.
formalised private meetings / workshops right through to less structured networking
events such as sponsored drinks receptions, coffee breaks or lunches. Ultimately 02 Launch new products or services: Use the event as a launch pad to
promote your latest products or system. with the most senior figures from the
industry in attendance, plus carefully selected media partners at the event,
whatever you decide is the right forum, we will support you in your quest to advance
relationships with the key people who can influence the future of your business. innovative new technology will always generate a buzz.
BRANDING
your company can be elevated to a position where they are seen as a market leader. In 03 Demonstrate thought leadership: Speaking on the program will allow you
to demonstrate your market knowledge and expertise to an audience of high
level decision makers.
a fiercely competitive market you need to ensure that your brand is differentiated from
the competition. failure to create a clear identity will see your organisation fade into
the background. we ensure that we do everything we can to effectively lift your brand 04 Enter new markets and emerging markets: Sponsorship is one of the
most effective ways to step into new markets. It is a great opportunity to
research and network whilst gaining exposure to a new qualified database
before, during and after the event. not only do we create a fully integrated marketing
campaign, which your company can be part of, but we also offer high impact premium
branding opportunities for example on bags, water bottles, pens lanyards etc. 05 Building customer loyalty: face-to-face contact at conferences, and
showing continued support of the market, helps develop client loyalty as well
as cementing your position as an industry player.
THOUGHT LEADERSHIP
If you think that you should be viewed as a true industry leader then your need to
demonstrate your market knowledge and expertise through a thought leadership 06 Positioning your company brand: being part of this highly influential
industry event will establish your company as a strong brand and highlights
opportunity, such as speaking or chairing. This is a highly unique opportunity for your your company’s abilities and strength.
company to educate the market, and as long as you are credible enough to fit into a
high level event programme, we can position your organisation alongside top customers
and prospects in our speaker faculty. As part of this speaker faculty your company will
07 Building relations with the media: we have researched the market in order
to find the most influential media partners. we understand that opportunities
for editorial coverage and developing better relations can be integral to your
be set apart from other industry attendees giving you the competitive edge required to companies’ success, so our media partnerships offer additional benefit above
make further strides in the market. and beyond the standard sponsorship package.
PACKAGE EXHIBITION ASSOCIATE PLENARY PLENARY DELEGATE PROFILE PREvIOUS CYBER EvENTS
Exhibition 3x2m ✔ ✔ ✔ ✔
Exhibition Passes ✔ (2) ✔(2) ✔(2) ✔(3)
y Europe 44%
(No entry to conference but does include lunch) y N America 30%
Conference Delegate Passes ✔(1) ✔(2) ✔(3)
y Middle East 11%
y South America 9%
Branding At Conference ✔ ✔ ✔ ✔ y Asia 9%
Pre Event Branding (Brochure) ✔ ✔ ✔ ✔ y Africa 3%
Customised Mailing ✔ ✔ ✔ ✔
Wish List ✔ ✔ ✔ ✔ “Excellent opportunity to verify that my ideas are still up to date
30-40 min Stream Speaking ✔ ✔ ✔ and at the right altitude”
30-40 min Plenary Speaking ✔ ✔
30-40 min Focus Day Speaking ✔ Colonel Gerald vernez, Swiss MoD
1 day Conference Chair ✔ (Cyber warfare 2011)
Drinks Reception
“Good mix of concepts, ideas and technical aspects”
✔
Site Visit POA
Workshop POA
Major Frank valenten Nielson, Defence Command Denmark
Dinner POA
(Cyber warfare 2011)
for more information on sponsoring or exhibiting at the Keep Connected!
Cyber Defence & Network Security Conference, contact Ola Jonsson,
Business Development Manager, Defence & Government, at +44 (0)201 368 9308 or
follow us on Twitter: become a member:
sponsor@iqpc.co.uk or www.twitter.com/defenceiq Defenceiq.com
Download the CDANS Sponsor Prospectus for
further package details at www.cdans.org become a member: Defenceiq.com
SPONSORS Codenomicon’s clients include national CeRT’s, protectors of CnI MEDIA PARTNERS
and Military. we empower our customer to protect their networks and
applications against costly incidents such as hacker attacks, service
interruptions, security exploits and loss of data. with our security and
robustness testing tools customers can proactively find and fix known and
previously unknown software defects, which could otherwise be exploited
with malicious intent. Our abuse management and situational awareness LOGICAL & PHYSICAL IT SECURITY
solutions, used operationally by CeRT’s and also in Cyber Attack exercises,
automate information processing, providing the relevant information to the
right people so that they can make fast and informed decisions.