SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
20       B
                                                                                                                        10 5 ook
                                     Presents                                                                             an Nth &
                                                                                                                            d S o pa
                                                                                                                               AV vem y b
                                                                                                                                 E U be y
                                                                                                                                    P r
                                                                                                                                     TO
                                                                                                                                        £3
                                                                                                                                          50




                                                                                 With key briefings from:
                                                                                    Air Cdre Graham Wright, Deputy Director, UK Office of
                                                                                    Cyber Security
                                                                                    Dr Paul Killworth, Head of Cyber Strategy, GCHQ
                                                                                    Col David Fahrenkrug, Director, CSAF Strategic Studies
                                                                                    Group, US Air Force
                                                                                    Col Robert A. Morris, Director, Air Component Element,
                                                                                    24th Air Force
                                                                                    LtCol Bryant Glando, Commander, 2nd IO Battalion,
                                                                                    US Army
www.cyberwarfare-event.com




                                                                                    LtCol Volker Wetzler, Head of Cyber Security, German
                                                                                    MoD
                              Venue: American Square Conference Center, London      Lt Col E.W.A Tapper, Commanding Officer, Canadian
                              Conference: 27th and 28th January 2011                Forces Network Operations Centre
                              Pre Conference Workshops: 26th January 2011           LtCol William Hagestad II, Force Movement Control
                                                                                    Officer, US Marine Corps
                              Cyber Warfare 2011 will                               Maj Sam Raeves, Information System Security Manager,
                              enable you to:                                        Belgian Armed Forces
                                                                                    Gregory Radabaugh, Technical Director, Cyber Analysis
                             v	Hear from the most senior military officer           Squadron, US Air Force
                               at the UK Office of Cyber Security and the           Ian J West, Director, NCIRC Technical Centre, NATO CIS
                               Head of Cyber Strategy at GCQH, allowing             Services Agency
                               you to get a full picture of how the UK is           Dick Crowell, Information Operations & Cyberspace
                                                                                    Operations, US Naval War College
                               developing its cyber capabilities
                                                                                    Thomas C. Wingfield, Professor of International Law,
                                                                                    Marshall Center
                             v	Gain a key insight into the development of
                                                                                    John Bumgarner, Chief Technologist, US Cyber
                               an ‘operational art’ for war in cyberspace;          Consequences Unit
                               command and control, battle management               Dr Dan Kuehl, Information Resources Management
                               and cyberspace denial and control                    College (IRMC), US National Defence University
                                                                                    Roy Lindelauf, Researcher, Netherlands Defence Academy
                             v	Learn how to engage in pro-active cyber              Dr. Steve Purser, Head of Technical and Competence
                               defence and find, fix and finish a cyber             Department, ENISA
                               threat that has entered your network                 Frank Coggrave, Vice President of EMEA, Guidance
                                                                                    Software
                                                                                    David Vincenzetti, Partner, Hacking Team, Italy


                             E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
             Sponsors
PRE CONFERENCE WORKSHOPS:
                         WEDNESDAY 26TH JANUARY
                        09:00 – 12:00                    WORKSHOP A: THE OPERATIONAL ART OF CYBER WAR
                             Led by: Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, U.S. Naval War College
                             Introduction:
                             This workshop will begin the exploration into operational warfare in cyberspace. It will present the framework of operational art, specifically operational factors and
                             functions as a tool for understanding cyber warfare. A series of questions will be posed for future operational commanders to help frame their thoughts on cyber-
                             space and cyber warfare.
                             Participants will evaluate:
                             vv The definitions of the information environment, cyberspace, and cyberspace operations
                             vv The definition of cyber warfare
                             vv The intertwining of cyberspace and human activity
                             vv The applicability of operational warfare at sea as a metaphor for operational warfare in cyberspace
                             vv How commanders need to balance operational factors and functions to fight and win a cyber war
                             vv The concepts of sea control (the stronger side) and sea denial (the weaker side) and how they apply to cyberspace control and cyberspace denial
                             vv The concepts of freedom of action in the maritime domain versus freedom of action in cyberspace



                         14:00 – 17:00                   WORKSHOP B::CYBER INSURGENCIES:AN ESCALATING
                                                                     PROBLEM
                             Led by: John Bumgarner, Chief Technologist, US Cyber Consequences Unit
                             Introduction:
                             The workshop will explore the security threat posed to sovereign nations and other entities from cyber insurgencies. The ubiquitous nature of cyberspace provides
                                                                                                                                                                                               an
                             international conduit for non-state actors to engage in acts of civil disobedience, acts of espionage or acts of warfare.
                             An effective cyber insurgency campaign can destabilise a government or spark a kinetic conflict. The globalization of cyber
                             insurgencies creates unique challenges in countering this escalating problem in the 21st Century.
                             Participants will:
                             vv Review the lexicon of cyber insurgencies
                             vv Explore the history of insurgencies in cyberspace
                             vv Investigate the role of cyber insurgencies in regional conflicts
www.cyberwarfare-event.com




                             vv Evaluate the art of digital diplomacy
                             vv Examine cyber counter-insurgency



                             SPONSORSHIP OPPORTUNITIES Three easy ways to get involved
                             1) Thought Leadership: With an expected audience of senior military customers and decision-makers from across the globe, Defence IQ events enable you to build your reputation
                             as a market-leader and to position yourself as an innovative thought-leader in your chosen domain through speaking sessions and subject-specific conference streams, workshops and
                             focus days
                             2) Branding: We bring together buyers and suppliers in a tailored location with unbeatable facilities for onsite branding and exposure. Furthermore, our dedicated marketing team
                             can help you achieve your promotional aims in the months leading up to the conference with dedicated mailings to cover 50,000 contacts, through brochure drops, extensive email
                             campaigns and tailored web coverage
                             3) Featured Networking Events: Focused and high level, our events will provide you with the perfect environment to initiate new business relationships and achieve the face-to-face
                             contact that overcrowded trade shows cannot deliver. Sponsorship opportunities range from exhibition stands to sponsored lunches, cocktail receptions, gala dinners and a host of
                             informal social networking events. For further details, or to discuss which option is best for your organisation, please call Ola Jonsson or Ross Clayton on +44 (0) 207
                             368 9300 or Email: enquire@defenceiq.com



                             SPONSORS
                                                          Guidance Software is                                                  HACKING TEAM is a                                           Based in Atlanta, GA,
                                                          recognized worldwide as                                               company totally focused                                     Endgame Systems is a
                                                          the industry leader in digital    on IT OFFENSIVE SECURITY intelligence solutions for LEAs                                        privately held U.S. company
                                                          investigative solutions. Its      and Security Agencies. Remote Control System V6 (RCS)                                           providing applied security
                             EnCase® platform provides the foundation for government,       is a premier, integrated, multi-OS platform for remotely         research and development, and Cyber ISR technology.
                             corporate and law enforcement organizations to conduct         attacking, infecting and controlling target computers and        Comprised of highly skilled information security
                             thorough, network-enabled, and court-validated computer        mobile phones. RCS FULLY SUPPORTS XP Vista, 7, MacOS,
                                                                                                                                         ,                   professionals, Endgame Systems is exclusively aligned to
                             investigations of any kind, such as responding to eDiscovery   iPhone, Symbian and BlackBerry. It is INVISIBLE to most          support the mission and unique challenges of our clients.
                             requests, conducting internal investigations, responding       protection systems available in the market (e.g., systems        Formed by industry veterans previously employed by Internet
                             to regulatory inquiries or performing data and compliance      listed in the GARTNER’s Magic Quadrant For Endpoint              Security Systems, Inc. (ISS), a market leading network
                             auditing - all while maintaining the integrity of the data.    Protection Platforms) It is RESISTANT to system restoration      vulnerability assessment, network intrusion prevention (IPS),
                             There are more than 30,000 licensed users of the EnCase        technologies (e.g., DeepFreeze) It is a PROVEN technology:       and network security intelligence vendor, Endgame Systems’
                             technology worldwide, the EnCase® Enterprise platform is       it is being used by Agencies worldwide since 2003.Target         founders and employees have extensive background in
                             used by over half of the Fortune 100, and thousands attend     monitoring includes Skype, chat, mail, web, removable            network and computer vulnerability research, design
                             Guidance Software’s renowned training programs annually.       media, encrypted communications, PGP GSM-cell GEO-
                                                                                                                                      ,                      and implementation of defensive computer and network
                             For more information about Guidance Software, visit www.       tracking, GPS GEO-tracking, voice calls, etc. Target infection   protection technologies.
                             guidancesoftware.com.                                          can be performed by means of local access techniques
                                                                                            and remote attack techniques (zero day exploit portal and
                                                                                            transparent injection proxy).
                                                                                            For more information info@hackingteam.it



                             E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
MAIN CONFERENCE DAY 1:
                             THURSDAY 27TH JANUARY
                             08.30 Registration and Coffee                                                      13:00 Networking Lunch
                             09.00 Chairman’s Welcome and Opening Speech                                        14:00 CONDUCTING COUNTER CYBER ACTIONS
                                   Dr Dan Kuehl, Information Resources Management                                     WITHIN US ARMY CYBERSPACE
                                   College (IRMC), US National Defense University                               	     v Computer Defense Assistance Program (CDAP)

                             09:10 UK KEYNOTE: THE UK OFFICE OF CYBER                                                   (foundation of our training to develop a skilled cyber
                                   SECURITY – ENSURING A COHERENT                                                       defender and the authority to operate)
                                   RESPONSE TO CYBER SECURITY                                                   	     v Active engagement to find, fix and finish a cyber

                             	     v The Office of Cyber Security (OCS) as pulling
                                                                                                                        threat that has entered US Army cyberspace
                                     together all the key actors involved in defending the                      	     v The operational scenario

                                     UK against a cyber attack                                                        LtCol Bryant Glando, Commander, 2nd IO Battalion,
                             	     v The outcome of the Strategic Defence Review and
                                                                                                                      US Army
                                     what this means for the OCS
                                                                                                                14:40 THE DATA ENCRYPTION PROBLEM
                                   Air Cdre Graham Wright, Deputy Director,
                                                                                                                	     v Encryption: A nightmare for LEAs and security
                                   UK Office of Cyber Security
                                                                                                                        agencies
                             09:50 CYBER WARFARE – A GCHQ PERSPECTIVE                                           	     v How to deal with encrypted communications over
                             	     v The four principles of cyber power                                                 the Internet (e.g., Skype, PGP secure web mail)
                                                                                                                                                      ,
                             	     v Importance of thinking cyber security, vice defence                        	     v A stealth offensive IT technology for remotely
                             	     v An integrated approach to operational cyber thinking                               attacking, controlling and monitoring PCs and
                             	     v Importance of industry partnerships                                                smartphones
                                   Dr Paul Killworth, Head of Cyber Strategy, GCHQ                                    David Vincenzetti, Partner, Hacking Team, Italy
                             10:30 CANADIAN FORCES’ CYBER DEFENCE                                               15:20 Networking Coffee Break
                                   OPERATIONS
www.cyberwarfare-event.com




                             	     v The mission and partners                                                   15:50 THE DEVELOPMENT OF THE BELGIAN CYBER
                             	     v The cyber threat                                                                 CAPABILITY
                             	     v Cyber defence operations within the Canadian                               	     v The creation and execution of the Belgian cyber
                                     Forces                                                                             capability development roadmap
                                   Lt Col E.W.A Tapper, Commanding Officer,                                     	     v The need for integration and cooperation with
                                   Canadian Forces Network Operations Centre                                            partners
                                                                                                                	     v The legal issues and considerations (national/
                             11:10 Networking Coffee Break                                                              international, law of armed conflict, rules of
                             11:40 ARE YOU KEEPING PACE WITH BOTH EVOLVING                                              engagement)
                                   AND COVERT SECURITY THREATS?                                                       Maj Sam Raeves, Information System Security
                             	     v How effective is your current security solution?                                 Manager, Belgian Armed Forces
                             	     v Complement and augment your existing security
                                     infrastructure                                                             16:30 CYBER WAR: A NETWORK DESIGN AND
                             	     v Respond quickly to discover and remediate threats                                ANALYSIS PERSPECTIVE
                                     that have evaded layered security systems and are                          	     v Design principles of covert networks and how they
                                     posing a risk to sensitive data                                                    can aid defence against a cyber attack
                                   Frank Coggrave, Vice President of EMEA,                                      	     v Network analysis and how it can identify potential
                                   Guidance Software                                                                    intruders
                                                                                                                	     v Resilience studies as helping to identify weak points
                             12:20 CYBER DEFENCE IN THE GERMAN ARMED                                                    in critical infrastructure
                                   FORCES                                                                             Roy Lindelauf, Researcher, Netherlands Defence
                             	     v National cyber defence responsibilities                                          Academy
                             	     v Organisation and structure of military cyber security
                             	     v Multinational co-operation in the cyber realm                              17:10 Chairman’s Close
                             	     v Cyber defence exercises
                                   LtCol Volker Wetzler, Head of Cyber Security,
                                   German MoD

                                 ABOUT DEFENCE IQ
                                 Defence IQ is host to a series of global events and runs an online community of military and private sector professionals. We provide the platform which
                                 leading defence experts share their experience, knowledge and strategic thoughts. We are dedicated to providing military personnel and the private sector
                                 with strategic defence resources covering current defence issues. Join the community: http://www.defenceiq.com/join.cfm


                             E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
MAIN CONFERENCE DAY 2:
                             FRIDAY 28TH JANUARY
                             08.30 Registration and Coffee                                   13:00 Lunch and Networking
                             09.00 Chairman’s Welcome                                        14:00 CYBER SECURITY OPERATIONS –
                                   Dr Dan Kuehl, Information Resources Management                  COLLABORATION WITH THE COALITION
                                   College (IRMC), US National Defense University            	     v The cyber coalition environment
                                                                                             	     v Identification of challenges
                             09:10 OPERATIONAL TARGETING - RELEVANCE FOR CYBER               	     v Discussion of potential solutions
                                   OPERATIONS IN THE MULTI-DOMAIN BATTLEFIELD                      Ian J West, Director, NCIRC Technical Centre,
                             	     v What are Militarily Relevant Cyber Targets?
                                                                                                   NATO CIS Services Agency
                             	     v How do they contribute to the Combined Force
                                     Commander’s operations?                                 14:40 THE TALLINN MANUAL: CODIFYING THE LAW
                             	     v When will Cyber Weapons be operationally relevant?            OF WAR FOR CYBERSPACE
                                   Col Robert A. Morris, Director, Air Component             	     v Operational challenge: How do we apply kinetic law
                                   Element, 24th Air Force                                           to cyber operations?
                                                                                             	     v Experts and approach: Who decides? How are
                             09:50 CYBER WARFARE: OPERATING IN AN OPPOSED                            rules determined? How are they presented?
                                   NETWORK ENVIRONMENT                                       	     v Principled analysis: What is a use of force? What is
                             	     v The future warfare environment as characterized by
                                                                                                     an armed attack? What are the requirements for
                                     degraded networks and sophisticated electronic combat           discriminating targets, minimising collateral
                             	     v The need to develop the concepts and capabilities
                                                                                                     damage, and avoiding perfidy?
                                     to operate in opposed network environments                    Thomas C. Wingfield, Professor of International Law,
                             	     v Establishing a balance between passive and active
                                                                                                   Marshall Center
                                     warfare in the electromagnetic spectrum
                             	     v Applying concepts of manoeuvre warfare to               14:20 Coffee and Networking Break
                                     cyberspace and pursuing realistic training in a
                                     highly contested environment                            15:50 THE CHINESE MILITARY INDUSTRIAL CYBER
                                   Col David Fahrenkrug, Director, CSAF Strategic                  COMPLEX USE OF THE BIG 5 CHARACTURE SET
www.cyberwarfare-event.com




                                                                                             	     v The Government Chinese Character Set or GCCS in
                                   Studies Group, US Air Force
                                                                                                     support of the eight pillars of cyber warfare
                             10:30 THE EVOLVING THREAT IN CYBERSPACE                         	     v HTML 5 code using the Big 5 Character set to create
                             	     v The current operational environment                             virtual deception operations
                             	     v The evolving threat: How the adversary takes            	     v How the Character set can be used for gathering
                                     advantage of the operational environment                        intelligence, initiating DDOS attacks and infiltrating
                             	     v The resulting consequences: How the threat will                 both civilian corporate and government networks
                                     influence your behaviour and decision making                  LtCol William Hagestad II, Force Movement
                                     process in cyber combat                                       Control Officer, US Marine Corps
                                   Gregory Radabaugh, Technical Director, Cyber
                                   Analysis Squadron, US Air Force                           16:30 COOPERATION IN SECURING CRITICAL
                                                                                                   NATIONAL INFRASTRUCTURE
                             11:00 Coffee and Networking Break                               	     v Introduction to ENISA and what we do
                                                                                             	     v ENISA’s role in facilitating dialogue: Bridging
                             11:40 COMPUTERS AS WEAPONS OF WAR
                                                                                                     public and private sectors
                             	     v Explore the history of cyber-weaponry development
                                                                                             	     v The Critical Information Infrastructure Protection
                             	     v Define the types of cyber-weaponry
                                                                                                     (CIIP) action plan
                             	     v Review the use of cyber-weaponry in past conflicts
                                                                                             	     v Pan European exersises for resilience: Objectives
                             	     v Outline the use of cyber-weaponry in future conflicts
                                                                                                     and current status
                             	     v Investigate the strategies to counter cyber-weaponry
                                                                                             	     v Engaging with ENISA: Opportunities and benefits
                                   John Bumgarner, Chief Technology Officer,
                                                                                             	     v The way forward
                                   US Cyber Consequences Unit
                                                                                                   Dr. Steve Purser, Head of Technical and
                             12:20 CYBER WAR: AN INTERNATIONAL THREAT                              Competence Department, ENISA
                                   NEEDING INTERNATIONAL SOLUTIONS
                             	     v Which nations have the potential to wage cyber war?
                                                                                             17:00 Closing Remarks and End of Conference
                             	     v NATO and its role in cyber warfare
                             	     v The role of the private sector
                             	     v Cyber war - an opportunity or a vulnerability?
                                   Dr Dan Kuehl, Information Resources Management
                                   College (IRMC), US National Defense University

                             E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
WHO WILL YOU MEET?
                             As the leading Cyber Warfare event in Europe, Cyber Warfare 2011 will give you the chance
                             to meet with key military and industry professionals who are driving the development of
                             cyber defence, exploit and attack capabilities
                               Visitor profile for 2010                                                               Attending countries
                                Military/Governments                      Agency                                             Austria                   1
                                BMLVS                                     UK MoD                                             Belguim                   2
                                Bundeswehr                                US Army                                            Denmark                   9
                                                                          US European Command                                France                    3
                                Cyber Analysis Squadron
                                                                                                                             Germany                   5
                                Danish Defence Intelligence               US Navy                                            Greece                    1
                                Service                                   USAF                                               Italy                     2
                                Defence Command Denmark                                                                      Luxembourg                1
                                                                          Industry                                           Malaysia                  1
                                DOD Rapid Fielding Directorate
                                                                                                                             Norway                    3
                                DSTL                                      Elettronica                                        Spain                     1
                                European Commission                       Northrop Grumman Mission                           Sweeden                   6
                                European Union Military Staff             Systems Europe Ltd.                                Switzerland               1
                                FRA                                       EADS DS UK                                         The Netherlands           3
                                                                                                                             UAE                      10
                                German Armed Forces                       Ultra Electronics                                  UK                       21
                                Hellenic National Defence General         Raytheon                                           USA                      21
                                Staff                                     Prevx Limited
                                Italian Air Force Operational             Qosmos
                                Command
                                Jordan Armed Forces
                                                                          Selex Communications Ltd.
                                                                          BAE Systems
                                                                                                                       Download Centre
                                Maryland Air National Guard               Boeing                                       For Free resources on cyber warfare, including podcasts, videos and
                                Ministry of Defence Denmark               Aeris Capital AG                             whitepapers, please visit the website www.cyberwarfare-event.com
                                MSB - Swedish Civil                       EADS Germany
                                Contingencies Agency                      Elbit Systems Land and C4I –                 Our resources include exclusive interviews with key cyber warfare
                                National Air & Space Intelligence         Tadiran                                      professionals including:
                                Center, USAF                              Global Communications and
                                National Defense University               Software Systems                             Admiral the Lord West (former Parliamentary Under-Secretary of State for
                                National Security Agency                  ITM Instalaciones Técnicas
                                                                                                                       Security and Counter-terrorism under Gordon Brown)
                                Netherlands MoD                           Mantenimiento
                                Norwegian Defence Force                   Symantec                                     John Bumgarner, Chief Technology Officer of the U.S. Cyber
www.cyberwarfare-event.com




                                Swedish Armed Forces                      Nexor Ltd.
                                                                                                                       Consequences Unit
                                Swedish Civil Contingencies
                                                                                                                       Professor Peter Sommer, London School of Economics and Political
                                                                                                                       Science

                               MEDIA PARTNERS                                                                          Nigel Inkster, International Institute for Strategic Studies

                                                                      Defense Update online     well as useful facts about developments in the UK Defence          •	Event	presentation,	(Conferences-Seminars-Exhibitions)
                                                                      bi-monthly defense        Industry Contact us: defenceenquiries@armedforces.co.uk            •	Defence	news	(RSS	system)
                                                                      magazine highlights       Tel: 01743 241962 website: www.armedforces.co.uk                   •	Press	articles	and		Press	Releases
                                                                      defense programs                                                                             •	Cooperates	with	Embassies	,	Def.	Associations	&	Think		
                               worldwide including land, air, naval, C4ISR, intelligence, and                                        ContingencyToday.                Thanks
                               net-centric warfare, infantry warfare, homeland defense etc.                                          com and CT Review             •	Performs	Marketing	Research	/	Optimization	to	Def.			
                               The coverage is frequently updated to follow the development                                          magazine (print)                 Companies
                               of key defense programs. Major global defense exhibitions                                             dedicated to the              •	Focuses	also	on	Consulting	Services
                               are covered. Defense Update is available free at our web site.   challenges and opportunities of Critical National Infrastructure   In the context of the above, and beyond our continuous Site
                               Website: www.defense-update.com                                  protection. Its readership includes policy-makers, decision-       information with the latest defence news from this area, we
                                                                                                influencers and middle management implementers engaged             provide information notes to Key Officers serving the MoD,
                                                           ASDNews.com –                        in emergency planning, disaster recovery and infrastructure        and we are running independent researches on matters
                                                           “Be the first to know”               protection including electronic attack and the sophisticated       dealing with questions that we receive from Armament
                                                           ASDNews brings the latest            misuse of computer systems; physical attacks by terrorist          Departments.
                                                           aerospace, defence and security      organisations and other criminals; the effects of climate          Take the time to visit our site at www.defence-guide.com and
                               news from government, industry and major news agencies           change; and other natural disasters, including pandemics,          in case you find it of your interest, contact us to:
                               around the world. Our service has over 60,000 active             fire and flood.                                                    info@defence-guide.com
                               subscribers and 2 million article readers per year.                                                                                 Website: www.defence-guide.com
                               ASDNews content is categorised in over 25 main news              To sign-up for Complimentary Newsletter and CT Review
                               groups for example: “Training & Simulation News”, or             in the post (UK only) www.contingencytoday.com/                                          Tactical Data Links news will present
                               “Unmanned Systems News” making recent and related                subscribe-free (Outside UK) – email us: freemagazine@                                    and describe the current Tactical Data
                               articles easy to find.                                           contingencytoday.com to receive Complimentary Newsletter                                 Links and the major command, control,
                               Subscribe to our free daily newsletter or weekly group           and first two issues of CT Review.                                                       communications, computers, and
                               newsletters on www.asdnews.com/subscription                                                                                                               intelligence (C4I) systems employed
                                                                                                                                www.Defence-Guide.                                       by the major European nations and the
                                                                The DEFENCE                                                     com is an International                                  major NATO nations, and will present
                                                                SUPPLIERS DIRECTORY                                             Military Site, and has as          the international NEWS and international EVENTS of the
                                                                is an authoritative online                                      primary scope to establish         Tactical Data Links community! It will also allow all Tactical
                               information resource for all defence purchasers. This            an electronic magazine dealing, with international news on         Data Links experts to exchange information on a specialized
                               comprehensive listing of Defence Suppliers has enabled           defence manufactures and technology. More specific, this           TDL area, exclusively reserved for TDL NEWS members.
                               thousands of purchasing professionals to find exactly what       International Military Guide – unique for the three Branches       www.tdl-news.com is the first Tactical Data Links international
                               they are looking for - in seconds. THE DEFENCE SUPPLIERS         of the MoD and Law enforcement , includes among others             news website
                               DIRECTORY provides a total overview of all the UK’s Armed        the following:
                               Forces - with a wealth of valuable information about the         •	Companies		profiles/products/projects,
                               organisation and structure of the UK’s Defence Services, as      •	Military	magazines




                             E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
CYBER WAREFARE 2O11                                                                                                                                          5 WAYS TO REGISTER
                        Venue: American Square Conference Center, London
                        Conference: 27th and 28th January 2011                                                                                                                                       Tel:                  0800 652 2363 or
                        Pre Conference Workshops: 26th January 2011                                                                                                                                                        +44 (0)20 7368 9300
                        To speed registration, please provide the priority code located on the mailing label or in the box below.
                        My registration code is                 PDFW                                                                                                                                 Fax:                  +44 (0)20 7368 9301
                        Please contact our database manager on +44(0) 207 368 9300 or at database@iqpc.co.uk quoting the registration
                        code above to inform us of any changes or to remove your details.                                                                                                            Post:                 your booking form to
                                        General/Flag officer 1* and above may attend the conference free of charge Please contact
                                                                                                                                                                                                                           IQPC Ltd. 2nd Floor,
                             enquire@defenceiq.com for further details. This offer cannot be combined with any other offer and is non-transferable.                                                                        129 Wilton Road,
                                                                                      STANDARD INDUSTRY RATES                                                                                                              London, SW1V 1JZ
                                                                   Book and Pay by 5th             Book and Pay by 3rd             Book and Pay by 14th            Standard Price
                                                                    November 2010*                  December 2010*                    January 2011*                                                  Online: www.cyberwarfare-event.com
                             2-Day Conference                          Save £350                       Save £300                        Save £200
                             + 2 Workshops                            £2,247 +VAT                     £2,297 +VAT                      £2,397 +VAT                  £2,597 +VAT
                                                                                                                                                                                                     Email: enquire@defenceiq.com
                             2-Day Conference                            Save £300                       Save £250                       Save £150
                             + 1 Workshop***                            £1,798 +VAT                     £1,848 +VAT                     £1,948 +VAT                 £2,098 +VAT

                             2-Day Conference
                                                                         Save £250                       Save £200                       Save £100                                   Team Discounts*
                                                                        £1,349 +VAT                     £1,399 +VAT                     £1,499 +VAT                 £1,599 +VAT
                                                                                                                                                                                    IQPC recognises the value of learning in teams. Groups of 3 or more
                             Workshop***                                                                                                                                            booking at the same time from the same company receive a 10%
                                                                                                                                                                     £499 +VAT
                                                                                                                                                                                    discount. 5 or more receive a 15% discount. 7 receive a 20% discount.
                                                                     DISCOUNTED PUBLIC SECTOR GOVERNMENT RATES **
                                                                                                                                                                                    Only one discount available per person.
                                                                   Book and Pay by 5th             Book and Pay by 3rd             Book and Pay by 14th            Standard Price
                                                                    November 2010*                  December 2010*                    January 2011*                                  Venue & Accommodation
                             2-Day Conference                          Save £350                       Save £300                        Save £200
                                                                      £1,047 +VAT                     £1,097 +VAT                      £1,197 +VAT                  £1,397 +VAT     Venue:
                             + 2 Workshops
                                                                                                                                                                                    America Square Conference Centre
                             2-Day Conference                            Save £300                       Save £250                        Save £150                                 One America Square, 17 Crosswall, London EC3N 2LB
                             + 1 Workshop***                             £748 +VAT                       £798 +VAT                        £898 +VAT                 £1,048 +VAT
                                                                                                                                                                                    Accommodation:
                                                                         Save £250                       Save £200                        Save £100
                             2-Day Conference                            £449 +VAT                       £499 +VAT                        £599 +VAT                  £699 +VAT      Overnight accommodation is not included in the registration fee, for nearby
                                                                                                                                                                                    accommodation options and best possible rates and special offers please
                             Workshop***                                                                                                                             £349 +VAT      visit http://www.HotelMap.com/M6Z4E. This map displays live availability
                                                                                                                                                                                    and allows you to book directly with each hotel. Alternatively, if you would
                            *Must register and pay by the early RSVP discount expiry date with your RSVP CODE 12956.005 <Merge Code>                                                like to book your accommodation by phone, you can call Daniel Spinner
                            Early RSVP discounts are not valid in conjunction with any other offer.                                                                                 on +44 20 7292 2335 quoting Special Reference Code M6Z4E.
                            ** Military rates apply to serving military officer and government personnel only. Academic rates apply to university accredited personnel only.
                            MoD sponsored institutions are subject to military rates.
                            *** Please select your choice of workshop A 6		B 6
                            All above prices are subject to 17.5% VAT. VAT No GB 799 2259 67
                                                                                                                                                                                     Free Online Resources
                             Delegate Details                                                                                                                                       To claim a variety of articles, podcasts and other free resources
                            Please photocopy for each additional delegate                                                                                                           please visit www.cyberwarfare-event.com
                            6	Mr 6	Mrs 6	Miss 6	Ms 6	Dr 6	Other

                            First Name                                               Family Name
                                                                                                                                                                                     Digital Conference On CD-ROM
                            Rank                                                     Job Title                                                                                      A digital version of the conference proceedings, including all
                            Tel No.                                                                                                                                                 presentations, is available to buy.
                            Email                                                                                                                                                   6 I cannot attend the event, please send me the CD Rom priced at
                                                                                                                                                                                         £599 plus VAT
                            6 Yes I would like to receive information about products and services via email
                                                                                                                                                                                    Recent digital conferences available - £599 plus VAT each
                            Organisation
                                                                                                                                                                                    6 Cyber Security 2010
                            Nature of business                                                                                                                                      6 Network Centric Warfare 2010
                            Address                                                                                                                                                 6 Please send me conference materials indicated above.
                            Postcode Country                                                                                                                                        6 I have filled out credit card details below
                            Telephone                                                               Fax                                                                             For further information
                            Approving Manager                                                                                                                                       Please call: 0207 368 9300 or email: knowledgebank@iqpc.co.uk.
                            Name of person completing form if different from delegate:                                                                                              To search IQPC’s archived conference documentation
                                                                                                                                                                                    visit: www.iqpcknowledgebank.com
                            Signature
                            I agree to IQPC’s cancellation, substitution and payment terms                                                                                           Terms and Conditions
                            Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify)                                                                         Please read the information listed below as each booking is subject to IQPC Ltd standard terms and conditions.

                            Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6                                                                           Payment Terms: Upon completion and return of the registration form full payment is required no later than 5
                                                                                                                                                                                    business days from the date of invoice. Payment of invoices by means other than by credit card, or purchase order
                            Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking.                                 (UK Plc and UK government bodies only) will be subject to a £49 (plus VAT) per delegate processing fee. Payment
                                                                                                                                                                                    must be received prior to the conference date. We reserve the right to refuse admission to the conference if payment
                             Payment Method                                                                                                                                         has not been received.
                                                                                                                                                                                    IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates at any time by
                            Total price for your Organisation: (Add total of all individuals attending):                                                                            providing reasonable advance notice to IQPC.
                                                                                                                                                                                    For any cancellations received in writing not less than eight (8) days prior to the conference, you will receive a 90%
                            Card Number: VISA 6 M/C 6 AMEX 6                                                                                                                        credit to be used at another IQPC conference which must occur within one year from the date of issuance of such
                                                                                                                                                                                    credit. An administration fee of 10% of the contract fee will be retained by IQPC for all permitted cancellations. No
                            6666666666666666                                                                                                                                        credit will be issued for any cancellations occurring within seven (7) days (inclusive) of the conference.
                                                                                                                                                                                    In the event that IQPC cancels an event for any reason, you will receive a credit for 100% of the contract fee paid.
                            Exp. Date: 6 6 6 6 Sec: 6 6 6 6                                                                                                                         You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year
Conference code 12956.005




                                                                                                                                                                                    from the date of cancellation.
                                                                                                                                                                                    In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling to attend in on the
                            Name On Card:                                                                        Signature:                                                         rescheduled date, you will receive a credit for 100% of the contract fee paid. You may use this credit for another
                                                                                                                                                                                    IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of postponement.
                                                                                                                                                                                    Except as specified above, no credits will be issued for cancellations. There are no refunds given under any
                            Billing Address (if different from below):                                                                                                              circumstances.
                                                                                                                                                                                    IQPC is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/postponement
                                                                                                                                                                                    of an event. IQPC shall assume no liability whatsoever in the event this conference is cancelled, rescheduled or
                            City/County/Postcode                                                Cheque enclosed for: £                             (Made payable to IQPC Ltd.)      postponed due to a fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance
                                                                                                                                                                                    of this conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event shall include,
                                                                                                                                                                                    but not be limited to: war, fire, labour strike, extreme weather or other emergency.
                            (Please quote 12956.005 with remittance advice)                                                                                                         Please note that while speakers and topics were confirmed at the time of publishing, circumstances beyond the
                                                                                                                                                                                    control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics.
                            IQPC Bank details: HSBC Bank Plc, 67 George Street, Richmond, Surrey TW9 1HG, United Kingdom                                                            As such, IQPC reserves the right to alter or modify the advertised speakers and/or topics if necessary without any
                            Sort Code: 40 38 18, Account No: 51304143, IBAN Code: GB59 MIDL 4038 1851 3041 43                                                                       liability to you whatsoever. Any substitutions or alterations will be updated on our web page as soon as possible.

                            Swift Code: MIDLGB2112V Account name: International Quality & Productivity Centre Ltd.                                                                  Discounts: All ‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order to
                                                                                                                                                                                    receive any discount. Any discounts offered whether by IQPC (including team discounts) must also require payment
                                                                                                                                                                                    at the time of registration. All discount offers cannot be combined with any other offer
                             PAYMENT MUST BE RECEIVED PRIOR TO THE CONFERENCE                                                                                                       6 Please do not pass my information to any third party

Contenu connexe

Similaire à Cyber Warefare Pdfw 2nd Nov Update

Cyber Defence & Network Security
Cyber Defence & Network SecurityCyber Defence & Network Security
Cyber Defence & Network Security
cjeffray
 
Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012
Sharmin Ahammad
 
Cyber Warfare India Programme Agenda
Cyber Warfare India Programme AgendaCyber Warfare India Programme Agenda
Cyber Warfare India Programme Agenda
JohannaMikkela
 

Similaire à Cyber Warefare Pdfw 2nd Nov Update (6)

Cyber Defence & Network Security
Cyber Defence & Network SecurityCyber Defence & Network Security
Cyber Defence & Network Security
 
Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012
 
SMi's Inaugural Digital Cockpit Conference
SMi's Inaugural Digital Cockpit ConferenceSMi's Inaugural Digital Cockpit Conference
SMi's Inaugural Digital Cockpit Conference
 
Airborne ISR & C2 Battle Management USA 2014
Airborne ISR & C2 Battle Management USA 2014Airborne ISR & C2 Battle Management USA 2014
Airborne ISR & C2 Battle Management USA 2014
 
SMi's 13th annual Military Airlift conference
SMi's 13th annual Military Airlift conference SMi's 13th annual Military Airlift conference
SMi's 13th annual Military Airlift conference
 
Cyber Warfare India Programme Agenda
Cyber Warfare India Programme AgendaCyber Warfare India Programme Agenda
Cyber Warfare India Programme Agenda
 

Plus de dirrtybass

Plus de dirrtybass (6)

Cbrn2011pdfw
Cbrn2011pdfwCbrn2011pdfw
Cbrn2011pdfw
 
Alijfs 2011 Bro A5 Pdfw
Alijfs 2011 Bro A5 PdfwAlijfs 2011 Bro A5 Pdfw
Alijfs 2011 Bro A5 Pdfw
 
Battlefield Healthcare A4 7pp Pdfw
Battlefield Healthcare A4 7pp PdfwBattlefield Healthcare A4 7pp Pdfw
Battlefield Healthcare A4 7pp Pdfw
 
Spw 2011 Bro Pdfw
Spw 2011 Bro PdfwSpw 2011 Bro Pdfw
Spw 2011 Bro Pdfw
 
Cyber Security 2011 Pdfw
Cyber Security 2011 PdfwCyber Security 2011 Pdfw
Cyber Security 2011 Pdfw
 
Computers As Weapons Of War
Computers As Weapons Of WarComputers As Weapons Of War
Computers As Weapons Of War
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Cyber Warefare Pdfw 2nd Nov Update

  • 1. 20 B 10 5 ook Presents an Nth & d S o pa AV vem y b E U be y P r TO £3 50 With key briefings from: Air Cdre Graham Wright, Deputy Director, UK Office of Cyber Security Dr Paul Killworth, Head of Cyber Strategy, GCHQ Col David Fahrenkrug, Director, CSAF Strategic Studies Group, US Air Force Col Robert A. Morris, Director, Air Component Element, 24th Air Force LtCol Bryant Glando, Commander, 2nd IO Battalion, US Army www.cyberwarfare-event.com LtCol Volker Wetzler, Head of Cyber Security, German MoD Venue: American Square Conference Center, London Lt Col E.W.A Tapper, Commanding Officer, Canadian Conference: 27th and 28th January 2011 Forces Network Operations Centre Pre Conference Workshops: 26th January 2011 LtCol William Hagestad II, Force Movement Control Officer, US Marine Corps Cyber Warfare 2011 will Maj Sam Raeves, Information System Security Manager, enable you to: Belgian Armed Forces Gregory Radabaugh, Technical Director, Cyber Analysis v Hear from the most senior military officer Squadron, US Air Force at the UK Office of Cyber Security and the Ian J West, Director, NCIRC Technical Centre, NATO CIS Head of Cyber Strategy at GCQH, allowing Services Agency you to get a full picture of how the UK is Dick Crowell, Information Operations & Cyberspace Operations, US Naval War College developing its cyber capabilities Thomas C. Wingfield, Professor of International Law, Marshall Center v Gain a key insight into the development of John Bumgarner, Chief Technologist, US Cyber an ‘operational art’ for war in cyberspace; Consequences Unit command and control, battle management Dr Dan Kuehl, Information Resources Management and cyberspace denial and control College (IRMC), US National Defence University Roy Lindelauf, Researcher, Netherlands Defence Academy v Learn how to engage in pro-active cyber Dr. Steve Purser, Head of Technical and Competence defence and find, fix and finish a cyber Department, ENISA threat that has entered your network Frank Coggrave, Vice President of EMEA, Guidance Software David Vincenzetti, Partner, Hacking Team, Italy E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301 Sponsors
  • 2. PRE CONFERENCE WORKSHOPS: WEDNESDAY 26TH JANUARY 09:00 – 12:00 WORKSHOP A: THE OPERATIONAL ART OF CYBER WAR Led by: Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, U.S. Naval War College Introduction: This workshop will begin the exploration into operational warfare in cyberspace. It will present the framework of operational art, specifically operational factors and functions as a tool for understanding cyber warfare. A series of questions will be posed for future operational commanders to help frame their thoughts on cyber- space and cyber warfare. Participants will evaluate: vv The definitions of the information environment, cyberspace, and cyberspace operations vv The definition of cyber warfare vv The intertwining of cyberspace and human activity vv The applicability of operational warfare at sea as a metaphor for operational warfare in cyberspace vv How commanders need to balance operational factors and functions to fight and win a cyber war vv The concepts of sea control (the stronger side) and sea denial (the weaker side) and how they apply to cyberspace control and cyberspace denial vv The concepts of freedom of action in the maritime domain versus freedom of action in cyberspace 14:00 – 17:00 WORKSHOP B::CYBER INSURGENCIES:AN ESCALATING PROBLEM Led by: John Bumgarner, Chief Technologist, US Cyber Consequences Unit Introduction: The workshop will explore the security threat posed to sovereign nations and other entities from cyber insurgencies. The ubiquitous nature of cyberspace provides an international conduit for non-state actors to engage in acts of civil disobedience, acts of espionage or acts of warfare. An effective cyber insurgency campaign can destabilise a government or spark a kinetic conflict. The globalization of cyber insurgencies creates unique challenges in countering this escalating problem in the 21st Century. Participants will: vv Review the lexicon of cyber insurgencies vv Explore the history of insurgencies in cyberspace vv Investigate the role of cyber insurgencies in regional conflicts www.cyberwarfare-event.com vv Evaluate the art of digital diplomacy vv Examine cyber counter-insurgency SPONSORSHIP OPPORTUNITIES Three easy ways to get involved 1) Thought Leadership: With an expected audience of senior military customers and decision-makers from across the globe, Defence IQ events enable you to build your reputation as a market-leader and to position yourself as an innovative thought-leader in your chosen domain through speaking sessions and subject-specific conference streams, workshops and focus days 2) Branding: We bring together buyers and suppliers in a tailored location with unbeatable facilities for onsite branding and exposure. Furthermore, our dedicated marketing team can help you achieve your promotional aims in the months leading up to the conference with dedicated mailings to cover 50,000 contacts, through brochure drops, extensive email campaigns and tailored web coverage 3) Featured Networking Events: Focused and high level, our events will provide you with the perfect environment to initiate new business relationships and achieve the face-to-face contact that overcrowded trade shows cannot deliver. Sponsorship opportunities range from exhibition stands to sponsored lunches, cocktail receptions, gala dinners and a host of informal social networking events. For further details, or to discuss which option is best for your organisation, please call Ola Jonsson or Ross Clayton on +44 (0) 207 368 9300 or Email: enquire@defenceiq.com SPONSORS Guidance Software is HACKING TEAM is a Based in Atlanta, GA, recognized worldwide as company totally focused Endgame Systems is a the industry leader in digital on IT OFFENSIVE SECURITY intelligence solutions for LEAs privately held U.S. company investigative solutions. Its and Security Agencies. Remote Control System V6 (RCS) providing applied security EnCase® platform provides the foundation for government, is a premier, integrated, multi-OS platform for remotely research and development, and Cyber ISR technology. corporate and law enforcement organizations to conduct attacking, infecting and controlling target computers and Comprised of highly skilled information security thorough, network-enabled, and court-validated computer mobile phones. RCS FULLY SUPPORTS XP Vista, 7, MacOS, , professionals, Endgame Systems is exclusively aligned to investigations of any kind, such as responding to eDiscovery iPhone, Symbian and BlackBerry. It is INVISIBLE to most support the mission and unique challenges of our clients. requests, conducting internal investigations, responding protection systems available in the market (e.g., systems Formed by industry veterans previously employed by Internet to regulatory inquiries or performing data and compliance listed in the GARTNER’s Magic Quadrant For Endpoint Security Systems, Inc. (ISS), a market leading network auditing - all while maintaining the integrity of the data. Protection Platforms) It is RESISTANT to system restoration vulnerability assessment, network intrusion prevention (IPS), There are more than 30,000 licensed users of the EnCase technologies (e.g., DeepFreeze) It is a PROVEN technology: and network security intelligence vendor, Endgame Systems’ technology worldwide, the EnCase® Enterprise platform is it is being used by Agencies worldwide since 2003.Target founders and employees have extensive background in used by over half of the Fortune 100, and thousands attend monitoring includes Skype, chat, mail, web, removable network and computer vulnerability research, design Guidance Software’s renowned training programs annually. media, encrypted communications, PGP GSM-cell GEO- , and implementation of defensive computer and network For more information about Guidance Software, visit www. tracking, GPS GEO-tracking, voice calls, etc. Target infection protection technologies. guidancesoftware.com. can be performed by means of local access techniques and remote attack techniques (zero day exploit portal and transparent injection proxy). For more information info@hackingteam.it E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  • 3. MAIN CONFERENCE DAY 1: THURSDAY 27TH JANUARY 08.30 Registration and Coffee 13:00 Networking Lunch 09.00 Chairman’s Welcome and Opening Speech 14:00 CONDUCTING COUNTER CYBER ACTIONS Dr Dan Kuehl, Information Resources Management WITHIN US ARMY CYBERSPACE College (IRMC), US National Defense University v Computer Defense Assistance Program (CDAP) 09:10 UK KEYNOTE: THE UK OFFICE OF CYBER (foundation of our training to develop a skilled cyber SECURITY – ENSURING A COHERENT defender and the authority to operate) RESPONSE TO CYBER SECURITY v Active engagement to find, fix and finish a cyber v The Office of Cyber Security (OCS) as pulling threat that has entered US Army cyberspace together all the key actors involved in defending the v The operational scenario UK against a cyber attack LtCol Bryant Glando, Commander, 2nd IO Battalion, v The outcome of the Strategic Defence Review and US Army what this means for the OCS 14:40 THE DATA ENCRYPTION PROBLEM Air Cdre Graham Wright, Deputy Director, v Encryption: A nightmare for LEAs and security UK Office of Cyber Security agencies 09:50 CYBER WARFARE – A GCHQ PERSPECTIVE v How to deal with encrypted communications over v The four principles of cyber power the Internet (e.g., Skype, PGP secure web mail) , v Importance of thinking cyber security, vice defence v A stealth offensive IT technology for remotely v An integrated approach to operational cyber thinking attacking, controlling and monitoring PCs and v Importance of industry partnerships smartphones Dr Paul Killworth, Head of Cyber Strategy, GCHQ David Vincenzetti, Partner, Hacking Team, Italy 10:30 CANADIAN FORCES’ CYBER DEFENCE 15:20 Networking Coffee Break OPERATIONS www.cyberwarfare-event.com v The mission and partners 15:50 THE DEVELOPMENT OF THE BELGIAN CYBER v The cyber threat CAPABILITY v Cyber defence operations within the Canadian v The creation and execution of the Belgian cyber Forces capability development roadmap Lt Col E.W.A Tapper, Commanding Officer, v The need for integration and cooperation with Canadian Forces Network Operations Centre partners v The legal issues and considerations (national/ 11:10 Networking Coffee Break international, law of armed conflict, rules of 11:40 ARE YOU KEEPING PACE WITH BOTH EVOLVING engagement) AND COVERT SECURITY THREATS? Maj Sam Raeves, Information System Security v How effective is your current security solution? Manager, Belgian Armed Forces v Complement and augment your existing security infrastructure 16:30 CYBER WAR: A NETWORK DESIGN AND v Respond quickly to discover and remediate threats ANALYSIS PERSPECTIVE that have evaded layered security systems and are v Design principles of covert networks and how they posing a risk to sensitive data can aid defence against a cyber attack Frank Coggrave, Vice President of EMEA, v Network analysis and how it can identify potential Guidance Software intruders v Resilience studies as helping to identify weak points 12:20 CYBER DEFENCE IN THE GERMAN ARMED in critical infrastructure FORCES Roy Lindelauf, Researcher, Netherlands Defence v National cyber defence responsibilities Academy v Organisation and structure of military cyber security v Multinational co-operation in the cyber realm 17:10 Chairman’s Close v Cyber defence exercises LtCol Volker Wetzler, Head of Cyber Security, German MoD ABOUT DEFENCE IQ Defence IQ is host to a series of global events and runs an online community of military and private sector professionals. We provide the platform which leading defence experts share their experience, knowledge and strategic thoughts. We are dedicated to providing military personnel and the private sector with strategic defence resources covering current defence issues. Join the community: http://www.defenceiq.com/join.cfm E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  • 4. MAIN CONFERENCE DAY 2: FRIDAY 28TH JANUARY 08.30 Registration and Coffee 13:00 Lunch and Networking 09.00 Chairman’s Welcome 14:00 CYBER SECURITY OPERATIONS – Dr Dan Kuehl, Information Resources Management COLLABORATION WITH THE COALITION College (IRMC), US National Defense University v The cyber coalition environment v Identification of challenges 09:10 OPERATIONAL TARGETING - RELEVANCE FOR CYBER v Discussion of potential solutions OPERATIONS IN THE MULTI-DOMAIN BATTLEFIELD Ian J West, Director, NCIRC Technical Centre, v What are Militarily Relevant Cyber Targets? NATO CIS Services Agency v How do they contribute to the Combined Force Commander’s operations? 14:40 THE TALLINN MANUAL: CODIFYING THE LAW v When will Cyber Weapons be operationally relevant? OF WAR FOR CYBERSPACE Col Robert A. Morris, Director, Air Component v Operational challenge: How do we apply kinetic law Element, 24th Air Force to cyber operations? v Experts and approach: Who decides? How are 09:50 CYBER WARFARE: OPERATING IN AN OPPOSED rules determined? How are they presented? NETWORK ENVIRONMENT v Principled analysis: What is a use of force? What is v The future warfare environment as characterized by an armed attack? What are the requirements for degraded networks and sophisticated electronic combat discriminating targets, minimising collateral v The need to develop the concepts and capabilities damage, and avoiding perfidy? to operate in opposed network environments Thomas C. Wingfield, Professor of International Law, v Establishing a balance between passive and active Marshall Center warfare in the electromagnetic spectrum v Applying concepts of manoeuvre warfare to 14:20 Coffee and Networking Break cyberspace and pursuing realistic training in a highly contested environment 15:50 THE CHINESE MILITARY INDUSTRIAL CYBER Col David Fahrenkrug, Director, CSAF Strategic COMPLEX USE OF THE BIG 5 CHARACTURE SET www.cyberwarfare-event.com v The Government Chinese Character Set or GCCS in Studies Group, US Air Force support of the eight pillars of cyber warfare 10:30 THE EVOLVING THREAT IN CYBERSPACE v HTML 5 code using the Big 5 Character set to create v The current operational environment virtual deception operations v The evolving threat: How the adversary takes v How the Character set can be used for gathering advantage of the operational environment intelligence, initiating DDOS attacks and infiltrating v The resulting consequences: How the threat will both civilian corporate and government networks influence your behaviour and decision making LtCol William Hagestad II, Force Movement process in cyber combat Control Officer, US Marine Corps Gregory Radabaugh, Technical Director, Cyber Analysis Squadron, US Air Force 16:30 COOPERATION IN SECURING CRITICAL NATIONAL INFRASTRUCTURE 11:00 Coffee and Networking Break v Introduction to ENISA and what we do v ENISA’s role in facilitating dialogue: Bridging 11:40 COMPUTERS AS WEAPONS OF WAR public and private sectors v Explore the history of cyber-weaponry development v The Critical Information Infrastructure Protection v Define the types of cyber-weaponry (CIIP) action plan v Review the use of cyber-weaponry in past conflicts v Pan European exersises for resilience: Objectives v Outline the use of cyber-weaponry in future conflicts and current status v Investigate the strategies to counter cyber-weaponry v Engaging with ENISA: Opportunities and benefits John Bumgarner, Chief Technology Officer, v The way forward US Cyber Consequences Unit Dr. Steve Purser, Head of Technical and 12:20 CYBER WAR: AN INTERNATIONAL THREAT Competence Department, ENISA NEEDING INTERNATIONAL SOLUTIONS v Which nations have the potential to wage cyber war? 17:00 Closing Remarks and End of Conference v NATO and its role in cyber warfare v The role of the private sector v Cyber war - an opportunity or a vulnerability? Dr Dan Kuehl, Information Resources Management College (IRMC), US National Defense University E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  • 5. WHO WILL YOU MEET? As the leading Cyber Warfare event in Europe, Cyber Warfare 2011 will give you the chance to meet with key military and industry professionals who are driving the development of cyber defence, exploit and attack capabilities Visitor profile for 2010 Attending countries Military/Governments Agency Austria 1 BMLVS UK MoD Belguim 2 Bundeswehr US Army Denmark 9 US European Command France 3 Cyber Analysis Squadron Germany 5 Danish Defence Intelligence US Navy Greece 1 Service USAF Italy 2 Defence Command Denmark Luxembourg 1 Industry Malaysia 1 DOD Rapid Fielding Directorate Norway 3 DSTL Elettronica Spain 1 European Commission Northrop Grumman Mission Sweeden 6 European Union Military Staff Systems Europe Ltd. Switzerland 1 FRA EADS DS UK The Netherlands 3 UAE 10 German Armed Forces Ultra Electronics UK 21 Hellenic National Defence General Raytheon USA 21 Staff Prevx Limited Italian Air Force Operational Qosmos Command Jordan Armed Forces Selex Communications Ltd. BAE Systems Download Centre Maryland Air National Guard Boeing For Free resources on cyber warfare, including podcasts, videos and Ministry of Defence Denmark Aeris Capital AG whitepapers, please visit the website www.cyberwarfare-event.com MSB - Swedish Civil EADS Germany Contingencies Agency Elbit Systems Land and C4I – Our resources include exclusive interviews with key cyber warfare National Air & Space Intelligence Tadiran professionals including: Center, USAF Global Communications and National Defense University Software Systems Admiral the Lord West (former Parliamentary Under-Secretary of State for National Security Agency ITM Instalaciones Técnicas Security and Counter-terrorism under Gordon Brown) Netherlands MoD Mantenimiento Norwegian Defence Force Symantec John Bumgarner, Chief Technology Officer of the U.S. Cyber www.cyberwarfare-event.com Swedish Armed Forces Nexor Ltd. Consequences Unit Swedish Civil Contingencies Professor Peter Sommer, London School of Economics and Political Science MEDIA PARTNERS Nigel Inkster, International Institute for Strategic Studies Defense Update online well as useful facts about developments in the UK Defence • Event presentation, (Conferences-Seminars-Exhibitions) bi-monthly defense Industry Contact us: defenceenquiries@armedforces.co.uk • Defence news (RSS system) magazine highlights Tel: 01743 241962 website: www.armedforces.co.uk • Press articles and Press Releases defense programs • Cooperates with Embassies , Def. Associations & Think worldwide including land, air, naval, C4ISR, intelligence, and ContingencyToday. Thanks net-centric warfare, infantry warfare, homeland defense etc. com and CT Review • Performs Marketing Research / Optimization to Def. The coverage is frequently updated to follow the development magazine (print) Companies of key defense programs. Major global defense exhibitions dedicated to the • Focuses also on Consulting Services are covered. Defense Update is available free at our web site. challenges and opportunities of Critical National Infrastructure In the context of the above, and beyond our continuous Site Website: www.defense-update.com protection. Its readership includes policy-makers, decision- information with the latest defence news from this area, we influencers and middle management implementers engaged provide information notes to Key Officers serving the MoD, ASDNews.com – in emergency planning, disaster recovery and infrastructure and we are running independent researches on matters “Be the first to know” protection including electronic attack and the sophisticated dealing with questions that we receive from Armament ASDNews brings the latest misuse of computer systems; physical attacks by terrorist Departments. aerospace, defence and security organisations and other criminals; the effects of climate Take the time to visit our site at www.defence-guide.com and news from government, industry and major news agencies change; and other natural disasters, including pandemics, in case you find it of your interest, contact us to: around the world. Our service has over 60,000 active fire and flood. info@defence-guide.com subscribers and 2 million article readers per year. Website: www.defence-guide.com ASDNews content is categorised in over 25 main news To sign-up for Complimentary Newsletter and CT Review groups for example: “Training & Simulation News”, or in the post (UK only) www.contingencytoday.com/ Tactical Data Links news will present “Unmanned Systems News” making recent and related subscribe-free (Outside UK) – email us: freemagazine@ and describe the current Tactical Data articles easy to find. contingencytoday.com to receive Complimentary Newsletter Links and the major command, control, Subscribe to our free daily newsletter or weekly group and first two issues of CT Review. communications, computers, and newsletters on www.asdnews.com/subscription intelligence (C4I) systems employed www.Defence-Guide. by the major European nations and the The DEFENCE com is an International major NATO nations, and will present SUPPLIERS DIRECTORY Military Site, and has as the international NEWS and international EVENTS of the is an authoritative online primary scope to establish Tactical Data Links community! It will also allow all Tactical information resource for all defence purchasers. This an electronic magazine dealing, with international news on Data Links experts to exchange information on a specialized comprehensive listing of Defence Suppliers has enabled defence manufactures and technology. More specific, this TDL area, exclusively reserved for TDL NEWS members. thousands of purchasing professionals to find exactly what International Military Guide – unique for the three Branches www.tdl-news.com is the first Tactical Data Links international they are looking for - in seconds. THE DEFENCE SUPPLIERS of the MoD and Law enforcement , includes among others news website DIRECTORY provides a total overview of all the UK’s Armed the following: Forces - with a wealth of valuable information about the • Companies profiles/products/projects, organisation and structure of the UK’s Defence Services, as • Military magazines E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  • 6. CYBER WAREFARE 2O11 5 WAYS TO REGISTER Venue: American Square Conference Center, London Conference: 27th and 28th January 2011 Tel: 0800 652 2363 or Pre Conference Workshops: 26th January 2011 +44 (0)20 7368 9300 To speed registration, please provide the priority code located on the mailing label or in the box below. My registration code is PDFW Fax: +44 (0)20 7368 9301 Please contact our database manager on +44(0) 207 368 9300 or at database@iqpc.co.uk quoting the registration code above to inform us of any changes or to remove your details. Post: your booking form to General/Flag officer 1* and above may attend the conference free of charge Please contact IQPC Ltd. 2nd Floor, enquire@defenceiq.com for further details. This offer cannot be combined with any other offer and is non-transferable. 129 Wilton Road, STANDARD INDUSTRY RATES London, SW1V 1JZ Book and Pay by 5th Book and Pay by 3rd Book and Pay by 14th Standard Price November 2010* December 2010* January 2011* Online: www.cyberwarfare-event.com 2-Day Conference Save £350 Save £300 Save £200 + 2 Workshops £2,247 +VAT £2,297 +VAT £2,397 +VAT £2,597 +VAT Email: enquire@defenceiq.com 2-Day Conference Save £300 Save £250 Save £150 + 1 Workshop*** £1,798 +VAT £1,848 +VAT £1,948 +VAT £2,098 +VAT 2-Day Conference Save £250 Save £200 Save £100 Team Discounts* £1,349 +VAT £1,399 +VAT £1,499 +VAT £1,599 +VAT IQPC recognises the value of learning in teams. Groups of 3 or more Workshop*** booking at the same time from the same company receive a 10% £499 +VAT discount. 5 or more receive a 15% discount. 7 receive a 20% discount. DISCOUNTED PUBLIC SECTOR GOVERNMENT RATES ** Only one discount available per person. Book and Pay by 5th Book and Pay by 3rd Book and Pay by 14th Standard Price November 2010* December 2010* January 2011* Venue & Accommodation 2-Day Conference Save £350 Save £300 Save £200 £1,047 +VAT £1,097 +VAT £1,197 +VAT £1,397 +VAT Venue: + 2 Workshops America Square Conference Centre 2-Day Conference Save £300 Save £250 Save £150 One America Square, 17 Crosswall, London EC3N 2LB + 1 Workshop*** £748 +VAT £798 +VAT £898 +VAT £1,048 +VAT Accommodation: Save £250 Save £200 Save £100 2-Day Conference £449 +VAT £499 +VAT £599 +VAT £699 +VAT Overnight accommodation is not included in the registration fee, for nearby accommodation options and best possible rates and special offers please Workshop*** £349 +VAT visit http://www.HotelMap.com/M6Z4E. This map displays live availability and allows you to book directly with each hotel. Alternatively, if you would *Must register and pay by the early RSVP discount expiry date with your RSVP CODE 12956.005 <Merge Code> like to book your accommodation by phone, you can call Daniel Spinner Early RSVP discounts are not valid in conjunction with any other offer. on +44 20 7292 2335 quoting Special Reference Code M6Z4E. ** Military rates apply to serving military officer and government personnel only. Academic rates apply to university accredited personnel only. MoD sponsored institutions are subject to military rates. *** Please select your choice of workshop A 6 B 6 All above prices are subject to 17.5% VAT. VAT No GB 799 2259 67 Free Online Resources Delegate Details To claim a variety of articles, podcasts and other free resources Please photocopy for each additional delegate please visit www.cyberwarfare-event.com 6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other First Name Family Name Digital Conference On CD-ROM Rank Job Title A digital version of the conference proceedings, including all Tel No. presentations, is available to buy. Email 6 I cannot attend the event, please send me the CD Rom priced at £599 plus VAT 6 Yes I would like to receive information about products and services via email Recent digital conferences available - £599 plus VAT each Organisation 6 Cyber Security 2010 Nature of business 6 Network Centric Warfare 2010 Address 6 Please send me conference materials indicated above. Postcode Country 6 I have filled out credit card details below Telephone Fax For further information Approving Manager Please call: 0207 368 9300 or email: knowledgebank@iqpc.co.uk. Name of person completing form if different from delegate: To search IQPC’s archived conference documentation visit: www.iqpcknowledgebank.com Signature I agree to IQPC’s cancellation, substitution and payment terms Terms and Conditions Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify) Please read the information listed below as each booking is subject to IQPC Ltd standard terms and conditions. Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6 Payment Terms: Upon completion and return of the registration form full payment is required no later than 5 business days from the date of invoice. Payment of invoices by means other than by credit card, or purchase order Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking. (UK Plc and UK government bodies only) will be subject to a £49 (plus VAT) per delegate processing fee. Payment must be received prior to the conference date. We reserve the right to refuse admission to the conference if payment Payment Method has not been received. IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates at any time by Total price for your Organisation: (Add total of all individuals attending): providing reasonable advance notice to IQPC. For any cancellations received in writing not less than eight (8) days prior to the conference, you will receive a 90% Card Number: VISA 6 M/C 6 AMEX 6 credit to be used at another IQPC conference which must occur within one year from the date of issuance of such credit. An administration fee of 10% of the contract fee will be retained by IQPC for all permitted cancellations. No 6666666666666666 credit will be issued for any cancellations occurring within seven (7) days (inclusive) of the conference. In the event that IQPC cancels an event for any reason, you will receive a credit for 100% of the contract fee paid. Exp. Date: 6 6 6 6 Sec: 6 6 6 6 You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year Conference code 12956.005 from the date of cancellation. In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling to attend in on the Name On Card: Signature: rescheduled date, you will receive a credit for 100% of the contract fee paid. You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of postponement. Except as specified above, no credits will be issued for cancellations. There are no refunds given under any Billing Address (if different from below): circumstances. IQPC is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever in the event this conference is cancelled, rescheduled or City/County/Postcode Cheque enclosed for: £ (Made payable to IQPC Ltd.) postponed due to a fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of this conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event shall include, but not be limited to: war, fire, labour strike, extreme weather or other emergency. (Please quote 12956.005 with remittance advice) Please note that while speakers and topics were confirmed at the time of publishing, circumstances beyond the control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics. IQPC Bank details: HSBC Bank Plc, 67 George Street, Richmond, Surrey TW9 1HG, United Kingdom As such, IQPC reserves the right to alter or modify the advertised speakers and/or topics if necessary without any Sort Code: 40 38 18, Account No: 51304143, IBAN Code: GB59 MIDL 4038 1851 3041 43 liability to you whatsoever. Any substitutions or alterations will be updated on our web page as soon as possible. Swift Code: MIDLGB2112V Account name: International Quality & Productivity Centre Ltd. Discounts: All ‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order to receive any discount. Any discounts offered whether by IQPC (including team discounts) must also require payment at the time of registration. All discount offers cannot be combined with any other offer PAYMENT MUST BE RECEIVED PRIOR TO THE CONFERENCE 6 Please do not pass my information to any third party