1. 20 B
10 5 ook
Presents an Nth &
d S o pa
AV vem y b
E U be y
P r
TO
£3
50
With key briefings from:
Air Cdre Graham Wright, Deputy Director, UK Office of
Cyber Security
Dr Paul Killworth, Head of Cyber Strategy, GCHQ
Col David Fahrenkrug, Director, CSAF Strategic Studies
Group, US Air Force
Col Robert A. Morris, Director, Air Component Element,
24th Air Force
LtCol Bryant Glando, Commander, 2nd IO Battalion,
US Army
www.cyberwarfare-event.com
LtCol Volker Wetzler, Head of Cyber Security, German
MoD
Venue: American Square Conference Center, London Lt Col E.W.A Tapper, Commanding Officer, Canadian
Conference: 27th and 28th January 2011 Forces Network Operations Centre
Pre Conference Workshops: 26th January 2011 LtCol William Hagestad II, Force Movement Control
Officer, US Marine Corps
Cyber Warfare 2011 will Maj Sam Raeves, Information System Security Manager,
enable you to: Belgian Armed Forces
Gregory Radabaugh, Technical Director, Cyber Analysis
v Hear from the most senior military officer Squadron, US Air Force
at the UK Office of Cyber Security and the Ian J West, Director, NCIRC Technical Centre, NATO CIS
Head of Cyber Strategy at GCQH, allowing Services Agency
you to get a full picture of how the UK is Dick Crowell, Information Operations & Cyberspace
Operations, US Naval War College
developing its cyber capabilities
Thomas C. Wingfield, Professor of International Law,
Marshall Center
v Gain a key insight into the development of
John Bumgarner, Chief Technologist, US Cyber
an ‘operational art’ for war in cyberspace; Consequences Unit
command and control, battle management Dr Dan Kuehl, Information Resources Management
and cyberspace denial and control College (IRMC), US National Defence University
Roy Lindelauf, Researcher, Netherlands Defence Academy
v Learn how to engage in pro-active cyber Dr. Steve Purser, Head of Technical and Competence
defence and find, fix and finish a cyber Department, ENISA
threat that has entered your network Frank Coggrave, Vice President of EMEA, Guidance
Software
David Vincenzetti, Partner, Hacking Team, Italy
E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
Sponsors
2. PRE CONFERENCE WORKSHOPS:
WEDNESDAY 26TH JANUARY
09:00 – 12:00 WORKSHOP A: THE OPERATIONAL ART OF CYBER WAR
Led by: Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, U.S. Naval War College
Introduction:
This workshop will begin the exploration into operational warfare in cyberspace. It will present the framework of operational art, specifically operational factors and
functions as a tool for understanding cyber warfare. A series of questions will be posed for future operational commanders to help frame their thoughts on cyber-
space and cyber warfare.
Participants will evaluate:
vv The definitions of the information environment, cyberspace, and cyberspace operations
vv The definition of cyber warfare
vv The intertwining of cyberspace and human activity
vv The applicability of operational warfare at sea as a metaphor for operational warfare in cyberspace
vv How commanders need to balance operational factors and functions to fight and win a cyber war
vv The concepts of sea control (the stronger side) and sea denial (the weaker side) and how they apply to cyberspace control and cyberspace denial
vv The concepts of freedom of action in the maritime domain versus freedom of action in cyberspace
14:00 – 17:00 WORKSHOP B::CYBER INSURGENCIES:AN ESCALATING
PROBLEM
Led by: John Bumgarner, Chief Technologist, US Cyber Consequences Unit
Introduction:
The workshop will explore the security threat posed to sovereign nations and other entities from cyber insurgencies. The ubiquitous nature of cyberspace provides
an
international conduit for non-state actors to engage in acts of civil disobedience, acts of espionage or acts of warfare.
An effective cyber insurgency campaign can destabilise a government or spark a kinetic conflict. The globalization of cyber
insurgencies creates unique challenges in countering this escalating problem in the 21st Century.
Participants will:
vv Review the lexicon of cyber insurgencies
vv Explore the history of insurgencies in cyberspace
vv Investigate the role of cyber insurgencies in regional conflicts
www.cyberwarfare-event.com
vv Evaluate the art of digital diplomacy
vv Examine cyber counter-insurgency
SPONSORSHIP OPPORTUNITIES Three easy ways to get involved
1) Thought Leadership: With an expected audience of senior military customers and decision-makers from across the globe, Defence IQ events enable you to build your reputation
as a market-leader and to position yourself as an innovative thought-leader in your chosen domain through speaking sessions and subject-specific conference streams, workshops and
focus days
2) Branding: We bring together buyers and suppliers in a tailored location with unbeatable facilities for onsite branding and exposure. Furthermore, our dedicated marketing team
can help you achieve your promotional aims in the months leading up to the conference with dedicated mailings to cover 50,000 contacts, through brochure drops, extensive email
campaigns and tailored web coverage
3) Featured Networking Events: Focused and high level, our events will provide you with the perfect environment to initiate new business relationships and achieve the face-to-face
contact that overcrowded trade shows cannot deliver. Sponsorship opportunities range from exhibition stands to sponsored lunches, cocktail receptions, gala dinners and a host of
informal social networking events. For further details, or to discuss which option is best for your organisation, please call Ola Jonsson or Ross Clayton on +44 (0) 207
368 9300 or Email: enquire@defenceiq.com
SPONSORS
Guidance Software is HACKING TEAM is a Based in Atlanta, GA,
recognized worldwide as company totally focused Endgame Systems is a
the industry leader in digital on IT OFFENSIVE SECURITY intelligence solutions for LEAs privately held U.S. company
investigative solutions. Its and Security Agencies. Remote Control System V6 (RCS) providing applied security
EnCase® platform provides the foundation for government, is a premier, integrated, multi-OS platform for remotely research and development, and Cyber ISR technology.
corporate and law enforcement organizations to conduct attacking, infecting and controlling target computers and Comprised of highly skilled information security
thorough, network-enabled, and court-validated computer mobile phones. RCS FULLY SUPPORTS XP Vista, 7, MacOS,
, professionals, Endgame Systems is exclusively aligned to
investigations of any kind, such as responding to eDiscovery iPhone, Symbian and BlackBerry. It is INVISIBLE to most support the mission and unique challenges of our clients.
requests, conducting internal investigations, responding protection systems available in the market (e.g., systems Formed by industry veterans previously employed by Internet
to regulatory inquiries or performing data and compliance listed in the GARTNER’s Magic Quadrant For Endpoint Security Systems, Inc. (ISS), a market leading network
auditing - all while maintaining the integrity of the data. Protection Platforms) It is RESISTANT to system restoration vulnerability assessment, network intrusion prevention (IPS),
There are more than 30,000 licensed users of the EnCase technologies (e.g., DeepFreeze) It is a PROVEN technology: and network security intelligence vendor, Endgame Systems’
technology worldwide, the EnCase® Enterprise platform is it is being used by Agencies worldwide since 2003.Target founders and employees have extensive background in
used by over half of the Fortune 100, and thousands attend monitoring includes Skype, chat, mail, web, removable network and computer vulnerability research, design
Guidance Software’s renowned training programs annually. media, encrypted communications, PGP GSM-cell GEO-
, and implementation of defensive computer and network
For more information about Guidance Software, visit www. tracking, GPS GEO-tracking, voice calls, etc. Target infection protection technologies.
guidancesoftware.com. can be performed by means of local access techniques
and remote attack techniques (zero day exploit portal and
transparent injection proxy).
For more information info@hackingteam.it
E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
3. MAIN CONFERENCE DAY 1:
THURSDAY 27TH JANUARY
08.30 Registration and Coffee 13:00 Networking Lunch
09.00 Chairman’s Welcome and Opening Speech 14:00 CONDUCTING COUNTER CYBER ACTIONS
Dr Dan Kuehl, Information Resources Management WITHIN US ARMY CYBERSPACE
College (IRMC), US National Defense University v Computer Defense Assistance Program (CDAP)
09:10 UK KEYNOTE: THE UK OFFICE OF CYBER (foundation of our training to develop a skilled cyber
SECURITY – ENSURING A COHERENT defender and the authority to operate)
RESPONSE TO CYBER SECURITY v Active engagement to find, fix and finish a cyber
v The Office of Cyber Security (OCS) as pulling
threat that has entered US Army cyberspace
together all the key actors involved in defending the v The operational scenario
UK against a cyber attack LtCol Bryant Glando, Commander, 2nd IO Battalion,
v The outcome of the Strategic Defence Review and
US Army
what this means for the OCS
14:40 THE DATA ENCRYPTION PROBLEM
Air Cdre Graham Wright, Deputy Director,
v Encryption: A nightmare for LEAs and security
UK Office of Cyber Security
agencies
09:50 CYBER WARFARE – A GCHQ PERSPECTIVE v How to deal with encrypted communications over
v The four principles of cyber power the Internet (e.g., Skype, PGP secure web mail)
,
v Importance of thinking cyber security, vice defence v A stealth offensive IT technology for remotely
v An integrated approach to operational cyber thinking attacking, controlling and monitoring PCs and
v Importance of industry partnerships smartphones
Dr Paul Killworth, Head of Cyber Strategy, GCHQ David Vincenzetti, Partner, Hacking Team, Italy
10:30 CANADIAN FORCES’ CYBER DEFENCE 15:20 Networking Coffee Break
OPERATIONS
www.cyberwarfare-event.com
v The mission and partners 15:50 THE DEVELOPMENT OF THE BELGIAN CYBER
v The cyber threat CAPABILITY
v Cyber defence operations within the Canadian v The creation and execution of the Belgian cyber
Forces capability development roadmap
Lt Col E.W.A Tapper, Commanding Officer, v The need for integration and cooperation with
Canadian Forces Network Operations Centre partners
v The legal issues and considerations (national/
11:10 Networking Coffee Break international, law of armed conflict, rules of
11:40 ARE YOU KEEPING PACE WITH BOTH EVOLVING engagement)
AND COVERT SECURITY THREATS? Maj Sam Raeves, Information System Security
v How effective is your current security solution? Manager, Belgian Armed Forces
v Complement and augment your existing security
infrastructure 16:30 CYBER WAR: A NETWORK DESIGN AND
v Respond quickly to discover and remediate threats ANALYSIS PERSPECTIVE
that have evaded layered security systems and are v Design principles of covert networks and how they
posing a risk to sensitive data can aid defence against a cyber attack
Frank Coggrave, Vice President of EMEA, v Network analysis and how it can identify potential
Guidance Software intruders
v Resilience studies as helping to identify weak points
12:20 CYBER DEFENCE IN THE GERMAN ARMED in critical infrastructure
FORCES Roy Lindelauf, Researcher, Netherlands Defence
v National cyber defence responsibilities Academy
v Organisation and structure of military cyber security
v Multinational co-operation in the cyber realm 17:10 Chairman’s Close
v Cyber defence exercises
LtCol Volker Wetzler, Head of Cyber Security,
German MoD
ABOUT DEFENCE IQ
Defence IQ is host to a series of global events and runs an online community of military and private sector professionals. We provide the platform which
leading defence experts share their experience, knowledge and strategic thoughts. We are dedicated to providing military personnel and the private sector
with strategic defence resources covering current defence issues. Join the community: http://www.defenceiq.com/join.cfm
E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
4. MAIN CONFERENCE DAY 2:
FRIDAY 28TH JANUARY
08.30 Registration and Coffee 13:00 Lunch and Networking
09.00 Chairman’s Welcome 14:00 CYBER SECURITY OPERATIONS –
Dr Dan Kuehl, Information Resources Management COLLABORATION WITH THE COALITION
College (IRMC), US National Defense University v The cyber coalition environment
v Identification of challenges
09:10 OPERATIONAL TARGETING - RELEVANCE FOR CYBER v Discussion of potential solutions
OPERATIONS IN THE MULTI-DOMAIN BATTLEFIELD Ian J West, Director, NCIRC Technical Centre,
v What are Militarily Relevant Cyber Targets?
NATO CIS Services Agency
v How do they contribute to the Combined Force
Commander’s operations? 14:40 THE TALLINN MANUAL: CODIFYING THE LAW
v When will Cyber Weapons be operationally relevant? OF WAR FOR CYBERSPACE
Col Robert A. Morris, Director, Air Component v Operational challenge: How do we apply kinetic law
Element, 24th Air Force to cyber operations?
v Experts and approach: Who decides? How are
09:50 CYBER WARFARE: OPERATING IN AN OPPOSED rules determined? How are they presented?
NETWORK ENVIRONMENT v Principled analysis: What is a use of force? What is
v The future warfare environment as characterized by
an armed attack? What are the requirements for
degraded networks and sophisticated electronic combat discriminating targets, minimising collateral
v The need to develop the concepts and capabilities
damage, and avoiding perfidy?
to operate in opposed network environments Thomas C. Wingfield, Professor of International Law,
v Establishing a balance between passive and active
Marshall Center
warfare in the electromagnetic spectrum
v Applying concepts of manoeuvre warfare to 14:20 Coffee and Networking Break
cyberspace and pursuing realistic training in a
highly contested environment 15:50 THE CHINESE MILITARY INDUSTRIAL CYBER
Col David Fahrenkrug, Director, CSAF Strategic COMPLEX USE OF THE BIG 5 CHARACTURE SET
www.cyberwarfare-event.com
v The Government Chinese Character Set or GCCS in
Studies Group, US Air Force
support of the eight pillars of cyber warfare
10:30 THE EVOLVING THREAT IN CYBERSPACE v HTML 5 code using the Big 5 Character set to create
v The current operational environment virtual deception operations
v The evolving threat: How the adversary takes v How the Character set can be used for gathering
advantage of the operational environment intelligence, initiating DDOS attacks and infiltrating
v The resulting consequences: How the threat will both civilian corporate and government networks
influence your behaviour and decision making LtCol William Hagestad II, Force Movement
process in cyber combat Control Officer, US Marine Corps
Gregory Radabaugh, Technical Director, Cyber
Analysis Squadron, US Air Force 16:30 COOPERATION IN SECURING CRITICAL
NATIONAL INFRASTRUCTURE
11:00 Coffee and Networking Break v Introduction to ENISA and what we do
v ENISA’s role in facilitating dialogue: Bridging
11:40 COMPUTERS AS WEAPONS OF WAR
public and private sectors
v Explore the history of cyber-weaponry development
v The Critical Information Infrastructure Protection
v Define the types of cyber-weaponry
(CIIP) action plan
v Review the use of cyber-weaponry in past conflicts
v Pan European exersises for resilience: Objectives
v Outline the use of cyber-weaponry in future conflicts
and current status
v Investigate the strategies to counter cyber-weaponry
v Engaging with ENISA: Opportunities and benefits
John Bumgarner, Chief Technology Officer,
v The way forward
US Cyber Consequences Unit
Dr. Steve Purser, Head of Technical and
12:20 CYBER WAR: AN INTERNATIONAL THREAT Competence Department, ENISA
NEEDING INTERNATIONAL SOLUTIONS
v Which nations have the potential to wage cyber war?
17:00 Closing Remarks and End of Conference
v NATO and its role in cyber warfare
v The role of the private sector
v Cyber war - an opportunity or a vulnerability?
Dr Dan Kuehl, Information Resources Management
College (IRMC), US National Defense University
E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
5. WHO WILL YOU MEET?
As the leading Cyber Warfare event in Europe, Cyber Warfare 2011 will give you the chance
to meet with key military and industry professionals who are driving the development of
cyber defence, exploit and attack capabilities
Visitor profile for 2010 Attending countries
Military/Governments Agency Austria 1
BMLVS UK MoD Belguim 2
Bundeswehr US Army Denmark 9
US European Command France 3
Cyber Analysis Squadron
Germany 5
Danish Defence Intelligence US Navy Greece 1
Service USAF Italy 2
Defence Command Denmark Luxembourg 1
Industry Malaysia 1
DOD Rapid Fielding Directorate
Norway 3
DSTL Elettronica Spain 1
European Commission Northrop Grumman Mission Sweeden 6
European Union Military Staff Systems Europe Ltd. Switzerland 1
FRA EADS DS UK The Netherlands 3
UAE 10
German Armed Forces Ultra Electronics UK 21
Hellenic National Defence General Raytheon USA 21
Staff Prevx Limited
Italian Air Force Operational Qosmos
Command
Jordan Armed Forces
Selex Communications Ltd.
BAE Systems
Download Centre
Maryland Air National Guard Boeing For Free resources on cyber warfare, including podcasts, videos and
Ministry of Defence Denmark Aeris Capital AG whitepapers, please visit the website www.cyberwarfare-event.com
MSB - Swedish Civil EADS Germany
Contingencies Agency Elbit Systems Land and C4I – Our resources include exclusive interviews with key cyber warfare
National Air & Space Intelligence Tadiran professionals including:
Center, USAF Global Communications and
National Defense University Software Systems Admiral the Lord West (former Parliamentary Under-Secretary of State for
National Security Agency ITM Instalaciones Técnicas
Security and Counter-terrorism under Gordon Brown)
Netherlands MoD Mantenimiento
Norwegian Defence Force Symantec John Bumgarner, Chief Technology Officer of the U.S. Cyber
www.cyberwarfare-event.com
Swedish Armed Forces Nexor Ltd.
Consequences Unit
Swedish Civil Contingencies
Professor Peter Sommer, London School of Economics and Political
Science
MEDIA PARTNERS Nigel Inkster, International Institute for Strategic Studies
Defense Update online well as useful facts about developments in the UK Defence • Event presentation, (Conferences-Seminars-Exhibitions)
bi-monthly defense Industry Contact us: defenceenquiries@armedforces.co.uk • Defence news (RSS system)
magazine highlights Tel: 01743 241962 website: www.armedforces.co.uk • Press articles and Press Releases
defense programs • Cooperates with Embassies , Def. Associations & Think
worldwide including land, air, naval, C4ISR, intelligence, and ContingencyToday. Thanks
net-centric warfare, infantry warfare, homeland defense etc. com and CT Review • Performs Marketing Research / Optimization to Def.
The coverage is frequently updated to follow the development magazine (print) Companies
of key defense programs. Major global defense exhibitions dedicated to the • Focuses also on Consulting Services
are covered. Defense Update is available free at our web site. challenges and opportunities of Critical National Infrastructure In the context of the above, and beyond our continuous Site
Website: www.defense-update.com protection. Its readership includes policy-makers, decision- information with the latest defence news from this area, we
influencers and middle management implementers engaged provide information notes to Key Officers serving the MoD,
ASDNews.com – in emergency planning, disaster recovery and infrastructure and we are running independent researches on matters
“Be the first to know” protection including electronic attack and the sophisticated dealing with questions that we receive from Armament
ASDNews brings the latest misuse of computer systems; physical attacks by terrorist Departments.
aerospace, defence and security organisations and other criminals; the effects of climate Take the time to visit our site at www.defence-guide.com and
news from government, industry and major news agencies change; and other natural disasters, including pandemics, in case you find it of your interest, contact us to:
around the world. Our service has over 60,000 active fire and flood. info@defence-guide.com
subscribers and 2 million article readers per year. Website: www.defence-guide.com
ASDNews content is categorised in over 25 main news To sign-up for Complimentary Newsletter and CT Review
groups for example: “Training & Simulation News”, or in the post (UK only) www.contingencytoday.com/ Tactical Data Links news will present
“Unmanned Systems News” making recent and related subscribe-free (Outside UK) – email us: freemagazine@ and describe the current Tactical Data
articles easy to find. contingencytoday.com to receive Complimentary Newsletter Links and the major command, control,
Subscribe to our free daily newsletter or weekly group and first two issues of CT Review. communications, computers, and
newsletters on www.asdnews.com/subscription intelligence (C4I) systems employed
www.Defence-Guide. by the major European nations and the
The DEFENCE com is an International major NATO nations, and will present
SUPPLIERS DIRECTORY Military Site, and has as the international NEWS and international EVENTS of the
is an authoritative online primary scope to establish Tactical Data Links community! It will also allow all Tactical
information resource for all defence purchasers. This an electronic magazine dealing, with international news on Data Links experts to exchange information on a specialized
comprehensive listing of Defence Suppliers has enabled defence manufactures and technology. More specific, this TDL area, exclusively reserved for TDL NEWS members.
thousands of purchasing professionals to find exactly what International Military Guide – unique for the three Branches www.tdl-news.com is the first Tactical Data Links international
they are looking for - in seconds. THE DEFENCE SUPPLIERS of the MoD and Law enforcement , includes among others news website
DIRECTORY provides a total overview of all the UK’s Armed the following:
Forces - with a wealth of valuable information about the • Companies profiles/products/projects,
organisation and structure of the UK’s Defence Services, as • Military magazines
E: enquire@defenceiq.com T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
6. CYBER WAREFARE 2O11 5 WAYS TO REGISTER
Venue: American Square Conference Center, London
Conference: 27th and 28th January 2011 Tel: 0800 652 2363 or
Pre Conference Workshops: 26th January 2011 +44 (0)20 7368 9300
To speed registration, please provide the priority code located on the mailing label or in the box below.
My registration code is PDFW Fax: +44 (0)20 7368 9301
Please contact our database manager on +44(0) 207 368 9300 or at database@iqpc.co.uk quoting the registration
code above to inform us of any changes or to remove your details. Post: your booking form to
General/Flag officer 1* and above may attend the conference free of charge Please contact
IQPC Ltd. 2nd Floor,
enquire@defenceiq.com for further details. This offer cannot be combined with any other offer and is non-transferable. 129 Wilton Road,
STANDARD INDUSTRY RATES London, SW1V 1JZ
Book and Pay by 5th Book and Pay by 3rd Book and Pay by 14th Standard Price
November 2010* December 2010* January 2011* Online: www.cyberwarfare-event.com
2-Day Conference Save £350 Save £300 Save £200
+ 2 Workshops £2,247 +VAT £2,297 +VAT £2,397 +VAT £2,597 +VAT
Email: enquire@defenceiq.com
2-Day Conference Save £300 Save £250 Save £150
+ 1 Workshop*** £1,798 +VAT £1,848 +VAT £1,948 +VAT £2,098 +VAT
2-Day Conference
Save £250 Save £200 Save £100 Team Discounts*
£1,349 +VAT £1,399 +VAT £1,499 +VAT £1,599 +VAT
IQPC recognises the value of learning in teams. Groups of 3 or more
Workshop*** booking at the same time from the same company receive a 10%
£499 +VAT
discount. 5 or more receive a 15% discount. 7 receive a 20% discount.
DISCOUNTED PUBLIC SECTOR GOVERNMENT RATES **
Only one discount available per person.
Book and Pay by 5th Book and Pay by 3rd Book and Pay by 14th Standard Price
November 2010* December 2010* January 2011* Venue & Accommodation
2-Day Conference Save £350 Save £300 Save £200
£1,047 +VAT £1,097 +VAT £1,197 +VAT £1,397 +VAT Venue:
+ 2 Workshops
America Square Conference Centre
2-Day Conference Save £300 Save £250 Save £150 One America Square, 17 Crosswall, London EC3N 2LB
+ 1 Workshop*** £748 +VAT £798 +VAT £898 +VAT £1,048 +VAT
Accommodation:
Save £250 Save £200 Save £100
2-Day Conference £449 +VAT £499 +VAT £599 +VAT £699 +VAT Overnight accommodation is not included in the registration fee, for nearby
accommodation options and best possible rates and special offers please
Workshop*** £349 +VAT visit http://www.HotelMap.com/M6Z4E. This map displays live availability
and allows you to book directly with each hotel. Alternatively, if you would
*Must register and pay by the early RSVP discount expiry date with your RSVP CODE 12956.005 <Merge Code> like to book your accommodation by phone, you can call Daniel Spinner
Early RSVP discounts are not valid in conjunction with any other offer. on +44 20 7292 2335 quoting Special Reference Code M6Z4E.
** Military rates apply to serving military officer and government personnel only. Academic rates apply to university accredited personnel only.
MoD sponsored institutions are subject to military rates.
*** Please select your choice of workshop A 6 B 6
All above prices are subject to 17.5% VAT. VAT No GB 799 2259 67
Free Online Resources
Delegate Details To claim a variety of articles, podcasts and other free resources
Please photocopy for each additional delegate please visit www.cyberwarfare-event.com
6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other
First Name Family Name
Digital Conference On CD-ROM
Rank Job Title A digital version of the conference proceedings, including all
Tel No. presentations, is available to buy.
Email 6 I cannot attend the event, please send me the CD Rom priced at
£599 plus VAT
6 Yes I would like to receive information about products and services via email
Recent digital conferences available - £599 plus VAT each
Organisation
6 Cyber Security 2010
Nature of business 6 Network Centric Warfare 2010
Address 6 Please send me conference materials indicated above.
Postcode Country 6 I have filled out credit card details below
Telephone Fax For further information
Approving Manager Please call: 0207 368 9300 or email: knowledgebank@iqpc.co.uk.
Name of person completing form if different from delegate: To search IQPC’s archived conference documentation
visit: www.iqpcknowledgebank.com
Signature
I agree to IQPC’s cancellation, substitution and payment terms Terms and Conditions
Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify) Please read the information listed below as each booking is subject to IQPC Ltd standard terms and conditions.
Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6 Payment Terms: Upon completion and return of the registration form full payment is required no later than 5
business days from the date of invoice. Payment of invoices by means other than by credit card, or purchase order
Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking. (UK Plc and UK government bodies only) will be subject to a £49 (plus VAT) per delegate processing fee. Payment
must be received prior to the conference date. We reserve the right to refuse admission to the conference if payment
Payment Method has not been received.
IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates at any time by
Total price for your Organisation: (Add total of all individuals attending): providing reasonable advance notice to IQPC.
For any cancellations received in writing not less than eight (8) days prior to the conference, you will receive a 90%
Card Number: VISA 6 M/C 6 AMEX 6 credit to be used at another IQPC conference which must occur within one year from the date of issuance of such
credit. An administration fee of 10% of the contract fee will be retained by IQPC for all permitted cancellations. No
6666666666666666 credit will be issued for any cancellations occurring within seven (7) days (inclusive) of the conference.
In the event that IQPC cancels an event for any reason, you will receive a credit for 100% of the contract fee paid.
Exp. Date: 6 6 6 6 Sec: 6 6 6 6 You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year
Conference code 12956.005
from the date of cancellation.
In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling to attend in on the
Name On Card: Signature: rescheduled date, you will receive a credit for 100% of the contract fee paid. You may use this credit for another
IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of postponement.
Except as specified above, no credits will be issued for cancellations. There are no refunds given under any
Billing Address (if different from below): circumstances.
IQPC is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/postponement
of an event. IQPC shall assume no liability whatsoever in the event this conference is cancelled, rescheduled or
City/County/Postcode Cheque enclosed for: £ (Made payable to IQPC Ltd.) postponed due to a fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance
of this conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event shall include,
but not be limited to: war, fire, labour strike, extreme weather or other emergency.
(Please quote 12956.005 with remittance advice) Please note that while speakers and topics were confirmed at the time of publishing, circumstances beyond the
control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics.
IQPC Bank details: HSBC Bank Plc, 67 George Street, Richmond, Surrey TW9 1HG, United Kingdom As such, IQPC reserves the right to alter or modify the advertised speakers and/or topics if necessary without any
Sort Code: 40 38 18, Account No: 51304143, IBAN Code: GB59 MIDL 4038 1851 3041 43 liability to you whatsoever. Any substitutions or alterations will be updated on our web page as soon as possible.
Swift Code: MIDLGB2112V Account name: International Quality & Productivity Centre Ltd. Discounts: All ‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order to
receive any discount. Any discounts offered whether by IQPC (including team discounts) must also require payment
at the time of registration. All discount offers cannot be combined with any other offer
PAYMENT MUST BE RECEIVED PRIOR TO THE CONFERENCE 6 Please do not pass my information to any third party