Cyber Security for the Military and Defence Sector 2013

6
CYBER SECURITY FOR THE MILITARY AND DEFENCE SECTOR 19 - 20 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK www.cyberdefenceevent.com Register online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 WHY SHOULD YOU ATTEND LEARN- about emerging threats, current initiatives and the recent technical developments in network, firewall, and database security ASSESS- the experiences of current military operators and share ideas with civilian industrial peers ANALYSE- the latest cyber defence solutions, training and network threats ENGAGE- with international military and inductrial representatives in dedicated question & answer sessions. Communicate directly with military operators, defence contractors tasked with supplying secure equipment, as well as experts at the forefront of producing cyber security solutions. SPEAKER PANEL INCLUDES CONFIRMED CHAIRMAN: Commander Wolfgang Roehrig, Project Officer Cyber Defence, European Defence Agency Dr Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO Mr Ulrich Poeschl, Chief Security Architect, Infosec Planning & Implementation Authority, Austrian MoD Mr John Ross, Strategic Analyst, Canadian Department of National Defence Ms Heli Tiirma Klaar, Cyber Security Policy Advisor, Conflict Prevention and Security Policy Directorate, European External Action Service Hasan Yasar, Technical Manager, CERT, Digital Intelligence and Investigations, Software Engineering Institute Mr Akira Yamada, Senior Security Analyst, Cyber Defence Institute Japan Special Agent representative, FBI Cyber ALAT, Cyber Division, Federal Bureau of Investigation Mr Patrick Curry OBE, Director, British Business Federation Authority Mr Geoff Harris, Management Council, Information Security Systems Associations UK BOOK BY 28TH FEBRUARY TO SAVE £300 BOOK BY 28TH MARCH TO SAVE £100 A: Threat Intelligence, Threat Horizons WORKSHOP LEADER: Mr Cristiano Lincoln Mattos, SEO, Tempest Security Intelligence 09.00-12.30 B: Process Modelling for Information Security Engineering (PROMISE) in the UKCNI WORKSHOP LEADER: Dr Howard Thompson, Managing Director, NAS Defence 13.00-17.00 PLUS TWO INTERACTIVE HALF-DAY PRE-CONFERENCE WORKSHOPS 18 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK SMi Presents their 6th annual

description

SMi Groups inaugural Cyber Security for the Military & Defence Sectors

Transcript of Cyber Security for the Military and Defence Sector 2013

Page 1: Cyber Security for the Military and Defence Sector 2013

CYBER SECURITY FOR THE MILITARY ANDDEFENCE SECTOR

19 - 20 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK

www.cyberdefenceevent.comRegister online or fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711

WHY SHOULD YOU ATTEND

• LEARN- about emergingthreats, current initiatives andthe recent technicaldevelopments in network,firewall, and databasesecurity

• ASSESS- the experiences ofcurrent military operators andshare ideas with civilianindustrial peers

• ANALYSE- the latest cyberdefence solutions, trainingand network threats

• ENGAGE- with internationalmilitary and inductrialrepresentatives in dedicatedquestion & answer sessions.Communicate directly withmilitary operators, defencecontractors tasked withsupplying secure equipment,as well as experts at theforefront of producing cybersecurity solutions.

SPEAKER PANEL INCLUDES

CONFIRMED CHAIRMAN:

Commander Wolfgang Roehrig, Project Officer Cyber Defence,European Defence Agency

Dr Jamie Shea, Deputy Assistant Secretary General, EmergingSecurity Challenges Division, NATO

Mr Ulrich Poeschl, Chief Security Architect, Infosec Planning &Implementation Authority, Austrian MoD

Mr John Ross, Strategic Analyst, Canadian Department ofNational Defence

Ms Heli Tiirma Klaar, Cyber Security Policy Advisor, ConflictPrevention and Security Policy Directorate, European ExternalAction Service

Hasan Yasar, Technical Manager, CERT, Digital Intelligence andInvestigations, Software Engineering Institute

Mr Akira Yamada, Senior Security Analyst, Cyber DefenceInstitute Japan

Special Agent representative, FBI Cyber ALAT, Cyber Division,Federal Bureau of Investigation

Mr Patrick Curry OBE, Director, British Business FederationAuthority

Mr Geoff Harris, Management Council, Information

Security Systems Associations UK

BOOK

BY

28TH FE

BRUA

RY TO

SAVE £3

00

BOOK

BY 28

TH MAR

CH TO

SAVE £1

00

A: Threat Intelligence, Threat HorizonsWORKSHOP LEADER: Mr Cristiano Lincoln Mattos, SEO,

Tempest Security Intelligence09.00-12.30

B: Process Modelling for Information SecurityEngineering (PROMISE) in the UKCNI

WORKSHOP LEADER: Dr Howard Thompson, Managing Director, NAS Defence13.00-17.00

PLUS TWO INTERACTIVE HALF-DAY PRE-CONFERENCE WORKSHOPS18 JUNE 2013 | COPTHORNE TARA HOTEL | LONDON, UK

SMi Presents their 6th annual

Page 2: Cyber Security for the Military and Defence Sector 2013

DAY ONE I 19 JUNE 2013 www.cyberdefenceevent.com

Register online at www.cyberdefenceevent.com • Fax: +44 (0) 870 90 Supported by

08.30 REGISTRATION & COFFEE

09.00Chairman's Opening Remarks

Mr Geoff Harris, Management Council, InformationSecurity Systems Associations UK

OPENING ADDRESS 09.10NATO’s policy on cyber defence and the evolution of the cyberchallenge• How cyber is changing the nature of conflict and crisis

management• NATO's perception of the cyber threat • How NATO is constructing its cyber defence organization• Future tasks and challenges

Dr Shea, Deputy Assistant Secretary General, EmergingSecurity Challenges Division, NATO

09.50Technical aspects of cyber security as seen by the Austrianmilitary and the local milCERT• What is as an "advanced threat"?• (Scary) ways around conventional defence mechanisms• Live-Demo of a target-system infection with conventional

defence• Emerging cyber threats - strategies to cope with them• Optional: Further live-demos (Fighting back the malware from

1st demo, create custom anti-virus signatures)Mr Ulrich Poeschl, Chief Security Architect, InfosecPlanning & Implementation Authority, Austrian MoD

10.30 MORNING COFFEE

11.00Adversity, risk and trustworthiness• Why there is a need for a consensus on adversity, risk and

trustworthiness• The role of Standards Development Organisations (SDO) in

achieving such a consensus• Achieving the desired outcome with the Trustworthy Software

Framework (TSF)Mr Ian Bryant, Technical Director, Trustworthy SoftwareInitiative

11.40Speed up the velocity of investigation with behaviour analysis ofmalware• Identify and capture the signature of suspicious files,• Behavioural Analysis with correlation of other artefact, • Importance of Multiple Analysis Platform,• How to correlate multiple malware and find the similar ones?• Result: Malware activity graphs.

Hasan Yasar, Technical Manager, CERT, DigitalIntelligence and Investigations, Software EngineeringInstitute

12.20 NETWORKING LUNCH

13.40

Risks of Social Media to Organizations and Personnel • Insight into potentially disruptive effect of social media on

defence and security

• Insight into personnel implications from work-related to

personal issues

• Insight into organizational implications including cyber-vetting,

trust and potential effects on organizational management

• Using example from real-world and potential scenarios

John Ross, Strategic Analyst, Canadian Department of

National Defence

14.20

Sharing sensitive information securely- times are changing• What business and cyber information is being shared securely

and the strategic drivers for it?

• What are the collaborative mechanisms, technologies and

standards enabling such sharing, and the threats to success?

• Where is such information sharing happening in UK and

internationally?

• What's likely to happen in the next 3 years and what should

my organisation be doing?

Mr Patrick Curry OBE, Director, British Business Federation

Authority

15.00 AFTERNOON TEA

15.30

Cyber Security and the UK's Critical National Infrastructure• Identifying what elements are ‘critical’

• Benefits and risks of international commercial cooperation

• Creating and maintaining a stable cyber policy for protecting

CNI

Mr Dave Clemente, Research Associate, International

Security, Royal Institute of International Affairs

16.10

Defending the UK defence industry against cyber attack • The changing landscape of the cyber threat to the UK

Defence Industry

• Understanding your cyber resilience maturity in the face of the

cyber threat?

• How the UK Defence industry is working together to detect,

analyse and respond to threats

• What does the cyber future bring for the UK Defence Industry?

Mr Vincent Blake, Head of Cyber Security,

Raytheon UK

16.50

Chairman's Closing Remarks and Close of Day One

Page 3: Cyber Security for the Military and Defence Sector 2013

DAY TWO I 20 JUNE 2013 www.cyberdefenceevent.com

090 712 • Call: +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE

Are you interested in promoting your defence services to atargeted industry sector? SMi offer tailored marketing

packages so that your association / publication can gainaccess to a global market and key decision makers in the

defence market. Contact Sonal Patel, SMi Marketing on +44 (0) 20 7827 6106

or email: [email protected]

SPONSORSHIP AND EXHIBITION OPPORTUNITIESSMi offer sponsorship, exhibition, advertising and branding packages,uniquely tailored to complement your company's marketing strategy. Primenetworking opportunities exist to entertain, enhance and expand your clientbase within the context of an independent discussion specific to yourindustry. Should you wish to join the increasing number of companiesbenefiting from sponsoring our conferences please call: Simon Wright, SMiSponsorship +44 (0) 20 7827 6732 or email: [email protected]

08.30 REGISTRATION & COFFEE

09.00

Chairman's Opening Remarks

Mr Geoff Harris, Management Council, Information

Security Systems Associations UK

OPENING ADDRESS

09.10

The FBI's role in the advancement of cyber security

Special Agent representative, FBI Cyber ALAT, Cyber

Division, Federal Bureau of Investigation

09.50

Strategies for cyber security and defence: Organisational

perspective

• Presentation will offer a blueprint what constitutes a successful

cyber strategy

• Comparison of national cyber strategies

• Basic elements of a cyber defence policy of a multinational

organisation

• Major elements for a successful national cyber security and

defence strategy

Ms Heli Tiirma Klaar, Cyber Security Policy Advisor,

Conflict Prevention and Security Policy Directorate,

European External Action Service

10.30 MORNING COFFEE

11.00

Cyber Defence Capability Building in EU

• Military aspects of the cyber security strategy for the European

Union

• Military capability development in EU cyber defence

• Pooling & Sharing in Cyber Defence

• A stock-take of EU cyber defence capability

Commander Wolfgang Roehrig, Project Officer Cyber

Defence, European Defence Agency

11.40

Japanese cyber security update

• Cyber threats/attacks in Japan

• Response activities

• Findings from massive cyber attacks

• Activities on digital Forensics

Mr Akira Yamada, Senior Security Analyst,

Cyber Defence Institute Japan

12.20 NETWORKING LUNCH

13.40Achieving global cyber security through cooperation• About ENISA• Protecting Critical Information Infrastructure• Input to EU & MS Cyber Security Strategies• Assisting Operational Communities• Security & Data Breach Notification• Data Protection• Future Direction

Dr Steven Purser, Head of Core Operations Department,European Network and Information Security Agency(ENISA)

14.20Voluntary participation in national cyber defence: The exampleof the Estonian cyber defence unit• Legal and policy framework for using volunteers in national

cyber defence• Functioning and roles of the CDU: Estonian case study• Legal implications arising from using volunteers in national

cyber defence Senior Scientist, Legal & Policy Branch, NATO CCD COE

15.00 AFTERNOON TEA

15.30Cyber security incident response • The security services industry’s response to cyber security

threats; how do you prepare for an incident and what are theimmediate steps and decision making process that you willhave to go through following an incident

• Government and private sector initiatives for validating thirdparty security services providers

• How to identifying suitable cyber security incident responseservice suppliers and what should be considered in contractsfor their services

Mr Ian Glover, President, CREST

16.10Building and managing a comprehensive computer Incidentresponse capability• Don't start when the horse has bolted; Starting with protection

and defence• Scope and ambition • Appetite for Interoperability

- Are you prepared to share with other nations?• What tools are out there?• The need for integration and cooperation

Mr Jeremy O’Connor, Security & Smart Solutions, Selex ES

16.50Chairman's Closing Remarks and Close of Day Two

Page 4: Cyber Security for the Military and Defence Sector 2013

Threat Intelligence, Threat Horizons

OverviewThis workshop will give delegates a valuableinsight in to the actions and motivations ofpotential attackers and understand the number,diversity and speed of actual attacks on theirsystems and the motivation, techniques, strategiesand operations of the attackers as well as theimplications of changing IT trends such as BYOD,cloud computing and mobile technology. For toolong we have been playing ‘catch up’ with thecyber criminals – it’s time to get ahead of thegame and give ourselves an intelligentadvantage.

Agenda08.30 Registration & Coffee

09.00 Global cyber threat outlook (recentdiscoveries/attacks and operations withtheir likely background andimpact/international implications)

09.45 Morning Coffee

10.30 Sector specific cyber threat outlook (financial sector/CNI/aviation/pharma etc)

11.15 Collateral damage from malware used onan international base(examples for Flame, Duqu, Stuxnet andhow they are being exploited by cybercriminals)

12.00 End of Workshop

About the Workshop LeaderMr Cristiano Lincoln Mattos, SEO, TempestSecurity IntelligenceCEO Cristiano Lincoln Mattos has been active inInformation Security since being introduced to theinternet in 1993, and has accumulated significantexperience in both engineering and testingsecurity defences. As one of Tempest’s founders,Lincoln has fulfilled a critical role in creating anddeveloping the company’s expertise, productsand strategy over the past 12 years. Anexperienced consultant, he has assumed avariety of roles within Tempest, includingpenetration testing and vulnerability researchprojects, developing software tools, and buildingand leading top-notch teams through complextechnical projects.

About Tempest Security IntelligenceTempest Security Intelligence has been deliveringexceptional service quality to Clients in Brazil andEurope for the past 12 years. Tempest delivershighly specialised information security consultingservices to large and medium-sized organisationsin the private and public sectors, and is relied onto protect some of the largest global financialinstitutions. Our focus on information securitymanagement allows us to build long-term,strategic relationships with our clients that result instable and continuous service. Our in-depthknowledge, expertise and extensive R&D efforts,have given Tempest an authoritative position inthe cyber security market.

HALF-DAY PRE-CONFERENCE WORKSHOP A

9.00 – 12.30 I 18 JUNE 2013

COPTHORNE TARA HOTEL I LONDON, UK

In association with

Page 5: Cyber Security for the Military and Defence Sector 2013

Process Modelling forInformation Security Engineering

(PROMISE) in the UKCNI

OverviewThe UK Critical National Infrastructure (UKCNI) iscrucial to the safetl and defence of the UK,however, they are not always Governmentowned, are often in the hands of foreign ownersand are not subject to a consistent or supervisedlevel of information security. This workshop willaddress this issue by presenting a model for thedesign of a socio-technical information securityengineering management design methodologyfor the purpose of reconciling technicalrequirements with human and social factorsinherent in any management system. The method,called PROMISE (Process Modelling for InformationSystems Engineering), is intended to provide amodel for a researched platform of ideas,expressed as processes, in order to better informinformation security decisions with the aim ofmaking those decisions better suited to the needsof the information security manager operating ina UKCNI organisation.

Agenda13.30 Registration & Coffee

14.00 Security management in the UKCNI- It’s notjust technology

15.00 Afternoon Tea

15.30 How can Information security managementprocesses in the UKCNI be better designed,developed and implemented?

16.30 Question & Answer Discussion

17.00 End of Workshop

About the Workshop LeaderDr Howard Thompson, ManagingDirector, NAS DefenceAfter a career in policing, security andcounter-intelligence work in governmentservice, a number of years of whichwere spent in IT and Communications

Security, Dr Howard Thompson moved into theprivate sector where he built on his technicalexpertise by gaining commercial and industrialsector skills and knowledge. Since then, he hasundertaken a number of IT security consultancy andmanagement roles in various international industriesincluding aerospace, defence and systems, andnow practices as an IT Security Consultant,providing services to many companies andorganisations that now comprise the UKCNI.

About NAS CyberDefenceNAS CyberDefence consultancy services aredesigned to help organizations to realize the secureand safe management of corporate governance,manage operational risk, maintain legal, regulatoryand standards compliance, protect intellectualproperty and secure business communications.

HALF-DAY PRE-CONFERENCE WORKSHOP B

13.30-17.00 I 18 JUNE 2013

COPTHORNE TARA HOTEL I LONDON, UK

In association with

Page 6: Cyber Security for the Military and Defence Sector 2013

If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at [email protected]

CYBER SECURITY FOR THE MILITARY AND DEFENCE SECTORCONFERENCE: 19 - 20 JUNE 2013 COPTHORNE TARA HOTEL, LONDON, UK | WORKSHOPS: 18 JUNE 2013

4 WAYS TO REGISTER

FAX your booking form to +44 (0) 870 9090 712PHONE on +44 (0) 870 9090 711

ONLINE at www.cyberdefenceevent.com

□ Book by 28 February and receive a £300 discount

□ Book by 28 March and receive a £100 discount EARLY BIRDDISCOUNT

Payment must be made to SMi Group Ltd, and received before the event, by one ofthe following methods quoting reference D-031 and the delegate’s name. Bookingsmade within 7 days of the event require payment on booking, methods of paymentare below. Please indicate method of payment:□ UK BACS Sort Code 300009, Account 00936418□ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU

Swift (BIC): LOYDGB21013, Account 00936418IBAN GB48 LOYD 3000 0900 9364 18

□ Cheque We can only accept Sterling cheques drawn on a UK bank.□ Credit Card □ Visa □ MasterCard □ American Express

All credit card payments will be subject to standard credit card charges.

Card No: □□□□ □□□□ □□□□ □□□□Valid From □□/□□ Expiry Date □□/□□CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card

Cardholder’s Name:

Signature: Date:I agree to be bound by SMi's Terms and Conditions of Booking.

Card Billing Address (If different from above):

CONFERENCE PRICES GROUP DISCOUNTS AVALABLE

DOCUMENTATION (Shipped 10-14 days after the event)I cannot attend but would like to purchase access to the following DocumentPortal/paper copy documentation: Price Total□ Access to the conference documentation

on the Document Portal £499.00 + VAT £598.80□ The Conference Presentations - paper copy £499.00 - £499.00

(or only £300 if ordered with the Document Portal)

VENUE□ Please contact me to book my hotelAlternatively call us on +44 (0) 870 9090 711, email: [email protected] or fax +44 (0) 870 9090 712

VATVAT at 20% is charged on the attendance fees for all delegates. VAT is also charged onDocument Portal and Literature Distribution for all UK customers and for those EU customers notsupplying a registration number for their own country here: _______________________

PAYMENT

POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor South,Harling House, 47-51 Great Suffolk Street, London, SE1 0BS

Payment: If payment is not made at the time of booking, then an invoice will be issued and mustbe paid immediately and prior to the start of the event. If payment has not been received thencredit card details will be requested and payment taken before entry to the event. Bookings within7 days of event require payment on booking. Access to the Document Portal will not be given untilpayment has been received.

Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, anotherdelegate to take your place at any time prior to the start of the event. Two or more delegates maynot ‘share’ a place at an event. Please make separate bookings for each delegate.

Cancellation: If you wish to cancel your attendance at an event and you are unable to send asubstitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providingthat cancellation is made in writing and received at least 28 days prior to the start of the event.Regretfully cancellation after this time cannot be accepted. We will however provide theconferences documentation via the Document Portal to any delegate who has paid but is unableto attend for any reason. Due to the interactive nature of the Briefings we are not normally able toprovide documentation in these circumstances. We cannot accept cancellations of ordersplaced for Documentation or the Document Portal as these are reproduced specifically to order.If we have to cancel the event for any reason, then we will make a full refund immediately, butdisclaim any further liability.

Alterations: It may become necessary for us to make alterations to the content, speakers, timing,venue or date of the event compared to the advertised programme.

Data Protection: The SMi Group gathers personal data in accordance with the UK Data ProtectionAct 1998 and we may use this to contact you by telephone, fax, post or email to tell you aboutother products and services. Unless you tick here □ we may also share your data with third partiesoffering complementary products or services. If you have any queries or want to update any ofthe data that we hold then please contact our Database Manager [email protected] or visit our website www.smi-online.co.uk/updates quoting the URN as detailed aboveyour address on the attached letter.

Unique Reference Number

Our Reference LV D-031

Terms and Conditions of Booking

DELEGATE DETAILSPlease complete fully and clearly in capital letters. Please photocopy for additional delegates.

Title: Forename:

Surname:

Job Title:

Department/Division:

Company/Organisation:

Company VAT Number:

Email:

Address:

Town/City:

Post/Zip Code: Country:

Direct Tel: Direct Fax:

Mobile:

Switchboard:

Signature: Date:I agree to be bound by SMi's Terms and Conditions of Booking.

ACCOUNTS DEPT

Title: Forename:

Surname:

Email:

Address (if different from above):

Town/City:

Post/Zip Code: Country:

Direct Tel: Direct Fax:

Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.

I would like to attend: (Please tick as appropriate) Fee TotalMILITARY, GOVERNMENT & PUBLIC SECTOR RATE□ Conference and both Workshops £2097.00 + VAT £2516.40□ Conference & Interactive Workshop £1498.00 + VAT £1797.60□ Conference only £899.00 +VAT £1078.80□ Interactive Workshop only £599.00 +VAT £718.80

COMMERCIAL ORGANISATIONS□ Conference and both Workshops £2697.00 + VAT £3236.40□ Conference & Interactive Workshop £2098.00 +VAT £2517.60□ Conference only £1499.00 +VAT £1798.80□ Interactive Workshop only £599.00 +VAT £718.80

PROMOTIONAL LITERATURE DISTRIBUTION □ Distribution of your company’s promotional

literature to all conference attendees £999.00 + VAT £1198.80

The Conference fee includes refreshments, lunch, conference papers and CD ROM containing all of the presentations.