REGISTER NOW  · • What is Defence going to do to ensure the skilled Cyber Warriors are prepared...

4
Researched and developed by: REGISTER NOW SECURE ORDER 3rd annual GOLD SPONSOR: ENDORSED BY: EXHIBITOR: PLATINUM SPONSOR: Plus 2 post-conference workshops on Friday 14th June 2013 Featuring presentations from: Scott Borg, Director (CEO) and Chief Economist, U.S. Cyber Consequences Unit Lt. Col. (Ret.) William Hagestad II, Chief Cyber Security Strategist Robert Behler, Chief Operating Officer, Software Engineering Institute, Carnegie Mellon University Jeff Snyder, Vice President, Cyber Programs, Raytheon Company Peter Lilley, Australasian Region Director, BAE Systems Detica Prof Craig Valli, Director, ECU Security Research Institute, Edith Cowan University Tobias Feakin, Senior Analyst, National Security, Australian Strategic Policy Institute Jurgen Opfer MTCP, MAIPIO, MIEEE, Director, Australian Chapter of the Association of Old Crows, and Systems Engineer, Fujitsu Donald Jokhan, IT Architect, IBM Scientia Professor Gernot Heiser, Leader, Software Systems Research Group, NICTA www.admevents.com.au

Transcript of REGISTER NOW  · • What is Defence going to do to ensure the skilled Cyber Warriors are prepared...

Page 1: REGISTER NOW  · • What is Defence going to do to ensure the skilled Cyber Warriors are prepared for cyber warfare? • How cyber security makes up aspects of all Defence security,

Researched and developed by:REGISTER NOW

SECURE ORDER

3rd annual

Gold SponSor: EndorSEd by:Exhibitor:plAtinUM SponSor:

Plus 2 post-conference workshops on Friday 14th June 2013

Featuring presentations from:

Scott Borg, Director (CEO) and Chief Economist, U.S. Cyber Consequences Unit

Lt. Col. (Ret.) William Hagestad II, Chief Cyber Security Strategist

Robert Behler, Chief Operating Officer, Software Engineering Institute, Carnegie Mellon University

Jeff Snyder, Vice President, Cyber Programs, Raytheon Company

Peter Lilley, Australasian Region Director, BAE Systems Detica

Prof Craig Valli, Director, ECU Security Research Institute, Edith Cowan University

Tobias Feakin, Senior Analyst, National Security, Australian Strategic Policy Institute

Jurgen Opfer MTCP, MAIPIO, MIEEE, Director, Australian Chapter of the Association of Old Crows, and Systems Engineer, Fujitsu

Donald Jokhan, IT Architect, IBM

Scientia Professor Gernot Heiser, Leader, Software Systems Research Group, NICTA

www.admevents.com.au

Page 2: REGISTER NOW  · • What is Defence going to do to ensure the skilled Cyber Warriors are prepared for cyber warfare? • How cyber security makes up aspects of all Defence security,

The 3rd annual ADM Cyber Security Summit

DAY ONE

Wednesday 12th June 2013

8:30 Registration, welcome coffee & networking

9:00 Opening remarks from Chair

9:05 intErnAtionAl kEynotE

replacing industrial defense thinking with Cyber defense thinking

Cyber attacks require a profound shift in the way we think about defense. Defense strategies that depend entirely on deterrence are no longer viable. The assumption that our main adversaries will be nation states has become dangerously narrow. Spatial metaphors, including the idea of “cyberspace” itself, encourage approaches that are profoundly misleading. The idea that using military force means blowing things up or physically capturing them has become downright naive. Even efforts to achieve shorter OODA Loops are becoming, in many cases, irrelevant. This talk will explain:

• The conceptual framework for the cyber defense era and how it differs from the one for the industrial defense era

• The specific ways cyber attacks can support or replace physical attacks

• The dangers in using cyber attacks for tactical purposes

• The new role of advanced malware and triggering strategies

Scott Borg, Director and Chief Economist, U.S. Cyber Consequences Unit

9:45

Senior representative, Defence Signals Directorate

10:20 intErnAtionAl SkypE SESSion

Cybersecurity: Finding synergy between industry and government

When CSOs and CISOs in government compare notes with their counterparts in corporate settings like banks, consumer-facing companies, cloud companies among others, much can be learned and shared in countering cyber threats. How do we maintain awareness of emerging technologies? What processes do we use to evaluate the efficacy of the vendors claims? What products will become tomorrow’s standards and how long will they last? How do we determine when to adopt major new technology platforms or when to sit it out? What are the major cycles that drive security models and their adoption, i.e., budgetary, legal requirements, catastrophic events, etc. that produce sudden and often substantial investments?

Curtis KS Levinson, Advisor, North Atlantic Treaty Organization, and Subject Matter Expert, United States Cyber Defense

10:55 Morning tea

11:25 Countering the cyber security threat – a government response

Speaker TBC

12:00 A role for industry in Australia’s cyber security • Emerging threats and cyber security predictions

• Australia’s cyber security maturity – are we up for the challenge?

• Industry and government as partners in tackling Australia’s cyber security challenges

• The role of government

• The role for industry

• What is happening elsewhere and how well is it working?

• What does success look like?

Peter Lilley, Australasian Region Director, BAE Systems Detica

12:35 Lunch

1:30 intErnAtionAl kEynotE

Facts of Chinese history of cyber risk and economic reward as it directly applies to Australia

Fundamental elements of the Official Communist Party, People’s Liberation Army and their direct involvement in Chinese Electronic & Information Warfare, specifically related to the Country of Australia will be presented, reviewed and discussed.

Distinct cyber rules of engagement in participating with the Chinese State will be presented as well as suggested short and long term moves for future confidential successes in the People’s Republic of China. In conclusion, specific recommendations and suggestions for future actions will be offered as well as an opportunity for detailed question and answer.

Lt. Col. (Ret.) William Hagestad II, Chief Cyber Security Strategist

2:05 information security adaptation: Survival in an evolving threat landscape

• Anatomy of an attack

• The evolving threat landscape

• Securing tomorrow’s perimeter

Mick Stephens, General Manager ANZ, Radware

2:40 Afternoon tea

3:10 intErnAtionAl kEynotE United States Air Force Major General (ret.) Robert Behler,

currently the Deputy Director and Chief Operating Officer of the Carnegie Mellon Software Engineering Institute, will address the increasingly complex world of cyber security in software intensive systems.

Robert Behler, Chief Operating Officer, Software Engineering Institute, Carnegie Mellon University

3:45 Cyber policy – the moving target • Maintaining an effective policy of a technology that does not

fall under the primary control of the Government

• How imposing government boundaries on the use of cyber space is problematic

• Is a White Paper on cyber even relevant any more?

Tobias Feakin, Senior Analyst, National Security, Australian Strategic Policy Institute

4:20 Closing remarks from the Chair and networking drinks

Sponsorship & exhibition

opportunities

To enquire about sponsorship and exhibition opportunities, please contact Samuel Wilson on (02) 9080 4371 or

email: [email protected]

www.admevents.com.au

• for 2013-2014

• government is protectedThe emerging cyber threat-ensuring the Australian

• How can Defence better protect itself from the threat of future cyber attacks?

Changes to DSD's award winning mitigation strategies

Identifying the future cyber challenges for Australia

Page 3: REGISTER NOW  · • What is Defence going to do to ensure the skilled Cyber Warriors are prepared for cyber warfare? • How cyber security makes up aspects of all Defence security,

The 3rd annual ADM Cyber Security Summit

please visit the website for regular updates and changes to the program. be kept in the loop with this event

DAY TWO

Thursday 13th June 2013

8:30 Morning coffee & networking

9:00 Opening remarks from Chair

9:05 intErnAtionAl indUStry kEynotE

A layered approach to achieve cyber resiliency A more comprehensive cyber solution involves much

more than installing a few firewalls to block the novice attacker. The advanced cybersecurity threat is very real, complex, zero-day and persistent. As such, it takes a layered, multi-faceted approach to minimize the probability of experiencing cyber harm from both external and insider threats.

Jeff Snyder, Vice President, Cyber Programs, Raytheon Company

9:40 provable isolation Isolation between system components is an essential

prerequisite for security. Isolation can be compromised by design or implementation flaws in hardware or software and the way these interact. Recent research at NICTA has, for the first time, removed a large class of such threats by mathematical correctness proofs of software. This talk will provide an overview of NICTA’s work on the seL4 security kernel, which now has a complete proof chain from high-level integrity and confidentiality requirements down to executable code which runs on the hardware.

Scientia Professor Gernot Heiser, Leader, Software Systems Research Group, NICTA

10:15 Morning tea

10:45 Skilling the Cyber Warriors of tomorrow • Ensuring Australia’s electronic borders are maintained from

the threats of cyber breaches

• What is Defence going to do to ensure the skilled Cyber Warriors are prepared for cyber warfare?

• How cyber security makes up aspects of all Defence security, including land, sea and aerospace

• Allocating an appropriate proportion of Defence time and budget moving forward

Prof Craig Valli, Director, ECU Security Research Institute, Edith Cowan University

11:20 A telstra thought leader on cyber security will discuss strategies to protect critical data and infrastructure from unauthorised intrusion and cyber criminals

Senior Representative, Telstra

12:00 Lunch

1:00 the overlap between Cyber and Electronic Warfare • Channeling the effective use of EW and cyber techniques

that can enhance the protection of Australia’s deployed forces and increase their effectiveness

• Anticipating and nullifying potential cyber adversaries

• Convergence of Cyber Warfare and Electronic Warfare

Jurgen Opfer MTCP, MAIPIO, MIEEE, Director, Australian Chapter of the Association of Old Crows, and Systems Engineer, Fujitsu

1:40 Can social media identities of defence personnel ever be secure?

• How is social media and future warfare linked?

• What does a data breach actually mean for Defence security?

• What are the realistic steps Defence can take?

Mark Gregory, Senior Lecturer, School of Electrical and Computer Engineering, RMIT University

2:20 Afternoon tea

2:50 Cyber terrorism • Defending Australia from foreign cyber espionage

• What Defence Intelligence has found so far

• Where does the threat originate from and what is the purpose?

• Who is most at risk?

Milton Baar, Centre for Policing, Intelligence and Counter Terrorism, Macquarie University

3:30 Application of deep analytics in detecting and combating cyber threats

Donald Jokhan, IT Architect, IBM

4:10 Closing remarks from Chair

4:15 End of conference

Post-Conference Workshops

Friday 14th June 2013

9:00 – 12:30

WorkShop A: Making application whitelisting work

Course Detail: Foresight Consulting has significant practical experience in the implementation and operation of application whitelisting solutions. This course will cover the common whitelisting implementation challenges faced by organisations and assist you in the selection and implementation of a robust and secure technology. This technical workshop will cover:

• Application whitelisting challenges;

• Choosing a technology / technology limitations;

• Capturing hashes;

• Delivering updates & security patches;

• Operational workflows.

This course is aimed at system administrators responsible for the implementation and operation of application whitelisting solutions.

Facilitator: Peter Baussmann, Founder and Director, Foresight Consulting

1:30 – 4:00

WorkShop b: red dragon rising

This workshop will assess the cyber threat currently being deployed by China in order to better defend against the advanced persistent threat. Emphasising defensive measures to be taken against the attack, the workshop will provide a run down of the People’s Republic of China’s cyber wafare capability, addressing the following points:

• A composite review of Chinese cyber conflict history

• Origins of Chinese EW & IW policy - historical perspective

• Examination of “Unrestricted Warfare” (War Without Limits)

• Who is the Chinese adversary (CPC; PLA; SOE & Hacktivists)

• Determining the future of Chinese cyber intentions

Facilitator: Lt. Col. (Ret.) William Hagestad II, Chief Cyber Security Strategist

via linkedin, twitter, you tube and our blog. Full details at www.admevents.com.au

Page 4: REGISTER NOW  · • What is Defence going to do to ensure the skilled Cyber Warriors are prepared for cyber warfare? • How cyber security makes up aspects of all Defence security,

REGISTER EARLY & SAVE UP TO $200Early BirD ratE

Book & pay on until 28 Feb 2013

Conference $1,695 $169.50 $1,864.50 $200 $1,895 $189.50 $2,084.50

Conference + one workshop (A or B) $2,095 $209.50 $2,304.50 $200 $2,295 $229.50 $2,524.50

Conference + both workshops $2,495 $249.50 $2,744.50 $200 $2,695 $269.50 $2,964.50

One workshop (A or B) $595 $59.50 $654.50 $100 $695 $69.50 $764.50

Both workshops $1,095 $109.50 $1,204.50 $100 $1,195 $119.50 $1,314.50

StaNDarD ratEBook & pay after 28 Feb 2013

PRICE GST TOTAL SAVE PRICE GST TOTAL

3 EASY WAYS TO REGISTER

Telephone (+61 2) 9080 4307 – Please quote the event code P13K21 with your booking.

Email [email protected] – Please quote the event code P13K21 with your booking.

STAY CONNECTED

LinkedIn Group www.admevents.com.au/linkedin

Twitter twitter.com/informa_oz

Blog informaaustralia.wordpress.com

YouTube www.youtube.com/informaoz

The 3rd annual ADM Cyber Security Summit 12-13 June 2013 | Hotel Realm Canberra

Network with leading professionals and learn from key case studies by registering yourself or your team today.

REGISTER NOWSECURE ORDER

rEGiStEr todAy At www.admevents.com.au/2013

Conference VenueHotel Realm, Canberra

18 National Circuit, Barton ACT 2600

Phone: (+61 2) 6163 1888

www.hotelrealm.com.au

Accommodation & TravelTravel and accommodation fees are not included in the conference fees. We do not refund airfares or hotel expenses if the event is cancelled.

Privacy Policy & Updating Your DetailsPlease visit us online for our full privacy policy at www.informa.com.au/privacy. Database amendments can be sent to [email protected] or by calling (+61 2) 9080 4307 asking for the database department.

Payment TermsPayment must be made prior to the event or admittance will not be permitted. A tax invoice and confirmation letter will be emailed to the attendee upon completion of a valid registration. Payment may be made by EFT, cheque or credit card. Credit card payments will not be accepted by email or fax and must be made via our secure credit card gateway.

A.B.N. 66 086 268 313

Registration Fees IncludeEntrance to the relevant conference package purchased plus refreshments, lunch and online access to available presentations (five working days post event). They do not include airfares or hotel rooms.

Dress CodeBusiness attire is suggested along with a sweater or jacket in case the conference room is cool.

Cancellation Policy & SubstitutionsCancellations must be advised in writing at least 10 working days prior to the event. An administration fee of $550 (inc 10% GST) will be incurred for cancellations. A refund will not be given if a delegate fails to attend or cancels within 10 working days prior to the event.

Fully paid delegates unable to attend will be provided with on line access to speaker presentations post event. Substitutions can be made at any time before the event without penalty.

Informa reserves the right to cancel, alter the content and/or speakers on any program. Paid registration fees will be fully refunded for cancelled events.

Use your QR Reader App on your smartphone and scan this code to take you directly to the website

Web www.admevents.com.au

rEGiStEr onlinE via our secure server www.admevents.com.au