Cyber Defence & Network Security

  • 1,452 views
Uploaded on

Cyber Defence and Network Security 2012 is the seminal and leading conference focusing on information operations, cyber attacks, defence, exploitation, network security and information …

Cyber Defence and Network Security 2012 is the seminal and leading conference focusing on information operations, cyber attacks, defence, exploitation, network security and information assurance.

2012 will be Defence IQ’s 6th annual conference in the series making Cyber Defence and Network Security one of the most established events of its kind. All of our cyber events attract a truly international delegation with only the leading authorities and programmes on the speaker faculty.
Held in London, 24th-27th January, Cyber Defence and Network Security, aims to discuss solutions to the following problems affecting industry, military, government and intelligence services:

• Defending networks against state sponsored cyber attacks
• Information assurance
• What security measures can be implemented to protect the Cloud
• Monitoring networks to sift out intruders
• Protecting customer records and ensuring access to systems with confidence
• Using cyber weapons as a game changing approach to warfare
• Validating and assessing networks for vulnerabilities
• Use of cyber test ranges to improve network security
• And much, much more….

For further details about the conference, please download the agenda at http://www.cdans.org/redForms.aspx?id=598084&pdf_form=1 or visit the media centre at http://www.cdans.org/Event.aspx?id=598076 for complimentary articles, podcasts, and reports.

Please note that complimentary passes are available to all serving Flag Officers 1 Star and above.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,452
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. BOOK AND PAY by DeCeMbeR 16TH TO SAvE UP TO £499! WITH A DEDICATED FOCUS DAY AND WORKSHOPS ON PROTECTING BIG BUSINESS ANDTHE ONLY CYBER CONFERENCE INCORPORATING MILITARIES, CRITICAL NATIONALCRITICAL NATIONAL INFRASTRUCTURE AND BIG BUSINESS AT INFRASTRUCTURETHE HIGHEST DECISION-MAKING LEvEL EvENT DATES: vENUE: 24TH-27TH JAnUARy 2012 THe RADISSOn bLU PORTMAn HOTeL, LOnDOn, UKEXPERT SPEAKERS INCLUDE: Mr Christopher Painter Lieutenant General Rhett Lieutenant General Kurt Coordinator for Cyber Issues, US Hernandez Herrmann Department of State Commander, US Army Cyber Director, NATO Communication Command (ARCYBER) and Information Systems Lieutenant General José Services Agency Carlos dos Santos Major General Jonathan Head of the Army Cybernetic Centre Shaw Major General Zaidi (CDCiber), Brazilian Army Commander, UK Cyber Policy and DG Technical, Deputy Commander of Plans Team, UK MoD the ISI, Pakistan Rear Admiral Arnaud Coustillière Mr David Ferbrache Mr John Stubley Cyber Defence General Officer, French Director, UK Cyber Policy and Plans Director of the Public Sector Armed Forces and French MoD Team, UK MoD Network Cabinet Office, UK Dr John Meakin Mr Mark Field MP Brigadier General Helmut CISO and Director, Digital Security, Intelligence and Security Committee, Habermayer BP UK Government Head of Military Strategy (Lead on Cyber), Austrian MoD Mr Peter Gibbons The Rt Hon The Lord Reid Head of Information Security, of Cardowan PhD PC Network Rail Chair, Institute for Security and Resilience Studies, University College Mr Andro Barnovi London, Former Home and Defence Deputy Defence Minister, Secretary GeorgiaATTenD CybeR DefenCe AnD neTwORK SeCURITy 2012 AnD See THe fOReMOST AUTHORITIeS In CRITICAL NATIONALINFRASTRUCTURE, MILITARY CYBER COMMANDS, INTELLIGENCE SERvICES AND GOvERNMENTAL DEPARTMENTS GIve HIGH-LeveL STRATeGIC AnD OPeRATIOnAL bRIefS On SeCURInG neTwORKS fROM CybeR ATTACK.24TH JANUARY 2012: 25TH - 26TH JANUARY 2012: 27TH JANUARY 2012:PRE-CONFERENCE FOCUS DAY MAIN CONFERENCE DAYS POST-CONFERENCE WORKSHOPSCritical national Infrastructure and Large businesses: The foremost authorities in military, big business, The cyber threats to critical national infrastructure,what are the current threats from cyber space; what intelligence and government give high level strategic businesses and the military. Classes led by a former UScan the military learn from these sectors and vice briefs on cyber security and network defence. intelligence officer and leading researchers from theversa; how can information remain ubiquitous and team responsible for taking down the Meriposa botnet.uncompromised at the same time?REGISTER ONLINE AT Sponsors The bbC was one of many media outlets covering 2011’s eventWWW.CDANS.ORG OR CONTACTUS AT DEFENCE@IqPC.CO.UKOR +44 (0)20 7368 9737
  • 2. 02Dear ColleagueWe’ve changed the name from Cyber ATTEND CYBER DEFENCE AND NETWORKWarfare to Cyber Defence and Network SECURITY IN ORDER TO:Security – and that’s because this year,we’ve changed the scope in a big way.Welcome to CDANS, with an international 1 Hear US Departmentthe State, US the world’s most MoD and french MoD so you can learn from briefings from heads of of Army, nATO, UK significant cyber departments includingspeaker faculty including leaders of the what the most advanced methods in cyber defence are.most prominent military cyber commands,intelligence services, government and critical 2 Meet with those responsibletheycyber security in big business andand process controls from infrastructure and hear how for intend to protect their networks critical nationalnational infrastructure. cyber attack. Apply this knowledge to your own organisation’s defences.From the conference that made internationalnews last year, our speaker faculty has 3 Learn from a truly international speaker faculty and network with an audience of senior cyber decision makers from every continent so you can gauge where the next breakthrough inbroadened to include presentations ranging technology is coming from.from operational cyber discussions, high-level strategic briefings and audience-engaged debates. 4 Benefit from dedicatedbusiness andand an entire focus day on cyber get told byand their application against big workshops critical national infrastructure – weapons the hackersIs your organisation looking to enhance its and experts about how they would penetrate your networks.cyber security, could you learn from theforemost militaries and businesses on how 5 Expand your clientintelligence contacts togovernment and international industry so cybercan from the military, base and services, include international representatives in you defenceto do this? Are you concerned about the penetrate new markets or develop partnerships.threat to your networks from mercenaryhackers? Do you have a ground-breakingsolution you want to show the biggest 6 Meet with the leading and network security whilstintegrated solutions forthe directors of small information assurance global companies offering also networking with cyber defence,budget holders in the cyber world? to medium sized firms offering innovative and unique methods to counteract cyber attacks.If the answer is “yes” to any of these thenCDANS is a must-attend conference foryou. Based in the heart of London, join ourflagship and seminal cyber event – noneother have such an impressive line-up as this.CDANS will bring together many of theworld’s experts and decision makers inwhat is already considered a priority Tier-1threat to most countries and organisation’sinterests. Be a part of this exciting andbooming market in London 24th January – “Excellent mix of speakers, all were highly qualified. Very high value.”right in the hub of its key players so you can Brigadier General Karl Schreiner, German Armed Forceslearn about the most advanced methods in (Cyber warfare 2011)cyber defence..Yours Faithfully, “Cyber Warfare 2010 was invaluable to its participants to begin understanding cyberspace and how warfare might take place in and through this global domain.” Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, Joint Military Operatios Department, US Naval War CollegeMichael Champion – Conference (Cyber warfare 2010)ProducerCyber Defence and Network Security 2012 ABOUT DEFENCEIq.COM Defence IQ is an authoritative news source for high quality and exclusive commentary and analysis on global defence and military-related topics. Sourcing interviews andDedicated focus day and insights directly from senior military and industry professionals on air defence, cyberworkshops on the cyber threat to warfare, armoured vehicles, naval defence, land defence and many more topics, Defence IQ is a unique multimedia platform to discuss and learn about the latest developmentscritical national infrastructure within the defence sector. So join over 45,000 defence professionals today to claim yourand the emerging solutions to exclusive video interviews, podcasts, articles and whitepapers that are updated on a daily basis at www.defenceiq.com - and all for free.secure networks Join the community: www.defenceiq.com/join.cfmvISIT OUR MEDIA RESOURCE CENTRE AT WWW.CDANS.ORG FOR ARTICLES, PODCASTS, vIDEOS, REPORTS AND MORE
  • 3. 03CNI FOCUS DAY: 24TH JANUARY 2012 FOCUS DAY RATIONALE Critical national Infrastructure and big business face daily cyber attacks in their thousands. This focus day will challenge your existing methods of cyber defence by revealing its weaknesses, it will reveal the latest methods of attack and discuss possible future ones. Through this exciting array of seminars and discussion panels learn from the leading global experts and some of the largest operators in big business how to develop a truly robust and secure set of cyber defences.BENEFITS OF ATTENDING:t be a part of the one of the best attended and high-profile focus days in t Learn from the Director of one of the UK government’s most ambitious Cyber, led by the former Defence and Home Secretary and current projects, the Public Sector network Chairman of UCL’s ISRS, Lord Reid t engage with all the speakers and your fellow delegates during a specialt Hear from leading experts in cyber defence, including Ian west (Head of round-table session, discuss your ideas with them, query their’s, make nATO CIRC) and Dr Steve Purser (Director, Technical Department, enISA) longlasting partnerships with people at the forefront of cyber defence.t network with some of the most important operators in Critical national Infrastructure including bP, Severn Trent water and network RailDEFENDING CRITICAL INFRASTRUCTURE AND BUSINESSES FROM COMPUTER NETWORKEXPLOITATION, INDUSTRIAL ESPIONAGE AND INTELLECTUAL PROPERTY THEFT 08.30 COFFEE AND REGISTRATION 09.00 CHAIRMAN’S INTRODUCTION WITH AN OvERvIEW OF THE INSTITUTE OF SECURITY AND RESILIENCE STUDIES’ CYBER DOCTRINE CONFIRMED: The Rt Hon The Lord Reid of Cardowen, Chair ISRS, University College London. Former Home Secretary and Secretary of Defence, UK 09.30 TRANSFORMING THE SECURITY AND INTEGRITY OF GOvERNMENTAL COMMUNICATIONS THROUGH THE PUBLIC SECTOR NETWORK (PSN) PROJECT CONFIRMED: John Stubley, Director, PSn project, Cabinet Office 10.15 INCIDENT RESPONSE HANDLING FOR THE PROTECTION OF CRITICAL NATIONAL INFRASTRUCTURE CONFIRMED: Michael Boyer, Director Regional Computer emergency Response Team – europe, US Army Cyber Command 11.00 COFFEE AND NETWORKING BREAK 11 30 PANEL DISCUSSION: LEARNING FROM CRITICAL NATIONAL INFRASTRUCTURE ON HOW TO DEFEND YOUR ORGANISATION FROM CYBER ATTACK SO YOU CAN MINIMISE THE CHANCES OF ESPIONAGE CONFIRMED: Lord Reid of Cardowan as Chair CONFIRMED: Dr John Meakin, CISO and Director, Digital Security, BP CONFIRMED: Peter Gibbons, Head of Information Security, Network Rail CONFIRMED: Major multination bank representative (date embargo) 13.00 LUNCH 14.15 TRANSFORM YOUR ORGANISATION’S CYBER DEFENCES BY EXPLORING THE EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY’S (ENISA) CRITICAL INFRASTRUCTURE INFORMATION PROTECTION PLAN (CIIP) CONFIRMED: Dr Steve Purser, Director, Technical Department, ENISA 15.00 AN UPDATE FROM DENMARK’S CERT PROGRAMME: MAXIMISING CYBER DEFENCES IN MILITARY, INDUSTRY AND GOvERNMENT CONFIRMED: Thomas Kristmar, Director, GovCERT Denmark 15.45 COFFEE AND NETWORKING BREAK 16.20 ROUND TABLE DISCUSSIONS – MEET THE SPEAKERS AND FELLOW DELEGATES AND ENGAGE IN DIRECT CONvERSATION ABOUT YOUR CYBER REqUIREMENTS Your Round Table Hosts. John Stubley, Director, PSn project, Cabinet Office Peter Gibbons, Head of Information Security, Network Rail Thomas Kristmar , Director, GovCERT Denmark Dr Steve Purser, Director, Technical Department, ENISA Michael W. Boyer, Director Regional Computer emergency Response Team – europe, US Army Cyber Command EvENING RECEPTION INTERESTED IN LEARNING MORE ABOUT THIS YEAR’S EvENT? vISIT US AT WWW.CDANS.ORG
  • 4. 04AGENDA AT A GLANCEMAIN CONFERENCE DAY 1 (25TH JANUARY) MAIN CONFERENCE DAY 2 (26TH JANUARY)07.30 COFFEE AND REGISTRATION 07.30 COFFEE AND REGISTRATION08.45 CHAIRMAN’S INTRODUCTION 08.45 CHAIRMAN’S INTRODUCTION FOLLOWED BY INTERNATIONAL KEYNOTE SPEECHES09.00 UK MOD KEYNOTE SPEECHES 09.00 KEYNOTE SPEECH INvITED: Minister Nick Harvey MP, Minister for the Armed forces, UK CONFIRMED: Mr Andro Barnovi, Deputy Defence Minister, Georgia Ministry of Defence 09.30 NATO COMMUNICATION AND INFORMATION SYSTEMS SERvICES09.20 UK CYBER POLICY AND PLANS TEAM: ENGAGING WITH INDUSTRY TO AGENCY (NCSA): OvERvIEW OF NCSA, SUPPORTING THE FRONTLINE DEvELOP INNOvATIvE CYBER SECURITY SOLUTIONS WITH SECURE CIS TECHNOLOGY IN ORDER TO MAINTAIN RELIABILITY CONFIRMED: Major General Jonathan Shaw, Commander, UK Cyber Policy OF MISSIONS and Plans Team (MoD), CONFIRMED: Lieutenant General Kurt Herrmann, Director, nCSA, NATO CONFIRMED: David Ferbrache, Director, UK Cyber Policy and Plans Team (MoD) 10.10 THE FRENCH CYBER STRATEGY: IS CYBER THE NEW TOWER OF BABEL,10.00 US DEPARTMENT OF STATE KEYNOTE SPEECH THE NEW THERMOPYLAE? IF SO, WHAT MEASURES CAN BE TAKEN TO CONFIRMED: Christopher Painter, Coordinator for Cyber Issues, US SURMOUNT CRYPTOLOGY AND SECURITY PROBLEMS? Department of State CONFIRMED: Rear Admiral Arnaud Coustillière, Cyber General Officer, French Integrated Defence Staff10.40 COFFEE AND NETWORKING BREAK 10.40 COFFEE AND NETWORKING BREAK11.10 AN UPDATE ON BRAZIL’S CYBERNETIC CENTRE AND THE ARMY’S 11.10 SPECIAL KEYNOTE DISCUSSION – LOMONOSOv UNIvERSITY MOSCOW, REqUIREMENT FOR CYBER SECURITY INFORMATION SECURITY INSTITUTE (IISI) CONFIRMED: Lieutenant General José Carlos dos Santos, Head of the Army INvITED: Colonel General vladislav Petrovich Sherstyuk, IISI, Russian Cybernetic Centre (CDCiber), Brazilian Army federation(pending final approval) CONFIRMED: Interviewed by Keir Giles, Conflict Studies Research Centre11.50 US ARMY CYBER COMMAND (ARCYBER): PROTECTING INFORMATION SYSTEMS FROM CYBER ATTACK IN ORDER TO ENSURE INTEGRITY OF 11.40 COUNTRY UPDATE: CHINA SYSTEMS IN BATTLE INvITED: Major General (Retd) Wang Baocun, former People’s Liberation CONFIRMED: Lieutenant General Rhett Hernandez, Commander, ARCYBER Army, People’s Republic of China (pending final approval) 12.10 MAXIMISING THE CYBER CAPABILITIES OF THE ISI IN ORDER TO12.20 AN UPDATE ON AUSTRIA’S CYBER SECURITY PLANS LAWFULLY INTERCEPT AND REDUCE THE CHANCES OF INTERNATIONAL CONFIRMED: Brigadier General Helmut Habermayer, Head of Military Strategy, TERRORISM Austrian MoD CONFIRMED: Major General Zaidi, Director General (Technical), Deputy Commander Inter Services Intelligence Agency (ISI), Pakistan12.40 LUNCH 12.30 LUNCH STREAM A STREAM B INTELLIGENCE AND PREPARING FOR FUTURE CYBER COUNTER-TERRORISM WARS STREAM A STREAM B OPTIONS FOR FRONTLINE CYBER OFFENSE CAPABILITIES14.10 CHAIRMAN’S INTRODUCTION CHAIRMAN’S INTRODUCTION NETWORK SECURITY14.25 HOLDING THE INTELLIGENCE AND CYBER WARFARE: THEORY 14.00 CHAIRMAN’S INTRODUCTION CHAIRMAN’S INTRODUCTION SECURITY SERvICES TO ACCOUNT AND PRACTICE - WHAT GAPS 14.40 PREvENTING ATTACKS ON CURRENT AND PROJECTED OvER IMPLEMENTING A ROBUST ARE THERE BETWEEN THEORY COMMUNICATIONS SYSTEMS THREATS TO CYBER ASSETS – CYBER STRATEGY AND PRACTICE? HOW HAvE CONFIRMED: Lt Col Chris AN OPERATIONAL PERSPECTIvE CONFIRMED: Mr Mark Field MP, CYBERSPACE OPERATIONS Barrington-Brown, Senior Officer in CONFIRMED: Jerry Webb, Member of the Intelligence and CHANGED THE CHARACTER OF Charge, Land Information Assurance Director, 35th Intelligence Security Committee reporting to the WAR? THE EvOLvING THREAT OF Group, Specialist Group Royal Signals, Squadron, USAF UK Prime Minister CYBER WARFARE. British Army CONFIRMED: Dick Crowell, Information Operations and Cyber 15.20 DEvELOPING PROTECTED SPEECH TBC: OvERvIEW OF Space Operations, US Navy War NETWORKS WITHIN C4ISTAR CYBER WEAPONS AND SOLUTIONS College SOLDIER EqUIPMENT TO COUNTERACT THEM INvITED: Prof Bob Madahar, Chief CONFIRMED: Steven Moulton15.05 COUNTERING CYBER TERRORISM DEFENDING UKRAINE’S CRITICAL Technologist, DSTL, UK Chris Smoak, Georgia Tech CONFIRMED: Maajid Nawaz, INFRASTRUCTURE AND SUPPLY Research Institute Chairman and co-founder, quilliam OF GAS FROM CYBER ATTACKS: Foundation AN OvERvIEW OF UKRAINIAN REqUIREMENTS INvITED: Col Pavlo Tertystkyi, 16.00 COFFEE AND NETWORKING BREAK Defence and Air Attache, Ukraine Embassy, London 16.30 DEvELOPING SECURE MILITARY NETWORKS WHICH ALLOW SAFE COMMUNICATIONS AND SHARE OF INFORMATION WITH ALLIES BUT15.45 COFFEE AND NETWORKING BREAK SUCCESSFULLY DEFEND AGAINST ENEMY INFILTRATION INvITED: Brigadier General Greg Loos, Commanding Officer, Canadian16.30 INTEGRATING CYBER DEFENCES INTO ALL MILITARY PLATFORMS Forces Network Operations Centre INvITED: Brig Gen A Basu, Director of Cyber warfare, Integrated Defence Staff, Indian Army 17.00 SPECIAL DEBATE: IS CYBER REvOLUTIONISING WARFARE? PANEL DEBATE WITH AUDIENCE PARTICIPATION17.10 CLOSING KEYNOTE SPEECH: BP CONFIRMED: Dr David Betz, King’s College London CONFIRMED: Dr. John Meakin, CISO and Director, Digital Security, BP CONFIRMED: Prof Giampiero Giacomello, Universita di Bologn CONFIRMED: Maajid Nawaz, Co-founder and Chairman, quilliam Foundation17.50 CHAIRMAN’S CLOSING REMARKS 18.00 CHAIRMAN’S CLOSING REMARKS EvENING GALA DINNER 18.15 END OF CONFERENCE JOIN OUR CYBER STRATEGY LINKEDIN GROUP FOR THE LATEST DISCUSSIONS ON CYBER AND NETWORK SECURITY
  • 5. 05POST CONFERENCE WORKSHOPS: 27TH JANUARY9AM-12PM WORKSHOP 1 CONFIRMED: Dr Chris Smoak, Cyber Technology and Information Security Laboratory, Georgia Tech Research Institute q Botnets and Malware: An overview of understanding the threat to CnI; Tool discussion – evaluating off the shelf solutions; techniques on capturing malware and analysing it q Penetration testing: Assessing vulnerability testing tools; techniques of physical intrusion and offensive information operations and solutions to defend against it. Delivered by the department that collaborated with the FBI to successfully dismantle the Meriposa Botnet. LUNCH1.30 3.30PM WORKSHOP 2 CONFIRMED: John Bumgarner, Research Director for Security Technology, US Cyber Consequences Unit q Critical National Infrastructure: How can process controls be manipulated to cause catastrophic damage to CnI? what solutions should be enacted to counteract risks to CnI? q Consequences of cyber attacks: what exactly is the level of threat facing your organisation; how can cyber attacks exfiltrate your company secrets and undermine your competitiveness; solutions to mitigate the effects John Bumgarner is a retired U.S. Army special operations veteran, former intelligence officer and professional hacker4.00 – 7.00PM WORKSHOP 3 CONFIRMED: Lt Col (Ret’d) William Hagestad II, Red Dragon Rising Current Communist Chinese Military electronic warfare (ew) & Information warfare (Iw) 1. focus of the 11 year History of Chinese ew 2. Origins of Chinese Iw - Protagonists & Theorists 3. examination of “war beyond Limits” 4. 21st Century Chinese Cyber warfare - Communist Party of China (CPC), People’s Liberation Army (PLA), State Owned enterprises (SOe) and Citizen Hacktivists (CH) 5. forward Looking Statements - what will happen next? William is an internationally recognized subject matter expert on the Chinese People’s Liberation Army & Government Information Warfare. He advises international intelligence organizations, military flag officers, and multi-national commercial enterprises with regard to their internal IT security governance and external security policies.Meet with some of the greatest minds in cyber security at Defence IQ’s networking with the cyber community at Cyber warfare 2011cyber conferences REGISTER ONLINE AT WWW.CDANS.ORG OR CONTACT US AT DEFENCE@IqPC.CO.UK OR +44 (0)20 7368 9737
  • 6. 06FEATURED SPEAKERS FOCUS DAY CHAIRMAN – THE RT HON THE LORD REID OF CARDOWAN PHD PC “Cyberspace is a manufactured environment, comprised of ones and zeros, not bodies and mass. Its infrastructure depends on a nano-scale innovation, not industrial-scale production. The rules of engagement- both civilian and military- developed for land, sea and air, over the centuries and millennia, require unprecedented adaptation”.John Reid is the most experienced Cabinet minister of modern times and is also the Principal of the Chertoff Group. He has held more ministerial posts at Cabinet level than anyother politician in recent history. In range of portfolios and in breadth and intensity of change management across departments, his experience is unparalleled.In particular he has served in leadership across a range of security-related portfolios in the UK Government including Home Secretary, Defence Secretary, northern IrelandSecretary, Minister for Transport and Armed forces Minister.following almost quarter of a century as a Member of Parliament Dr Reid was honoured with a nomination to the UK Upper Chamber as a Member of the House of Lords. He is aPrincipal of The Chertoff Group, serves as a Senior Advisor to a number of major commercial companies and is presently Hon Professor and Chair of the Institute for Security andResilience Studies at University College London; and Patron of Painting and Patronage, (Saudi-UK cultural and educational exchange Programme 2010-). MR CHRISTOPHER PAINTER Mr. Painter has been on the vanguard of cyber issues for twenty years. Most recently, Mr. Painter served in the white House as Senior Director for Cybersecurity Policy in the national Security Staff. During his two years at the white House, Mr. Painter was a senior member of the team that conducted the President’s Cyberspace Policy Review and subsequently served as Acting Cybersecurity Coordinator. He coordinated the development of a forthcoming international strategy for cyberspace and chaired high-level interagency groups devoted to international and other cyber issues. LIEUTENANT GENERAL KURT HERRMANN Lieutenant General Kurt Herrmann was born in wetzlar, Germany in 1950. He joined the German Air force (GAf) in 1969 and was commissioned at the Air force Officer School at fürstenfeldbruck and neubiberg (bavaria) in March 1971. After pursuing an education in aeronautical and space engineering at the Air force Technical Academy (later the federal Armed forces University, Munich), he studied computer science at the Technical University in Munich and received his diploma in 1977. In early assignments he served as Technical Officer, Aircraft electronics, for the f-104G “Starfighter” and as deputy squadron leader of the electronics and weapons Unit of a fighter bomber wing. Later on, he became a Software engineering Officer for the TORnADO PA-200. LIEUTENANT GENERAL RHETT HERNANDEZ Lt. Gen. Rhett A. Hernandez was commissioned as a second lieutenant of Artillery from the United States Military Academy, west Point, new york on 2 June 1976. His commands have ranged from the battery level with 2nd battalion, 33rd field Artillery and 1st battalion, 5th field Artillery to battalion level with 1st battalion, 14th field Artillery, later re-designated 3rd battalion, 16th field Artillery to brigade level command as the Commander of Division Artillery, 4th Infantry Division (Mechanized), fort Hood, Texas. He also served as the Assistant Division Commander (Support), 1st Armored Division, United States Army europe and Seventh Army, Germany and OPeRATIOn IRAQI fReeDOM, and the Commanding General, United States Army Human Resources Command, Alexandria, virginia. His current assignment is as the Commanding General, U.S. Army Cyber Command / Second Army at fort belvoir, virginia. MAJOR GENERAL JONATHAN SHAW Jonathan Shaw joined the Parachute Regiment in 1981. He was a platoon commander in 3 PARA through the falklands war. He has commanded at every level upto 2*, including 2nd battalion The Parachute Regiment (1997-9), 12 (Mechanized) brigade, Multi-national brigade (Centre) in Kosovo, and most recently, Multi- national Division (South east) in Iraq (2007), for which he was awarded the US Legion of Merit (Degree of Officer). He also holds the demanding position of Colonel Commandant of the Parachute Regiment. His staff appointments have been mainly in the Ministry of Defence: beginning in the resources and programming area (Army Plans), but latterly focusing on operations and policy (Commitments), including disaster relief, Military Assistance to Civil Authorities, northern Ireland and global counter terrorism. General Shaw was Chief of Staff, UK Land forces from September 2007 until March 2009. He then became Assistant Chief of Defence Staff (International Security Policy) and was appointed to his current role as Assistant Chief of Defence Staff (Global Issues) in January 2011. His responsibilities include Chemical biological Radiological & nuclear Policy, Arms Control and Counter Proliferation and Cyber. REAR ADMIRAL ARNAUD COUSTILLIèRE Rear Admiral Arnaud Coustillière was born in Toulon in 1960 and promoted rear admiral since the 1th of July, he is appointing as “Cyberdefence General Officer” for french armed forces and fr MoD, a new appointment just created in the Directorate of Joint Operations, but he was responsible of this domain since february 2011. He is an above warfare officer issued from the naval Academy (1981-83). between 1984 and 1999, he spent many times at sea and participated in many navy operations mainly in Indian Ocean and Mediterranean areas. He was Commanding Officer of four ships, the last one was the DDG DUQUeSne (2004-2006). MARK FIELD MP Mark was elected as the MP for the Cities of London and westminster constituency in 2001, and was re-elected with an increased majority in 2005. In the 2010 General election he was returned to parliament once more having been re-elected in the revised constituency (bearing the same name) with a further increased majority of 11,076. This result took Mark’s share of the vote locally to over 50% for the first time. He takes a special interest in economic matters, foreign trade and international development, and is currently Chairman of the All-Party Parliamentary Groups on business Services, venture Capital and Private equity and Azerbaijan. He is also vice Chairman of the All Party Parliamentary Groups on bangladesh and football. In September 2010 Mark was appointed by the Prime Minister to the prestigious Intelligence and Security Committee, chaired by Sir Malcolm Rifkind. He is the youngest MP ever to serve on the Committee which oversees and scrutinises the work of britain’s intelligence services. T: +44 (0)20 7368 9737 F: +44 (0)207 368 9301 E: DEFENCE@IqPC.CO.UK WWW.CDANS.ORG
  • 7. 07CYBER DEFENCE & NETWORK SECURITY BUSINESS OPPORTUNITIESHOW CAN YOU MEET YOUR MARKETING AND 7 REASONS WHY YOU SHOULD SPONSORBUSINESS DEvELOPMENT OBJECTIvES AT CYBER DEFENCE & NETWORK SECURITYCYBER DEFENCE & NETWORK SECURITY?NETWORKING 01 Generate new sales leads: Our event will bring together the global decision makers, all of whom have strong business reasons for attending the event. by exhibiting and presenting, you can impact on these buyers. by the very natureensure that you have the opportunity to engage with the key decision makers withinyour industry. we can create a platform for you to effectively interact with your top of the high quality of delegate attendance, the contacts generated will lead tocustomers and prospects in the environment of your choice. This can range from very high conversion rates.formalised private meetings / workshops right through to less structured networkingevents such as sponsored drinks receptions, coffee breaks or lunches. Ultimately 02 Launch new products or services: Use the event as a launch pad to promote your latest products or system. with the most senior figures from the industry in attendance, plus carefully selected media partners at the event,whatever you decide is the right forum, we will support you in your quest to advancerelationships with the key people who can influence the future of your business. innovative new technology will always generate a buzz.BRANDINGyour company can be elevated to a position where they are seen as a market leader. In 03 Demonstrate thought leadership: Speaking on the program will allow you to demonstrate your market knowledge and expertise to an audience of high level decision makers.a fiercely competitive market you need to ensure that your brand is differentiated fromthe competition. failure to create a clear identity will see your organisation fade intothe background. we ensure that we do everything we can to effectively lift your brand 04 Enter new markets and emerging markets: Sponsorship is one of the most effective ways to step into new markets. It is a great opportunity to research and network whilst gaining exposure to a new qualified databasebefore, during and after the event. not only do we create a fully integrated marketingcampaign, which your company can be part of, but we also offer high impact premiumbranding opportunities for example on bags, water bottles, pens lanyards etc. 05 Building customer loyalty: face-to-face contact at conferences, and showing continued support of the market, helps develop client loyalty as well as cementing your position as an industry player.THOUGHT LEADERSHIPIf you think that you should be viewed as a true industry leader then your need todemonstrate your market knowledge and expertise through a thought leadership 06 Positioning your company brand: being part of this highly influential industry event will establish your company as a strong brand and highlightsopportunity, such as speaking or chairing. This is a highly unique opportunity for your your company’s abilities and strength.company to educate the market, and as long as you are credible enough to fit into ahigh level event programme, we can position your organisation alongside top customersand prospects in our speaker faculty. As part of this speaker faculty your company will 07 Building relations with the media: we have researched the market in order to find the most influential media partners. we understand that opportunities for editorial coverage and developing better relations can be integral to yourbe set apart from other industry attendees giving you the competitive edge required to companies’ success, so our media partnerships offer additional benefit abovemake further strides in the market. and beyond the standard sponsorship package. PACKAGE EXHIBITION ASSOCIATE PLENARY PLENARY DELEGATE PROFILE PREvIOUS CYBER EvENTS Exhibition 3x2m ✔ ✔ ✔ ✔ Exhibition Passes ✔ (2) ✔(2) ✔(2) ✔(3) y Europe 44% (No entry to conference but does include lunch) y N America 30% Conference Delegate Passes ✔(1) ✔(2) ✔(3) y Middle East 11% y South America 9% Branding At Conference ✔ ✔ ✔ ✔ y Asia 9% Pre Event Branding (Brochure) ✔ ✔ ✔ ✔ y Africa 3% Customised Mailing ✔ ✔ ✔ ✔ Wish List ✔ ✔ ✔ ✔ “Excellent opportunity to verify that my ideas are still up to date 30-40 min Stream Speaking ✔ ✔ ✔ and at the right altitude” 30-40 min Plenary Speaking ✔ ✔ 30-40 min Focus Day Speaking ✔ Colonel Gerald vernez, Swiss MoD 1 day Conference Chair ✔ (Cyber warfare 2011) Drinks Reception “Good mix of concepts, ideas and technical aspects” ✔ Site Visit POA Workshop POA Major Frank valenten Nielson, Defence Command Denmark Dinner POA (Cyber warfare 2011) for more information on sponsoring or exhibiting at the Keep Connected! Cyber Defence & Network Security Conference, contact Ola Jonsson, Business Development Manager, Defence & Government, at +44 (0)201 368 9308 or follow us on Twitter: become a member: sponsor@iqpc.co.uk or www.twitter.com/defenceiq Defenceiq.com Download the CDANS Sponsor Prospectus for further package details at www.cdans.org become a member: Defenceiq.comSPONSORS Codenomicon’s clients include national CeRT’s, protectors of CnI MEDIA PARTNERS and Military. we empower our customer to protect their networks and applications against costly incidents such as hacker attacks, service interruptions, security exploits and loss of data. with our security and robustness testing tools customers can proactively find and fix known and previously unknown software defects, which could otherwise be exploited with malicious intent. Our abuse management and situational awareness LOGICAL & PHYSICAL IT SECURITY solutions, used operationally by CeRT’s and also in Cyber Attack exercises, automate information processing, providing the relevant information to the right people so that they can make fast and informed decisions.
  • 8. PRE- MAIN POST- vENUE: 5 WAYS TO REGISTER CONFERENCE CONFERENCE: CONFERENCE THe RADISSOn bLU Freephone: 0800 652 2363 or FOCUS DAY: 24TH 25TH-26TH WORKSHOPS: PORTMAn HOTeL, JAnUARy 2012 JAnUARy 2012 27TH JAnUARy LOnDOn, UK +44 (0)20 7368 9737 2012 Fax: +44 (0)20 7368 9301 To speed registration, please provide the priority code located on the mailing label or in the box below. Post: your booking form to My registration code is: PDFW IQPC Ltd. 2nd Floor, 129 Wilton Road, Please contact our database manager on +44(0) 207 368 9737 or at database@iqpc.co.uk quoting the registration code above to inform us of any changes or to remove your details. London SW1V 1JZ Online: www.cdans.org Military/Govt/PuBlic Sector** Book & Pay By Book & Pay By Book & Pay By StaNDarD Email: defence@iqpc.co.uk 28th oct 2011* 18th Nov 2011* 16th Dec 2011* Price Main Conference and Focus Day SAVE £498 £600 + VAT SAVE £398 £700 + VAT SAVE £298 £800 + VAT SAVE £99 £999 + VAT Team Discounts* Main Conference Only SAVE £250 SAVE £150 SAVE £50 IQPC recognises the value of learning in teams. Groups of 3 or more £749 + VAT £499 + VAT £599 + VAT £699 + VAT booking at the same time from the same company receive a 10% Focus Day Only SAVE £100 SAVE £100 SAVE £50 £249 + VAT £249 + VAT £299 + VAT £349 + VAT discount. 5 or more receive a 15% discount. 7 receive a 20% discount. EACh WOrkShOp*** SAVE £100 SAVE £100 SAVE £50 Only one discount available per person. £299 + VAT £199 + VAT £199 + VAT £249 + VAT Venue & Accommodation Book & Pay By Book & Pay By Book & Pay By StaNDarD t iNDuStry 28th oct 2011* 18th Nov 2011* 16th Dec 2011* Price Venue: Radisson Blu Portman Hotel, 22 Portman Square London W1H7BG, United Kingdom Main Conference and Focus Day SAVE £699 SAVE £599 SAVE £499 SAVE £399 £2299 + VAT £2399 + VAT £2499 + VAT £2599 + VAT Accommodation: Travel and accommodation are not included in the SAVE £300 SAVE £200 SAVE £100 conference fee; however we have put together a HotelMap that displays Main Conference Only £2099 + VAT £1799 + VAT £1899 + VAT £1999 + VAT discounted accommodation for hotels in the area near to the Radisson Blu Focus Day Only SAVE £250 SAVE £200 SAVE £100 Portman Hotel. The map displays live availability and allows you to book £899 + VAT £649 + VAT £699 + VAT £799 + VAT directly with each hotel, including the Radisson Blu Portman Hotel: http://www. EACh WOrkShOp*** SAVE £250 SAVE £200 SAVE £100 £599 + VAT HotelMap.com/M8PP2 £349 + VAT £399 + VAT £499 + VAT Alternatively, if you would like to book your accommodation by phone, please call Daniel Spinner, our dedicated London concierge, on 020 7292 2335 (if ***Please select your choice of workshop A “Assessing the tools to protect from cyber attack” And/or outside UK +44 20 7292 2335) quoting Special Reference Code M8PP2. He B “Protecting CNI from the latest cyber weapons” And/or will be happy to help you with your hotel booking and provide assistance C “Current Communist Chinese Military Electronic Warfare (EW) organising your time in London. & Information Warfare (IW)” All prices are exclusive of UK VAT at 20%. VAT Registration #: GB 799 2259 67 *To qualify for discounts, bookings must be received with payment by the discount deadline. Only one discount/offer applicable per person Free Online Resources **Military and government discounted rates apply to serving military officers, government and university personnel only. To claim a variety of articles, podcasts and other free resources please visit www.cdans.org Delegate Details Please photocopy for each additional delegate Digital Conference On CD-ROM Mr Mrs Miss Ms Dr Other A digital version of the conference proceedings, including all Rank First Name presentations is available for purchase. I am unable to attend the event, please send me the conference Family Name Job Title proceedings priced at £599 + VAT Recent digital conferences available: Tel No. Cyber Warfare Europe 2011 Email Cyber Security India 2011 Cyber Warfare 2011 Yes I would like to receive information about products and services via email Please send me conference materials indicated above. Organisation I have filled out credit card details below Address For further information please call: 0207 368 9300 or email: knowledgebank@iqpc.co.uk Postcode Country Telephone Terms and Conditions Please read the information listed below as each booking is subject to IQPC Ltd standard terms Fax and conditions. Payment Terms: Upon completion and return of the registration form full payment is required no later than 5 business days from the date of invoice. Payment of invoices by means other than by Approving Manager credit card, or purchase order (UK Plc and UK government bodies only) will be subject to a £49 (plus VAT) per delegate processing fee. Payment must be received prior to the conference date. Name of person completing form if different from delegate We reserve the right to refuse admission to the conference if payment has not been received. IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates at any I agree to IQPC’s cancellation, substitution and payment terms time by providing reasonable advance notice to IQPC. For any cancellations received in writing Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking. not less than eight (8) days prior to the conference, you will receive a 90% credit to be used at another IQPC conference which must occur within one year from the date of issuance of such Payment methoD credit. An administration fee of 10% of the contract fee will be retained by IQPC for all permitted cancellations. No credit will be issued for any cancellations occurring within seven (7) days Total price for your Organisation: (Add total of all individuals attending): (inclusive) of the conference. In the event that IQPC cancels an event for any reason, you willConference code: 12956.006 receive a credit for 100% of the contract fee paid. You may use this credit for another IQPC Card Number: VISA M/C AMEX event to be mutually agreed with IQPC, which must occur within one year from the date of cancellation. In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling to attend in on the rescheduled date, you will receive a credit for 100% of the contract fee paid.You may use this credit for another IQPC event to be mutually agreed with Exp. Date: Sec: IQPC, which must occur within one year from the date of postponement. Except as specified above, no credits will be issued for cancellations. There are no refunds given under any circumstances. IQPC is not responsible for any loss or damage as a result of a substitution, Name On Card: alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever in the event this conference is cancelled, rescheduled or postponed due to a fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of this Billing Address (if different from above): conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event City/County/Postcode Cheque enclosed for: £ (Made payable to IQPC Ltd.) shall include, but not be limited to: war, fire, labour strike, extreme weather or other emergency. Please note that while speakers and topics were confirmed at the time of publishing, (Please quote 12956.006 with remittance advice) IQPC Bank Details: HSBC Bank Plc, 67 George Street, Richmond, circumstances beyond the control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics. As such, IQPC reserves the right to alter or modify Surrey TW9 1HG, United Kingdom Sort Code: 40 38 18 Account No: 51304143 Swift Code: MIDLGB2112V the advertised speakers and/or topics if necessary without any liability to you whatsoever. IBAN Code: GB59 MIDL 4038 1851 3041 43 Account Name: International Quality & Productivity Centre Ltd. Any substitutions or alterations will be updated on our web page as soon as possible. Discounts: All ‘Early Bird’ Discounts require payment at time of registration and before the CliCK heRe to sUBmit cut-off date in order to receive any discount. Any discounts offered whether by IQPC (including team discounts) must also require payment at the time of registration. All discount offers cannot FoRm noW Via email be combined with any other offer Please do not pass my information to any third party © IQPC Ltd. UK VAT registration no. GB 799 2259 67