As the cyber threat evolves and the incidence of attacks increases, maintaining preparedness and situational awareness is vitally important. Customised malware, DDoS attacks and the vulnerabilities of mobile and enterprise networks all present real challenges. However, the opportunity to come together and share ideas, solutions and initiatives and to facilitate deeper cooperation in cyber defence must be harnessed.
CDANS 2015 brought together the most senior and diverse speaker panel to date, including presentations from North America, Europe, the Middle East and Africa. We are delighted to be welcoming Vice Admiral Tighe, Commander of the US Fleet Cyber Command and Major General Pederson, Commander of the Norwegian Cyber Force, to mention but a few, both giving unique insight and updates from two very important institutions.
Questions? enquire@defenceiq.com (quote: 12956.009)
1. The premier cybersecurity symposium incorporating militaries, government
and critical national infrastructure at the highest decision making level
Senior International speaker panel includes:
Vice Admiral Jan
Tighe, Commander,
US Fleet Cyber
Command
Dr Jamie Shea,
Deputy Assistant
Secretary General,
Emerging Security
Challenges, NATO HQ
Vice Admiral Arnaud
Coustillière, Head of
Cyber, French
Defence Staff
Andrew Gracie,
Executive Director,
Resolution Directorate,
Bank of England
Major General Odd
Egil Pedersen, Chief,
Norwegian Cyber
Force
Jakub Boratyński,
Head of Trust
& Security, DG
CONNECT, European
Commission
Major General Basilio
di Martino, Director,
Telecommunications,
Italian Ministry of
Defence
Mihkel Tikk, Director
of Cyber Policy,
Estonian MoD
Meet with senior international military, government and critical national
infrastructure cybersecurity representatives from across Europe, North America,
the Middle East and Africa to gain unique insights into their cyber defence
strategies. Hear first hand what key technologies are in demand and how you can
meet these requirements
Learn about the latest developments in cyber defence and network security
solutions to gain a complete picture of industry trends. Meet leading industry and
research figures engaged in producing and influencing new cybersecurity systems
and share your own solutions
Compare how military, government and critical national infrastructure
institutions are approaching cybersecurity, the lessons learned from recent events
and how these can be incorporated into your own cyber defence frameworks and
technology development
Discuss the future cyber threat, and how greater situational awareness can be
achieved. Learn what solutions are under development, including an update on the
latest virtualisation technology
Share ideas on how deeper cross-agency and international cooperation can
be facilitated to ensure more secure networks. Engage in debate with your senior
international peers and colleagues to put forward your own opinions and approach
CONFERENCE HIGHLIGHTS:
As threats to the
cyber landscape increase
in number - The Spanish
Ministry of Defence
sees CDANS as a unique
opportunity to discover the
key challenges and their
solutions from other regions
on a day-to-day basis.
Lieutenant Colonel Angel Gomez
de Agreda, Office of the Secretary
General for Defence Policy,
Spanish Ministry of Defence
www.cdans.org
1 star officers and above go for free
Pre-Conference Cyber
Wargaming Focus Day:
21 January 2015
Main conference days:
22-23 January 2015
Venue:
London, UK
2. Dear Colleagues,
It is my humble honour and distinct pleasure to announce
the return of Cyber Defence and Network Security 2015
(CDANS 2015) this coming January. I am delighted to return
as chairman and look forward to greeting you all personally
in London.
In 2014 we experienced unparalleled information revelations
that have both changed and shaped forever the way in
which our respective countries handle the confidentiality
and integrity of information assurance. Without any doubt
the 21st Century will be known as the ‘cyber’ century:
cyber war, cyber defence, cyber attacks and cyber terror.
Militarisation of the binary world is a foregone conclusion
and it is essential that we understand the global, strategic
and tactical second/third order effects of this convergence
of military force, “informization” of networks and critical
infrastructure.
Consequently, there has never been a more important time
to investigate, discuss and cooperate on cyber matters.
CDANS 2015 will bring together international government,
military leaders and CNI cybersecurity specialists to
address the most pressing issues of 2015, outlining the
challenges and priorities nations will have over the next
12 months. You cannot afford to miss the very special
professional programme CDANS has in store for the
beginning of yet another new year - notably world renowned
wargaming expert John Curry will kick things off with a focus
day dedicated to cyber scenarios.
Alongside briefings from the United States, France, Norway
and Italy to mention but a few, we have brought back to
the fore the issue of cyber security for Critical National
Infrastructure and the explosion of requirements and
solutions in the mobile space. We are very proud of our truly
international panel of experts and I sincerely hope you will
be able to join us in January.
If you would like to discuss the event in more detail or
register, please do not hesitate to contact our enquiries team
on +44 (0)207 368 9737
Semper Fidelis,
Lt Col William Hagestad
US Marine Corps Retired
Conference Chairman
Vice Admiral Jan Tighe,
Commander, US Fleet Cyber
Command
Vice Admiral Arnaud Coustillière,
Head of Cyber, French Defence
Staff
Major General Odd Egil Pedersen,
Chief, Norwegian Cyber Force
Major General Basilio di Martino,
Director, Directorate General of
Telecommunications, Informatics
and Advanced Technologies, Italian
Ministry of Defence
Major General Mohammad Khalid
Rao, Chief of Information Security,
Pakistan Armed Forces
Brigadier General Welton Chase
Jr., Director, J6 – J4/Cyber, EUCOM
Brigadier General Helmut
Habermayer, Chief of Cyber,
Austrian MoD
Dr Jamie Shea, Deputy Assistant
Secretary General, Emerging
Security Challenges, NATO HQ
Mihkel Tikk, Director of Cyber
Policy, Estonian MoD
Thomas Kristmar, Head of Network
Security, Centre for Cyber Security,
Danish Defence Intelligence
Service
Colonel Artur Suzik, Director, NATO
CCD COE
Makame M. Mbarawa, Honorable
Minister for Communications,
Science & Technology, Tanzania
Jakub Boratyński, Head of Trust &
Security, DG CONNECT, European
Commission
Andrew Gracie, Executive Director,
Resolution Directorate, Bank of
England
Graham Wright, Chief Information
Security Officer, National Grid
Craig Balding, Chief Information
Security Officer, Barclays
David Isiavwe, General Manager,
Audit, Control & IT Security, Union
Bank of Nigeria
Annemarie Zielstra, Director Cyber
Security & Resilience, TNO
INTERNATIONAL SPEAKER PANEL
Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
3. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
Cyber Wargaming Pre-conference
Focus Day, 21st January 2015,, 10.30 - 16.30
Wargaming is an essential part of preparation for crisis situations by military, nation states and businesses. Games can be used
for their training and educational value at all levels from senior leaders to those on the receiving end of targeted penetration
attempts. This day is about the current cyber wargaming from those with direct experience of gaming and modelling large
scale cyber-attacks. The pre-conference focus day on cyber wargaming will start with lectures to introduce the theoretical and
contextual basis of the interactive workshop sessions to follow, and will include thought provoking briefings on:
• An overview of current cyber wargaming - outlining the current state of gaming cyber-attacks in the military, nation state, business and
education.
• What is a cyber-war? Exploring the tricky question of what a cyber-war will look like based on lessons learned from recent conflicts where
cyber power has been deployed.
• Penetration testing as a live fire exercise. Penetration testing is normally carried out to demonstrate compliance with set standards.
However, it can be used as a live system test to practice policies and procedures. The session will demonstrate how to use different
penetration testing methodologies depending on the security posture and maturity of an organisation.
The workshop sessions will allow attendees to observe and play a variety of manual based cyber wargames and will be run by a
variety of SME’s who specialise in gaming cyber conflict. Attendees will have the opportunity to participate in one or more of the
following manual wargame sessions:
• Game 1: Protecting military intellectual property from other nation states using the matrix game methodology.
• Game 2: A card based game about a nation state under attack by hacktivists. The aim is to explore how hactivist groups form, operate and
collaborate.
• Game 3: Exercise Tallinn Soldier- a scaled down version of an exercise about a small state under cyber-attack and the decisions that have
to be taken. This is run using the seminar/committee games traditional wargames methodology.
• Game 4: to be confirmed.
• There will also be static displays showing how commercial off the shelf games include elements of cyber warfare.
Meet our featured cyber wargame experts:
Major Tom Mouat MBE joined the British Army in 1979. He is a Graduate of the Army Staff College and has served
worldwide. He is an expert in both manual and computer-based simulation systems, running large scale military training
exercises, and designing wargames. He was the principal Exercise Planning Officer for Headquarters ARRC for 2 years
prior to their first deployment to Bosnia. In Bosnia he ran the Joint Military Commission for 12 months and was awarded
an MBE. Following this he ran the British Army's principal land-based computer simulation system for 3 years. Since then
he has been involved in numerous exercises and training events (both computer-assisted and manual). He also served as a
Requirements Manager in the UK MOD's procurement organization for nearly 5 years. He was awarded the Chief of Defence
Material Commendation for innovation and costs saving while he was there. He has a Masters Degree in Simulation and
Modelling, has published articles and delivered lectures about simulations, military history and wargames for professional
development, education and recreation since 1983. He is a contributing author to the Handbook of Research on Serious
Games as Educational, Business and Research Tools as well as Dark Guest: Training Games for Cyberwarfare. He is currently
the Directing Staff officer responsible for Modelling and Simulation at the Defence Academy of the UK and has recently been
awarded the Chief Scientific Officer's Commendation for his contribution to science and technology.
John Curry is an academic who specialises in military simulations and cyber warfare. He has written and edited over
sixty books on various aspects of recreational and professional wargaming. He has worked on gaming cyber warfare with a
variety of organisations, and contributed to the development of the cyber warfare module to the current British Army Forces
operational level wargame, RCAT (Rapid Campaign Analysis Tool). He is a contributing author to the Handbook of Research
on Serious Games as Educational, Business and Research Tools and Dark Guest: Training Games for Cyberwarfare. He has
also contributed a number of articles to professional journals on cyber warfare. He is an advisor to ECIPs and works for the
international consultancy Wikistrat on the Cyber Desk.
4. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
CONFERENCE DAY ONE, 22nd JANUARY, 2015
08.30 COFFEE & REGISTRATION
09.00 CHAIRMAN’S OPENING REMARKS
Lieutenant Colonel William Hagestad II,US Marine Corps Retired
SESSION THEME
National Solutions to Emerging Threats
How are nations and militaries advancing their defensive and
emergency response capabilities in the face of a persistent and
mutating threat? What are the emerging areas of greatest
importance and what will be the critical threats and challenges
for 2015? What technologies are under consideration for future
procurements?
09.10 The US Fleet Cyber Command (FLTCYBERCOM): Mission,
challenges and initiatives
• The mission of FLTCYBERCOM: directing cyberspace operations,
deterring and defeating aggression; achieving military objectives
in and through cyberspace; organizing and directing Navy
cryptologic operations worldwide; integrating information
operations and space planning and operations
• Insight into FLTCYBERCOM’s global operations
• Responding to the future cyber threat. How is FLTCYBERCOM
shaping future strategies and programmes in response?
Vice Admiral Jan Tighe, Commander, US Fleet Cyber Command
09.50 The Cyber Flank
• Significantly improving the European theatre’s C4 and Cyber Joint
and Combined Operating Environment
• “Operationalizing” the Joint Cyber Centre capabilities
(synchronization and integration)
• Preserving and maintaining strategic partnerships and key
relationships with C4 and cyber counterparts and allies by
sustaining partner-nation capabilities - via training, mil-to-mil
engagement, joint exercises, theatre security cooperation, and
public-private engagement
• Key priorities, future plans and requirements for securing
EUCOM’s cyber defence capabilities
BrigadierGeneralWeltonChaseJr.,Director,J6–J4/Cyber,EUCOM
10.30 COFFEE & NETWORKING
11.00 Initiating a proactive cyber defence policy for protecting the
French Ministry of Defence computer networks
• Protecting the military’s networks to ensure dominance in theatre
• Current and projected industry cyber policies
• Future plans for the French Ministry of Defence, how will they
ensure the best cyber-warriors are ready to react? Investing an
additional €1 billion to increase cyber capacities
Vice Admiral Arnaud Coustillière, Head of Cyber, French
Defence Staff
11.40 Building effective cyber defence: The NATO contribution
• NATO’s analysis of the evolving threat environment in the cyber
domain
• Building capabilities: what are the most promising technologies
• The NATO cyber-industry partnerships
Dr Jamie Shea, Deputy Assistant Secretary General, Emerging
Security Challenges, NATO HQ
12.20 The Italian MoD Strategic Communications Infrastructure
• The programmes launched by the Italian Joint General Staff to
improve connectivity both within each single service and at an
inter-service level
• The initial plan to develop a layered approach overcoming urgent
requirements and budget constraints
• Designing and improving in a combined effort with Allied Nations,
a dedicated satellite constellation to provide a reliable backup for
the highest level C2 functions, and to have an independent link
with task forces deployed abroad
• The goal of building a true Defense Information Infrastructure
Major General Basilio di Martino, Director, Directorate General
of Telecommunications, Informatics and Advanced Technologies,
Italian Ministry of Defence
13.00 NETWORKING LUNCH
14.00 Working towards enhanced international and cross
agency cooperation: The Norwegian Cyber Force
• An overview of the current cyber threat as seen from Norway
and an introduction to the Norwegian Cyber Force
• Working with other Nordic nations to forge closer collaboration
in cyber defence: Developing common anti-cyber threat policies
and strategies
• Looking ahead to future plans, programmes and requirements
Major General Odd Egil Pedersen,Chief,Norwegian Cyber Force
14.40 Civilian and Military cooperation in Network Security and
Cyber Defence
• Lessons learned when a MilCERT and GovCERT team up
• Establishing joint situational awareness in civilian and military
sectors
• Establishing a response capability for cyber attacks across sectors
• Using lessons learned to improve the overall security posture
Thomas Kristmar, Head of Network Security, Centre for Cyber
Security, Danish Defence Intelligence Service
15.20 COFFEE & NETWORKING
15.50 Seeking maximum efficiency in Cyber Security - the
Austrian Model
• Austria’s Cyber Security Strategy (CSS), the consequential CSS-
implementation plan and where we are now
• The importance of international and European cooperation for
securing an effective national cyber defence
• The Austrian approach of bringing civil cyber forces of the
Chancellery, the Ministry of Interior, the Ministry of Exterior
together with the military Cyber Defence Forces in a first circle
- including sector CERTs and industry in a second circle if a
serious cyber crisis evolves
• An insight into how Austria is using its conscription system to
win cyber experts for the armed forces and the nation
Brigadier General Helmut Habermayer, Chief of Cyber, Austrian
MoD
16.30 Cybersecurity challenges in Pakistan: Identifying the risks
and finding solutions
• Current assessments and analysis being undertaken on Pakistan’s
cybersecurity: What are the challenges being faced in Pakistan?
• Future requirements, programmes and strategies for ensuring an
effective cyber defence
• The importance of cross agency and international cooperation for
a long term cybersecurity framework
Major General Mohammad Khalid Rao, Director General,
Telecom Foundation, Pakistan
17.10 ROUND TABLE DISCUSSIONS
How should we define the legal boundaries of cyber defence?
• Are we experiencing a transformation from cyber security to
cyber defence? What does this constitute?
• Working towards ‘active’ cyber defence. What are the stumbling
blocks to legislation?
• More than a year on, what are the consequences of the
Snowden fiasco?
• What should be the legal boundaries of cyber defence? Can cyber
attacks be lawful as an act of defence?
17.50 CHAIR’S CLOSE AND END OF DAY ONE
5. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
CONFERENCE DAY TWO, 23RD JANUARY, 2015
08.30 COFFEE & REGISTRATION
09.00 CHAIRMAN’S OPENING REMARKS
Lieutenant Colonel William Hagestad II,US Marine Corps Retired
SESSION THEME
Trailblazing new initiatives and innovation in cyber defence
and facilitating deeper international cooperation
09.10 Shaping Estonia’s future cyber defence policy: Priorities and
plans
• An overview of the development of Estonia’s cyber defence
framework since the 2007 attack. Where are we now?
• Strategies in place for securing Estonia’s cybersecurity: working
in collaboration with government, military and critical
infrastructure
• Looking ahead to the next five years: future plans, programmes
and strategies
Mihkel Tikk, Director of Cyber Policy, Estonian MoD
09.50 Promoting international cooperation on cyber defence
across the NATO Alliance: The NATO Cooperative Cyber
Defence Centre of Excellence
• Introducing the NATO CCD COE’s mission and objectives
• Updates on the Tallinn Manual: key priorities and requirements to
respond to the future cyber threat
• Main findings and lessons learned from Locked Shields 2014:
the key technologies needed to be developed for enhanced
resilience and competency
Colonel Artur Suzik, Director, NATO CCD COE
10.30 COFFEE & NETWORKING
SESSION THEME
Collaboration & Governance: Protecting Critical Infrastructures
A large number of recent attacks on nations’ critical nation
infrastructures have demonstrated the continuing importance
of implementing substantive and resilient countermeasures.
There is an increasing demand for an integrated national approach
to cyber defence and the development of ‘best practice’ globally
on cybersecurity issues
11:00 Ensuring a secure and trustworthy digital environment for
EU citizens and businesses, and promoting a coherent
international approach on cybersecurity
• Implementing the Cybersecurity Strategy for the European Union,
addressing the technological and industrial issues that derive
from the Network and Information Security (NIS) policy of DG
CONNECT
• Incentives to foster investments, transparency and user
awareness, and addressing international cooperation as a key
priority
• Investing in cybersecurity research: introducing the Horizon 2020
programme
• Responding to new technological developments with a high
impact, such as cloud computing and big data
Jakub Boratyński, Head of Trust & Security, DG CONNECT,
European Commission
11.40 Managing cyber risk – the global banking perspective
• What is the cyber risk from a financial stability perspective?
• What impact do cyber threats have on the financial system?
• What strategies are in place with the Bank of England to ensure
maximum efficiency and resilience?
• Introducing the CBEST Programme: Lessons learned and potential
vulnerabilities
Andrew Gracie, Executive Director, Resolution Directorate, Bank
of England
12.20 Barclay’s strategy for Cyber Risk Management
• What does Barclay’s define as cyber?
• How is cyber risk measured and managed?
• Barclay’s set of operational threat management capabilities
including the intelligence detect ops & response components that
underpin it
Craig Balding, CISO, Barclays
13.00 NETWORKING LUNCH
14.00 Case Study: Protecting from the insider threat
• The insider threat: what are the dangers and where are the
vulnerabilities?
• Mitigating the risk: measures that can be implemented to
prevent an insider attack, including available technologies and
approaches
• The perspective of the Union Bank of Nigeria: how are they
working against the insider threat?
David Isiavwe, General Manager, Audit, Control & IT Security,
Union Bank of Nigeria
14.40 Developing an integrated security approach to
governmental and national cybersecurity: The Tanzanian
perspective
• Securing the Tanzanian National Optical Fibre Network
• Internet exchange points: security hardware to address the
biggest security challenges
• Mobile cybersecurity and regulating internet messaging: hard vs.
soft processes
Makame M. Mbarawa, Honorable Minister for Communications,
Science & Technology, Tanzania
15.20 COFFEE & NETWORKING
15.50 Protecting the UK’s Critical National Infrastructure from
Cybersecurity Attacks
• Identifying the cyber threat to the UK’s national energy
infrastructure
• How is the National Grid collaborating with industry and
government to ensure the protection of the grid?
• Working with CERT UK and CISP to increase grid protection
• The Technical and software solutions under consideration for
developing the UK’s energy infrastructure protection
Graham Wright, Chief Information Security Officer, National Grid
16.30 Creating innovations for safe cyberspace: The current
research projects and initiatives of TNO
• An introduction to TNO’s current cybersecurity initiatives, their
key areas of research and findings
• Mitigating new cyber threats by developing an algorithm to
predict the likelihood of specific internet domains being misused
• Enhancing cyber defence education and training via the Cyber
Awareness Trainer
Annemarie Zielstra, Director Cyber Security & Resilience, TNO
17.10 CHAIR’S CLOSE AND END OF DAY TWO
CDANS is the best venue I found to meet a
wide variety of international partners.
Gregory C. Radabaugh,GG-15, DAF Chief of Cyberspace
Operations, Air Force Intelligence, Surveillance and
Reconnaissance Agency
6. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
Follow Defence IQ @DefenceIQ to
keep up to date with news and
developments on Cyber Defence
and Network Security #CDANS15
Join Defence IQ
World Defence
Community on
LinkedIn
Read the Defence IQ blog authoritative news source
for high quality and exclusive commentary and
analysis on global defence and military-related
topics defencesummits.wordpress.com
Key Organisations Who Have Attended
Cyber Defence & Network Security
Industry
• ADS Defence and Security Systems Ltd
• BlackBerry Limited
• BreakingPoint
• Clearswift
• Codenomicon Ltd
• Combitech AB
• Elbit Systems
• Elettronica
• Encode UK Ltd
• Euroclear
• Exonar Limited
• Fidelis Security Systems
• FireEye
• Google, Inc.
• HP Enterprise Security
• i2 Ltd IBM Company
• IBM
• Ixia
• Kaspersky UK
• L-3 Communications
• Lockheed Martin UK Integrated Systems
• & Solutions Ltd.
• Microsoft Asia
• Mobile Enterprise Computing
• Netscout Systems
• PricewaterhouseCoopers LLP
• Qosmos
• Reuters
• RUAG Defence
• Saab
• Skybox Security
• Solera Networks
• Sourcefire
• Verint Systems Ltd
Defence
• Armasuisse
• Armed Forces Philippines
• Brazilian Army
• Canadian Forces Network Operation
Center (CFNOC)
• CYBERCOM
• Defence Command Denmark
• DSTL
• European Defence Agency
• French Integrated Defense Staff
• Indonesian MOD
• Israeli Space Agency
• Italian Defence General Staff
• Italian MoD
• MoD Austria
• NATO
• NATO Cooperative Cyber Defence,
Centre of Excellence
• Norwegian Armed Forces
• Pakistan Air Force
• Republic of Singapore Air Force
• Royal Saudi Air Force
• Royal Thai Air Force
• Spanish MoD
• Swedish Armed Forces
• Trinidad and Tobago Police Service
• UK Air Warfare Centre
• UK MoD Cyber Policy and Plans Team
• US Air Force
• US Army Cyber Command
• US Cyber Consequences Unit
• US Department of Defence
Government
• Bangladesh High Commission
• Banking Regulation and Supervision
Agency
• Belgian Ministry of Economy
• ENISA
• European Commission
• Foreign and Commonwealth Office, UK
• House of Commons
• House of Lords
• INTERPOL
• Israel Prime Minister's Office
• Ministry for Communications,
Science & Technology, Tanzania
• Ministry of Communications and
• Transportation, Mexico
• UK Cabinet Office
• US Department of State
CNI
• Bank of England
• Barclays
• BP International
• BT Research and Technology
• Dubai Bank
• Network Rail
• NHS Commissioning Board
• Ofcom
• Royal Bank of Scotland
• Saudi Aramco
T l
7. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
How Can You Meet Your Marketing And Business Development
Objectives At Cyber Defence and Network Security 2015?
Networking
Ensure that you have the opportunity to engage
with the key decision makers within your
industry. We can create a platform for you to
effectively interact with your top customers and
prospects in the environment of your choice.
This can range from formalised private meetings
/ workshops right through to less structured
networking events such as sponsored drinks
receptions, coffee breaks or lunches. Ultimately
whatever you decide is the right forum; we
will support you in your quest to advance
relationships with the key people who can
influence the future of your business.
Branding
Your company can be elevated to a position
where they are seen as a market leader. In a
fiercely competitive market you need to ensure
that your brand is differentiated from the
competition. Failure to create a clear identity will
see your organisation fade into the background.
We ensure that we do everything we can to
effectively lift your brand before, during and
after the event. Not only do we create a fully
integrated marketing campaign, which your
company can be part of, but we also offer high
impact premium branding opportunities for
example on bags, water bottles, pens, lanyards
etc.
Thought Leadership
If you think that you should be viewed as a true
industry leader then you need to demonstrate
your market knowledge and expertise through
a thought leadership opportunity, such as
speaking or chairing. This is a highly unique
opportunity for your company to educate the
market, and as long as you are credible enough
to fit into a high level event programme, we
can position your organisation alongside top
customers and prospects in our speaker faculty.
As part of this speaker faculty your company
will be set apart from other industry attendees
giving you the competitive edge required to
make further strides in the market.
To the left you will find an example of some
sample packages which are designed to be
multi functional across the above objectives.
These are just examples because all of our
sponsorship packages are specifically designed
to meet your company’s individual marketing
and business development objectives.
Package Exhibition Associate Plenary Lead
Advisory Board Member 4 4
Exhibition 6x3 4 4
Exhibition 3x2 4 4
Conference Delegate Passes 4 4 4
Branding at Conference 4 4 4 4
Pre Event Branding (brochure) 4 4 4 4
Customised Mailing 4 4 4 4
Wish List 4 4 4 4
30-40 Minute Plenary Speaking 4 4 4
1 Day Conference Chair 4
Thames River Dinner Cruise 4
IPAD Conference Note/information pack sponsor 4 4
Workshop 4
Lanyards 4 4
8 ways Cyber Defence & Network Security 2015 can benefit you!
Generate new sales
leads: Our event will bring
together the region’s
key-decision makers, all of whom
have strong business reasons for
attending the event. By exhibiting and
presenting, you can impact on these
buyers. By the very nature of the high
quality of delegate attendance, the
contacts generated will lead to very
high conversion rates.
Demonstrate
thought
leadership:
Speaking on the
programme will allow
you to demonstrate your
market knowledge and
expertise to an audience
of high level decision
makers.
Building
customer loyalty:
Face-to-face
contact at conferences, and
showing continued support
of the market, helps develop
client loyalty as well as
cement your position as an
industry player.
Building relations with
the media: We have
researched the market
in order to find the most influential
media partners. We understand that
opportunities for editorial coverage
and developing better relations
can be integral to your company’s
success, so our media partnerships
offer additional benefit above and
beyond the standard sponsorship
package.
Brokering new
business partnerships:
Currently there are huge
opportunities to partner with OEM
suppliers actively looking to adjust
their supply chains.
Enter new
markets:
Sponsorship
is one of the most
effective ways to enter
new markets. It is a great
opportunity to research
and network whilst
gaining exposure to a
new qualified database.
Positioning your
company brand:
Being part of this
highly influential industry event
establishes your company as
a strong brand and highlights
your company’s abilities and
strengths. Commitment to this
event also demonstrates your
capability as a global player.
01 03 05 07
08
04 06Launch new products or
services: Use the event as
a launch pad to promote
your latest products or system. With
the most senior figures from the
industry in attendance, plus carefully
selected media partners at the event,
innovative new technology will always
generate a buzz.
02
For sponsorship opportunities please contact alex darby on
+44 (0) 207 368 9300 or by e-mail at sponsor@iqpc.co.uk
CDANS is the world premiere
cyber event for intelligence,
military and commercial
enterprises. The level of
collaboration, cooperation and
threat intelligence sharing is
outstanding
Lieutenant Colonel (Rtd) Bill Hagestad,
Red Dragon Rising
8. 5 WAYS TO REGISTER
Tel: +44 (0) 20 7368 9300
Fax: +44 (0) 20 7368 9301
Post: your booking form to
IQPC UK, 2nd Floor,
129 Wilton Road, London SW1V 1JZ
Web: www.cdans.org
Email: enquire@defenceiq.com
Conferencecode12956.009
Terms and Conditions
IQPC recognises the value of learning in teams. Groups of 3 or
more booking at the same time from the same company receive a
10% discount. 5 or more receive a 15% discount. 7 receive a 20%
discount. Only one discount available per person.
Team Discounts*
Venue:
London, United Kingdom
Accommodation:
Travel and accommodation are not included in the registration fee.
For updates on the venue and accommodation information, please
visit: www.cdans.org
Venue & Accommodation
To claim a variety of articles, podcasts and other free resources
please visit www.CDANS.org
Free Online Resources
Total price for your Organisation: (Add total of all individuals attending):
Card Number: VISA 6 M/C 6 AMEX 6
6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
Exp. Date: 6 6 6 6 Sec: 6 6 6 6
Name On Card: Signature:
Billing Address (if different from below):
City/County/Postcode Cheque enclosed for: £ (Made payable to IQPC Ltd.)
(Please quote 12956.009 with remittance advice)
IQPC Bank details: HSBC Bank, 67 George Street, Richmond, Surrey, TW9 1HG, United Kingdom.
Sort Code: 40 38 18 Account No: 51304143 IBAN Code: GB59 MIDL 4038 1851 3041 43
Swift Code: MIDLGB2112V Account name: International Quality & Productivity Centre Ltd.
Please photocopy for each additional delegate
6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other 6 Rank (Please Specify)
First Name Family Name
Department Mobile No.
Job Title Tel No.
Email
6 Yes I would like to receive information about products and services via email
Organisation
Nature of business
Address
Postcode Country
Telephone Fax
Approving Manager
Name of person completing form if different from delegate:
Signature
6 I agree to IQPC’s cancellation, substitution and payment terms
Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify)
Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6
Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking.
Delegate Details
Payment Method
*To qualify for discounts, bookings must be received with payment by the discount deadline. Only one discount/offer applicable per person.
** Military, government and CNI discounted rates apply to serving military officers, government, CNI and university personnel only.
All serving Generals/Flag Officers 1 Star and above may attend the conference free of charge. Please contact defence@iqpc.co.uk for further details.
This offer can not be combined with any others and is not transferable. UK VAT is charged at 20%. VAT Registration #: GB 799 2259 67
payment must be RECEIVED prior to the conference
Please read the information listed below as each booking is subject to IQPC Ltd standard terms
and conditions.
Payment Terms: Upon completion and return of the registration form full payment is required
no later than 5 business days from the date of invoice. Payment of invoices by means other than
by credit card or purchase order (UK Plc and UK government bodies only) will be subject to a £49
(plus VAT) processing fee per delegate. Payment must be received prior to the conference date.
We reserve the right to refuse admission to the conference if payment has not been received.
IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates
at any time by providing reasonable advance notice to IQPC. For any cancellations received in
writing not less than eight (8) days prior to the conference, you will receive a 90% credit to be
used at another IQPC conference which must occur within one year from the date of issuance
of such credit. An administration fee of 10% of the contract fee will be retained by IQPC
for all permitted cancellations. No credit will be issued for any cancellations occurring within
seven (7) days (inclusive) of the conference. In the event that IQPC cancels an event for any
reason, you will receive a credit for 100% of the contract fee paid. You may use this credit for
another IQPC event to be mutually agreed with IQPC, which must occur within one year from
the date of cancellation. In the event that IQPC postpones an event for any reason and the
delegate is unable or unwilling to attend in on the rescheduled date, you will receive a credit for
100% of the contract fee paid. You may use this credit for another IQPC event to be mutually
agreed with IQPC, which must occur within one year from the date of postponement. Except
as specified above, no credits will be issued for cancellations.There are no refunds given under
any circumstances. IQPC is not responsible for any loss or damage as a result of a substitution,
alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever
in the event this conference is cancelled, rescheduled or postponed due to a fortuitous event,
Act of God, unforeseen occurrence or any other event that renders performance of this
conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event
shall include, but not be limited to: war, fire, labour strike, extreme weather or other emergency.
Please note that while speakers and topics were confirmed at the time of publishing,
circumstances beyond the control of the organizers may necessitate substitutions, alterations or
cancellations of the speakers and/or topics. As such, IQPC reserves the right to alter or modify
the advertised speakers and/or topics if necessary without any liability to you whatsoever. Any
substitutions or alterations will be updated on our web page as soon as possible. Discounts: All
‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order
to receive any discount. Any other discounts offered by IQPC (including team discounts) also
require payment at time of registration. Discount offers cannot be combined with any other offer.
6 Please do not pass my information to any third party
Start knowledge sharing and
networking before the event
To speed registration, please provide the priority code located on the mailing label or in the box below.
My registration code is PDFW
Please contact our database manager on +44 (0) 20 7368 9300 / +44 (0) 20 7036 1300 or at
database@iqpc.co.uk quoting the registration code above to inform us of any changes or to remove your details.
T Follow us on Twitter @DefenceIQ
l Join our linked In group
Pre-conference Cyber Wargaming Focus
Day 21 January 2015
Main conference days: 22-23 January 2015
Venue: London
Industry Rate
Package
Early Bird: Book Before
31st October 2014*
Early Bird: Book Before
28th November 2014*
Early Bird: Book Before
24th December 2014*
Standard Price
Platinum Package
2 day conference
Focus Day
Post event presentations and audio on b2bshop.com
SAVE £300
£2,798 + VAT
SAVE £200
£2,898 + VAT
SAVE £100
£2,998 + VAT
£3,098 + VAT
Gold Package
2 day conference
Focus Day
SAVE £300
£2,299 + VAT
SAVE £200
£2,399 + VAT
SAVE £100
£2,499 + VAT
£2,599 + VAT
Bronze Package
2 day conference
SAVE £300
£1,699 + VAT
SAVE £200
£1,799 + VAT
SAVE £100
£1,899 + VAT
£1,999 + VAT
Military / Government / CNI RATE**
Package
Early Bird: Book Before
31st October 2014*
Early Bird: Book Before
28th November 2014*
Early Bird: Book Before
24th December 2014*
Standard Price
Platinum Package
2 day conference
Focus Day
Post event presentations and audio on b2bshop.com
SAVE £300
£948 + VAT
SAVE £200
£1,048 + VAT
SAVE £100
£1,148 + VAT
£1,248 + VAT
Gold Package
2 day conference
Focus Day
SAVE £300
£649 + VAT
SAVE £200
£749 + VAT
SAVE £100
£849 + VAT
£949 + VAT
Bronze Package
2 day conference
SAVE £300
£399 + VAT
SAVE £200
£499 + VAT
SAVE £100
£599 + VAT
£699 + VAT
CLICK TO
SUBMIT