SlideShare a Scribd company logo
1 of 8
Download to read offline
The premier cybersecurity symposium incorporating militaries, government
and critical national infrastructure at the highest decision making level
Senior International speaker panel includes:
Vice Admiral Jan
Tighe, Commander,
US Fleet Cyber
Command
Dr Jamie Shea,
Deputy Assistant
Secretary General,
Emerging Security
Challenges, NATO HQ
Vice Admiral Arnaud
Coustillière, Head of
Cyber, French
Defence Staff
Andrew Gracie,
Executive Director,
Resolution Directorate,
Bank of England
Major General Odd
Egil Pedersen, Chief,
Norwegian Cyber
Force
Jakub Boratyński,
Head of Trust
& Security, DG
CONNECT, European
Commission
Major General Basilio
di Martino, Director,
Telecommunications,
Italian Ministry of
Defence
Mihkel Tikk, Director
of Cyber Policy,
Estonian MoD
Meet with senior international military, government and critical national
infrastructure cybersecurity representatives from across Europe, North America,
the Middle East and Africa to gain unique insights into their cyber defence
strategies. Hear first hand what key technologies are in demand and how you can
meet these requirements
Learn about the latest developments in cyber defence and network security
solutions to gain a complete picture of industry trends. Meet leading industry and
research figures engaged in producing and influencing new cybersecurity systems
and share your own solutions
Compare how military, government and critical national infrastructure
institutions are approaching cybersecurity, the lessons learned from recent events
and how these can be incorporated into your own cyber defence frameworks and
technology development
Discuss the future cyber threat, and how greater situational awareness can be 		
achieved. Learn what solutions are under development, including an update on the
latest virtualisation technology
Share ideas on how deeper cross-agency and international cooperation can
be facilitated to ensure more secure networks. Engage in debate with your senior
international peers and colleagues to put forward your own opinions and approach
CONFERENCE HIGHLIGHTS:
As threats to the
cyber landscape increase
in number - The Spanish
Ministry of Defence
sees CDANS as a unique
opportunity to discover the
key challenges and their
solutions from other regions
on a day-to-day basis.
Lieutenant Colonel Angel Gomez
de Agreda, Office of the Secretary
General for Defence Policy,
Spanish Ministry of Defence
www.cdans.org
1 star officers and above go for free
Pre-Conference Cyber
Wargaming Focus Day:
21 January 2015
Main conference days:
22-23 January 2015
Venue:
London, UK
Dear Colleagues,
It is my humble honour and distinct pleasure to announce
the return of Cyber Defence and Network Security 2015
(CDANS 2015) this coming January. I am delighted to return
as chairman and look forward to greeting you all personally
in London.
In 2014 we experienced unparalleled information revelations
that have both changed and shaped forever the way in
which our respective countries handle the confidentiality
and integrity of information assurance. Without any doubt
the 21st Century will be known as the ‘cyber’ century:
cyber war, cyber defence, cyber attacks and cyber terror.
Militarisation of the binary world is a foregone conclusion
and it is essential that we understand the global, strategic
and tactical second/third order effects of this convergence
of military force, “informization” of networks and critical
infrastructure.
Consequently, there has never been a more important time
to investigate, discuss and cooperate on cyber matters.
CDANS 2015 will bring together international government,
military leaders and CNI cybersecurity specialists to
address the most pressing issues of 2015, outlining the
challenges and priorities nations will have over the next
12 months. You cannot afford to miss the very special
professional programme CDANS has in store for the
beginning of yet another new year - notably world renowned
wargaming expert John Curry will kick things off with a focus
day dedicated to cyber scenarios.
Alongside briefings from the United States, France, Norway
and Italy to mention but a few, we have brought back to
the fore the issue of cyber security for Critical National
Infrastructure and the explosion of requirements and
solutions in the mobile space. We are very proud of our truly
international panel of experts and I sincerely hope you will
be able to join us in January.
If you would like to discuss the event in more detail or
register, please do not hesitate to contact our enquiries team
on +44 (0)207 368 9737
Semper Fidelis,
Lt Col William Hagestad
US Marine Corps Retired
Conference Chairman
Vice Admiral Jan Tighe,
Commander, US Fleet Cyber
Command
Vice Admiral Arnaud Coustillière,
Head of Cyber, French Defence
Staff
Major General Odd Egil Pedersen,
Chief, Norwegian Cyber Force
Major General Basilio di Martino,
Director, Directorate General of
Telecommunications, Informatics
and Advanced Technologies, Italian
Ministry of Defence
Major General Mohammad Khalid
Rao, Chief of Information Security,
Pakistan Armed Forces
Brigadier General Welton Chase
Jr., Director, J6 – J4/Cyber, EUCOM
Brigadier General Helmut
Habermayer, Chief of Cyber,
Austrian MoD
Dr Jamie Shea, Deputy Assistant
Secretary General, Emerging
Security Challenges, NATO HQ
Mihkel Tikk, Director of Cyber
Policy, Estonian MoD
Thomas Kristmar, Head of Network
Security, Centre for Cyber Security,
Danish Defence Intelligence
Service
Colonel Artur Suzik, Director, NATO
CCD COE
Makame M. Mbarawa, Honorable
Minister for Communications,
Science & Technology, Tanzania
Jakub Boratyński, Head of Trust &
Security, DG CONNECT, European
Commission
Andrew Gracie, Executive Director,
Resolution Directorate, Bank of
England
Graham Wright, Chief Information
Security Officer, National Grid
Craig Balding, Chief Information
Security Officer, Barclays
David Isiavwe, General Manager,
Audit, Control & IT Security, Union
Bank of Nigeria
Annemarie Zielstra, Director Cyber
Security & Resilience, TNO
INTERNATIONAL SPEAKER PANEL
Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
Cyber Wargaming Pre-conference
Focus Day, 21st January 2015,, 10.30 - 16.30
Wargaming is an essential part of preparation for crisis situations by military, nation states and businesses. Games can be used
for their training and educational value at all levels from senior leaders to those on the receiving end of targeted penetration
attempts. This day is about the current cyber wargaming from those with direct experience of gaming and modelling large
scale cyber-attacks. The pre-conference focus day on cyber wargaming will start with lectures to introduce the theoretical and
contextual basis of the interactive workshop sessions to follow, and will include thought provoking briefings on:
•	 An overview of current cyber wargaming - outlining the current state of gaming cyber-attacks in the military, nation state, business and 	 	
	 education.
•	 What is a cyber-war? Exploring the tricky question of what a cyber-war will look like based on lessons learned from recent conflicts where 		
	 cyber power has been deployed.
•	 Penetration testing as a live fire exercise. Penetration testing is normally carried out to demonstrate compliance with set standards. 	 	
	 However, it can be used as a live system test to practice policies and procedures. The session will demonstrate how to use different 	 	
	 penetration testing methodologies depending on the security posture and maturity of an organisation.
The workshop sessions will allow attendees to observe and play a variety of manual based cyber wargames and will be run by a
variety of SME’s who specialise in gaming cyber conflict. Attendees will have the opportunity to participate in one or more of the
following manual wargame sessions:
•	 Game 1: Protecting military intellectual property from other nation states using the matrix game methodology.
•	 Game 2: A card based game about a nation state under attack by hacktivists. The aim is to explore how hactivist groups form, operate and 	
	 collaborate.
•	 Game 3: Exercise Tallinn Soldier- a scaled down version of an exercise about a small state under cyber-attack and the decisions that have 	
	 to be taken. This is run using the seminar/committee games traditional wargames methodology.
•	 Game 4: to be confirmed.
•	 There will also be static displays showing how commercial off the shelf games include elements of cyber warfare.
Meet our featured cyber wargame experts:
Major Tom Mouat MBE joined the British Army in 1979. He is a Graduate of the Army Staff College and has served
worldwide. He is an expert in both manual and computer-based simulation systems, running large scale military training
exercises, and designing wargames. He was the principal Exercise Planning Officer for Headquarters ARRC for 2 years
prior to their first deployment to Bosnia. In Bosnia he ran the Joint Military Commission for 12 months and was awarded
an MBE. Following this he ran the British Army's principal land-based computer simulation system for 3 years. Since then
he has been involved in numerous exercises and training events (both computer-assisted and manual). He also served as a
Requirements Manager in the UK MOD's procurement organization for nearly 5 years. He was awarded the Chief of Defence
Material Commendation for innovation and costs saving while he was there. He has a Masters Degree in Simulation and
Modelling, has published articles and delivered lectures about simulations, military history and wargames for professional
development, education and recreation since 1983. He is a contributing author to the Handbook of Research on Serious
Games as Educational, Business and Research Tools as well as Dark Guest: Training Games for Cyberwarfare. He is currently
the Directing Staff officer responsible for Modelling and Simulation at the Defence Academy of the UK and has recently been
awarded the Chief Scientific Officer's Commendation for his contribution to science and technology.
John Curry is an academic who specialises in military simulations and cyber warfare.  He has written and edited over
sixty books on various aspects of recreational and professional wargaming. He has worked on gaming cyber warfare with a
variety of organisations, and contributed to the development of the cyber warfare module to the current British Army Forces
operational level wargame, RCAT (Rapid Campaign Analysis Tool). He is a contributing author to the Handbook of Research
on Serious Games as Educational, Business and Research Tools and Dark Guest: Training Games for Cyberwarfare. He has
also contributed a number of articles to professional journals on cyber warfare. He is an advisor to ECIPs and works for the
international consultancy Wikistrat on the Cyber Desk.
Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
CONFERENCE DAY ONE, 22nd JANUARY, 2015
08.30 	COFFEE & REGISTRATION
09.00 	CHAIRMAN’S OPENING REMARKS
	 Lieutenant Colonel William Hagestad II,US Marine Corps Retired	
	 SESSION THEME
	 National Solutions to Emerging Threats
	 How are nations and militaries advancing their defensive and 	
	 emergency response capabilities in the face of a persistent and 	
	 mutating threat? What are the emerging areas of greatest 	 	
	 importance and what will be the critical threats and challenges 	
	 for 2015? What technologies are under consideration for future 	
	 procurements?
09.10 	 The US Fleet Cyber Command (FLTCYBERCOM): Mission, 	
	 challenges and initiatives
	 •	The mission of FLTCYBERCOM: directing cyberspace operations, 	
	 	 deterring and defeating aggression; achieving military objectives 	
	 	 in and through cyberspace; organizing and directing Navy 		
	 	 cryptologic operations worldwide; integrating information 		
	 	 operations and space planning and operations
	 •	Insight into FLTCYBERCOM’s global operations
	 •	Responding to the future cyber threat. How is FLTCYBERCOM 	
	 	 shaping future strategies and programmes in response?
	 Vice Admiral Jan Tighe, Commander, US Fleet Cyber Command
09.50	 The Cyber Flank
	 •	Significantly improving the European theatre’s C4 and Cyber Joint 	
	 	 and Combined Operating Environment
	 •	“Operationalizing” the Joint Cyber Centre capabilities 	 	
	 	 (synchronization and integration)
	 •	Preserving and maintaining strategic partnerships and key 		
	 	 relationships with C4 and cyber counterparts and allies by 		
	 	 sustaining partner-nation capabilities - via training, mil-to-mil 	
	 	 engagement, joint exercises, theatre security cooperation, and 	
	 	 public-private engagement
	 •	Key priorities, future plans and requirements for securing 	 	
	 	 EUCOM’s cyber defence capabilities
	BrigadierGeneralWeltonChaseJr.,Director,J6–J4/Cyber,EUCOM
10.30 	COFFEE & NETWORKING
11.00	 Initiating a proactive cyber defence policy for protecting the 	
	French Ministry of Defence computer networks
	 •	Protecting the military’s networks to ensure dominance in theatre
	 •	Current and projected industry cyber policies
	 •	Future plans for the French Ministry of Defence, how will they 	
	 	 ensure the best cyber-warriors are ready to react? Investing an 	
	 	 additional €1 billion to increase cyber capacities
	 Vice Admiral Arnaud Coustillière, Head of Cyber, French 		
	Defence Staff
11.40	 Building effective cyber defence: The NATO contribution
	 •	NATO’s analysis of the evolving threat environment in the cyber 	
	 	 domain
	 •	Building capabilities: what are the most promising technologies
	 •	The NATO cyber-industry partnerships
	 Dr Jamie Shea, Deputy Assistant Secretary General, Emerging 	
	 Security Challenges, NATO HQ
12.20	 The Italian MoD Strategic Communications Infrastructure
	 •	The programmes launched by the Italian Joint General Staff to 	
	 	 improve connectivity both within each single service and at an 	
	 	 inter-service level
	 •	The initial plan to develop a layered approach overcoming urgent 	
	 	 requirements and budget constraints
	 •	Designing and improving in a combined effort with Allied Nations, 	
	 	 a dedicated satellite constellation to provide a reliable backup for 	
	 	 the highest level C2 functions, and to have an independent link 	
	 	 with task forces deployed abroad
	 •	The goal of building a true Defense Information Infrastructure
	 Major General Basilio di Martino, Director, Directorate General 	
	 of Telecommunications, Informatics and Advanced Technologies, 	
	 Italian Ministry of Defence
13.00	 NETWORKING LUNCH
14.00	 Working towards enhanced international and cross 		
	 agency cooperation: The Norwegian Cyber Force
	 •	An overview of the current cyber threat as seen from Norway 	
	 	 and an introduction to the Norwegian Cyber Force
	 •	Working with other Nordic nations to forge closer collaboration 	
	 	 in cyber defence: Developing common anti-cyber threat policies 	
	 	 and strategies
	 •	Looking ahead to future plans, programmes and requirements
	 Major General Odd Egil Pedersen,Chief,Norwegian Cyber Force
14.40	Civilian and Military cooperation in Network Security and 	
	Cyber Defence
	 •	Lessons learned when a MilCERT and GovCERT team up
	 •	Establishing joint situational awareness in civilian and military 	
	 	 sectors
	 •	Establishing a response capability for cyber attacks across sectors
	 •	Using lessons learned to improve the overall security posture
	 Thomas Kristmar, Head of Network Security, Centre for Cyber 	
	 Security, Danish Defence Intelligence Service
15.20 	COFFEE & NETWORKING
15.50	 Seeking maximum efficiency in Cyber Security - the 		
	 Austrian Model
	 •	Austria’s Cyber Security Strategy (CSS), the consequential CSS-	
	 	 implementation plan and where we are now
	 •	The importance of international and European cooperation for 	
	 	 securing an effective national cyber defence
	 •	The Austrian approach of bringing civil cyber forces of the 		
	 	 Chancellery, the Ministry of Interior, the Ministry of Exterior 	
	 	 together with the military Cyber Defence Forces in a first circle 	
	 	 - including sector CERTs and industry in a second circle if a 	
	 	 serious cyber crisis evolves
	 •	An insight into how Austria is using its conscription system to 	
	 	 win cyber experts for the armed forces and the nation
	 Brigadier General Helmut Habermayer, Chief of Cyber, Austrian 	
	MoD
16.30	Cybersecurity challenges in Pakistan: Identifying the risks 	
	 and finding solutions
	 •	Current assessments and analysis being undertaken on Pakistan’s 	
	 	 cybersecurity: What are the challenges being faced in Pakistan?
	 •	Future requirements, programmes and strategies for ensuring an 	
	 	 effective cyber defence
	 •	The importance of cross agency and international cooperation for 	
	 	 a long term cybersecurity framework
	 Major General Mohammad Khalid Rao, Director General, 	
	 Telecom Foundation, Pakistan
	
17.10	ROUND TABLE DISCUSSIONS
	 How should we define the legal boundaries of cyber defence?
	 •	Are we experiencing a transformation from cyber security to 	
	 	 cyber defence? What does this constitute?
	 •	Working towards ‘active’ cyber defence. What are the stumbling 	
	 	 blocks to legislation?
	 •	More than a year on, what are the consequences of the 	 	
	 	 Snowden fiasco?
	 •	What should be the legal boundaries of cyber defence? Can cyber 	
	 	 attacks be lawful as an act of defence?
	
17.50	CHAIR’S CLOSE AND END OF DAY ONE
Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
CONFERENCE DAY TWO, 23RD JANUARY, 2015
08.30 	COFFEE & REGISTRATION
09.00 	CHAIRMAN’S OPENING REMARKS
	 Lieutenant Colonel William Hagestad II,US Marine Corps Retired
	 SESSION THEME
	 Trailblazing new initiatives and innovation in cyber defence 	
	 and facilitating deeper international cooperation
09.10 	 Shaping Estonia’s future cyber defence policy: Priorities and 	
	plans
	 •	An overview of the development of Estonia’s cyber defence 	
	 	 framework since the 2007 attack. Where are we now?
	 •	Strategies in place for securing Estonia’s cybersecurity: working 	
	 	 in collaboration with government, military and critical 	 	
	 	 infrastructure
	 •	Looking ahead to the next five years: future plans, programmes 	
	 	 and strategies
	 Mihkel Tikk, Director of Cyber Policy, Estonian MoD
09.50 	Promoting international cooperation on cyber defence 	
	 across the NATO Alliance: The NATO Cooperative Cyber 	
	Defence Centre of Excellence
	 •	Introducing the NATO CCD COE’s mission and objectives
	 •	Updates on the Tallinn Manual: key priorities and requirements to 	
	 	 respond to the future cyber threat
	 •	Main findings and lessons learned from Locked Shields 2014: 	
	 	 the key technologies needed to be developed for enhanced 	
	 	 resilience and competency
	 Colonel Artur Suzik, Director, NATO CCD COE
10.30 	COFFEE & NETWORKING
	
	 SESSION THEME
	Collaboration & Governance: Protecting Critical Infrastructures
	 A large number of recent attacks on nations’ critical nation 	 	
	 infrastructures have demonstrated the continuing importance 	
	 of implementing substantive and resilient countermeasures. 		
	 There is an increasing demand for an integrated national approach 	
	 to cyber defence and the development of  ‘best practice’ globally 	
	 on 	cybersecurity issues
11:00	 Ensuring a secure and trustworthy digital environment for 	
	 EU citizens and businesses, and promoting a coherent 	
	 international approach on cybersecurity
	 •	Implementing the Cybersecurity Strategy for the European Union, 	
	 	 addressing the technological and industrial issues that derive 	
	 	 from the Network and Information Security (NIS) policy of DG 	
	 	 CONNECT
	 •	Incentives to foster investments, transparency and user 	 	
	 	 awareness, and addressing international cooperation as a key 	
	 	 priority
	 •	Investing in cybersecurity research: introducing the Horizon 2020 	
	 	 programme
	 •	Responding to new technological developments with a high 	
	 	 impact, such as cloud computing and big data
	 	 Jakub Boratyński, Head of Trust & Security, DG CONNECT, 	
	 	 European Commission
11.40	 Managing cyber risk – the global banking perspective
	 •	What is the cyber risk from a financial stability perspective?
	 •	What impact do cyber threats have on the financial system?
	 •	What strategies are in place with the Bank of England to ensure 	
	 	 maximum efficiency and resilience?
	 •	Introducing the CBEST Programme: Lessons learned and potential 	
	 	 vulnerabilities
	 Andrew Gracie, Executive Director, Resolution Directorate, Bank 	
	 of England
12.20	Barclay’s strategy for Cyber Risk Management
	 •	What does Barclay’s define as cyber?
	 •	How is cyber risk measured and managed?
	 •	Barclay’s set of operational threat management capabilities 	
	 	 including the intelligence detect ops & response components that 	
	 	 underpin it
	 Craig Balding, CISO, Barclays
13.00	 NETWORKING LUNCH
14.00	Case Study: Protecting from the insider threat
	 •	The insider threat: what are the dangers and where are the 	
	 	 vulnerabilities?
	 •	Mitigating the risk: measures that can be implemented to 		
	 	 prevent an insider attack, including available technologies and 	
	 	 approaches
	 •	The perspective of the Union Bank of Nigeria: how are they 	
	 	 working against the insider threat?
	 David Isiavwe, General Manager, Audit, Control & IT Security, 	
	 Union Bank of Nigeria
14.40	Developing an integrated security approach to 		
	 governmental and national cybersecurity: The Tanzanian 	
	perspective
	 •	Securing the Tanzanian National Optical Fibre Network
	 •	Internet exchange points: security hardware to address the 	
	 	 biggest security challenges
	 •	Mobile cybersecurity and regulating internet messaging: hard vs. 	
	 	 soft processes
	 Makame M. Mbarawa, Honorable Minister for Communications, 	
	 Science & Technology, Tanzania
15.20 	COFFEE & NETWORKING
15.50	Protecting the UK’s Critical National Infrastructure from 	
	Cybersecurity Attacks
	 •	Identifying the cyber threat to the UK’s national energy 	 	
	 	 infrastructure
	 •	How is the National Grid collaborating with industry and 	 	
	 	 government to ensure the protection of the grid?
	 •	Working with CERT UK and CISP to increase grid protection
	 •	The Technical and software solutions under consideration for 	
	 	 developing the UK’s energy infrastructure protection
	 Graham Wright, Chief Information Security Officer, National Grid
16.30	Creating innovations for safe cyberspace: The current 	
	 research projects and initiatives of TNO
	 •	An introduction to TNO’s current cybersecurity initiatives, their 	
	 	 key areas of research and findings
	 •	Mitigating new cyber threats by developing an algorithm to 	
	 	 predict the likelihood of specific internet domains being misused
	 •	Enhancing  cyber defence education and training via the Cyber 	
	 	 Awareness Trainer
	 Annemarie Zielstra, Director Cyber Security & Resilience, TNO
17.10	CHAIR’S CLOSE AND END OF DAY TWO
CDANS is the best venue I found to meet a
wide variety of international partners.
Gregory C. Radabaugh,GG-15, DAF Chief of Cyberspace
Operations, Air Force Intelligence, Surveillance and
Reconnaissance Agency
Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
Follow Defence IQ @DefenceIQ to
keep up to date with news and
developments on Cyber Defence
and Network Security #CDANS15
Join Defence IQ
World Defence
Community on
LinkedIn
Read the Defence IQ blog authoritative news source
for high quality and exclusive commentary and
analysis on global defence and military-related
topics defencesummits.wordpress.com
Key Organisations Who Have Attended
Cyber Defence & Network Security
Industry
•	 ADS Defence and Security Systems Ltd
•	 BlackBerry Limited
•	 BreakingPoint
•	 Clearswift
•	 Codenomicon Ltd
•	 Combitech AB
•	 Elbit Systems
•	 Elettronica
•	 Encode UK Ltd
•	 Euroclear
•	 Exonar Limited
•	 Fidelis Security Systems
•	 FireEye
•	 Google, Inc.
•	 HP Enterprise Security
•	 i2 Ltd IBM Company
•	 IBM
•	 Ixia
•	 Kaspersky UK
•	 L-3 Communications
•	 Lockheed Martin UK Integrated Systems
•	 & Solutions Ltd.
•	 Microsoft Asia
•	 Mobile Enterprise Computing
•	 Netscout Systems
•	 PricewaterhouseCoopers LLP
•	 Qosmos
•	 Reuters
•	 RUAG Defence
•	 Saab
•	 Skybox Security
•	 Solera Networks
•	 Sourcefire
•	 Verint Systems Ltd
Defence
•	 Armasuisse
•	 Armed Forces Philippines
•	 Brazilian Army
•	 Canadian Forces Network Operation
Center (CFNOC)
•	 CYBERCOM
•	 Defence Command Denmark
•	 DSTL
•	 European Defence Agency
•	 French Integrated Defense Staff
•	 Indonesian MOD
•	 Israeli Space Agency
•	 Italian Defence General Staff
•	 Italian MoD
•	 MoD Austria
•	 NATO
•	 NATO Cooperative Cyber Defence,
Centre of Excellence
•	 Norwegian Armed Forces
•	 Pakistan Air Force
•	 Republic of Singapore Air Force
•	 Royal Saudi Air Force
•	 Royal Thai Air Force
•	 Spanish MoD
•	 Swedish Armed Forces
•	 Trinidad and Tobago Police Service
•	 UK Air Warfare Centre
•	 UK MoD Cyber Policy and Plans Team
•	 US Air Force
•	 US Army Cyber Command
•	 US Cyber Consequences Unit
•	 US Department of Defence
Government
•	 Bangladesh High Commission
•	 Banking Regulation and Supervision
Agency
•	 Belgian Ministry of Economy
•	 ENISA
•	 European Commission
•	 Foreign and Commonwealth Office, UK
•	 House of Commons
•	 House of Lords
•	 INTERPOL
•	 Israel Prime Minister's Office
•	 Ministry for Communications,
Science & Technology, Tanzania
•	 Ministry of Communications and
•	 Transportation, Mexico
•	 UK Cabinet Office
•	 US Department of State
CNI
•	 Bank of England
•	 Barclays
•	 BP International
•	 BT Research and Technology
•	 Dubai Bank
•	 Network Rail
•	 NHS Commissioning Board
•	 Ofcom
•	 Royal Bank of Scotland
•	 Saudi Aramco
T l
Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
How Can You Meet Your Marketing And Business Development
Objectives At Cyber Defence and Network Security 2015?
Networking
Ensure that you have the opportunity to engage
with the key decision makers within your
industry. We can create a platform for you to
effectively interact with your top customers and
prospects in the environment of your choice.
This can range from formalised private meetings
/ workshops right through to less structured
networking events such as sponsored drinks
receptions, coffee breaks or lunches. Ultimately
whatever you decide is the right forum; we
will support you in your quest to advance
relationships with the key people who can
influence the future of your business.
Branding
Your company can be elevated to a position
where they are seen as a market leader. In a
fiercely competitive market you need to ensure
that your brand is differentiated from the
competition. Failure to create a clear identity will
see your organisation fade into the background.
We ensure that we do everything we can to
effectively lift your brand before, during and
after the event. Not only do we create a fully
integrated marketing campaign, which your
company can be part of, but we also offer high
impact premium branding opportunities for
example on bags, water bottles, pens, lanyards
etc.
Thought Leadership
If you think that you should be viewed as a true
industry leader then you need to demonstrate
your market knowledge and expertise through
a thought leadership opportunity, such as
speaking or chairing. This is a highly unique
opportunity for your company to educate the
market, and as long as you are credible enough
to fit into a high level event programme, we
can position your organisation alongside top
customers and prospects in our speaker faculty.
As part of this speaker faculty your company
will be set apart from other industry attendees
giving you the competitive edge required to
make further strides in the market.
To the left you will find an example of some
sample packages which are designed to be
multi functional across the above objectives.
These are just examples because all of our
sponsorship packages are specifically designed
to meet your company’s individual marketing
and business development objectives.
Package Exhibition Associate Plenary Lead
Advisory Board Member 4 4
Exhibition 6x3 4 4
Exhibition 3x2 4 4
Conference Delegate Passes 4 4 4
Branding at Conference 4 4 4 4
Pre Event Branding (brochure) 4 4 4 4
Customised Mailing 4 4 4 4
Wish List 4 4 4 4
30-40 Minute Plenary Speaking 4 4 4
1 Day Conference Chair 4
Thames River Dinner Cruise 4
IPAD Conference Note/information pack sponsor 4 4
Workshop 4
Lanyards 4 4
8 ways Cyber Defence & Network Security 2015 can benefit you!
Generate new sales
leads: Our event will bring
together the region’s
key-decision makers, all of whom
have strong business reasons for
attending the event. By exhibiting and
presenting, you can impact on these
buyers. By the very nature of the high
quality of delegate attendance, the
contacts generated will lead to very
high conversion rates.
Demonstrate
thought
leadership:
Speaking on the
programme will allow
you to demonstrate your
market knowledge and
expertise to an audience
of high level decision
makers.
Building
customer loyalty:
Face-to-face
contact at conferences, and
showing continued support
of the market, helps develop
client loyalty as well as
cement your position as an
industry player.
Building relations with
the media: We have
researched the market
in order to find the most influential
media partners. We understand that
opportunities for editorial coverage
and developing better relations
can be integral to your company’s
success, so our media partnerships
offer additional benefit above and
beyond the standard sponsorship
package.
Brokering new
business partnerships:
Currently there are huge
opportunities to partner with OEM
suppliers actively looking to adjust
their supply chains.
Enter new
markets:
Sponsorship
is one of the most
effective ways to enter
new markets. It is a great
opportunity to research
and network whilst
gaining exposure to a
new qualified database.
Positioning your
company brand:
Being part of this
highly influential industry event
establishes your company as
a strong brand and highlights
your company’s abilities and
strengths. Commitment to this
event also demonstrates your
capability as a global player.
01 03 05 07
08
04 06Launch new products or
services: Use the event as
a launch pad to promote
your latest products or system. With
the most senior figures from the
industry in attendance, plus carefully
selected media partners at the event,
innovative new technology will always
generate a buzz.
02
For sponsorship opportunities please contact alex darby on
+44 (0) 207 368 9300 or by e-mail at sponsor@iqpc.co.uk
CDANS is the world premiere
cyber event for intelligence,
military and commercial
enterprises. The level of
collaboration, cooperation and
threat intelligence sharing is
outstanding
Lieutenant Colonel (Rtd) Bill Hagestad,
Red Dragon Rising
5 WAYS TO REGISTER
Tel:	 +44 (0) 20 7368 9300
Fax: 	 +44 (0) 20 7368 9301
Post: 	 your booking form to
	 IQPC UK, 2nd Floor,
	 129 Wilton Road, London SW1V 1JZ
Web: 	 www.cdans.org
Email: 	 enquire@defenceiq.com
Conferencecode12956.009
Terms and Conditions
IQPC recognises the value of learning in teams. Groups of 3 or
more booking at the same time from the same company receive a
10% discount. 5 or more receive a 15% discount. 7 receive a 20%
discount. Only one discount available per person.
Team Discounts*
Venue:
London, United Kingdom
Accommodation:
Travel and accommodation are not included in the registration fee.
For updates on the venue and accommodation information, please
visit: www.cdans.org
Venue & Accommodation
To claim a variety of articles, podcasts and other free resources
please visit www.CDANS.org
Free Online Resources
Total price for your Organisation: (Add total of all individuals attending):
Card Number: VISA 6 M/C 6 AMEX 6
6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
Exp. Date: 6 6 6 6 Sec: 6 6 6 6
Name On Card:				Signature:
Billing Address (if different from below):
City/County/Postcode			 Cheque enclosed for: £		 (Made payable to IQPC Ltd.)
(Please quote 12956.009 with remittance advice)
IQPC Bank details: HSBC Bank, 67 George Street, Richmond, Surrey, TW9 1HG, United Kingdom.
Sort Code: 40 38 18 Account No: 51304143 IBAN Code: GB59 MIDL 4038 1851 3041 43
Swift Code: MIDLGB2112V Account name: International Quality & Productivity Centre Ltd.
Please photocopy for each additional delegate
6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other 6 Rank (Please Specify)
First Name 				 Family Name
Department				Mobile No.
Job Title 				Tel No.
Email
6 Yes I would like to receive information about products and services via email
Organisation
Nature of business
Address
Postcode 					Country
Telephone 					Fax
Approving Manager
Name of person completing form if different from delegate:
Signature
6 I agree to IQPC’s cancellation, substitution and payment terms
Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify)
Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6
Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking.
Delegate Details
Payment Method
*To qualify for discounts, bookings must be received with payment by the discount deadline. Only one discount/offer applicable per person.
** Military, government and CNI discounted rates apply to serving military officers, government, CNI and university personnel only.
All serving Generals/Flag Officers 1 Star and above may attend the conference free of charge. Please contact defence@iqpc.co.uk for further details.
This offer can not be combined with any others and is not transferable. UK VAT is charged at 20%. VAT Registration #: GB 799 2259 67
payment must be RECEIVED prior to the conference
Please read the information listed below as each booking is subject to IQPC Ltd standard terms
and conditions.
Payment Terms: Upon completion and return of the registration form full payment is required
no later than 5 business days from the date of invoice. Payment of invoices by means other than
by credit card or purchase order (UK Plc and UK government bodies only) will be subject to a £49
(plus VAT) processing fee per delegate. Payment must be received prior to the conference date.
We reserve the right to refuse admission to the conference if payment has not been received.
IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates
at any time by providing reasonable advance notice to IQPC. For any cancellations received in
writing not less than eight (8) days prior to the conference, you will receive a 90% credit to be
used at another IQPC conference which must occur within one year from the date of issuance
of such credit. An administration fee of 10% of the contract fee will be retained by IQPC
for all permitted cancellations. No credit will be issued for any cancellations occurring within
seven (7) days (inclusive) of the conference. In the event that IQPC cancels an event for any
reason, you will receive a credit for 100% of the contract fee paid. You may use this credit for
another IQPC event to be mutually agreed with IQPC, which must occur within one year from
the date of cancellation. In the event that IQPC postpones an event for any reason and the
delegate is unable or unwilling to attend in on the rescheduled date, you will receive a credit for
100% of the contract fee paid. You may use this credit for another IQPC event to be mutually
agreed with IQPC, which must occur within one year from the date of postponement. Except
as specified above, no credits will be issued for cancellations.There are no refunds given under
any circumstances. IQPC is not responsible for any loss or damage as a result of a substitution,
alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever
in the event this conference is cancelled, rescheduled or postponed due to a fortuitous event,
Act of God, unforeseen occurrence or any other event that renders performance of this
conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event
shall include, but not be limited to: war, fire, labour strike, extreme weather or other emergency.
Please note that while speakers and topics were confirmed at the time of publishing,
circumstances beyond the control of the organizers may necessitate substitutions, alterations or
cancellations of the speakers and/or topics. As such, IQPC reserves the right to alter or modify
the advertised speakers and/or topics if necessary without any liability to you whatsoever. Any
substitutions or alterations will be updated on our web page as soon as possible. Discounts: All
‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order
to receive any discount. Any other discounts offered by IQPC (including team discounts) also
require payment at time of registration. Discount offers cannot be combined with any other offer.
6 Please do not pass my information to any third party
Start knowledge sharing and
networking before the event
To speed registration, please provide the priority code located on the mailing label or in the box below.
My registration code is PDFW
Please contact our database manager on +44 (0) 20 7368 9300 / +44 (0) 20 7036 1300 or at
database@iqpc.co.uk quoting the registration code above to inform us of any changes or to remove your details.
T Follow us on Twitter @DefenceIQ
l Join our linked In group
Pre-conference Cyber Wargaming Focus
Day 21 January 2015
Main conference days: 22-23 January 2015
Venue: London
Industry Rate
Package
Early Bird: Book Before
31st October 2014*
Early Bird: Book Before
28th November 2014*
Early Bird: Book Before
24th December 2014*
Standard Price
Platinum Package
2 day conference
Focus Day
Post event presentations and audio on b2bshop.com
SAVE £300
£2,798 + VAT
SAVE £200
£2,898 + VAT
SAVE £100
£2,998 + VAT
£3,098 + VAT
Gold Package
2 day conference
Focus Day
SAVE £300
£2,299 + VAT
SAVE £200
£2,399 + VAT
SAVE £100
£2,499 + VAT
£2,599 + VAT
Bronze Package
2 day conference
SAVE £300
£1,699 + VAT
SAVE £200
£1,799 + VAT
SAVE £100
£1,899 + VAT
£1,999 + VAT
Military / Government / CNI RATE**
Package
Early Bird: Book Before
31st October 2014*
Early Bird: Book Before
28th November 2014*
Early Bird: Book Before
24th December 2014*
Standard Price
Platinum Package
2 day conference
Focus Day
Post event presentations and audio on b2bshop.com
SAVE £300
£948 + VAT
SAVE £200
£1,048 + VAT
SAVE £100
£1,148 + VAT
£1,248 + VAT
Gold Package
2 day conference
Focus Day
SAVE £300
£649 + VAT
SAVE £200
£749 + VAT
SAVE £100
£849 + VAT
£949 + VAT
Bronze Package
2 day conference
SAVE £300
£399 + VAT
SAVE £200
£499 + VAT
SAVE £100
£599 + VAT
£699 + VAT
CLICK TO
SUBMIT

More Related Content

Recently uploaded

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 

Recently uploaded (20)

Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

#CDANS #CDANS2015 - Cyber Defence & Network Security 2015

  • 1. The premier cybersecurity symposium incorporating militaries, government and critical national infrastructure at the highest decision making level Senior International speaker panel includes: Vice Admiral Jan Tighe, Commander, US Fleet Cyber Command Dr Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO HQ Vice Admiral Arnaud Coustillière, Head of Cyber, French Defence Staff Andrew Gracie, Executive Director, Resolution Directorate, Bank of England Major General Odd Egil Pedersen, Chief, Norwegian Cyber Force Jakub Boratyński, Head of Trust & Security, DG CONNECT, European Commission Major General Basilio di Martino, Director, Telecommunications, Italian Ministry of Defence Mihkel Tikk, Director of Cyber Policy, Estonian MoD Meet with senior international military, government and critical national infrastructure cybersecurity representatives from across Europe, North America, the Middle East and Africa to gain unique insights into their cyber defence strategies. Hear first hand what key technologies are in demand and how you can meet these requirements Learn about the latest developments in cyber defence and network security solutions to gain a complete picture of industry trends. Meet leading industry and research figures engaged in producing and influencing new cybersecurity systems and share your own solutions Compare how military, government and critical national infrastructure institutions are approaching cybersecurity, the lessons learned from recent events and how these can be incorporated into your own cyber defence frameworks and technology development Discuss the future cyber threat, and how greater situational awareness can be achieved. Learn what solutions are under development, including an update on the latest virtualisation technology Share ideas on how deeper cross-agency and international cooperation can be facilitated to ensure more secure networks. Engage in debate with your senior international peers and colleagues to put forward your own opinions and approach CONFERENCE HIGHLIGHTS: As threats to the cyber landscape increase in number - The Spanish Ministry of Defence sees CDANS as a unique opportunity to discover the key challenges and their solutions from other regions on a day-to-day basis. Lieutenant Colonel Angel Gomez de Agreda, Office of the Secretary General for Defence Policy, Spanish Ministry of Defence www.cdans.org 1 star officers and above go for free Pre-Conference Cyber Wargaming Focus Day: 21 January 2015 Main conference days: 22-23 January 2015 Venue: London, UK
  • 2. Dear Colleagues, It is my humble honour and distinct pleasure to announce the return of Cyber Defence and Network Security 2015 (CDANS 2015) this coming January. I am delighted to return as chairman and look forward to greeting you all personally in London. In 2014 we experienced unparalleled information revelations that have both changed and shaped forever the way in which our respective countries handle the confidentiality and integrity of information assurance. Without any doubt the 21st Century will be known as the ‘cyber’ century: cyber war, cyber defence, cyber attacks and cyber terror. Militarisation of the binary world is a foregone conclusion and it is essential that we understand the global, strategic and tactical second/third order effects of this convergence of military force, “informization” of networks and critical infrastructure. Consequently, there has never been a more important time to investigate, discuss and cooperate on cyber matters. CDANS 2015 will bring together international government, military leaders and CNI cybersecurity specialists to address the most pressing issues of 2015, outlining the challenges and priorities nations will have over the next 12 months. You cannot afford to miss the very special professional programme CDANS has in store for the beginning of yet another new year - notably world renowned wargaming expert John Curry will kick things off with a focus day dedicated to cyber scenarios. Alongside briefings from the United States, France, Norway and Italy to mention but a few, we have brought back to the fore the issue of cyber security for Critical National Infrastructure and the explosion of requirements and solutions in the mobile space. We are very proud of our truly international panel of experts and I sincerely hope you will be able to join us in January. If you would like to discuss the event in more detail or register, please do not hesitate to contact our enquiries team on +44 (0)207 368 9737 Semper Fidelis, Lt Col William Hagestad US Marine Corps Retired Conference Chairman Vice Admiral Jan Tighe, Commander, US Fleet Cyber Command Vice Admiral Arnaud Coustillière, Head of Cyber, French Defence Staff Major General Odd Egil Pedersen, Chief, Norwegian Cyber Force Major General Basilio di Martino, Director, Directorate General of Telecommunications, Informatics and Advanced Technologies, Italian Ministry of Defence Major General Mohammad Khalid Rao, Chief of Information Security, Pakistan Armed Forces Brigadier General Welton Chase Jr., Director, J6 – J4/Cyber, EUCOM Brigadier General Helmut Habermayer, Chief of Cyber, Austrian MoD Dr Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO HQ Mihkel Tikk, Director of Cyber Policy, Estonian MoD Thomas Kristmar, Head of Network Security, Centre for Cyber Security, Danish Defence Intelligence Service Colonel Artur Suzik, Director, NATO CCD COE Makame M. Mbarawa, Honorable Minister for Communications, Science & Technology, Tanzania Jakub Boratyński, Head of Trust & Security, DG CONNECT, European Commission Andrew Gracie, Executive Director, Resolution Directorate, Bank of England Graham Wright, Chief Information Security Officer, National Grid Craig Balding, Chief Information Security Officer, Barclays David Isiavwe, General Manager, Audit, Control & IT Security, Union Bank of Nigeria Annemarie Zielstra, Director Cyber Security & Resilience, TNO INTERNATIONAL SPEAKER PANEL Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org
  • 3. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org Cyber Wargaming Pre-conference Focus Day, 21st January 2015,, 10.30 - 16.30 Wargaming is an essential part of preparation for crisis situations by military, nation states and businesses. Games can be used for their training and educational value at all levels from senior leaders to those on the receiving end of targeted penetration attempts. This day is about the current cyber wargaming from those with direct experience of gaming and modelling large scale cyber-attacks. The pre-conference focus day on cyber wargaming will start with lectures to introduce the theoretical and contextual basis of the interactive workshop sessions to follow, and will include thought provoking briefings on: • An overview of current cyber wargaming - outlining the current state of gaming cyber-attacks in the military, nation state, business and education. • What is a cyber-war? Exploring the tricky question of what a cyber-war will look like based on lessons learned from recent conflicts where cyber power has been deployed. • Penetration testing as a live fire exercise. Penetration testing is normally carried out to demonstrate compliance with set standards. However, it can be used as a live system test to practice policies and procedures. The session will demonstrate how to use different penetration testing methodologies depending on the security posture and maturity of an organisation. The workshop sessions will allow attendees to observe and play a variety of manual based cyber wargames and will be run by a variety of SME’s who specialise in gaming cyber conflict. Attendees will have the opportunity to participate in one or more of the following manual wargame sessions: • Game 1: Protecting military intellectual property from other nation states using the matrix game methodology. • Game 2: A card based game about a nation state under attack by hacktivists. The aim is to explore how hactivist groups form, operate and collaborate. • Game 3: Exercise Tallinn Soldier- a scaled down version of an exercise about a small state under cyber-attack and the decisions that have to be taken. This is run using the seminar/committee games traditional wargames methodology. • Game 4: to be confirmed. • There will also be static displays showing how commercial off the shelf games include elements of cyber warfare. Meet our featured cyber wargame experts: Major Tom Mouat MBE joined the British Army in 1979. He is a Graduate of the Army Staff College and has served worldwide. He is an expert in both manual and computer-based simulation systems, running large scale military training exercises, and designing wargames. He was the principal Exercise Planning Officer for Headquarters ARRC for 2 years prior to their first deployment to Bosnia. In Bosnia he ran the Joint Military Commission for 12 months and was awarded an MBE. Following this he ran the British Army's principal land-based computer simulation system for 3 years. Since then he has been involved in numerous exercises and training events (both computer-assisted and manual). He also served as a Requirements Manager in the UK MOD's procurement organization for nearly 5 years. He was awarded the Chief of Defence Material Commendation for innovation and costs saving while he was there. He has a Masters Degree in Simulation and Modelling, has published articles and delivered lectures about simulations, military history and wargames for professional development, education and recreation since 1983. He is a contributing author to the Handbook of Research on Serious Games as Educational, Business and Research Tools as well as Dark Guest: Training Games for Cyberwarfare. He is currently the Directing Staff officer responsible for Modelling and Simulation at the Defence Academy of the UK and has recently been awarded the Chief Scientific Officer's Commendation for his contribution to science and technology. John Curry is an academic who specialises in military simulations and cyber warfare. He has written and edited over sixty books on various aspects of recreational and professional wargaming. He has worked on gaming cyber warfare with a variety of organisations, and contributed to the development of the cyber warfare module to the current British Army Forces operational level wargame, RCAT (Rapid Campaign Analysis Tool). He is a contributing author to the Handbook of Research on Serious Games as Educational, Business and Research Tools and Dark Guest: Training Games for Cyberwarfare. He has also contributed a number of articles to professional journals on cyber warfare. He is an advisor to ECIPs and works for the international consultancy Wikistrat on the Cyber Desk.
  • 4. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org CONFERENCE DAY ONE, 22nd JANUARY, 2015 08.30 COFFEE & REGISTRATION 09.00 CHAIRMAN’S OPENING REMARKS Lieutenant Colonel William Hagestad II,US Marine Corps Retired SESSION THEME National Solutions to Emerging Threats How are nations and militaries advancing their defensive and emergency response capabilities in the face of a persistent and mutating threat? What are the emerging areas of greatest importance and what will be the critical threats and challenges for 2015? What technologies are under consideration for future procurements? 09.10 The US Fleet Cyber Command (FLTCYBERCOM): Mission, challenges and initiatives • The mission of FLTCYBERCOM: directing cyberspace operations, deterring and defeating aggression; achieving military objectives in and through cyberspace; organizing and directing Navy cryptologic operations worldwide; integrating information operations and space planning and operations • Insight into FLTCYBERCOM’s global operations • Responding to the future cyber threat. How is FLTCYBERCOM shaping future strategies and programmes in response? Vice Admiral Jan Tighe, Commander, US Fleet Cyber Command 09.50 The Cyber Flank • Significantly improving the European theatre’s C4 and Cyber Joint and Combined Operating Environment • “Operationalizing” the Joint Cyber Centre capabilities (synchronization and integration) • Preserving and maintaining strategic partnerships and key relationships with C4 and cyber counterparts and allies by sustaining partner-nation capabilities - via training, mil-to-mil engagement, joint exercises, theatre security cooperation, and public-private engagement • Key priorities, future plans and requirements for securing EUCOM’s cyber defence capabilities BrigadierGeneralWeltonChaseJr.,Director,J6–J4/Cyber,EUCOM 10.30 COFFEE & NETWORKING 11.00 Initiating a proactive cyber defence policy for protecting the French Ministry of Defence computer networks • Protecting the military’s networks to ensure dominance in theatre • Current and projected industry cyber policies • Future plans for the French Ministry of Defence, how will they ensure the best cyber-warriors are ready to react? Investing an additional €1 billion to increase cyber capacities Vice Admiral Arnaud Coustillière, Head of Cyber, French Defence Staff 11.40 Building effective cyber defence: The NATO contribution • NATO’s analysis of the evolving threat environment in the cyber domain • Building capabilities: what are the most promising technologies • The NATO cyber-industry partnerships Dr Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO HQ 12.20 The Italian MoD Strategic Communications Infrastructure • The programmes launched by the Italian Joint General Staff to improve connectivity both within each single service and at an inter-service level • The initial plan to develop a layered approach overcoming urgent requirements and budget constraints • Designing and improving in a combined effort with Allied Nations, a dedicated satellite constellation to provide a reliable backup for the highest level C2 functions, and to have an independent link with task forces deployed abroad • The goal of building a true Defense Information Infrastructure Major General Basilio di Martino, Director, Directorate General of Telecommunications, Informatics and Advanced Technologies, Italian Ministry of Defence 13.00 NETWORKING LUNCH 14.00 Working towards enhanced international and cross agency cooperation: The Norwegian Cyber Force • An overview of the current cyber threat as seen from Norway and an introduction to the Norwegian Cyber Force • Working with other Nordic nations to forge closer collaboration in cyber defence: Developing common anti-cyber threat policies and strategies • Looking ahead to future plans, programmes and requirements Major General Odd Egil Pedersen,Chief,Norwegian Cyber Force 14.40 Civilian and Military cooperation in Network Security and Cyber Defence • Lessons learned when a MilCERT and GovCERT team up • Establishing joint situational awareness in civilian and military sectors • Establishing a response capability for cyber attacks across sectors • Using lessons learned to improve the overall security posture Thomas Kristmar, Head of Network Security, Centre for Cyber Security, Danish Defence Intelligence Service 15.20 COFFEE & NETWORKING 15.50 Seeking maximum efficiency in Cyber Security - the Austrian Model • Austria’s Cyber Security Strategy (CSS), the consequential CSS- implementation plan and where we are now • The importance of international and European cooperation for securing an effective national cyber defence • The Austrian approach of bringing civil cyber forces of the Chancellery, the Ministry of Interior, the Ministry of Exterior together with the military Cyber Defence Forces in a first circle - including sector CERTs and industry in a second circle if a serious cyber crisis evolves • An insight into how Austria is using its conscription system to win cyber experts for the armed forces and the nation Brigadier General Helmut Habermayer, Chief of Cyber, Austrian MoD 16.30 Cybersecurity challenges in Pakistan: Identifying the risks and finding solutions • Current assessments and analysis being undertaken on Pakistan’s cybersecurity: What are the challenges being faced in Pakistan? • Future requirements, programmes and strategies for ensuring an effective cyber defence • The importance of cross agency and international cooperation for a long term cybersecurity framework Major General Mohammad Khalid Rao, Director General, Telecom Foundation, Pakistan 17.10 ROUND TABLE DISCUSSIONS How should we define the legal boundaries of cyber defence? • Are we experiencing a transformation from cyber security to cyber defence? What does this constitute? • Working towards ‘active’ cyber defence. What are the stumbling blocks to legislation? • More than a year on, what are the consequences of the Snowden fiasco? • What should be the legal boundaries of cyber defence? Can cyber attacks be lawful as an act of defence? 17.50 CHAIR’S CLOSE AND END OF DAY ONE
  • 5. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org CONFERENCE DAY TWO, 23RD JANUARY, 2015 08.30 COFFEE & REGISTRATION 09.00 CHAIRMAN’S OPENING REMARKS Lieutenant Colonel William Hagestad II,US Marine Corps Retired SESSION THEME Trailblazing new initiatives and innovation in cyber defence and facilitating deeper international cooperation 09.10 Shaping Estonia’s future cyber defence policy: Priorities and plans • An overview of the development of Estonia’s cyber defence framework since the 2007 attack. Where are we now? • Strategies in place for securing Estonia’s cybersecurity: working in collaboration with government, military and critical infrastructure • Looking ahead to the next five years: future plans, programmes and strategies Mihkel Tikk, Director of Cyber Policy, Estonian MoD 09.50 Promoting international cooperation on cyber defence across the NATO Alliance: The NATO Cooperative Cyber Defence Centre of Excellence • Introducing the NATO CCD COE’s mission and objectives • Updates on the Tallinn Manual: key priorities and requirements to respond to the future cyber threat • Main findings and lessons learned from Locked Shields 2014: the key technologies needed to be developed for enhanced resilience and competency Colonel Artur Suzik, Director, NATO CCD COE 10.30 COFFEE & NETWORKING SESSION THEME Collaboration & Governance: Protecting Critical Infrastructures A large number of recent attacks on nations’ critical nation infrastructures have demonstrated the continuing importance of implementing substantive and resilient countermeasures. There is an increasing demand for an integrated national approach to cyber defence and the development of ‘best practice’ globally on cybersecurity issues 11:00 Ensuring a secure and trustworthy digital environment for EU citizens and businesses, and promoting a coherent international approach on cybersecurity • Implementing the Cybersecurity Strategy for the European Union, addressing the technological and industrial issues that derive from the Network and Information Security (NIS) policy of DG CONNECT • Incentives to foster investments, transparency and user awareness, and addressing international cooperation as a key priority • Investing in cybersecurity research: introducing the Horizon 2020 programme • Responding to new technological developments with a high impact, such as cloud computing and big data Jakub Boratyński, Head of Trust & Security, DG CONNECT, European Commission 11.40 Managing cyber risk – the global banking perspective • What is the cyber risk from a financial stability perspective? • What impact do cyber threats have on the financial system? • What strategies are in place with the Bank of England to ensure maximum efficiency and resilience? • Introducing the CBEST Programme: Lessons learned and potential vulnerabilities Andrew Gracie, Executive Director, Resolution Directorate, Bank of England 12.20 Barclay’s strategy for Cyber Risk Management • What does Barclay’s define as cyber? • How is cyber risk measured and managed? • Barclay’s set of operational threat management capabilities including the intelligence detect ops & response components that underpin it Craig Balding, CISO, Barclays 13.00 NETWORKING LUNCH 14.00 Case Study: Protecting from the insider threat • The insider threat: what are the dangers and where are the vulnerabilities? • Mitigating the risk: measures that can be implemented to prevent an insider attack, including available technologies and approaches • The perspective of the Union Bank of Nigeria: how are they working against the insider threat? David Isiavwe, General Manager, Audit, Control & IT Security, Union Bank of Nigeria 14.40 Developing an integrated security approach to governmental and national cybersecurity: The Tanzanian perspective • Securing the Tanzanian National Optical Fibre Network • Internet exchange points: security hardware to address the biggest security challenges • Mobile cybersecurity and regulating internet messaging: hard vs. soft processes Makame M. Mbarawa, Honorable Minister for Communications, Science & Technology, Tanzania 15.20 COFFEE & NETWORKING 15.50 Protecting the UK’s Critical National Infrastructure from Cybersecurity Attacks • Identifying the cyber threat to the UK’s national energy infrastructure • How is the National Grid collaborating with industry and government to ensure the protection of the grid? • Working with CERT UK and CISP to increase grid protection • The Technical and software solutions under consideration for developing the UK’s energy infrastructure protection Graham Wright, Chief Information Security Officer, National Grid 16.30 Creating innovations for safe cyberspace: The current research projects and initiatives of TNO • An introduction to TNO’s current cybersecurity initiatives, their key areas of research and findings • Mitigating new cyber threats by developing an algorithm to predict the likelihood of specific internet domains being misused • Enhancing cyber defence education and training via the Cyber Awareness Trainer Annemarie Zielstra, Director Cyber Security & Resilience, TNO 17.10 CHAIR’S CLOSE AND END OF DAY TWO CDANS is the best venue I found to meet a wide variety of international partners. Gregory C. Radabaugh,GG-15, DAF Chief of Cyberspace Operations, Air Force Intelligence, Surveillance and Reconnaissance Agency
  • 6. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org Follow Defence IQ @DefenceIQ to keep up to date with news and developments on Cyber Defence and Network Security #CDANS15 Join Defence IQ World Defence Community on LinkedIn Read the Defence IQ blog authoritative news source for high quality and exclusive commentary and analysis on global defence and military-related topics defencesummits.wordpress.com Key Organisations Who Have Attended Cyber Defence & Network Security Industry • ADS Defence and Security Systems Ltd • BlackBerry Limited • BreakingPoint • Clearswift • Codenomicon Ltd • Combitech AB • Elbit Systems • Elettronica • Encode UK Ltd • Euroclear • Exonar Limited • Fidelis Security Systems • FireEye • Google, Inc. • HP Enterprise Security • i2 Ltd IBM Company • IBM • Ixia • Kaspersky UK • L-3 Communications • Lockheed Martin UK Integrated Systems • & Solutions Ltd. • Microsoft Asia • Mobile Enterprise Computing • Netscout Systems • PricewaterhouseCoopers LLP • Qosmos • Reuters • RUAG Defence • Saab • Skybox Security • Solera Networks • Sourcefire • Verint Systems Ltd Defence • Armasuisse • Armed Forces Philippines • Brazilian Army • Canadian Forces Network Operation Center (CFNOC) • CYBERCOM • Defence Command Denmark • DSTL • European Defence Agency • French Integrated Defense Staff • Indonesian MOD • Israeli Space Agency • Italian Defence General Staff • Italian MoD • MoD Austria • NATO • NATO Cooperative Cyber Defence, Centre of Excellence • Norwegian Armed Forces • Pakistan Air Force • Republic of Singapore Air Force • Royal Saudi Air Force • Royal Thai Air Force • Spanish MoD • Swedish Armed Forces • Trinidad and Tobago Police Service • UK Air Warfare Centre • UK MoD Cyber Policy and Plans Team • US Air Force • US Army Cyber Command • US Cyber Consequences Unit • US Department of Defence Government • Bangladesh High Commission • Banking Regulation and Supervision Agency • Belgian Ministry of Economy • ENISA • European Commission • Foreign and Commonwealth Office, UK • House of Commons • House of Lords • INTERPOL • Israel Prime Minister's Office • Ministry for Communications, Science & Technology, Tanzania • Ministry of Communications and • Transportation, Mexico • UK Cabinet Office • US Department of State CNI • Bank of England • Barclays • BP International • BT Research and Technology • Dubai Bank • Network Rail • NHS Commissioning Board • Ofcom • Royal Bank of Scotland • Saudi Aramco T l
  • 7. Tel: +44 (0)20 7368 9737 Email: enquire@defenceiq.com www.cdans.org How Can You Meet Your Marketing And Business Development Objectives At Cyber Defence and Network Security 2015? Networking Ensure that you have the opportunity to engage with the key decision makers within your industry. We can create a platform for you to effectively interact with your top customers and prospects in the environment of your choice. This can range from formalised private meetings / workshops right through to less structured networking events such as sponsored drinks receptions, coffee breaks or lunches. Ultimately whatever you decide is the right forum; we will support you in your quest to advance relationships with the key people who can influence the future of your business. Branding Your company can be elevated to a position where they are seen as a market leader. In a fiercely competitive market you need to ensure that your brand is differentiated from the competition. Failure to create a clear identity will see your organisation fade into the background. We ensure that we do everything we can to effectively lift your brand before, during and after the event. Not only do we create a fully integrated marketing campaign, which your company can be part of, but we also offer high impact premium branding opportunities for example on bags, water bottles, pens, lanyards etc. Thought Leadership If you think that you should be viewed as a true industry leader then you need to demonstrate your market knowledge and expertise through a thought leadership opportunity, such as speaking or chairing. This is a highly unique opportunity for your company to educate the market, and as long as you are credible enough to fit into a high level event programme, we can position your organisation alongside top customers and prospects in our speaker faculty. As part of this speaker faculty your company will be set apart from other industry attendees giving you the competitive edge required to make further strides in the market. To the left you will find an example of some sample packages which are designed to be multi functional across the above objectives. These are just examples because all of our sponsorship packages are specifically designed to meet your company’s individual marketing and business development objectives. Package Exhibition Associate Plenary Lead Advisory Board Member 4 4 Exhibition 6x3 4 4 Exhibition 3x2 4 4 Conference Delegate Passes 4 4 4 Branding at Conference 4 4 4 4 Pre Event Branding (brochure) 4 4 4 4 Customised Mailing 4 4 4 4 Wish List 4 4 4 4 30-40 Minute Plenary Speaking 4 4 4 1 Day Conference Chair 4 Thames River Dinner Cruise 4 IPAD Conference Note/information pack sponsor 4 4 Workshop 4 Lanyards 4 4 8 ways Cyber Defence & Network Security 2015 can benefit you! Generate new sales leads: Our event will bring together the region’s key-decision makers, all of whom have strong business reasons for attending the event. By exhibiting and presenting, you can impact on these buyers. By the very nature of the high quality of delegate attendance, the contacts generated will lead to very high conversion rates. Demonstrate thought leadership: Speaking on the programme will allow you to demonstrate your market knowledge and expertise to an audience of high level decision makers. Building customer loyalty: Face-to-face contact at conferences, and showing continued support of the market, helps develop client loyalty as well as cement your position as an industry player. Building relations with the media: We have researched the market in order to find the most influential media partners. We understand that opportunities for editorial coverage and developing better relations can be integral to your company’s success, so our media partnerships offer additional benefit above and beyond the standard sponsorship package. Brokering new business partnerships: Currently there are huge opportunities to partner with OEM suppliers actively looking to adjust their supply chains. Enter new markets: Sponsorship is one of the most effective ways to enter new markets. It is a great opportunity to research and network whilst gaining exposure to a new qualified database. Positioning your company brand: Being part of this highly influential industry event establishes your company as a strong brand and highlights your company’s abilities and strengths. Commitment to this event also demonstrates your capability as a global player. 01 03 05 07 08 04 06Launch new products or services: Use the event as a launch pad to promote your latest products or system. With the most senior figures from the industry in attendance, plus carefully selected media partners at the event, innovative new technology will always generate a buzz. 02 For sponsorship opportunities please contact alex darby on +44 (0) 207 368 9300 or by e-mail at sponsor@iqpc.co.uk CDANS is the world premiere cyber event for intelligence, military and commercial enterprises. The level of collaboration, cooperation and threat intelligence sharing is outstanding Lieutenant Colonel (Rtd) Bill Hagestad, Red Dragon Rising
  • 8. 5 WAYS TO REGISTER Tel: +44 (0) 20 7368 9300 Fax: +44 (0) 20 7368 9301 Post: your booking form to IQPC UK, 2nd Floor, 129 Wilton Road, London SW1V 1JZ Web: www.cdans.org Email: enquire@defenceiq.com Conferencecode12956.009 Terms and Conditions IQPC recognises the value of learning in teams. Groups of 3 or more booking at the same time from the same company receive a 10% discount. 5 or more receive a 15% discount. 7 receive a 20% discount. Only one discount available per person. Team Discounts* Venue: London, United Kingdom Accommodation: Travel and accommodation are not included in the registration fee. For updates on the venue and accommodation information, please visit: www.cdans.org Venue & Accommodation To claim a variety of articles, podcasts and other free resources please visit www.CDANS.org Free Online Resources Total price for your Organisation: (Add total of all individuals attending): Card Number: VISA 6 M/C 6 AMEX 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 Exp. Date: 6 6 6 6 Sec: 6 6 6 6 Name On Card: Signature: Billing Address (if different from below): City/County/Postcode Cheque enclosed for: £ (Made payable to IQPC Ltd.) (Please quote 12956.009 with remittance advice) IQPC Bank details: HSBC Bank, 67 George Street, Richmond, Surrey, TW9 1HG, United Kingdom. Sort Code: 40 38 18 Account No: 51304143 IBAN Code: GB59 MIDL 4038 1851 3041 43 Swift Code: MIDLGB2112V Account name: International Quality & Productivity Centre Ltd. Please photocopy for each additional delegate 6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other 6 Rank (Please Specify) First Name Family Name Department Mobile No. Job Title Tel No. Email 6 Yes I would like to receive information about products and services via email Organisation Nature of business Address Postcode Country Telephone Fax Approving Manager Name of person completing form if different from delegate: Signature 6 I agree to IQPC’s cancellation, substitution and payment terms Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify) Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6 Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking. Delegate Details Payment Method *To qualify for discounts, bookings must be received with payment by the discount deadline. Only one discount/offer applicable per person. ** Military, government and CNI discounted rates apply to serving military officers, government, CNI and university personnel only. All serving Generals/Flag Officers 1 Star and above may attend the conference free of charge. Please contact defence@iqpc.co.uk for further details. This offer can not be combined with any others and is not transferable. UK VAT is charged at 20%. VAT Registration #: GB 799 2259 67 payment must be RECEIVED prior to the conference Please read the information listed below as each booking is subject to IQPC Ltd standard terms and conditions. Payment Terms: Upon completion and return of the registration form full payment is required no later than 5 business days from the date of invoice. Payment of invoices by means other than by credit card or purchase order (UK Plc and UK government bodies only) will be subject to a £49 (plus VAT) processing fee per delegate. Payment must be received prior to the conference date. We reserve the right to refuse admission to the conference if payment has not been received. IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates at any time by providing reasonable advance notice to IQPC. For any cancellations received in writing not less than eight (8) days prior to the conference, you will receive a 90% credit to be used at another IQPC conference which must occur within one year from the date of issuance of such credit. An administration fee of 10% of the contract fee will be retained by IQPC for all permitted cancellations. No credit will be issued for any cancellations occurring within seven (7) days (inclusive) of the conference. In the event that IQPC cancels an event for any reason, you will receive a credit for 100% of the contract fee paid. You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of cancellation. In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling to attend in on the rescheduled date, you will receive a credit for 100% of the contract fee paid. You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of postponement. Except as specified above, no credits will be issued for cancellations.There are no refunds given under any circumstances. IQPC is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever in the event this conference is cancelled, rescheduled or postponed due to a fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of this conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event shall include, but not be limited to: war, fire, labour strike, extreme weather or other emergency. Please note that while speakers and topics were confirmed at the time of publishing, circumstances beyond the control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics. As such, IQPC reserves the right to alter or modify the advertised speakers and/or topics if necessary without any liability to you whatsoever. Any substitutions or alterations will be updated on our web page as soon as possible. Discounts: All ‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order to receive any discount. Any other discounts offered by IQPC (including team discounts) also require payment at time of registration. Discount offers cannot be combined with any other offer. 6 Please do not pass my information to any third party Start knowledge sharing and networking before the event To speed registration, please provide the priority code located on the mailing label or in the box below. My registration code is PDFW Please contact our database manager on +44 (0) 20 7368 9300 / +44 (0) 20 7036 1300 or at database@iqpc.co.uk quoting the registration code above to inform us of any changes or to remove your details. T Follow us on Twitter @DefenceIQ l Join our linked In group Pre-conference Cyber Wargaming Focus Day 21 January 2015 Main conference days: 22-23 January 2015 Venue: London Industry Rate Package Early Bird: Book Before 31st October 2014* Early Bird: Book Before 28th November 2014* Early Bird: Book Before 24th December 2014* Standard Price Platinum Package 2 day conference Focus Day Post event presentations and audio on b2bshop.com SAVE £300 £2,798 + VAT SAVE £200 £2,898 + VAT SAVE £100 £2,998 + VAT £3,098 + VAT Gold Package 2 day conference Focus Day SAVE £300 £2,299 + VAT SAVE £200 £2,399 + VAT SAVE £100 £2,499 + VAT £2,599 + VAT Bronze Package 2 day conference SAVE £300 £1,699 + VAT SAVE £200 £1,799 + VAT SAVE £100 £1,899 + VAT £1,999 + VAT Military / Government / CNI RATE** Package Early Bird: Book Before 31st October 2014* Early Bird: Book Before 28th November 2014* Early Bird: Book Before 24th December 2014* Standard Price Platinum Package 2 day conference Focus Day Post event presentations and audio on b2bshop.com SAVE £300 £948 + VAT SAVE £200 £1,048 + VAT SAVE £100 £1,148 + VAT £1,248 + VAT Gold Package 2 day conference Focus Day SAVE £300 £649 + VAT SAVE £200 £749 + VAT SAVE £100 £849 + VAT £949 + VAT Bronze Package 2 day conference SAVE £300 £399 + VAT SAVE £200 £499 + VAT SAVE £100 £599 + VAT £699 + VAT CLICK TO SUBMIT