Cyber Warefare Pdfw 2nd Nov Update


Published on

Cyber Warfare 2011, 27th - 28th January

American Square Conference Centre, London, UK

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber Warefare Pdfw 2nd Nov Update

  1. 1. 20 B 10 5 ook Presents an Nth & d S o pa AV vem y b E U be y P r TO £3 50 With key briefings from: Air Cdre Graham Wright, Deputy Director, UK Office of Cyber Security Dr Paul Killworth, Head of Cyber Strategy, GCHQ Col David Fahrenkrug, Director, CSAF Strategic Studies Group, US Air Force Col Robert A. Morris, Director, Air Component Element, 24th Air Force LtCol Bryant Glando, Commander, 2nd IO Battalion, US LtCol Volker Wetzler, Head of Cyber Security, German MoD Venue: American Square Conference Center, London Lt Col E.W.A Tapper, Commanding Officer, Canadian Conference: 27th and 28th January 2011 Forces Network Operations Centre Pre Conference Workshops: 26th January 2011 LtCol William Hagestad II, Force Movement Control Officer, US Marine Corps Cyber Warfare 2011 will Maj Sam Raeves, Information System Security Manager, enable you to: Belgian Armed Forces Gregory Radabaugh, Technical Director, Cyber Analysis v Hear from the most senior military officer Squadron, US Air Force at the UK Office of Cyber Security and the Ian J West, Director, NCIRC Technical Centre, NATO CIS Head of Cyber Strategy at GCQH, allowing Services Agency you to get a full picture of how the UK is Dick Crowell, Information Operations & Cyberspace Operations, US Naval War College developing its cyber capabilities Thomas C. Wingfield, Professor of International Law, Marshall Center v Gain a key insight into the development of John Bumgarner, Chief Technologist, US Cyber an ‘operational art’ for war in cyberspace; Consequences Unit command and control, battle management Dr Dan Kuehl, Information Resources Management and cyberspace denial and control College (IRMC), US National Defence University Roy Lindelauf, Researcher, Netherlands Defence Academy v Learn how to engage in pro-active cyber Dr. Steve Purser, Head of Technical and Competence defence and find, fix and finish a cyber Department, ENISA threat that has entered your network Frank Coggrave, Vice President of EMEA, Guidance Software David Vincenzetti, Partner, Hacking Team, Italy E: T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301 Sponsors
  2. 2. PRE CONFERENCE WORKSHOPS: WEDNESDAY 26TH JANUARY 09:00 – 12:00 WORKSHOP A: THE OPERATIONAL ART OF CYBER WAR Led by: Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, U.S. Naval War College Introduction: This workshop will begin the exploration into operational warfare in cyberspace. It will present the framework of operational art, specifically operational factors and functions as a tool for understanding cyber warfare. A series of questions will be posed for future operational commanders to help frame their thoughts on cyber- space and cyber warfare. Participants will evaluate: vv The definitions of the information environment, cyberspace, and cyberspace operations vv The definition of cyber warfare vv The intertwining of cyberspace and human activity vv The applicability of operational warfare at sea as a metaphor for operational warfare in cyberspace vv How commanders need to balance operational factors and functions to fight and win a cyber war vv The concepts of sea control (the stronger side) and sea denial (the weaker side) and how they apply to cyberspace control and cyberspace denial vv The concepts of freedom of action in the maritime domain versus freedom of action in cyberspace 14:00 – 17:00 WORKSHOP B::CYBER INSURGENCIES:AN ESCALATING PROBLEM Led by: John Bumgarner, Chief Technologist, US Cyber Consequences Unit Introduction: The workshop will explore the security threat posed to sovereign nations and other entities from cyber insurgencies. The ubiquitous nature of cyberspace provides an international conduit for non-state actors to engage in acts of civil disobedience, acts of espionage or acts of warfare. An effective cyber insurgency campaign can destabilise a government or spark a kinetic conflict. The globalization of cyber insurgencies creates unique challenges in countering this escalating problem in the 21st Century. Participants will: vv Review the lexicon of cyber insurgencies vv Explore the history of insurgencies in cyberspace vv Investigate the role of cyber insurgencies in regional vv Evaluate the art of digital diplomacy vv Examine cyber counter-insurgency SPONSORSHIP OPPORTUNITIES Three easy ways to get involved 1) Thought Leadership: With an expected audience of senior military customers and decision-makers from across the globe, Defence IQ events enable you to build your reputation as a market-leader and to position yourself as an innovative thought-leader in your chosen domain through speaking sessions and subject-specific conference streams, workshops and focus days 2) Branding: We bring together buyers and suppliers in a tailored location with unbeatable facilities for onsite branding and exposure. Furthermore, our dedicated marketing team can help you achieve your promotional aims in the months leading up to the conference with dedicated mailings to cover 50,000 contacts, through brochure drops, extensive email campaigns and tailored web coverage 3) Featured Networking Events: Focused and high level, our events will provide you with the perfect environment to initiate new business relationships and achieve the face-to-face contact that overcrowded trade shows cannot deliver. Sponsorship opportunities range from exhibition stands to sponsored lunches, cocktail receptions, gala dinners and a host of informal social networking events. For further details, or to discuss which option is best for your organisation, please call Ola Jonsson or Ross Clayton on +44 (0) 207 368 9300 or Email: SPONSORS Guidance Software is HACKING TEAM is a Based in Atlanta, GA, recognized worldwide as company totally focused Endgame Systems is a the industry leader in digital on IT OFFENSIVE SECURITY intelligence solutions for LEAs privately held U.S. company investigative solutions. Its and Security Agencies. Remote Control System V6 (RCS) providing applied security EnCase® platform provides the foundation for government, is a premier, integrated, multi-OS platform for remotely research and development, and Cyber ISR technology. corporate and law enforcement organizations to conduct attacking, infecting and controlling target computers and Comprised of highly skilled information security thorough, network-enabled, and court-validated computer mobile phones. RCS FULLY SUPPORTS XP Vista, 7, MacOS, , professionals, Endgame Systems is exclusively aligned to investigations of any kind, such as responding to eDiscovery iPhone, Symbian and BlackBerry. It is INVISIBLE to most support the mission and unique challenges of our clients. requests, conducting internal investigations, responding protection systems available in the market (e.g., systems Formed by industry veterans previously employed by Internet to regulatory inquiries or performing data and compliance listed in the GARTNER’s Magic Quadrant For Endpoint Security Systems, Inc. (ISS), a market leading network auditing - all while maintaining the integrity of the data. Protection Platforms) It is RESISTANT to system restoration vulnerability assessment, network intrusion prevention (IPS), There are more than 30,000 licensed users of the EnCase technologies (e.g., DeepFreeze) It is a PROVEN technology: and network security intelligence vendor, Endgame Systems’ technology worldwide, the EnCase® Enterprise platform is it is being used by Agencies worldwide since 2003.Target founders and employees have extensive background in used by over half of the Fortune 100, and thousands attend monitoring includes Skype, chat, mail, web, removable network and computer vulnerability research, design Guidance Software’s renowned training programs annually. media, encrypted communications, PGP GSM-cell GEO- , and implementation of defensive computer and network For more information about Guidance Software, visit www. tracking, GPS GEO-tracking, voice calls, etc. Target infection protection technologies. can be performed by means of local access techniques and remote attack techniques (zero day exploit portal and transparent injection proxy). For more information E: T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  3. 3. MAIN CONFERENCE DAY 1: THURSDAY 27TH JANUARY 08.30 Registration and Coffee 13:00 Networking Lunch 09.00 Chairman’s Welcome and Opening Speech 14:00 CONDUCTING COUNTER CYBER ACTIONS Dr Dan Kuehl, Information Resources Management WITHIN US ARMY CYBERSPACE College (IRMC), US National Defense University v Computer Defense Assistance Program (CDAP) 09:10 UK KEYNOTE: THE UK OFFICE OF CYBER (foundation of our training to develop a skilled cyber SECURITY – ENSURING A COHERENT defender and the authority to operate) RESPONSE TO CYBER SECURITY v Active engagement to find, fix and finish a cyber v The Office of Cyber Security (OCS) as pulling threat that has entered US Army cyberspace together all the key actors involved in defending the v The operational scenario UK against a cyber attack LtCol Bryant Glando, Commander, 2nd IO Battalion, v The outcome of the Strategic Defence Review and US Army what this means for the OCS 14:40 THE DATA ENCRYPTION PROBLEM Air Cdre Graham Wright, Deputy Director, v Encryption: A nightmare for LEAs and security UK Office of Cyber Security agencies 09:50 CYBER WARFARE – A GCHQ PERSPECTIVE v How to deal with encrypted communications over v The four principles of cyber power the Internet (e.g., Skype, PGP secure web mail) , v Importance of thinking cyber security, vice defence v A stealth offensive IT technology for remotely v An integrated approach to operational cyber thinking attacking, controlling and monitoring PCs and v Importance of industry partnerships smartphones Dr Paul Killworth, Head of Cyber Strategy, GCHQ David Vincenzetti, Partner, Hacking Team, Italy 10:30 CANADIAN FORCES’ CYBER DEFENCE 15:20 Networking Coffee Break v The mission and partners 15:50 THE DEVELOPMENT OF THE BELGIAN CYBER v The cyber threat CAPABILITY v Cyber defence operations within the Canadian v The creation and execution of the Belgian cyber Forces capability development roadmap Lt Col E.W.A Tapper, Commanding Officer, v The need for integration and cooperation with Canadian Forces Network Operations Centre partners v The legal issues and considerations (national/ 11:10 Networking Coffee Break international, law of armed conflict, rules of 11:40 ARE YOU KEEPING PACE WITH BOTH EVOLVING engagement) AND COVERT SECURITY THREATS? Maj Sam Raeves, Information System Security v How effective is your current security solution? Manager, Belgian Armed Forces v Complement and augment your existing security infrastructure 16:30 CYBER WAR: A NETWORK DESIGN AND v Respond quickly to discover and remediate threats ANALYSIS PERSPECTIVE that have evaded layered security systems and are v Design principles of covert networks and how they posing a risk to sensitive data can aid defence against a cyber attack Frank Coggrave, Vice President of EMEA, v Network analysis and how it can identify potential Guidance Software intruders v Resilience studies as helping to identify weak points 12:20 CYBER DEFENCE IN THE GERMAN ARMED in critical infrastructure FORCES Roy Lindelauf, Researcher, Netherlands Defence v National cyber defence responsibilities Academy v Organisation and structure of military cyber security v Multinational co-operation in the cyber realm 17:10 Chairman’s Close v Cyber defence exercises LtCol Volker Wetzler, Head of Cyber Security, German MoD ABOUT DEFENCE IQ Defence IQ is host to a series of global events and runs an online community of military and private sector professionals. We provide the platform which leading defence experts share their experience, knowledge and strategic thoughts. We are dedicated to providing military personnel and the private sector with strategic defence resources covering current defence issues. Join the community: E: T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  4. 4. MAIN CONFERENCE DAY 2: FRIDAY 28TH JANUARY 08.30 Registration and Coffee 13:00 Lunch and Networking 09.00 Chairman’s Welcome 14:00 CYBER SECURITY OPERATIONS – Dr Dan Kuehl, Information Resources Management COLLABORATION WITH THE COALITION College (IRMC), US National Defense University v The cyber coalition environment v Identification of challenges 09:10 OPERATIONAL TARGETING - RELEVANCE FOR CYBER v Discussion of potential solutions OPERATIONS IN THE MULTI-DOMAIN BATTLEFIELD Ian J West, Director, NCIRC Technical Centre, v What are Militarily Relevant Cyber Targets? NATO CIS Services Agency v How do they contribute to the Combined Force Commander’s operations? 14:40 THE TALLINN MANUAL: CODIFYING THE LAW v When will Cyber Weapons be operationally relevant? OF WAR FOR CYBERSPACE Col Robert A. Morris, Director, Air Component v Operational challenge: How do we apply kinetic law Element, 24th Air Force to cyber operations? v Experts and approach: Who decides? How are 09:50 CYBER WARFARE: OPERATING IN AN OPPOSED rules determined? How are they presented? NETWORK ENVIRONMENT v Principled analysis: What is a use of force? What is v The future warfare environment as characterized by an armed attack? What are the requirements for degraded networks and sophisticated electronic combat discriminating targets, minimising collateral v The need to develop the concepts and capabilities damage, and avoiding perfidy? to operate in opposed network environments Thomas C. Wingfield, Professor of International Law, v Establishing a balance between passive and active Marshall Center warfare in the electromagnetic spectrum v Applying concepts of manoeuvre warfare to 14:20 Coffee and Networking Break cyberspace and pursuing realistic training in a highly contested environment 15:50 THE CHINESE MILITARY INDUSTRIAL CYBER Col David Fahrenkrug, Director, CSAF Strategic COMPLEX USE OF THE BIG 5 CHARACTURE v The Government Chinese Character Set or GCCS in Studies Group, US Air Force support of the eight pillars of cyber warfare 10:30 THE EVOLVING THREAT IN CYBERSPACE v HTML 5 code using the Big 5 Character set to create v The current operational environment virtual deception operations v The evolving threat: How the adversary takes v How the Character set can be used for gathering advantage of the operational environment intelligence, initiating DDOS attacks and infiltrating v The resulting consequences: How the threat will both civilian corporate and government networks influence your behaviour and decision making LtCol William Hagestad II, Force Movement process in cyber combat Control Officer, US Marine Corps Gregory Radabaugh, Technical Director, Cyber Analysis Squadron, US Air Force 16:30 COOPERATION IN SECURING CRITICAL NATIONAL INFRASTRUCTURE 11:00 Coffee and Networking Break v Introduction to ENISA and what we do v ENISA’s role in facilitating dialogue: Bridging 11:40 COMPUTERS AS WEAPONS OF WAR public and private sectors v Explore the history of cyber-weaponry development v The Critical Information Infrastructure Protection v Define the types of cyber-weaponry (CIIP) action plan v Review the use of cyber-weaponry in past conflicts v Pan European exersises for resilience: Objectives v Outline the use of cyber-weaponry in future conflicts and current status v Investigate the strategies to counter cyber-weaponry v Engaging with ENISA: Opportunities and benefits John Bumgarner, Chief Technology Officer, v The way forward US Cyber Consequences Unit Dr. Steve Purser, Head of Technical and 12:20 CYBER WAR: AN INTERNATIONAL THREAT Competence Department, ENISA NEEDING INTERNATIONAL SOLUTIONS v Which nations have the potential to wage cyber war? 17:00 Closing Remarks and End of Conference v NATO and its role in cyber warfare v The role of the private sector v Cyber war - an opportunity or a vulnerability? Dr Dan Kuehl, Information Resources Management College (IRMC), US National Defense University E: T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  5. 5. WHO WILL YOU MEET? As the leading Cyber Warfare event in Europe, Cyber Warfare 2011 will give you the chance to meet with key military and industry professionals who are driving the development of cyber defence, exploit and attack capabilities Visitor profile for 2010 Attending countries Military/Governments Agency Austria 1 BMLVS UK MoD Belguim 2 Bundeswehr US Army Denmark 9 US European Command France 3 Cyber Analysis Squadron Germany 5 Danish Defence Intelligence US Navy Greece 1 Service USAF Italy 2 Defence Command Denmark Luxembourg 1 Industry Malaysia 1 DOD Rapid Fielding Directorate Norway 3 DSTL Elettronica Spain 1 European Commission Northrop Grumman Mission Sweeden 6 European Union Military Staff Systems Europe Ltd. Switzerland 1 FRA EADS DS UK The Netherlands 3 UAE 10 German Armed Forces Ultra Electronics UK 21 Hellenic National Defence General Raytheon USA 21 Staff Prevx Limited Italian Air Force Operational Qosmos Command Jordan Armed Forces Selex Communications Ltd. BAE Systems Download Centre Maryland Air National Guard Boeing For Free resources on cyber warfare, including podcasts, videos and Ministry of Defence Denmark Aeris Capital AG whitepapers, please visit the website MSB - Swedish Civil EADS Germany Contingencies Agency Elbit Systems Land and C4I – Our resources include exclusive interviews with key cyber warfare National Air & Space Intelligence Tadiran professionals including: Center, USAF Global Communications and National Defense University Software Systems Admiral the Lord West (former Parliamentary Under-Secretary of State for National Security Agency ITM Instalaciones Técnicas Security and Counter-terrorism under Gordon Brown) Netherlands MoD Mantenimiento Norwegian Defence Force Symantec John Bumgarner, Chief Technology Officer of the U.S. Swedish Armed Forces Nexor Ltd. Consequences Unit Swedish Civil Contingencies Professor Peter Sommer, London School of Economics and Political Science MEDIA PARTNERS Nigel Inkster, International Institute for Strategic Studies Defense Update online well as useful facts about developments in the UK Defence • Event presentation, (Conferences-Seminars-Exhibitions) bi-monthly defense Industry Contact us: • Defence news (RSS system) magazine highlights Tel: 01743 241962 website: • Press articles and Press Releases defense programs • Cooperates with Embassies , Def. Associations & Think worldwide including land, air, naval, C4ISR, intelligence, and ContingencyToday. Thanks net-centric warfare, infantry warfare, homeland defense etc. com and CT Review • Performs Marketing Research / Optimization to Def. The coverage is frequently updated to follow the development magazine (print) Companies of key defense programs. Major global defense exhibitions dedicated to the • Focuses also on Consulting Services are covered. Defense Update is available free at our web site. challenges and opportunities of Critical National Infrastructure In the context of the above, and beyond our continuous Site Website: protection. Its readership includes policy-makers, decision- information with the latest defence news from this area, we influencers and middle management implementers engaged provide information notes to Key Officers serving the MoD, – in emergency planning, disaster recovery and infrastructure and we are running independent researches on matters “Be the first to know” protection including electronic attack and the sophisticated dealing with questions that we receive from Armament ASDNews brings the latest misuse of computer systems; physical attacks by terrorist Departments. aerospace, defence and security organisations and other criminals; the effects of climate Take the time to visit our site at and news from government, industry and major news agencies change; and other natural disasters, including pandemics, in case you find it of your interest, contact us to: around the world. Our service has over 60,000 active fire and flood. subscribers and 2 million article readers per year. Website: ASDNews content is categorised in over 25 main news To sign-up for Complimentary Newsletter and CT Review groups for example: “Training & Simulation News”, or in the post (UK only) Tactical Data Links news will present “Unmanned Systems News” making recent and related subscribe-free (Outside UK) – email us: freemagazine@ and describe the current Tactical Data articles easy to find. to receive Complimentary Newsletter Links and the major command, control, Subscribe to our free daily newsletter or weekly group and first two issues of CT Review. communications, computers, and newsletters on intelligence (C4I) systems employed www.Defence-Guide. by the major European nations and the The DEFENCE com is an International major NATO nations, and will present SUPPLIERS DIRECTORY Military Site, and has as the international NEWS and international EVENTS of the is an authoritative online primary scope to establish Tactical Data Links community! It will also allow all Tactical information resource for all defence purchasers. This an electronic magazine dealing, with international news on Data Links experts to exchange information on a specialized comprehensive listing of Defence Suppliers has enabled defence manufactures and technology. More specific, this TDL area, exclusively reserved for TDL NEWS members. thousands of purchasing professionals to find exactly what International Military Guide – unique for the three Branches is the first Tactical Data Links international they are looking for - in seconds. THE DEFENCE SUPPLIERS of the MoD and Law enforcement , includes among others news website DIRECTORY provides a total overview of all the UK’s Armed the following: Forces - with a wealth of valuable information about the • Companies profiles/products/projects, organisation and structure of the UK’s Defence Services, as • Military magazines E: T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
  6. 6. CYBER WAREFARE 2O11 5 WAYS TO REGISTER Venue: American Square Conference Center, London Conference: 27th and 28th January 2011 Tel: 0800 652 2363 or Pre Conference Workshops: 26th January 2011 +44 (0)20 7368 9300 To speed registration, please provide the priority code located on the mailing label or in the box below. My registration code is PDFW Fax: +44 (0)20 7368 9301 Please contact our database manager on +44(0) 207 368 9300 or at quoting the registration code above to inform us of any changes or to remove your details. Post: your booking form to General/Flag officer 1* and above may attend the conference free of charge Please contact IQPC Ltd. 2nd Floor, for further details. This offer cannot be combined with any other offer and is non-transferable. 129 Wilton Road, STANDARD INDUSTRY RATES London, SW1V 1JZ Book and Pay by 5th Book and Pay by 3rd Book and Pay by 14th Standard Price November 2010* December 2010* January 2011* Online: 2-Day Conference Save £350 Save £300 Save £200 + 2 Workshops £2,247 +VAT £2,297 +VAT £2,397 +VAT £2,597 +VAT Email: 2-Day Conference Save £300 Save £250 Save £150 + 1 Workshop*** £1,798 +VAT £1,848 +VAT £1,948 +VAT £2,098 +VAT 2-Day Conference Save £250 Save £200 Save £100 Team Discounts* £1,349 +VAT £1,399 +VAT £1,499 +VAT £1,599 +VAT IQPC recognises the value of learning in teams. Groups of 3 or more Workshop*** booking at the same time from the same company receive a 10% £499 +VAT discount. 5 or more receive a 15% discount. 7 receive a 20% discount. DISCOUNTED PUBLIC SECTOR GOVERNMENT RATES ** Only one discount available per person. Book and Pay by 5th Book and Pay by 3rd Book and Pay by 14th Standard Price November 2010* December 2010* January 2011* Venue & Accommodation 2-Day Conference Save £350 Save £300 Save £200 £1,047 +VAT £1,097 +VAT £1,197 +VAT £1,397 +VAT Venue: + 2 Workshops America Square Conference Centre 2-Day Conference Save £300 Save £250 Save £150 One America Square, 17 Crosswall, London EC3N 2LB + 1 Workshop*** £748 +VAT £798 +VAT £898 +VAT £1,048 +VAT Accommodation: Save £250 Save £200 Save £100 2-Day Conference £449 +VAT £499 +VAT £599 +VAT £699 +VAT Overnight accommodation is not included in the registration fee, for nearby accommodation options and best possible rates and special offers please Workshop*** £349 +VAT visit This map displays live availability and allows you to book directly with each hotel. Alternatively, if you would *Must register and pay by the early RSVP discount expiry date with your RSVP CODE 12956.005 <Merge Code> like to book your accommodation by phone, you can call Daniel Spinner Early RSVP discounts are not valid in conjunction with any other offer. on +44 20 7292 2335 quoting Special Reference Code M6Z4E. ** Military rates apply to serving military officer and government personnel only. Academic rates apply to university accredited personnel only. MoD sponsored institutions are subject to military rates. *** Please select your choice of workshop A 6 B 6 All above prices are subject to 17.5% VAT. VAT No GB 799 2259 67 Free Online Resources Delegate Details To claim a variety of articles, podcasts and other free resources Please photocopy for each additional delegate please visit 6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other First Name Family Name Digital Conference On CD-ROM Rank Job Title A digital version of the conference proceedings, including all Tel No. presentations, is available to buy. Email 6 I cannot attend the event, please send me the CD Rom priced at £599 plus VAT 6 Yes I would like to receive information about products and services via email Recent digital conferences available - £599 plus VAT each Organisation 6 Cyber Security 2010 Nature of business 6 Network Centric Warfare 2010 Address 6 Please send me conference materials indicated above. Postcode Country 6 I have filled out credit card details below Telephone Fax For further information Approving Manager Please call: 0207 368 9300 or email: Name of person completing form if different from delegate: To search IQPC’s archived conference documentation visit: Signature I agree to IQPC’s cancellation, substitution and payment terms Terms and Conditions Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify) Please read the information listed below as each booking is subject to IQPC Ltd standard terms and conditions. Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6 Payment Terms: Upon completion and return of the registration form full payment is required no later than 5 business days from the date of invoice. Payment of invoices by means other than by credit card, or purchase order Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking. (UK Plc and UK government bodies only) will be subject to a £49 (plus VAT) per delegate processing fee. Payment must be received prior to the conference date. We reserve the right to refuse admission to the conference if payment Payment Method has not been received. IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates at any time by Total price for your Organisation: (Add total of all individuals attending): providing reasonable advance notice to IQPC. For any cancellations received in writing not less than eight (8) days prior to the conference, you will receive a 90% Card Number: VISA 6 M/C 6 AMEX 6 credit to be used at another IQPC conference which must occur within one year from the date of issuance of such credit. An administration fee of 10% of the contract fee will be retained by IQPC for all permitted cancellations. No 6666666666666666 credit will be issued for any cancellations occurring within seven (7) days (inclusive) of the conference. In the event that IQPC cancels an event for any reason, you will receive a credit for 100% of the contract fee paid. Exp. Date: 6 6 6 6 Sec: 6 6 6 6 You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one yearConference code 12956.005 from the date of cancellation. In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling to attend in on the Name On Card: Signature: rescheduled date, you will receive a credit for 100% of the contract fee paid. You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of postponement. Except as specified above, no credits will be issued for cancellations. There are no refunds given under any Billing Address (if different from below): circumstances. IQPC is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever in the event this conference is cancelled, rescheduled or City/County/Postcode Cheque enclosed for: £ (Made payable to IQPC Ltd.) postponed due to a fortuitous event, Act of God, unforeseen occurrence or any other event that renders performance of this conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event shall include, but not be limited to: war, fire, labour strike, extreme weather or other emergency. (Please quote 12956.005 with remittance advice) Please note that while speakers and topics were confirmed at the time of publishing, circumstances beyond the control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics. IQPC Bank details: HSBC Bank Plc, 67 George Street, Richmond, Surrey TW9 1HG, United Kingdom As such, IQPC reserves the right to alter or modify the advertised speakers and/or topics if necessary without any Sort Code: 40 38 18, Account No: 51304143, IBAN Code: GB59 MIDL 4038 1851 3041 43 liability to you whatsoever. Any substitutions or alterations will be updated on our web page as soon as possible. Swift Code: MIDLGB2112V Account name: International Quality & Productivity Centre Ltd. Discounts: All ‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order to receive any discount. Any discounts offered whether by IQPC (including team discounts) must also require payment at the time of registration. All discount offers cannot be combined with any other offer PAYMENT MUST BE RECEIVED PRIOR TO THE CONFERENCE 6 Please do not pass my information to any third party