With a greater dependence on computer systems and a reliance on integrated networking, today’s armed forces are faced with an ever changing set of challenges in maintaining cyber security from the threat of attack. Rapid evolution in technology has forced governments and industry alike to continually develop secure systems that remain one step ahead of the enemy. As cyber systems become increasingly integrated the requirement for a multi-layered, adaptive and self learning security system becomes imperative. With the prevalence of electronic communications, the growth of social media, a widespread access to mobile networked devices and the defence industry's increasing reliance on "Big Data", the cyber threat to today's defence sector has never been more apparent. The 'cyber landscape' is both dynamic and borderless and forces us to address our security in terms of technology, international cooperation as well as individual user awareness.

This year’s conference will focus on the military as well as the industrial defence sector itself; establishing what the current threats are, in terms of both state-sponsored intrusion as well as independent hackers and terrorist cells, what technology is currently available and where the gaps in our protection are. Additionally, with increasingly networked systems the defence sector has been presented with a whole array of emerging challenges in cyber defence. Cyber Security for the Military and the Defence Sector 2013 will tackle this by gathering senior experts from both industry and the military to discuss and ideas share to ensure that our governments remain educated, up-to-date and secure. 

As a European leader, SMi's Cyber Security for Military and the Defence Sector conference offers a truly unrivalled networking forum and learning opportunity. This year’s 6th annual event, taking place in London in June 2013, will engage with many of the world's military and industrial leaders from across the globe.

Cyber attack is a rapidly growing threat, with an emerging reliance on electronic systems and an increasingly networked cyber infrastructure the outcome of such an attack is potentially crippling to any military. The source of such a threat is all too often borderless and in many ways asymmetric- having a larger military than the enemy can no longer guarantee security. With such a rapid development in cyber warfare over the last decade it is easy to become outdated, in terms of both technology and training and therefore vulnerable. SMi's 'Cyber Security for Military and the Defence Sector' addresses this by gathering leading security solution experts, prominent defence contractors and leading international military representatives to discuss ideas, learn about the latest developments and initiatives in place and keep up to date with the most relevant information available in cyber security today, so do not let your organisation get left behind!

•LEARN- about emerging threats, current initiatives and the recent technical developments in network, firewall, and database security, .
•ASSESS- the experiences of current military operators and share ideas with civilian industrial peers.
•ANALYSE- the latest cyber defence solutions, training and network threats.
•ENGAGE- with international military and industrial representatives in dedicated question & answer sessions. Communicate directly with military operators, defence contactors tasked with supplying secure equipment , as well as as experts at the forefront of producing cyber security solutions.
•DISCUSS- key topics throughout the conference with colleagues and international peers during networking breaks, lunches and drinks.

This year's event will address the Military and Defence sector in particular. This will provide a more focussed agenda on the specific issues facing governments, militaries and defence contractors and allow for a greater, more in-depth, engagement with the relevant experts in cyber security.


Chief Technology Officers
Chief Information Officers
Chief Security Officers
Chief Security Technology Officers
Heads of Security
Heads of Data Security
Heads of IT Security
Heads of ICT
Heads of Information Security
Heads of e-Crime
Heads of Cyber Security
Heads of Risk and Resilience
Heads of Military IT
Heads of Cyber Warfare Training
Heads of IT Operational Risk
Directors of Digital Security
Directors of Network Security
Directors of Operational Risk
Heads of Counter Terrorism
Group Security Managers
Computer Emergency Response Teams
Government Security Procurement and System Integrators
Group IT Directors
Procurement Directors & Officers
Secured Database Systems Managers 

A B B; A Y R Group Ltd; Aeronova; Alstom Grid; Ambeo Plc; Amira Air; B B G A - British Business And General Aviation Association; Banque Internationale Pour L'Afrique Au Niger (B I A Niger); Copy Max (Copy Center); Cornerstone; Defence Equipment and Support; DNB Bank ASA; Ecosave Pty Ltd; Freedon Air Limited; Grundfos; Honeywell International Inc; Hunt And Palmer P L C; Johnson & Johnson Ethicon; Mindef - Terre - D C C A T - Scercat Mindef - Land -D C C A T - Scercat; Ministry of Defence, Nigeria; NESL-ICPE; Nigerian National Petroleum Corp; NNPC; Norwegian Hull Club; NSSL Global Ltd; Ntnu Sintef; Orion New Zealand; Pavia & Ansaldo LLC; Radio communication Section; Regent Group; Renaissance Life Insurance Company L.T.D.; Russian Connection; SOUTHERN PETRO CHEMICAL INDUSTRIES CORPORATION LTD.; Sui Southern Gas Company Ltd; Takadu; Telecom Regulatory Authority of India (TRAI) Room No 527; University of London; WI Department of Health Services;

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Geoff  Harris

Geoff Harris, Director, Alderbridge Consulting Ltd

9:10 Learning cyber control & denial from contemporary conflict

Richard Crowell

Richard Crowell, Associate Professor Information and Cyberspace Operations, Naval War College

  • The forces of content & code and how they have been employed in recent conflicts
  • Developing concepts and capabilities to manoeuver in and through cyberspace to achieve objectives
  • Narrowing the Preparation / Execution Gap
  • Working partnerships in a domain in which there is nearly equal access
  • 9:50 Technical aspects of cyber security as seen by the Austrian military and the local milCERT

    Ulrich Poeschl

    Ulrich Poeschl, Chief Security Architect, Ministry of Defence, Austria

  • What is as an "advanced threat"?
  • (Scary) ways around conventional defence mechanisms
  • Live-Demo of a target-system infection with conventional defence
  • Emerging cyber threats - strategies to cope with them
  • Optional: Further live-demos (Fighting back the malware from 1st demo, create custom anti-virus signatures
  • 10:30 Morning Coffee

    10:50 Adversity, risk and trustworthiness

    Ian Bryant

    Ian Bryant, Technical Director, Trustworthy Software Initiative

  • Why there is a need for a consensus on adversity, risk and trustworthiness
  • The role of Standards Development Organisations (SDO) in achieving such a consensus
  • Achieving the desired outcome with the Trustworthy Software Framework (TSF)
  • 11:30 Speed up the velocity of investigation with behaviour analysis of malware

  • Identify and  capture the signature of suspicious  files
  • Behavioural Analysis  with  correlation of  other artefact
  • Importance of Multiple Analysis Platform
  • How to correlate multiple malware and find the similar ones?
  • Result: Malware activity graphs
  • Hasan Yasar

    Hasan Yasar, Technical Manager , Carnegie Mellon University

    12:10 Networking Lunch

    13:10 Voluntary participation in national cyber defence: The example of the Estonian cyber defence unit

    Kadri Kaska

    Kadri Kaska, Senior Analyst, Cooperative Cyber Defence Centre of Excellence, Estonia

  • Legal and policy framework for using volunteers in national cyber defence
  • Functioning and roles of the CDU: Estonian case study
  • Legal implications arising from using volunteers in national cyber defence
  • 13:50 Risks of Social Media to Organizations and Personnel

    John Wayne Ross

    John Wayne Ross, Strategic Analyst, Defence Research & Development Canada (DRDC), Department of National Defence Canada (DND)

  • Insight into potentially disruptive effect of social media on defence and security
  • Insight into personnel implications from work-related to personal issues
  • Insight into organizational implications including cyber-vetting, trust and potential effects on organizational management
  • Using example from real-world and potential scenarios
  • 14:30 Cyber Defence Capability Building in EU

    Wolfgang Roehrig

    Wolfgang Roehrig, Project Officer Cyber Defence, European Defence Agency

  • Military aspects of the cyber security strategy for the European Union
  • Military capability development in EU cyber defence
  • Pooling & Sharing in Cyber Defence
  • A stock-take of EU cyber defence capability
  • 15:10 Afternoon Tea

    15:30 Cyber Security and the UK's Critical National Infrastructure

    Dave Clemente

    Dave Clemente, Research Analyst, Royal Institute Of International Affairs

  • Identifying what elements are ‘critical’
  • Benefits and risks of international commercial cooperation
  • Creating and maintaining a stable cyber policy for protecting CNI
  • 16:10 Defending the UK defence industry against cyber attack

    Vincent Blake

    Vincent Blake, Head of Cyber Security, Raytheon Systems Ltd

  • The changing landscape of the cyber threat to the UK Defence Industry
  • Understanding your cyber resilience maturity in the face of the cyber threat?
  • How the UK Defence industry is working together to detect, analyse and respond to threats
  • What does the cyber future bring for the UK Defence Industry?


  • 16:50 International Law and Cyber Warfare

    Michela Menting

    Michela Menting, Senior Analyst, ABI Research

  • Jus in Bello (Laws of War)
  • Applying the Cyber Context
  • Codification vs. Customary Law
  • National Cyber Defence Strategies
  • 17:30 Chairman’s Closing Remarks and Close of Day One

    Geoff  Harris

    Geoff Harris, Director, Alderbridge Consulting Ltd

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Geoff  Harris

    Geoff Harris, Director, Alderbridge Consulting Ltd

    9:10 The FBI's role in the advancement of cyber security

    Mr Kurt Pipal

    Mr Kurt Pipal, Special Agent, Cyber ALAT, Federal Bureau Of Investigation

  • FBI's Cyber Mission and Priority
  • APT Threats
  • Collaborative Investigative Efforts
  • Cyber Mitigation Best Practices Based on Investigations
  • 9:50 Cyber security and incident management

    Natalie Black

    Natalie Black, Deputy Director of Cyber Defence and Public Networks , Office of Cyber Security & Information Assurance

  • The evolving cyber threat
  • How the Government is responding
  • The national approach to cyber incident management
  • New initiatives including the Cyber Information Sharing Partnership and the national CERT
  • 10:30 Morning Coffee

    10:50 Sharing sensitive information securely- times are changing

    Patrick Curry OBE

    Patrick Curry OBE, Director, British Business Federation Authority - BBFA Ltd

  • What business and cyber information is being shared securely and the strategic drivers for it?
  • What are the collaborative mechanisms, technologies and standards enabling such sharing, and the threats to success?
  • Where is such information sharing happening in UK and internationally?
  • What's likely to happen in the next 3 years and what should my organisation be doing?
  • 11:30 Japanese cyber security update

    Akira Yamada

    Akira Yamada, Senior Security Analyst, Cyber defense institute Incident Response Team

  • Cyber threats/attacks in Japan
  • Response activities
  • Findings from massive cyber attacks
  • Activities on digital Forensics
  • 12:10 NATO’s policy on cyber defence and the evolution of the cyber challenge

    Jamie Shea

    Jamie Shea, Deputy Assistant Secretary General , NATO HQ

  • How cyber is changing the nature of conflict and crisis management
  • NATO's perception of the cyber threat
  • How NATO is constructing its cyber defence organization
  • Future tasks and challenges
  • 12:50 Networking Lunch

    13:50 Achieving Global Cyber Security Through Cooperation

    Steven Purser

    Steven Purser, Head of Core Operations Department, ENISA (European Network and Information Security Agency)

  • About ENISA
  • Protecting Critical Information Infrastructure
  • Input to EU & MS Cyber Security Strategies
  • Assisting Operational Communities
  • Security & Data Breach Notification
  • Data Protection
  • Future Direction
  • 14:30 Building and managing a comprehensive computer Incident response capability

  • Don't start when the horse has bolted; Starting with Protection and Defence
  • Scope and ambition 
  • Appetite for Interoperability 
  • What tools are out there? 
  • The need for integration and cooperation
  • Jeremy O'Connor

    Jeremy O'Connor, Client Industry Executive, Selex ES

    Jonathan Fulkerson

    Jonathan Fulkerson , Systems Engineering Associate, Northrop Grumman Corporation

    15:10 Cyber security incident response

    Ian Glover

    Ian Glover, President, CREST

  • The security services industry’s response to cyber security threats; how do you prepare for an incident and what are the immediate steps and decision making process that you will have to go through following an incident
  • Government and private sector initiatives for validating third party security services providers
  • How to identifying suitable cyber security incident response service suppliers and what should be considered in contracts for their services
  • 15:50 Afternoon Tea

    16:10 Cyber Science: Future Trends

    Irene Moulitsas

    Irene Moulitsas , Lecturer in Scientific Computing, Cranfield University

  • Graphs are everywhere, with an unprecedented, massive, and ever-growing amount of data.
  • Are science and technology prepared to deal with such an information explosion?
  • Are modern High Performance Computing infrastructures effectively utilised? Are we prepared to reinvent the wheel?
  • 16:50 Security on Social Network Sites: The Case of the British Army

  • Social Network Sites (SNSs) and security risks
  • The Army perspective and issues for consideration
  • Research and findings
  • Being or working in the Army and risk perception; Individual and group dynamics on   SNSs
  • The future … SNSs and the Army
  • 17:30 Chairman’s Closing Remarks and Close of Day Two

    Geoff  Harris

    Geoff Harris, Director, Alderbridge Consulting Ltd



    Threat Intelligence, Threat Horizons

    Threat Intelligence, Threat Horizons

    Copthorne Tara Hotel
    18th June 2013
    London, United Kingdom

    Copthorne Tara Hotel

    Scarsdale Place
    London W8 5SR
    United Kingdom

    Copthorne Tara Hotel

    The Copthorne Tara Hotel London Kensington is an elegant contemporary four-star hotel in prestigious Kensington, located just a two minutes walk from High Street Kensington underground station, making exploring easy. The hotel offers well-appointed and comfortable guest rooms combining Standard, Superior and Club accommodation. Club rooms offer iconic views over the city and include Club Lounge access for complimentary breakfast and refreshments. Guests can sample the authentic Singaporean, Malaysian and Chinese cuisine at Bugis Street, traditional pub fare at the Brasserie Restaurant & Bar or relax with a delicious drink at West8 Cocktail Lounge & Bar.

    The Copthorne Tara Hotel boasts 745 square meters of flexible meeting space, consisting of the Shannon Suite and the Liffey Suite, ideal for hosting conferences, weddings and social events. Facilities include access to the business centre 24 hours a day, fully equipped fitness room, gift shop, theatre desk and Bureau de Change. With ample onsite parking outside the London congestion charge zone and excellent transport links via Heathrow Airport, the hotel is the perfect location for business or leisure stays. The hotel is within close proximity to the shops of High Street Kensington, Knightsbridge and Westfield London, Olympia Conference Centre, Royal Albert Hall, Kensington Palace and Hyde Park.




    speaker image






    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.


    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.


    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.


    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title


    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event


    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group

    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out