Conference Day One

8:00 am - 8:50 am COFFEE AND REGISTRATION

8:50 am - 9:00 am CHAIRMAN'S OPENING REMARKS

9:00 am - 9:40 am INFORMATION WARFARE COMMAND: BEYOND CYBER

Air Commodore Tim Neal-Hopes - Head Joint User C4ISR & Cyber UK Ministry of Defence
·          Lessons identified from the cyber domain and operations in the information environment
·          Understanding cyber domain convergence of intelligence, signals and Electronic Warfare (EW)
·          The advantages of integration: Creating complete visibility at all command levels
  • ·          Steps towards information warfare dominance
img

Air Commodore Tim Neal-Hopes

Head Joint User C4ISR & Cyber
UK Ministry of Defence

9:40 am - 10:20 am THE UNIQUE ROLE OF PRIVATE TECH COMPANIES IN INFORMATION WARFARE

Mr David Perlman - Research Intelligence Analyst Twitter
·          The implications of information warfare on a privately-owned battlefield: "The battlefield we have, not the battlefield we wish we had"
·          The anatomy, culture, and incentives of social media companies
·          Feasible and unfeasible technical approaches to combating influence, and how national security can work with platforms
  •  Is information warfare a military problem, a tech problem, a cybersecurity problem, or something else? 
img

Mr David Perlman

Research Intelligence Analyst
Twitter

10:20 am - 11:00 am ‘THE DEFINING MOMENT OF CYBER’: REINFORCING THE US CYBER COMMAND

·          Outlining the remit of the US Cyber Command across government and the private sector
·          Managing the threat landscape by prioritising near-peer and non-state threats to the US
·          Is the best defence a good offense? Building offensive capabilities as a deterrent
  • How will we be attacked? Is national cyber defence exclusively a military concern?

11:00 am - 11:40 am MORNING COFFEE AND NETWORKING

11:40 am - 12:20 pm HUMAN TARGETS IN CYBER WARFARE: PSYCHOLOGICAL OPERATIONS IN CYBER

Mr John R Gwinnup - Cyber Threat Analyst NATO Intelligence Fusion Centre
·          Reexamining the human-cyber interface to acknowledge humans as the target
·          How does the targeting of a human change defensive cyber operations?
·          Has the ‘systems attack’ threat been misidentified as the major threat to security?
  • ·          Should this new perspective impact the prioritisation of the cyber defence operations?
img

Mr John R Gwinnup

Cyber Threat Analyst
NATO Intelligence Fusion Centre

12:20 pm - 1:00 pm THE NEW CYBER OPERATING ENVIRONMENT; WHO, WHERE, HOW?

Colonel Ian Hargreaves - CEMA Lead British Army HQ
·          Outlining key players in the cyber domain: CNI, government and military
·          Creating a shared operating space between these traditionally independent organisations
·    Assessing the true threat from offensive cyber systems
  •   Is the military the right organisation to lead in cyber defence?
img

Colonel Ian Hargreaves

CEMA Lead
British Army HQ

1:00 pm - 2:00 pm NETWORKING LUNCH

2:00 pm - 2:40 pm CONDUCTING DETERRENCE OPERATIONS AND INFO OPS

Major Michael Klipstein PhD - Research Scientist US Army Cyber Institute
·          Outlining the likely threat vectors from state and non-state adversaries
·          The cyber role in information operations at home and in theatre
·          Supporting national defence objectives through civilian agency support
  • ·          Demonstrating deterrence operation models from experience
img

Major Michael Klipstein PhD

Research Scientist
US Army Cyber Institute

·          Outlining the cyber threat exposure to civilians from social media influencers and similar
·          Assessing the threat posed to military and government from civilian manipulation
·          #FakeNews? The true risk to government and military
  • Understanding how this threat can be managed and mitigated without censorship methods
img

Ben Russell

National Cyber Crime Unit Head of Threat Response (Intelligence & Strategy) National Cyber Crime Unit
National Crime Agency

3:20 pm - 4:00 pm AFTERNOON TEA AND NETWORKING

4:00 pm - 4:40 pm THE EU’S CYBER DEFENCE POLICY FRAMEWORK

Brigadier General Juergen Brotz - Chief of Military Intelligence Bundeswehr
·          Is the ‘zero to hero’ model realistic for military cyber training?
·          How can the armed forces attract cyber expertise into the organisation?
·          Should the military ‘soldier first’ mentality be changed within the cyber context?
  • Does the solution lie in greater sharing of personnel with known industry partners?
img

Brigadier General Juergen Brotz

Chief of Military Intelligence
Bundeswehr

4:40 pm - 5:20 pm PANEL DISCUSSION: TRAIN TO RETAIN: MANAGING CYBER CAPABILITY IN THE ARMED FORCES

·          Steps to building an effective cyber force – lessons identified from force development programmes
·          Is the military structure attractive to cyber operators? Is the ‘soldier first’ mentality detrimental to cyber force development?
·          Can a more open structure be designed to encourage force retention between cyber personnel
  • ·          Should the military be more open to cyber operators from other sectors?

5:10 pm - 5:20 pm END OF CONFERENCE DAY ONE