Conference Day Two

8:00 am - 8:50 am COFFEE AND REGISTRATION

8:50 am - 9:00 am CHAIRMAN'S OPENING REMARKS

·  Establishment and organization of the Spanish Joint Cyberdefence Command (MCCD)
· Understanding the specific role that the MCCD plays in the national cyber defence effort
· Overview of how the MCCD is aligning its cyber capabilities to support the challenges of the contemporary operating environment
  • Establishment of a collaborative approach to threat intelligence to identify diverse threats to information security and system functionality
img

Lieutenant Colonel Francisco Marin Gutierrez

Head of Operations EMAD - Command of Cyber Defence
Spanish MoD

9:40 am - 10:20 am CRITICAL INFRASTRUCTURE AS A TARGET: CAPABILITY AND INTENT IN A HOME CONTEXT

Senior Officer - Cyber Operations Chief French Cyber Command
·          How vulnerable is critical infrastructure to cyber attack? Is this still a major threat to national security?
·          Understanding the threat from state and non-state actors. Are different agencies responsible for defence?
·          Demonstrations of known opposition capabilities and intent in attacking infrastructure
  •  Modelling the implications of critical infrastructure attack
img

Senior Officer

Cyber Operations Chief
French Cyber Command

10:20 am - 11:00 am MORNING COFFEE AND NETWORKING

11:00 am - 11:40 am CIS CRITICAL SECURITY CONTROLS AND SECURITY BENCHMARKS

Tony Sager - Chief Evangelist Centre for Internet Security
·          Outlining the steps to critical security control – what are the most important defensive steps, and how to prioritize?
·          In it together? How different are the military and CNI challenges? Building cybersecurity through collaboration
·          Case studies from the DoD, USG and private sector on defensive practices
  •        Looking ahead beyond cyber2020
img

Tony Sager

Chief Evangelist
Centre for Internet Security

11:40 am - 12:20 pm MAINTAINING CYBER INTEGRITY IN THE SUPPLY CHAIN

Mr Phil Blunden - Cyber Industry Communications Lead UK Ministry of Defence
·          Keys to understanding the cyber threat beyond your area of control
·          Balancing requirement and outsourcing requirement with security
·          Maintaining  cyber influence outside your immediate your organisation
  • Solving the new third party problem for suppliers
img

Mr Phil Blunden

Cyber Industry Communications Lead
UK Ministry of Defence

12:20 pm - 1:20 pm NETWORKING LUNCH

1:20 pm - 2:00 pm PANEL DISCUSSION: WHAT DOES THE CYBER COMMAND OF THE FUTURE LOOK LIKE?

·          How will the threat likely evolve beyond 2020?
·          Will the expansion of the Internet of Things (IoT) and the connected world fundamentally change how cyber   deploy and operate?
·          Is a joint civilian-military cyber command a possibility?
  •           How will the cyber threat evolve against remote platforms? 
·          Outlining the consequences to the military of the new connected world
·          Normalising the cyber domain
·          Utilising cyber denial to control the battlespace
  • Are cyber operations hindered by a generational gap in understanding?
img

Mr Richard Crowell

Associate Professor, Information Operations & Cyberspace Operations Joint Military Operations Department
U.S. Naval War College

2:40 pm - 3:10 pm AFTERNOON TEA AND NETWORKING

3:10 pm - 3:50 pm STATE, NON-STATE AND PROXY: KEY PLAYERS IN CYBER OFFENSE

Dr Jamie Shea - Assistant Secretary General Emerging Security Challenges NATO
·          The development of state, non-state and proxy actors in the cyber domain
·          Motivators, methods and vulnerabilities of the three types of cyber attacker
·          Identifiers of the threat groups: SOP’s and attack methods
·          Distinguishing between attack method and appropriate response to each group
img

Dr Jamie Shea

Assistant Secretary General Emerging Security Challenges
NATO

·          Challenges to building cohesion across the entire European command structure
·          Should cyber operations be combined, or does this present additional risks if compromised?
·          Is there a need to a combined cyber command across Europe?
  • Looking ahead to the new cyber space beyond 2020
img

Mr Mario Blokken

Head Permanent Secretariat
European Land Force Interoperability Center (Finabel)

4:30 pm - 4:40 pm END OF CONFERENCE