Conference Day Two

8:00 AM - 8:45 AM COFFEE AND REGISTRATION

8:45 AM - 9:00 AM CHAIRMAN'S OPENING REMARKS

9:00 AM - 9:40 AM SUPPORTING THE DEVELOPMENT OF A ROBUST ICT FRAMEWORK AT THE PAN-EUROPEAN LEVEL

Professor Dr Udo Helmbrecht, Executive Director, ENISA
  • Exploring a pan-European approach to specialist cyber training, including multinational exercises, that can minimize risk and maximise incident response
  • Integrating CSIRTS across Europe’s CNI to support the containment of offensive cyber
  • Assessing the cyber security demands of a remote network that depends on cloud storage and big data, and identifying bespoke approaches to information security

Professor Dr Udo Helmbrecht

Executive Director
ENISA

9:40 AM - 10:20 AM THREAT INTELLIGENCE, CYBER INFRASTRUCTURE AND REMOTE ASSET PROTECTION

Colonel Eric Alardet, Cyber Operations Chief, French Cyber Command
  • An overview of how French Cyber Command is aligning its defensive cyber capability to support the challenges of the contemporary operating environment
  • Delivering a sophisticated approach to threat intelligence that is flexible enough to identify diverse threats to information security and system functionality
  • Protecting remote assets at distance. Encrypting communications and securing the data flow in a contested operating environment

Colonel Eric Alardet

Cyber Operations Chief
French Cyber Command

10:20 AM - 10:50 AM MORNING COFFEE AND NETWORKING

10:50 AM - 11:30 AM TOWARDS AN INTEGRATED APPROACH FOR CYBER DEFENCE AND ELECTRONIC WARFARE

Colonel Ian Hargreaves, CEMA Lead, British Army HQ
  • Understanding the CEMA concept. Determining a joint approach to electronic warfare and cyber security to support operational effectiveness in a multi-domain environment
  • Analysing the advantages of CEMA as a means to deliver more robust cyber security
  • What does an integrated approach mean for the operational commander? What are the training requirements if operators are to move beyond a separated expertise in EW or cyber security?

Colonel Ian Hargreaves

CEMA Lead
British Army HQ

11:30 AM - 12:10 PM TRANSPORT FOR LONDON’S PROTECTION OF REMOTE ASSETS

Mr Paul Graziano, Head of Cyber Security Investigation and Threat Intelligence, Transport for London
  • Assessing the vulnerabilities of operational technology to cyber degradation in a CNI context
  • Monitoring and investigating suspicious activity to support an effective response to cyber threats
  • To what extent can unauthorized access to remote assets be controlled?

Mr Paul Graziano

Head of Cyber Security Investigation and Threat Intelligence
Transport for London

12:10 PM - 1:20 PM NETWORKING LUNCH

1:20 PM - 2:00 PM UNDERSTANDING OFFENSIVE INFORMATION WARFARE TO DIRECT CYBER RESILIENCE

Dr Jamie Shea, Assistant Secretary General Emerging Security Challenges, NATO
  • Moving beyond information as an enabler, and understanding how it could be exploited as a weapon of warfare
  • How will the development of offensive cyber capabilities test the resilience of NATO’s members?
  • Mitigating the risks of a distributed network and a multi-national mission. Streamlining NATO’s approach to defensive cyber

Dr Jamie Shea

Assistant Secretary General Emerging Security Challenges
NATO

2:00 PM - 2:40 PM PROTECTING THE ENERGY SECTOR AGAINST CYBER ATTACK

Mr Szabolcs Hallai, Chief Information Security Officer, Hungarian Energy Agency
  • Establishing a sector-specific information-sharing centre, in order to support awareness of and access to intelligence on the cyber threat landscape
  • Assessing the particular challenges that cyber poses to the energy sector. Delivering network and information security across a distributed supply chain to guarantee the energy supply
  • Ensuring that vulnerability assessments are robust enough to meet a varied cyber threat, and establishing best practice for the sector

Mr Szabolcs Hallai

Chief Information Security Officer
Hungarian Energy Agency

2:40 PM - 3:10 PM AFTERNOON TEA AND NETWORKING

Industry has worked hard to develop a range of innovative solutions that can defend the network and the information stored within it against cyber degradation and attack. Technology, however, can only take us so far. Delivering a truly robust cyber defence strategy will depend on overcoming current training gaps, so that cyber personnel and the broader workforce can effectively identify and respond to attacks on the network. This panel will examine the limitations of technology, and will help establish a clear training framework for the cyber force of tomorrow. Discussion points will include:

  • To what extent does the provision of greater information and network security depend on enhanced training, and what obstacles must be overcome if that training is to be effectively delivered?
  • Drawing on examples of simulated cyber training exercises to identify and overcome weaknesses for existing CERTS
  • Upskilling cyber teams so that they are equipped to cope with as diverse a range of threats as possible

Mr Ross Tsagalidis

Cyber Security Advisor & Consultant at the Department of Computer and Systems Sciences
Swedish Armed Forces/Stockholm University

Colonel Eric Alardet

Cyber Operations Chief
French Cyber Command

Mr Chris Stace

Head of Unit - Information Superiority
European Defence Agency

3:50 PM - 4:30 PM IMPROVING THE INVESTIGATION OF CYBERCRIME BY APPLYING A CRIMINOLOGICAL APPROACH

, ,
  • Applying conventional crime scene and criminological models to aid the investigation of cybercrime in the defence, government and CNI sectors
  • Understanding how small and micro civilian businesses deal, or fail to deal, with cyber incidents, and applying those lessons to support the defence of critical networks
  • Assessing the risk of remote supply chain actors as vectors for cyber attacks, and establishing a more holistic approach to security and incident response. Examining the concept of forensic readiness as an aid to incident investigation in a holistic security system

This panel will be a valuable opportunity to assess those emerging capabilities that will revolutionise the protection of information in a distributed, remote asset-heavy network. Discussion points will include:

  • Developing a more sophisticated approach to cyber threat intelligence. Using advanced analytics to accurately predict, prioritise and respond to threats to the networks. Can an accurate understanding of attacker motivations contribute to the implementation of a robust defensive framework?
  • Encrypting communications and datalinks to support the protection of and access to remote assets, even when the network is distributed across a complex operating space
  • How might blockchain be used to support information security for defence networks?
  • How will innovations in artificial intelligence support a broader approach to cyber defence?

Mr Ross Tsagalidis

Cyber Security Advisor & Consultant at the Department of Computer and Systems Sciences
Swedish Armed Forces/Stockholm University

Dr John Macrae

Technology Commercialisation Executive
University of Ulster

5:10 PM - 5:20 PM END OF CONFERENCE