23-25 January 2018 | HILTON LONDON CANARY WHARF

Media Center

Exclusive Content

Defence Cyber Protection Partnership - Daniel Selman

Daniel Selman, UK MOD delivered this presentation at 2016's CDANS Conference entitled 'Defence Cyber Protection Partnership working together to protect the Defence sector from the cyber threat'

How protecting your distributed network and remote assets against cyber threats is essential for future conflicts

In an increasingly distributed network, the persistent underlying cyber threat is as present as ever, whether the danger occurs on the battlespace or on critical national infrastructures. What solutions are best to mitigate the risk? What are the challenges that surround a wide and decentralised network? In this exclusive interview with Colonel Eric Alardet, Cyber Operations Chief at the French Cyber Command, discover why there is a need to counter the cyber threat now and where to implement solutions in order to keep your assets safe.

Cyber security for networks under threat: An expert overview

Militaries, governments and critical national infrastructure require innovative approaches to futher secure their networks and the information stored within them, as they continue to undergo sustain assaults from offensive cyber. Protecting data is essential to ensure national security and operational capability.

Ahead of the Cyber Defence & Network Security conference, we asked a wide range of experts from around the globe and working across defence, government and industry to better understand cyber security priorities in view of the contemporary threat landscape. 

Articles

Tackling Cyber Warfare- Introducing Germany’s Fourth Armed Force

In the past two decades, the world has gone from the “Information Age” to the  “Digital Age” in an almost seamless transition. However, in the same period, the rise of cyber warfare capability has developed beyond the ability to combat it.

At a time where the lives of civilians and the work of governments and corporations alike are conducted electronically, those who master the tools of cyber destruction could be as much of a menace to society as standing armies.

In this interview, we speak with officials from the Bundeswehr about their initiative to stem the cyber onslaught: the creation of a new branch of their armed forces.


Exclusive Content

PDF

Dick Crowell US Naval War College - Past Presentation

Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, U.S. Naval War College delivered this presentation entitled 'What’s Past is Prologue' at 2016's CDANS conference. Download for a copy of the presentation which covered the following points:

Professional military education (PME) as a two way street to aid commanders, industry leaders, and politicians in shaping success in future conflict –conflict that will most certainly include cyber warfare. 

  • Determining what future combat power is and how to produce, adapt, and operate it under degraded & denied conditions will be critical to winning future wars.
  • Moving from a tactical defense to a strategic offensive in conflict will require a multifaceted approach from military services, politicians, industry,and academics.
  • We’ve played this game before and we must play it again – and practice

Articles

Cyber Security tactics 'divided by a common language'

It is well known that the cyber threats to industrial control systems are increasing in pace and complexity, but the extent to which human operators and technical infrastructures are adapting to these threats is less clear. Ian Buffey, Technical Director, Industrial Control System Cyber Security at Atkins, has worked with control systems for around 25 years, with the last ten of those on security for a products company. This experience has given him a considerable perspective on how people are going about protecting their systems, mostly in the field of critical national infrastructure (CNI).

GCHQ chief ignites debate about government surveillance, tech giants and terrorists

The new head of GCHQ has piled the pressure on large tech firms including Google, Apple and Twitter to facilitate more open communications with government to shore up data privacy and security laws. Robert Hannigan wrote an article in the Financial Times suggesting that web giants including Facebook, WhatsApp and Twitter have become "command-and-control networks... for terrorists and criminals.” This article marks the first public outing for Hannigan since he was appointed GCHQ’s new director in April. He insisted that terrorist groups like ISIL had infiltrated the internet and embraced the use of social media to target and recruit new members. "They [US technology companies and social networks] aspire to be neutral conduits of data and to sit outside or above politics,” Hannigan wrote. "But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and

NATO hosts largest ever cyber defence exercise

November 2014
NATO is currently undertaking the largest multination cyber defence exercise that will test the Alliance’s ability to defend its networks against a number of threats. The exercise, Cyber Coalition 2014, is taking place Estonia and involves over 400 technical, government and cyber experts operating from dozens of locations from across the Alliance and partner nations.

Cyber attack from Islamic extremists "very likely," says City of London police chief

November 2014
The threat of Islamic militants goes beyond car bombs, suicide vests and crude knife and gun attacks; it’s also in the cyber domain...

Whitepapers

[INFOGRAPHIC] - Is Your Company's Cyber Security Good Enough?

In a recent Oil & Gas IQ survey it showed that most concerns are aimed on Hackivism (61%) and State actors (Espionage 20% & Cyber Warfare 8%). How confident are you that your current defense mechanisms can handle/detect Hackivism?

Download this exclusive and complimentary infographic below and find out what the oil & gas community answered to key cyber security questions!

Exclusive Content

The Hacking Team Fallout: Who can governments trust now?

In the summer of 2015, Hacking Team, a well-known cyber security firm, was itself the victim of a cyber attack, losing over 400GB of confidential data that included source code, internal documents and sensitive emails.The incident has raised several key questions: How do governments know who to trust when it comes to working with solution providers? Will sensitive data ever be secure enough? And what can be done legally when contractors don't fulfill their promises?