CONFERENCE DAY TWO | 17 SEPTEMBER

8:00 - 8:45 REGISTRATION & COFFEE

img

Major General (retd.) Andrew Sharpe

Director of the British Army’s Centre for Analysis and Conflict Research
Strategy and Security Institute

·          Amplifying research, development, test and evaluation through high performance computing
·          Deploying architecturally-diverse, routinely-refreshed bases of supercomputers and storage systems
·          Modernising the base of DoD science and engineering applications by providing vision, funding, and expertise to develop advanced physics-based computational analysis capabilities
·          Providing high-bandwidth, low-latency connectivity and instilling computational literacy within the next generation S&T workforce
img

Doctor David, A Horner

Director of the Information Technology Laboratory / Director of the High Performance Computing Modernization Program
U.S. Army Engineer Research and Development Center

9:30 - 10:00 EXPLOITING ADVANCED ANALYTICS FOR ENHANCED DECISION-MAKING

Brigadier Paul Lynch - Commander National Centre for Geospatial Intelligence, UK Ministry of Defence
·          Exploiting breakthroughs in AI/ML in geospatial intelligence strategy
·          Retaining operational advantage through accelerated data analysis and dissemination
·          Utilising computer vision to analyse geospatial intelligence
·          Assessing ways to enhance data sharing capabilities to ensure situational awareness at all times
·          Fusing data from disparate sources to create a multi-INT infrastructure where data is gathered from space and airborne GEOINT
img

Brigadier Paul Lynch

Commander National Centre for Geospatial Intelligence
UK Ministry of Defence

·          Assessing hardware vulnerabilities and ways to strengthen IT infrastructure and data protection against advanced malware
·          Outlining Austria’s Cyber Space Security Strategy
·          Conducting exercises in the cyber environment to retain high readiness for cyber warfare
·          Lessons learned from cyber exercises: Coalition Warrior, Cyber Phalanx, Locked Shields
·          ‘Digital Europe’ 2021-2027 and its impact on military cyber strategy 
img

Major General Helmut Habermayer

Cyber Coordinator and Head, Military Strategy Division
Austrian Ministry of Defence and Sport

10:30 - 11:00 MORNING COFFEE AND NETWORKING

11:00 - 11:45 SECURING THE CLOUD AGAINST CYBERCRIME

·          Instances of cybercrime are reaching a peak, as cyber criminals have no borders and rely on soft power to defeat their adversary. Due to the lack of international prosecution of cyber criminals, data protection and network resilience are critical to ensure data reliability. How can armed forces and intelligence communities improve cyber defence against malicious actors?
·          The big data environment needs to be secure and protected from cyberattacks. Digitisation presents a myriad of opportunities, however it also opens up new risks and vulnerabilities. Coupled with the proliferation of IoT, digitisation requires armed force leaders to integrate new solutions that would ensure data reliability. What should be done to mitigate the risks of digitisation? How can the IT infrastructure improve to allow malware detection at the highest speed? What kind of reverse engineering needs to be done to recover an attacked system at pace?
·          As the operating environment becomes increasingly cyber contested and opponents continue building capability in the cyber domain, the operator has to adapt and acquire new skills. What training provisions should be incorporated to instil this cultural shift and equip the Warfighter with the necessary cyber skills? What will the future Cyber Soldier look like? 

11:45 - 12:15 BIG DATA ANALYTICS: AN INTELLIGENCE ASSET

Colonel Kim Simonsen - Deputy Director, Danish Defence Intelligence Service
·          Big data for intelligence in practice: evaluating case studies and lessons learned
·          Big Data ML for cyber defence and deep learning to support intelligence analysis
·          Reducing IT complexity and enabling innovation
·          Ensuring software standardization and risk mitigation
·          Transforming enterprise architecture to support strategic decision-making
·          Simplifying big data collection and streamlining data delivery to the cloud and data science programmes
img

Colonel Kim Simonsen

Deputy Director
Danish Defence Intelligence Service

12:15 - 12:45 FACILITATING EXPERIMENTATION AND FIELDING INNOVATION

Lieutenant Colonel Pete Williams - Head, jHub
·          Achieving innovation through experimentation
·          Connecting world class technology and talent to military users by funding and accelerating pilots
·          Enabling rapid procurement through the innovation board
img

Lieutenant Colonel Pete Williams

Head
jHub

12:45 - 14:00 NETWORKING LUNCH

·          It is widely recognised that unlocking the power of big data maximises operational success. Due to the huge potential of advanced analytics, armed forces have prioritised the integration of data-driven capabilities to enhance complex decision-making. However, deep learning data cannot be trusted without verification, as opponents have become capable to infiltrate data sources and corrupt them. What challenges are militaries facing with data validation? What solutions could mitigate these risks?
·          The volume, variety, velocity, and veracity of data is undergoing changes, as data is derived from disparate sources. How can data fusion and visualisation improve to reduce the cognitive load? How should data management transform to reduce silo effect and ensure accessibility? 
img

Major General (retd.) Andrew Sharpe

Director of the British Army’s Centre for Analysis and Conflict Research
Strategy and Security Institute

·          Evaluating China’s capability and use of connectivity to gather massive amounts of data
·          Assessing the role of data across the competition continuum
·          Adaptation of force structure to gain advantage from cyber force
·          Cyber Force: content & code and their role in cyber power
img

Prof. Richard Crowell

Associate Professor, Information Operations & Cyberspace Operations Joint Military Operations Department
U.S. Naval War College

15:15 - 15:45 AFTERNOON TEA AND NETWORKING

·          Overview of the risk-based cyber security model to secure data in the supply chain
·          Employing big data analytics for predictive maintenance
·          Reinforcing the significance of training and instilling cyber essentials
·          Integrating a standardized cyber solution and ensuring inter-agency cooperation 
img

Phil Blunden

Cyber Industry Communications Lead
UK Ministry of Defence

·          Disinformation alters perceptions and changes the behaviour of the target audience. Influence or attacks via Cyberspace or the Twittersphere pose an existential threat to security. How should militaries respond and reap the benefits of social media as a disinformation platform? How should armed forces use cyberspace in future information warfare? What data analytics should be utilised to convert data from social media into actionable intelligence?
·          Commanders are disoriented and dislocated by the blizzard of information from a multitude of sources. What data tools should militaries utilise to focus on the right issues and data sets?
·          How should leaders in the armed forces drive innovation and experimentation? What R&D efforts are currently pursued and what are the inhibitors to absorbing game-changing technologies from the commercial sector?
img

Major General (retd.) Andrew Sharpe

Director of the British Army’s Centre for Analysis and Conflict Research
Strategy and Security Institute

17:00 - 17:15 CHAIRMAN’S CLOSING REMARKS AND END OF CONFERENCE