29 - 31 January, 2019 | Hilton London Canary Wharf, London, United Kingdom

Conference Day One - Jan 30 2019

8:00 am - 8:50 am COFFEE AND REGISTRATION

8:50 am - 9:00 am CHAIRMAN'S OPENING REMARKS

9:00 am - 9:40 am INFORMATION WARFARE COMMAND: BEYOND CYBER

·          Lessons identified from the cyber domain and operations in the information environment
·          Understanding cyber domain convergence of intelligence, signals and Electronic Warfare (EW)
·          The advantages of integration: Creating complete visibility at all command levels
  • ·          Steps towards information warfare dominance
Air Commodore Tim Neal-Hopes, Head Joint User C4ISR & Cyber at UK Ministry of Defence

Air Commodore Tim Neal-Hopes

Head Joint User C4ISR & Cyber
UK Ministry of Defence

9:40 am - 10:20 am THE UNIQUE ROLE OF PRIVATE TECH COMPANIES IN INFORMATION WARFARE

·          The implications of information warfare on a privately-owned battlefield: "The battlefield we have, not the battlefield we wish we had"
·          The anatomy, culture, and incentives of social media companies
·          Feasible and unfeasible technical approaches to combating influence, and how national security can work with platforms
  •  Is information warfare a military problem, a tech problem, a cybersecurity problem, or something else? 

10:20 am - 11:00 am ‘THE DEFINING MOMENT OF CYBER’: REINFORCING THE US CYBER COMMAND

·          Outlining the remit of the US Cyber Command across government and the private sector
·          Managing the threat landscape by prioritising near-peer and non-state threats to the US
·          Is the best defence a good offense? Building offensive capabilities as a deterrent
  • How will we be attacked? Is national cyber defence exclusively a military concern?

11:00 am - 11:40 am MORNING COFFEE AND NETWORKING

11:40 am - 12:20 pm HUMAN TARGETS IN CYBER WARFARE: PSYCHOLOGICAL OPERATIONS IN CYBER

·          Reexamining the human-cyber interface to acknowledge humans as the target
·          How does the targeting of a human change defensive cyber operations?
·          Has the ‘systems attack’ threat been misidentified as the major threat to security?
  • ·          Should this new perspective impact the prioritisation of the cyber defence operations?
Mr John R Gwinnup, Cyber Threat Analyst at NATO Intelligence Fusion Centre

Mr John R Gwinnup

Cyber Threat Analyst
NATO Intelligence Fusion Centre

12:20 pm - 1:00 pm THE NEW CYBER OPERATING ENVIRONMENT; WHO, WHERE, HOW?

·          Outlining key players in the cyber domain: CNI, government and military
·          Creating a shared operating space between these traditionally independent organisations
·    Assessing the true threat from offensive cyber systems
  •   Is the military the right organisation to lead in cyber defence?
Colonel Ian Hargreaves, CEMA Lead at British Army HQ

Colonel Ian Hargreaves

CEMA Lead
British Army HQ

1:00 pm - 2:00 pm NETWORKING LUNCH

2:00 pm - 2:40 pm CONDUCTING DETERRENCE OPERATIONS AND INFO OPS

·          Outlining the likely threat vectors from state and non-state adversaries
·          The cyber role in information operations at home and in theatre
·          Supporting national defence objectives through civilian agency support
  • ·          Demonstrating deterrence operation models from experience
Pablo Breuer, Innovation Officer and Director, Donovan Group at U.S. Special Operations Command

Pablo Breuer

Innovation Officer and Director, Donovan Group
U.S. Special Operations Command

2:40 pm - 3:20 pm RECOGNISING CYBER INFLUENCERS IN THE CIVILIAN SPACE

·          Outlining the cyber threat exposure to civilians from social media influencers and similar
·          Assessing the threat posed to military and government from civilian manipulation
·          #FakeNews? The true risk to government and military
  • Understanding how this threat can be managed and mitigated without censorship methods

3:20 pm - 4:00 pm AFTERNOON TEA AND NETWORKING

4:00 pm - 4:40 pm THE EU’S CYBER DEFENCE POLICY FRAMEWORK

·          Is the ‘zero to hero’ model realistic for military cyber training?
·          How can the armed forces attract cyber expertise into the organisation?
·          Should the military ‘soldier first’ mentality be changed within the cyber context?
  • Does the solution lie in greater sharing of personnel with known industry partners?
Brigadier General Juergen Brotz, Chief of Military Intelligence at Bundeswehr

Brigadier General Juergen Brotz

Chief of Military Intelligence
Bundeswehr

4:40 pm - 5:20 pm PANEL DISCUSSION: TRAIN TO RETAIN: MANAGING CYBER CAPABILITY IN THE ARMED FORCES

·          Steps to building an effective cyber force – lessons identified from force development programmes
·          Is the military structure attractive to cyber operators? Is the ‘soldier first’ mentality detrimental to cyber force development?
·          Can a more open structure be designed to encourage force retention between cyber personnel
  • ·          Should the military be more open to cyber operators from other sectors?

5:10 pm - 5:20 pm END OF CONFERENCE DAY ONE