Conference Day One - Jan 30 2019
8:00 am - 8:50 am COFFEE AND REGISTRATION
8:50 am - 9:00 am CHAIRMAN'S OPENING REMARKS
9:00 am - 9:40 am INFORMATION WARFARE COMMAND: BEYOND CYBER
· Lessons identified from the cyber domain and operations in the information environment
· Understanding cyber domain convergence of intelligence, signals and Electronic Warfare (EW)
· The advantages of integration: Creating complete visibility at all command levels
- · Steps towards information warfare dominance
Air Commodore Tim Neal-HopesHead Joint User C4ISR & Cyber
UK Ministry of Defence
9:40 am - 10:20 am THE UNIQUE ROLE OF PRIVATE TECH COMPANIES IN INFORMATION WARFARE
· The implications of information warfare on a privately-owned battlefield: "The battlefield we have, not the battlefield we wish we had"
· The anatomy, culture, and incentives of social media companies
· Feasible and unfeasible technical approaches to combating influence, and how national security can work with platforms
- Is information warfare a military problem, a tech problem, a cybersecurity problem, or something else?
10:20 am - 11:00 am ‘THE DEFINING MOMENT OF CYBER’: REINFORCING THE US CYBER COMMAND
· Outlining the remit of the US Cyber Command across government and the private sector
· Managing the threat landscape by prioritising near-peer and non-state threats to the US
· Is the best defence a good offense? Building offensive capabilities as a deterrent
- How will we be attacked? Is national cyber defence exclusively a military concern?
11:00 am - 11:40 am MORNING COFFEE AND NETWORKING
11:40 am - 12:20 pm HUMAN TARGETS IN CYBER WARFARE: PSYCHOLOGICAL OPERATIONS IN CYBER
· Reexamining the human-cyber interface to acknowledge humans as the target
· How does the targeting of a human change defensive cyber operations?
· Has the ‘systems attack’ threat been misidentified as the major threat to security?
- · Should this new perspective impact the prioritisation of the cyber defence operations?
Mr John R GwinnupCyber Threat Analyst
NATO Intelligence Fusion Centre
12:20 pm - 1:00 pm THE NEW CYBER OPERATING ENVIRONMENT; WHO, WHERE, HOW?
· Outlining key players in the cyber domain: CNI, government and military
· Creating a shared operating space between these traditionally independent organisations
· Assessing the true threat from offensive cyber systems
- Is the military the right organisation to lead in cyber defence?
Colonel Ian HargreavesCEMA Lead
British Army HQ
1:00 pm - 2:00 pm NETWORKING LUNCH
2:00 pm - 2:40 pm CONDUCTING DETERRENCE OPERATIONS AND INFO OPS
· Outlining the likely threat vectors from state and non-state adversaries
· The cyber role in information operations at home and in theatre
· Supporting national defence objectives through civilian agency support
- · Demonstrating deterrence operation models from experience
Pablo BreuerInnovation Officer and Director, Donovan Group
U.S. Special Operations Command
2:40 pm - 3:20 pm RECOGNISING CYBER INFLUENCERS IN THE CIVILIAN SPACE
· Outlining the cyber threat exposure to civilians from social media influencers and similar
· Assessing the threat posed to military and government from civilian manipulation
· #FakeNews? The true risk to government and military
- Understanding how this threat can be managed and mitigated without censorship methods
3:20 pm - 4:00 pm AFTERNOON TEA AND NETWORKING
4:00 pm - 4:40 pm THE EU’S CYBER DEFENCE POLICY FRAMEWORK
· Is the ‘zero to hero’ model realistic for military cyber training?
· How can the armed forces attract cyber expertise into the organisation?
· Should the military ‘soldier first’ mentality be changed within the cyber context?
- Does the solution lie in greater sharing of personnel with known industry partners?
Brigadier General Juergen BrotzChief of Military Intelligence
4:40 pm - 5:20 pm PANEL DISCUSSION: TRAIN TO RETAIN: MANAGING CYBER CAPABILITY IN THE ARMED FORCES
· Steps to building an effective cyber force – lessons identified from force development programmes
· Is the military structure attractive to cyber operators? Is the ‘soldier first’ mentality detrimental to cyber force development?
· Can a more open structure be designed to encourage force retention between cyber personnel
- · Should the military be more open to cyber operators from other sectors?