Conference Day Two - Jan 31 2019
8:00 am - 8:50 am COFFEE AND REGISTRATION
8:50 am - 9:00 am CHAIRMAN'S OPENING REMARKS
9:00 am - 9:40 am THE SPANISH JOINT CYBER DEFENCE COMMAND
· Establishment and organization of the Spanish Joint Cyberdefence Command (MCCD)
· Understanding the specific role that the MCCD plays in the national cyber defence effort
· Overview of how the MCCD is aligning its cyber capabilities to support the challenges of the contemporary operating environment
- Establishment of a collaborative approach to threat intelligence to identify diverse threats to information security and system functionality
Lieutenant Colonel Francisco Marin GutierrezHead of Operations EMAD - Command of Cyber Defence
9:40 am - 10:20 am CRITICAL INFRASTRUCTURE AS A TARGET: CAPABILITY AND INTENT IN A HOME CONTEXT
· How vulnerable is critical infrastructure to cyber attack? Is this still a major threat to national security?
· Understanding the threat from state and non-state actors. Are different agencies responsible for defence?
· Demonstrations of known opposition capabilities and intent in attacking infrastructure
- Modelling the implications of critical infrastructure attack
Senior OfficerCyber Operations Chief
French Cyber Command
10:20 am - 11:00 am MORNING COFFEE AND NETWORKING
11:00 am - 11:40 am CIS CRITICAL SECURITY CONTROLS AND SECURITY BENCHMARKS
· Outlining the steps to critical security control – what are the most important defensive steps, and how to prioritize?
· In it together? How different are the military and CNI challenges? Building cybersecurity through collaboration
· Case studies from the DoD, USG and private sector on defensive practices
- Looking ahead beyond cyber2020
Tony SagerChief Evangelist
Centre for Internet Security
11:40 am - 12:20 pm MAINTAINING CYBER INTEGRITY IN THE SUPPLY CHAIN
· Keys to understanding the cyber threat beyond your area of control
· Balancing requirement and outsourcing requirement with security
· Maintaining cyber influence outside your immediate your organisation
- Solving the new third party problem for suppliers
Mr Phil BlundenCyber Industry Communications Lead
UK Ministry of Defence
12:20 pm - 1:20 pm NETWORKING LUNCH
1:20 pm - 2:00 pm PANEL DISCUSSION: WHAT DOES THE CYBER COMMAND OF THE FUTURE LOOK LIKE?
· How will the threat likely evolve beyond 2020?
· Will the expansion of the Internet of Things (IoT) and the connected world fundamentally change how cyber deploy and operate?
· Is a joint civilian-military cyber command a possibility?
- How will the cyber threat evolve against remote platforms?
2:00 pm - 2:40 pm CYBER CONTROL AND CYBER DENIAL: A NEW APPROACH?
· Outlining the consequences to the military of the new connected world
· Normalising the cyber domain
· Utilising cyber denial to control the battlespace
- Are cyber operations hindered by a generational gap in understanding?
Mr Richard CrowellAssociate Professor, Information Operations & Cyberspace Operations Joint Military Operations Department
U.S. Naval War College
2:40 pm - 3:10 pm AFTERNOON TEA AND NETWORKING
3:10 pm - 3:50 pm STATE, NON-STATE AND PROXY: KEY PLAYERS IN CYBER OFFENSE
· The development of state, non-state and proxy actors in the cyber domain
· Motivators, methods and vulnerabilities of the three types of cyber attacker
· Identifiers of the threat groups: SOP’s and attack methods
· Distinguishing between attack method and appropriate response to each group
Dr Jamie SheaAssistant Secretary General Emerging Security Challenges
3:50 pm - 4:30 pm COMBINING EUROPE IN THE CYBER SPACE
· Challenges to building cohesion across the entire European command structure
· Should cyber operations be combined, or does this present additional risks if compromised?
· Is there a need to a combined cyber command across Europe?
- Looking ahead to the new cyber space beyond 2020
Mr Mario BlokkenHead Permanent Secretariat
European Land Force Interoperability Center (Finabel)