Interactive workshop day, 10 December 2014
Expand All Sessions [+]
Collapse All Sessions [-]
Lieutenant Colonel (Ret) Bill Hagestad, Chief Cyber Security Strategist, and Author of Red Dragon Rising
With a myriad of examples over the past few years, Author of Red
cyber warfare has become firmly established as the 5th domain of warfare. The development and proliferation of malware, viruses and Advanced Persistent Threat (APT) poses a significant threat for high-value networks such as those belonging to government, military and CNI organisations. To protect these targets it is vital to understand both the nature of the threat and the intention of the attack in order to develop a lasting, robust defence against cyber attack.
This workshop will assess the cyber threat currently being deployed by subversive forces in order to better defend against this increasing threat. Emphasising defensive measures to be taken against the attack, the workshop will provide a run down of hostile cyber warfare capability, addressing the following points:
Introduction to your enemy’s Cyber Warfare Capabilities - Defining the Advanced Persistent Threat (APT)
Interests & Intent of hostile militaries’ Informatization Campaigns
Defending against the APT of Informatization Campaigns - creating a defence-in-depth
Colonel (Ret) Ralph Thiele, Projects, German Air Force Former Director of Projects, German Air Force
This workshop will explore the role that open source intelligence (OSINT) can play in deciphering cyber threats from both state and non-state actors. These actors engage in acts of civil disobedience, acts of espionage and acts of warfare. Such actions often leave digital clues, which can be used to unmask the perpetrators, determine their attack techniques and even identify the catalyst that sparked the incident.
Explore common open source intelligence resources
Investigate historic cyber attacks
Analyse OSINT and forensic information related to these attacks
Evaluate strategies to predicate future cyber attacks
Review counter cyber attack methodologies
The programme is correct at time of publishing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight. You can find the most up-to-date programme on this website.