Online Only Offer

Register online using the code 24041.001-CC to enjoy a 15% discount off the Standard Price! (For new bookings only)

Interactive workshop day, 10 December 2014

Expand All Sessions [+] Collapse All Sessions [-]

Led by:

Lieutenant Colonel (Ret) Bill Hagestad, Chief Cyber Security Strategist, and Author of Red Dragon Rising

With a myriad of examples over the past few years, Author of Red
cyber warfare has become firmly established as the 5th domain of warfare. The development and proliferation of malware, viruses and Advanced Persistent Threat (APT) poses a significant threat for high-value networks such as those belonging to government, military and CNI organisations. To protect these targets it is vital to understand both the nature of the threat and the intention of the attack in order to develop a lasting, robust defence against cyber attack.

This workshop will assess the cyber threat currently being deployed by subversive forces in order to better defend against this increasing threat. Emphasising defensive measures to be taken against the attack, the workshop will provide a run down of hostile cyber warfare capability, addressing the following points:

  • Introduction to your enemy’s Cyber Warfare Capabilities - Defining the Advanced Persistent Threat (APT)

  • Interests & Intent of hostile militaries’ Informatization Campaigns

  • Defending against the APT of Informatization Campaigns - creating a defence-in-depth

Led By:

Colonel (Ret) Ralph Thiele, Projects, German Air Force Former Director of Projects, German Air Force

This workshop will explore the role that open source intelligence (OSINT) can play in deciphering cyber threats from both state and non-state actors. These actors engage in acts of civil disobedience, acts of espionage and acts of warfare. Such actions often leave digital clues, which can be used to unmask the perpetrators, determine their attack techniques and even identify the catalyst that sparked the incident.

Participants will:

  • Explore common open source intelligence resources

  • Investigate historic cyber attacks

  • Analyse OSINT and forensic information related to these attacks

  • Evaluate strategies to predicate future cyber attacks

  • Review counter cyber attack methodologies

The programme is correct at time of publishing. However, given the seniority of our speakers and the nature of their roles, speakers may subsequently substitute or remove themselves from the programme. This is always regrettable, and we will always try to replace the speaker with a speaker with equivalent insight. You can find the most up-to-date programme on this website.

Download the Agenda

Featured Content

Sponsorship Opportunity

Learn more about sponsor & exhibit opportunities

IDGA

Become a member of Defence IQ and gain access to Military Videos, Podcasts and Articles today!

Quick Links