www.cybersecurity-asia.com
Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +65 664 990 94 or +44 (0) 870 9090 712 or
call +65 664 990 95/96 or +44 (0) 870 9090 711
Wing Commander Tom Parkhouse,
Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES:
Major (Ret’d) Manik M Jolly,
Commander
Cyber Security Cell,
Indian Army
Bernie Trudel,
Chairman,
Asia Cloud Computing
Association
Xundi Zhang,
Founder,
XFocus, China
Iftekharul Bashar,
Senior Analyst,
International Centre for Political
Violence and Terrorism Research,
Singapore
Neelabh Rai,
Independent Cyber Security
Researcher,
Cyber Cops, India
Ammar Jaffri,
Chief Executive,
Pakistan
Information Security Association
(PISA)
Michael Rothery,
First Assistant
Secretary, National Security Resilience
Division,
Australian Government
Dr Goh Shen Tat,
Assistant Department
Head, Cryptography and Security Research
Group, Institute for Infocomm Research
(I2R),
Agency for Science Technology and
Research (A*STAR), Singapore
Sazali Sukardi,
Head, Strategic Policy
Research,
CyberSecurity Malaysia
•
Introducing the leading forum for Cyber Security Professionals in Asia
CONFERENCE HIGHLIGHTS:
C
ase studies from
International Cyber
Commands
Y
our chance to assess how
Cyber Terrorism and
Radicalisation through
social networking is being
used across Asia Pacific
B
e involved in our
interactive panel
discussions and working
groups and get your
opinion across to the
people that matter
E
nter into sessions focusing
on National Capabilities
and Protecting Critical
National Infrastructure
R
each out and network
with your industry peers
and leave having forged
new working relationships
and strengthened your
current ones!
PLUS ONE FULL DAY PRE-CONFERENCE WORKSHOP AND ONE FULL DAY POST-CONFERENCE WORKSHOP:
Preparing for the Next Cyber Attack…
Friday 11th NovemberCyber Games and the Operational Application to
Cyber Security
Tuesday 8th November
In Association with:
In Association with:
Cyber Security
ASIA
9th & 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore
GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR
SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR
Lead Sponsor: Sponsored by:
Conference Knowledge Partners:
DAY ONE
Wednesday 9th November 2011
8:30 Registration and Coffee
9:00 Chairman's Opening Remarks
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
9:10 GUEST OF HONOUR OPENING ADDRESS
Building a Secure and Connected Future
• Investing in information security competencies/expertise • Qualified information security professionals for Singapore • Everyone has a part to play
• Conclusions
Senior Representative, Agency for Science, Technology and Research (A*STAR), Singapore
9:40 KEYNOTE ADDRESS
The Global Cyber Security Challenge
Michael Wilks,Regional Director, Public Safety and National Security APAC, Microsoft
10:20 SCENARIO CYBER ATTACK
Cyber Attack – Is it an Act of War?
This session will be run by Microsoft – a large multinational company/government is being hit by a Cyber Attack what are the options to respond to this attack? This is the opportunity for the audience to engage with each other to discuss potential counter measures to a cyber attack.
Michael Wilks, Regional Director, Public Safety and National Security APAC, Microsoft
11:00 Networking Coffee Break
INTERNATIONAL CYBER COMMANDS AND NATIONAL CAPABILITIES
11:30 SPECIAL ADDRESS
Military Cyber Commands – An Overview
Many nations have been surging their efforts to meet the national security challenges, still largely unknown, of conflict in cyber space. This presentation will survey and compare these national efforts with a focus on military cyber commands: which nations have them, what missions they are likely to engage in, and the implications for the rest of us.
Jason Healy,Executive Director, Cyber Conflict Studies Association
12:00 KEYNOTE ADDRESS
USCYBERCOM – An Insight
• The US CYBERCOM - An overview
• Conducting full spectrum military cyberspace operations in order to enable actions in all domains
• Ensuring US/Allied freedom of action in cyberspace • Training at the centre
• Recent operations and lessons learned
Colonel Robert Morris,Director, 24 AF (AF CYBER) Air Component Coordination Element to US Cyber Command (USCYBERCOM)*
12:30 Update on the UK’s National Cyber Security Programme
• The UK’s National Cyber Crime Strategy
• The UK’s ability to detect and defend against cyber attacks from terrorists, states, and other hostile actors
• Emerging threat of cyber-attacks against Britain’s infrastructure • An insight into the UK Defence Cyber Operations Group
• Interoperability and collaboration with industry to address weaknesses in cyber security defence of critical infrastructure
• Cooperation in cyber security defence with the United States and other “like-minded nations”
Wing Commander Tom Parkhouse, Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
1:00 Networking Lunch
2:00 The Chinese Cyber Security Strategy
• Overview and insight into activities into Chinese Security Team • Cyber security, policies, standards and regulations in China • Underground economy on the Chinese cyber programme • The security landscape in China
Xundi Zhang, Founder, XFocus, China
2:30 Best Practice Cyber Defence, Based on Network Intelligence and Communications Metadata
• The challenges of government cyber defense • Detecting cyber threats by scanning traffic
• Using DPI & Network Intelligence to build a second line of cyber defense
• Examples of technical implementations
• Using communication metadata to detect suspicious traffic
Emmanuel Roger, Vice President Sales Asia Pacific & Japan,
Qosmos
3:00 Networking Coffee Break
STRATEGIES AND PROGRAMMES
3:30 Analysing Open Source Cyber Intelligence
• The importance of open source intelligence
• Information sharing among professionals involved in corporate security, information security, and the intelligence community
• Utilisation of open source data to protect physical assets and individuals • Identify sensitive information that has been compromised, malware,
phishing, identity theft, and related subject matter
Paul de Souza, Owner, Cyber Security Forum Initiative (CSFI)
4:00 Cloud Computing in Asia – An Introduction
• Regional issues of regulation and policy • Security infrastructure and awareness • Collaboration and innovation
Bernie Trudel, Chairman, Asia Cloud Computing Association
4:30 Cloud Reality – Dispelling the Myths
• The cold hard facts of cloud computing today • Defining the private cloud vs public vs hybrid • How secure is cloud?
Aloysius Cheang, APAC Strategy Advisor,Cloud Security Alliance
5:00 Conclusions and Key Talking Points from Day One
Michael Wilks, Regional Director, Public Safety and National Security APAC, Microsoft
5:15 Chairman’s Closing Remarks and Close of Day One
5:30 Networking Drinks Reception
Sponsored by
DAY TWO Thursday 10th November 2011
*subject to final confirmation
8:30 Registration and Coffee
9:00 Chairman's Opening Remarks
Wing Commander Tom Parkhouse,Cyber Security Strategy Staff Officer,
Ministry of Defence, UK
9:10 KEYNOTE ADDRESS
Australia’s Cyber Security Capabilities
• Coordinating operational responses to cyber events of national importance across government and critical infrastructure
• An overview of operations in the CSOC – Cyber Security Operations Centre
• Creating an integrated whole-of-government approach on cyber security
• Information Security (InfoSec) role
Michael Rothery, First Assistant Secretary, National Security Resilience Division, Australian Government
CYBER TERRORISM
9:50 PANEL DISCUSSION
What Constitutes Cyber Terrorism? Fact vs. Fiction
Chairman:
Michael Wilks, Regional Director, Public Safety and National Security APAC,Microsoft
Panellists:
Neelabh Rai, Independent Cyber Security Researcher,
Cyber Cops, India
Ammar Jaffri,Chief Executive,
Pakistan Information Security Association (PISA) Sazali Sukardi, Head, Strategic Policy Research,
CyberSecurity Malaysia
Iftekharul Bashar, Senior Analyst, International Centre for Political Violence and Terrorism Research, Singapore
Major (Ret’d) Manik M Jolly, Commander Cyber Security Cell,
Indian Army
10:50 Networking Coffee Break
11:20 Cyber Cops at the Crossroads of Cyber Hypnotism and Cyber Warfare – Indian Perspective
• An overview of the Indian Cyber Cops
• Cyber terrorism in India – Tackling the asymmetric threat • Comprehensive Online Proactive Security
• Liberty is the price of vigilance
Neelabh Rai,Independent Cyber Security Researcher,
Cyber Cops, India
11:50 Cyber Warfare and Pakistan – An Operational Assessment
• The cyber security programme in Pakistan • The internet as a tool for radicalisation • Organisational set up to counter the threat
• The Facebook explosion in Pakistan – Terrorist threats and implications • Understanding the challenges and overcoming them
• Lessons learned and aims for the future
Ammar Jaffri,Chief Executive, Pakistan Information Security Association (PISA)
12:20 The Cyber Defence Cell in Malaysia
• The current cyber security threat in Malaysia • Terrorism vs. Cyber terrorism
• Malaysia’s critical national information infrastructure • The use of ICT and cyberspace by terrorist
Sazali Sukardi, Head, Strategic Policy & Research Department,
CyberSecurity Malaysia
12:50 Networking Lunch
1:50 The Facebook Jihad - Radicalisation through Social Networking
• A social network for jihad?
• The newest face of terrorist and extremist use of the internet • The potential for misuse
• Cyber radicalisation vs. Social networking • The Power of Facebook
• Facing the new challenge
Iftekharul Bashar,Senior Analyst,International Centre for Political Violence and Terrorism Research, Singapore
2:20 Social Engineering – Context and Update
• Meaning and implications in current scenario • Threat as a victim
• Advantages as a user • Corporate lessons to be learnt
• Successful cases with modus operandi explained in detail
Major (Ret’d) Manik M Jolly,Commander Cyber Security Cell,
Indian Army
2:50 Networking Coffee Break
PROTECTING CRITICAL NATIONAL INFRASTRUCTURE
3:10 Stuxnet Cometh: Defence Agencies Prepare for Next Generation Warfare
• The first recognised cyber weapon
• Designed to target critical national infrastructure
• Operating through external Programmable Logic Controllers (PLCs) • Operational case studies – Attacks against Iran, Russia and Kazakhstan • Identifying the perpetrators
• A new era in which cyber warfare is no longer theoretical and action and discussion is vital to ensure the protection of critical infrastructure on a global scale
Speaker Details to be Announced
3:40 The Possible Risks and Protection needed for Smart Grid Communication
• Advance Smart Security Research and Development • Gaining access to grid-controlling networks
• Intelligence required: HUMINT (human intelligence), IMINT (imagery intelligence), SIGINT (signals intelligence) and MASINT (measurement and signature intelligence)
• Countering the threat - A strong intelligence presence inside our critical infrastructure systems
Dr Goh Shen Tat, Assistant Department Head, Cryptography and Security Research Group, Institute for Infocomm Research (I2R), Agency for Science Technology and Research (A*STAR), Singapore
4:10 Chairman's Closing Remarks and Close of Conference
Cyber Games and the Operational Application
to Cyber Security
About your workshop leaders:
Colonel (Ret’d) Marc Jamison
graduated from
Texas A&M and was commissioned into the USAF.
He is a combat aviator, having flown the B-52 and
B-1 bombers. Col Jamison is a USAF weapon school
graduate and has led multiple divisions in Air
Operations Centers. He holds 4 Master degrees to
include one from the School of Advanced Air and
Space Studies and the US Army War College.
Recently, he was the Director of Operations for
Joint Functional Component Command Network
Warfare, Director of Future Operations and Chief
of Modeling and Simulation for US CYBER
Command.
Paul de Souza
is the Founder/President/Director of
CSFI (Cyber Security Forum Initiative) and its
divisions CSFI-CWD (Cyber Warfare Division) and
CSFI-LPD (Law and Policy Division). CSFI is a
non-profit organization with headquarters in Omaha,
NE and offices in the DC area. Paul has over 12
years of cyber security experience and has worked
as a Chief Security Engineer for AT&T where he
designed and approved secure networks for MSS.
Paul has also consulted for several governments,
military and private institutions on best network
security practices and cyber warfare capabilities,
leading a group of more than 9000 cyber security
professionals.
In association with:
Preparing for the Next Cyber Attack…
POST-CONFERENCE WORKSHOP B 11TH NOVEMBER 2011
In association with:
PRE-CONFERENCE WORKSHOP A 8TH NOVEMBER 2011
In association with:
Benefits of Attending:
• Recognise how information systems can be subjected to
cyber attacks and the impact of these attacks on
government services, economy and social aspects of society
• Enhance your knowledge of potential security controls or
countermeasures that can be implemented to mitigate the
risk of a potential cyber attack
• Be aware of the actions that can be performed once a
system is compromised
Benefits of Attending:
This hands-on interactive workshop is designed to help
the audience members understand the value of cyber
games and how to develop a customized cyber games
program in their organizations. The workshop will give
the attendees the ability to follow a cyber games
framework, which can greatly improve the cyber
security posture of any organization or cyber command.
Programme
08.30
Registration and Coffee
09.00
History of war games
09.30
Definitions and differences between an
exercise, training, war game, etc.
10.00
History of cyber games
10.30
Morning Coffee
11.00
Definitions and differences between cyber
games, cyber exercises, etc.
12.00
Current cyber games platforms and the
applicability to organizations
13.00
Networking Lunch
14.00
Creating a cyber game culture (boosting
hands-on skills of your IT security team)
15.00
Cyber games operations and framework
(hands-on group exercise)
15.30
Afternoon Tea
16.00
US Department of Defense and NATO cyber
games initiatives
16.30
Q & A sessions
17.00
Close of Workshop
Why Attend this Workshop?
• Learn about how to protect critical information
systems and network infrastructure from cyber attacks
and fully understand which can be launched against
the industrial control systems used to protect critical
infrastructure
• See how cyber attacks are launched against critical
information systems and network infrastructure
• Understand how to apply technical and administrative
controls to mitigate critical systems and networks
from future attacks
Workshop Key Objectives:
• Analyse the key aspects of the cyber security as it
relates to protection, detection, respond and recovery
• Discuss how cyber attackers exploit current system
vulnerabilities
• Review what Microsoft and other vendors have done
to identify and attempt to prevent cyber attacks on
systems
• Evaluate various administrative and technical security
controls that can be used to mitigate future cyber
attacks
8:30
Registration and Coffee
9:00
Session 1
10:30 Networking Coffee Break
11:00 Session 2
12:30 Networking Lunch Break
1:30
Session 3
3:00
Networking Coffee Break
3:30
Session 4
5:00
Q&A
5:30
Close of Workshop
Microsoft
provides software and services that help people communicate, do their work, be
entertained, and manage their personal lives. Over the past 30 years, innovative technology has
transformed how we access and share information, changed the way businesses and institutions
operate, and made the whole smaller by giving us instant access to people and resources
everywhere. Microsoft works closely with public and private sector partners throughout Asia
Pacific to help enterprise customers, governments, educational institutions and nongovernmental
bodies meet business, social and economic challenges and realize the potential of their
organizations and their people. Our commitment to the region is reflected by the thousands of
developers, resellers, independent software vendors, and small and medium-sized enterprises
whose goals for growth and greater business efficiency has been made possible by Microsoft
technology.
www.microsoft.com
The Cyber Security Forum Initiative (CSFI)
is a non-profit organization headquartered in Omaha,
NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and
security solutions through collaboration, education, volunteer work, and training to assist the US
Government, US Military, Commercial Interests, and International Partners." CSFI was born out of
the collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly
5000 Cyber Security and Cyber Warfare professionals from the government, military, private sector,
and academia. Our amazing members are the core of all of our activities, and it is for them that
we are pushing forward our mission.
www.csfi.us
The Agency for Science, Technology and Research (A*STAR)
is the lead agency for fostering
world-class scientific research and talent for a vibrant knowledge-based and innovation-driven
Singapore. A*STAR supports Singapore's key economic clusters by providing intellectual, human
and industrial capital to its partners in industry. It also supports extramural research in the
universities, hospitals, research centres, and with other local and international partners.
www.a-star.edu.sg
Conference and Exhibition Supported By:
Lead Sponsor:
Conference Knowledge
Partners:
If you have any further queries please call the Events Team on tel +65 66 4990 95/+65 66 4990 96 or you can email them at events@smi-online.sg
CYBER SECURITY ASIA
Conference: 9th – 10th November 2011, Grand Copthorne Waterfront Hotel, Singapore Workshops: 8th & 11th November 2011
4 WAYS TO REGISTER
ONLINE at www.cybersecurity-asia.com
☎
+65 664 990 95/96 or +44 (0) 870 9090 711
Email: events@smi-online.sg FAX your booking form to +65 664 990 94 or +44 (0) 870 9090 712
GROUP AND REGIONAL DISCOUNTS ARE AVAILABLE FOR
SERVING MILITARY, GOVERNMENT AND PUBLIC SECTOR
Payment: Payments must be made with the order.
Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates may not ‘share’ a place at an event. Please make separate bookings for each delegate.
Cancellation: If you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a S$100 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept cancellations of orders placed for Documentation or the Document Portal as these are reproduced specifically to order. If we have to cancel the event for any reason, then we will make a full refund immediately, but disclaim any further liability.
Alterations: It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme.
Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to tell you about other products and services. Unless you tick here □we may also share your data with third parties offering complementary products or services. If you have any queries or want to update any of the data that we hold then please contact our Database Manager databasemanager@smi-online.co.uk or visit our website www.smi-online.co.uk/updates quoting the URN as detailed above your address on the attached letter.
Unique Reference Number
Our Reference LV SGS-001
Terms and Conditions of Booking
DELEGATE DETAILS
Please complete fully and clearly in capital letters. Please photocopy for additional delegates. Title: Forename: Surname: Job Title: Department/Division: Company/Organisation: Email: Address: Town/City:
Post/Zip Code: Country: Direct Tel: Direct Fax: Mobile:
Switchboard:
Signature: Date:
I agree to be bound by SMi's Terms and Conditions of Booking. ACCOUNTS DEPT
Title: Forename: Surname:
Email:
Address (if different from above):
Town/City:
Post/Zip Code: Country: Direct Tel: Direct Fax:
CARD PAYMENT ONLY - TO BE RECEIVED WITH THE ORDER.
An invoice will be supplied for your records on receipt of the order/payment.
Please fill in your credit card details below:
□
Visa
□
MasterCard
□
American Express
All credit card payments will be subject to standard credit card charges.
Card No:
□□□□ □□□□ □□□□ □□□□
Valid From
□□
/
□□
Expiry Date
□□
/
□□
CVV Number
□□□□
3 digit security on reverse of card, 4 digits for AMEX cardCardholder’s Name:
Signature:
Date:
I agree to be bound by SMi's Terms and Conditions of Booking.
Card Billing Address
(If different from above):
CONFERENCE PRICES
DOCUMENTATION
(Shipped 10-14 days after the event)
I cannot attend but would like to purchase access to the following Document
Portal/paper copy documentation:
Price
Total
□
Access to the conference documentation
on the Document Portal
s$999
+VAT
S$1198.80
□
The Conference Presentations - paper copy
s$999
(or only S$300 if ordered with the Document Portal)
PAYMENT
VENUE
Grand Copthorne Waterfront Hotel, 392 Havelock Road, Singapore 169663Book your accommodation at SMi discounted rates by calling the hotel directly
on tel: +65 67330880, Fax: +65 67378880 email: enquiry@grandcopthorne.com.sg
and make sure to refer to your attendance at this conference.
NON SINGAPORE SINGAPORE CLIENTS CLIENTS INCLUDING VAT
MILITARY, GOVERNMENT & PUBLIC SECTOR RATE
□
Conference & Interactive Workshop A and B S$2897 S$3100□
Conference & Interactive Workshop A S$2198 S$2352□
Conference & Interactive Workshop B S$2198 S$2352□
Conference only S$1499 S$1604□
Interactive Workshop A only S$699 S$748□
Interactive Workshop B only S$699 S$748 COMMERCIAL ORGANISATIONS□
Conference & Interactive Workshop A and B S$5497 S$5882□
Conference & Interactive Workshop A S$4298 S$4599□
Conference & Interactive Workshop B S$4298 S$4599□
Conference only S$3099 S$3316□
Interactive Workshop A only S$1199 S$1283□
Interactive Workshop B only S$1199 S$1283 PROMOTIONAL LITERATURE DISTRIBUTION□
Distribution of your company’s promotionalliterature to all conference attendees S$1999 S$2139 The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations.