You are on page 1of 4

DRAFT PROGRAMME

Cyber Warfare India 2011


Advancing Joint Cooperation and Integration in Cyber Warfare Systems to Strengthen Cyber Defence Capabilities
Tue 1st - Wed 2nd November
Location: To Be Confirmed, New Delhi

Conference Day One: Tuesday 1st


Developing Collaborative Strategies for Integrated Cyber Defence
Chairman's Welcome Brigadier General A Basu, Director of Cyber Warfare, HQ Integrated Defence Staff (IDS), Indian Armed Forces Honorary Keynote Placing Cyber Warfare as a Defence Priority INVITED: A K Anthony, Minister of Defence or INVITED: M M Pallam Raju, Minister of State for Defence IDS: Cyber Defence Integration Ensuring a Fully Integrated and interoperable Cyber Defense Across the Indian Armed Forces The organizational structure of the Joint Staff and IDS. Current concerns surrounding Cyber Attack and Exploit threats. Integrating Cyber Defense capabilities throughout the Armed Forces. Ensuring coordinated reaction and retaliation strategies for cyber-infiltration. Defining the aims and requirements for Indian Armed Forces cyber defense in the next 5 years. UNDER DISCUSSION: Admiral Nirmal Virma, Chief, HQ Integrated Defence Staff (IDS), Indian Armed Forces

DRDO - Developing Cyber Warfare Capabilities Advancing Cyber Defense Technologies Alongside an Evolving Threat Current concerns surrounding Cyber Attack and Cyber Exploit threats. Ensuring cooperation on and integration of Cyber Warfare systems between the scientific, military and civilian sectors. DRDO timelines and plans for Cyber Warfare technology development. INVITED: Dr. V K Sarasawat, Director, Defense Research and Development Organization (DRDO) US INSCOM: Information Warfare Ensuring Security Cyber Defence Strategies Against Information Warfare Considering current trends in information warfare. The impact of disinformation strategies in and beyond current military operations. Protecting communication networks from advanced jamming and hijacking capabilities. Ensuring failsafe firewalls for highly integrated logistic networks. The future of information operations, in a time of rapidly evolving Cyber Warfare capabilities. INVITED: Senior Representative, US Army Intelligence & Security Command (US INSCOM) US: Coordinating National Network Protection Protecting Critical Data from Online Intrusions and Viral Attacks Playing Catch-Up: understanding Cyber Security strategies as a continual reaction to newly-advancing threats. Integrating Developing secure network servers for critical data storage.

DRAFT PROGRAMME
Generating computer networks capable of automatic detection and blocking of cyber intrusions. Considering INVITED: Senior Representative, Cybersecurity Coordination (DCC), Department of Homeland Security (DHS) UK: Addressing Current Threats Addressing Growing Threats in Cyberspace a UK Military Perspective Why are cyber threats growing The nature of the threats The UK Military strategy integrated with the cross Governmental strategy Issues for policy makers CONFIRMED: Group Captain Jonathan Burr, Deputy Director, Cyber Policy & Plans, UK Armed Forces Germany: National Cyber Defense Strategies German Priorities for Cyber Defence The future strategic approach for the German government and defence cyber capabilities. Threat intelligence gathering and effectively anticipating attacks. Moving from a fortress mindset to a doctrine of defence in depth. INVITED: Lieutenant Colonel Volker Wetzler, Head of Cyber Security, German Ministry of Defence NATO: Policy and Legal Issues Ensuring Legitimate, Legal Responses to Cyber Attacks Addressing the need to clarify the legality of cyber warfare Establishing the legal parameters of cyber warfare within the existing laws governing armed conflict Responding to incidents of cyber attack: ensuring proportionality and legitimacy of response (NATO or EU?) INVITED: Senior Representative, NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) India: Cyber Security Auditing Processes Strengthening Cyber Defence Capabilities through Regular Auditing Processes The requirements for Cyber Security auditing in relation to current cyber threat levels. Evolving technologies and strategies for Cyber Auditing. Ensuring joint coherence strategies between Indian military and government's Critical Infrastructures. Prioritising information network defence for the Indian Armed Forces: the future policy of the ACSE. TO BE INVITED: Senior Representative, Army Cyber Security Establishment (ACSE) France: National Cyber Security Strategies Integrating Government Cyber Defence Mechanisms Alongside Wider National Cyber Cooperation Strategies Developing a strong operational center and defence mechanisms for integrated governmental cyber defence Ensuring rapid detection of and reaction to cyber attacks Strengthening industrial product development through cooperation and collaboration on cyber requirements Developing integrated advisory strategies and support for Critical Infrastructure INVITED: Mr. Patrick Pailloux, Director General, French Network and Information Security Agency (ANSSI) Saudi Arabia - Cyber Defence for C4I Ensuring Secure Cyber Defence Strategies for Integrated C4I Systems Developing integrated C4I systems across national military forces. Considering current threat risks for C4I and low-level comms systems. Considering fallback measures for potential cyber attack intrusion. Prioritizing known threats in addressing the issues of attribution. INVITED: Major General Dr. Hamed Al Yousefi, Director, MODA C4I Project, Ministry of Defence and Aviation US PACOM: Regional Cyber Oversight

DRAFT PROGRAMME
Strengthening National Cyber Defences in the Pacific Region through Multi-National Defence Strategies Current threat trends within the Pacific Region. Ensuring proactive prevention of national Cyber Attacks through sharing of network and security capabilities. Strengthening joint capabilities through joint defence agreements and coherence policies. Benefits of creating a defined cyber response strategy between nations. INVITED: Senior Representative, US Pacific Command (US PACOM) Difficulties in orchestrating inter-service and inter-national CERT architectures. timelines for action and future consequences of failing to develop a coherent joint policy for emergency readiness capabilities. INVITED: Senior Representative, Department of National Defence, Canada US: Multi-Nationally Integrated CERTs Considering New Architectures Available for Joint International CERT Capabilities Necessity of CERTs in line with current regional cyber threats Advantages of developing joint CERT capabilities in the Pacific Region Difficulties in orchestrating inter-service and inter-national CERT architectures. Timelines for action and future consequences of failing to develop a coherent joint policy for emergency readiness capabilities. CONFIRMED: John Bumgarner, Chief Technology Officer, US Cyber Consequences Unit UK: Centralising Cyber Command Structures Creating a Centralised Framework for National Governmental and Military Cyber Warfare Capabilities Predicting the threats faced by UK Cyber Defence in the next 3 years. Considering the new UK strategies for integrating military and governmental Cyber Command Capabilities. Securing collaborative governmental and military procedural policies for coordinated defence and retaliation. Considering the technical requirements for large-scale integration of Cyber Defense networks. INVITED: Paul Killworth, Head of Cyber Strategy, GCHQ Europe: CERTs Successfully Establishing a National Military CERT Capability: RCERT Europe Case Study The challenges of establishing a national military CERT - Establishing areas of responsibility and activity within the public sector - Ensuring effective co-ordination of activities

Conference Day Two: Wednesday 2nd


Future Technological Requirements and Capabilities for Cyber Security
India: National Strategic Defence Priorities Keynote Speech: The Requirements and Future Plans for Information Security in the Indian Armed Forces TO BE INVITED: Senior Representative, National Security Council IDS: Cyber Defence Technology Future Procurement Imperatives for Regional Cyber Warfare Capabilities The challenges of establishing integrated interservice Cyber Defence capabilities Requirements for interoperability between cyber security hardware Developing centralised coherence practices and integrated operating systems. Ensuring effective training and retention of an advanced military cyber force TO BE INVITED: Senior Representative, HQ Integrated Defense Staff (IDS), Indian Armed Forces Canada: Multi-Nationally Integrated CERTs Considering New Architectures Available for Joint International CERT Capabilities Necessity of CERTs in line with current regional cyber threats Advantages of developing joint CERT capabilities in the Pacific Region

DRAFT PROGRAMME
- Fostering co-operations between the public private cyber divide - Recruiting, training and retaining a military cyber force Protecting the US Armys networks from cyber attack - Network monitoring, threat detection and response to attacks Exploring the future of US Army cyber response capabilities TO BE INVITED: Michael Boyer, Director, RCERT Europe, US ARMY EU: Cloud Computing Cloud Computing: Security and Resilience Capabilities Adapting civilian practices and systems for military application. Assessing the impact of moving to the cloud - The risks - The Information assurance framework - Maturity models The implications of cloud computing for information security and resilience Developing cloud computing across services and national borders. Connecting cloud computing with internal national cyber structures and systems Capabilities in line with multi-tier cyber threats. TO BE INVITED: Senior Representative, European Defence Agency Norway: Indentifying Sites of Attack Strengthening Prevention of Cyber Attack and Exploit through the Identification of Vulnerabilities and Potential Sites of Attack Network analysis and how it can identify potential nodes of intrusion and attack - Application of game theory and formulaic models to cyber networks Resilience studies as helping to identify weak points in critical information infrastructure Design principles of covert networks and how they can aid defence against a cyber attack TO BE INVITED: Roy Lindelauf, Researcher, Netherlands Defence Academy Panel Discussion Ensuring Coordinated Cyber Responses Through the Establishment of Coordinated Cyber Policies TO BE INVITED: - Senior Representative, HQ Integrated Defence Staff (IDS), Indian Armed Forces - Senior Representative, US Cyber Command - Senior Representative, NATO Information Assurance Technical Center - Senior Representative, Emerging Security Challenges Division, NATO Half Day Workshop 14.00 - 17.30 Predicting and Mitigating Against the Chinese Cyber Warfare Threat Session 1: Defining the nature and intent of a Chinese cyber threat: - History of threats - History of cooperation - Specific examples and case studies of PLA cyber attack methods Session 2: Chinese Cyber Organization Structures: - PLA Cyber Command Org Structures - PLA cooperation with industry: Huawei, ZTE and Venus Session 3: the 8 Pillars of the PLA Cyber Strategy, and its Key Targets: - Critical National Infrastructures - Energy Industries - DoD Cyber Targets - System infiltration and data exfiltration - Firewall infiltration - Advancing IP exodus Session 4 / Conclusion: Identifying targets of attack and structuring cyber defense planning and attack detection in line with PLA Cyber Warfare Strategies. CONFIRMED Workshop leader: Lieutenant Colonel William Hagestad II, Force Movement Control, US MARINE CORPS ABOUT THE SPEAKER: Lieutenant Colonel Hagestad has a Bachelor of Arts in Mandarin Chinese and Masters of Science in the Management Of Technology Computer Engineering in Security Technologie. Enlisting in the United States Marine Corps in 1981 and having served in numerous command posts, in 2009 Lieutenant Colonel Hagestad was reassigned to MarForPac, Camp H.M. Smith as the Force Movement Control Officer in the G-4 section.

You might also like