SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
www.cyberwarfare-europe.com
Distinguished Speakers:
Brigadier General John Davis, Director of Current Operations,
US Cyber Command
Wing Commander Chris Stace, CIS Directorate (Policy &
Requirements), European Union Military Staff, EUROPEAN
EXTERNAL ACTION SERVICE
Colonel (GS) Gerald Vernez, Deputy Director of Cyber Defence,
SWISS DEPARTMENT OF DEFENSE
Lieutenant Colonel Chris Barrington-Brown, Land Information
Assurance Group (LIAG), BRITISH ARMY
Lieutenant Colonel Tupper, Commanding Officer, Canadian
Forces Network Operations Centre
Lieutenant Colonel William Hagestad II, Force Movement
Control, US MARINE CORPS
Lieutenant Colonel Volker Wetzler, Head of Cyber Security,
GERMAN MOD
Lieutenant Colonel Brian Cook, Director of Operations, 39th
Information Operations Squadron, USAF
Lieutenant Colonel Andreas Ulrich, Operations Officer, NATO
INFORMATION ASSURANCE TECHNICAL CENTRE
Dr Harald Niggemann, Department 1: Security of Applications,
Critical Infrastructures and Networks, GERMAN FEDERAL
OFFICE FOR INFORMATION SECURITY (BSI)
Heli Tiirmaa-Klaar, Cyber Defence Section, Emerging Security
Challenges Division, NATO
Kristin Mørkestøl, Senior Adviser, Department of Security Policy,
NORWEGIAN MOD
Dr. Steve Purser, Head of Technical and Competence
Department, EUROPEAN NETWORK AND INFORMATION
SECURITY AGENCY
Michael Boyer, Director, RCERT Europe, US ARMY
Rain Ottis, Scientist, NATO COOPERATIVE CYBER DEFENCE
CENTRE OF EXCELLENCE
Christopher Richardson, Lecturer, Defence College of
Communications & Information Systems, UK MOD
Eneken Tikk, Legal Advisor, NATO COOPERATIVE CYBER
DEFENCE CENTRE OF EXCELLENCE (NATO CCD COE)
Roy Lindelauf, Researcher, NETHERLANDS DEFENCE
ACADEMY
Professor Thomas C. Wingfield, Professor of International Law,
MARSHALL CENTER
Defence IQ Presents Book & pay by 3rd June and SAVE UP TO €450
Venue: Berlin Marriott Hotel, Germany
Pre-conference Focus Day: 26th September 2011
Main Conference: 27th – 28th September 2011
Post-conference Seminar: 29th September 2011
Attending Cyber Warfare 			
Europe 2011 Will Allow You To:
Hear and meet senior European military officers responsible for
newly announced cyber strategies including the Head of Cyber
Security at the German MoD and Deputy Director of Cyber Defence
for the Swiss Department of Defence.
Keep informed of the real cyber threats facing military networks,
methods of attack and denial by leading practitioners. PLUS Check
out the post-conference seminar on the Chinese Cyber Threat with
the US Marine Corps
Understand global developments in cyber warfare; with
presentations on building a ‘cyber force,’ civil – military cyber
coordination and coordination efforts, clarifying the current legal
status of cyber operations and the emerging ‘rules of engagement’
for cyber warfare practitioners. SEE our pre-conference workshop
on ‘Building the Cyber Force.’
Building on the success
of Defence IQ’s Cyber
Warfare London in
January, with over 150
military and defence
industry delegates from
across the globe.
Pre-conference Focus Day:
Building the Cyber Force
08.30 – 14.40 26th September
Join this exclusive pre-conference
focus day to examine the key issues
faced by armed forces globally in
building an effective ‘cyber force’ and
the strategies to bridge the human
capability gap in cyber warfare
and Information Assurance (IA)
practitioners. See page 2 for more
details.
Post-conference Seminar:
Chinese Cyber Threat
07.30 – 17.00 29th September
China has emerged as one of the
global hubs for cyber warfare and
is believed to be the source of a
multitude of cyber attacks targeting
both the public and private sectors
of Western nations. Take part in this
revealing seminar to cut through the
disinformation and assess the real
cyber threat posed by China.
See page 2 for more details.
‘The IQPC Cyber Warfare Event in Berlin will be a fantastic event to liaise
with international defence and intelligence colleagues, share ideas and
learn from another. My anticipation in attending and participating in the
event is eclipsed by the level of professionalism and knowledge that will
be available to everyone who registers and participates’
Lieutenant Colonel William Hagestad II, Force Movement
Control, US MARINE CORPS
E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
Dear Colleague,
As you well know, cyberspace has established itself as the 5th domain of
warfare. As the threats from individual hackers, organised crime, terrorist
groups and rival governments proliferate, so western militaries (particularly
in Europe) are looking to build their cyber warfare capabilities and implement
the best cyber defence possible to counter these. As newly allocated cyber
budgets fly against the wind of recent defence cuts, it is crucial that this
money be spent wisely to protect against the real threats, using the most
effective strategies and the correct solutions.
Cyber Warfare Europe 2011 will give you the unique opportunity to discuss
these issues and more, with military cyber strategists, decision makers
and practitioners globally, to ensure your cyber warfare capabilities are as
current as possible.
I look forward to meeting you in Berlin.
Best regards,
Sam Collard – Conference Producer, Cyber Warfare Europe 2011
	
	
Pre-conference Focus Day ‘
Building the Cyber Force
26th September 08.30-14.40
Post-conference Seminar: ‘
Analysing the Chinese Cyber
Warfare Threat – Full Day
Seminar 29th September 07.30-17.00
The end of the 20th century and start of the 21st has seen the creation of a 5th domain
in warfare – cyber warfare. Incidents of highly organised cyber attack in Estonia, Georgia
and Iran among many others have prompted armed forces globally to assess their own
cyber warfare capabilities and those of their potential adversaries, to ensure they remain
as prepared as possible for any and all threats. Whilst China is hailed as a global ‘hub’
for cyber warfare and held responsible for a host of attacks by the media, armed forces
globally still lack a thorough and educated understanding of the real Chinese cyber warfare
threat.
Attend this highly current full-day seminar to better understand the real cyber threat from
China and how to prepare your cyber defences accordingly.
Topics covered in the session include:
•	 Definition of the Chinese cyber threat
•	 Organization of China’s PLA Cyber Command, key personalities
•	 The 8 Pillars of the PLA’s Cyber Warfare Strategy - mapping East to West
•	 Specific case studies of cyber attacks by the PLA
•	 Interests and Intent of the PLA Cyber Command
 
Benefits of attending:
 •	In-depth look at how the Chinese value history, the art of war and can inculcate 	
	 information dominance
•	 Understand the nature and intent of the Chinese cyber threat for cyber force planning
•	 Analyse the symptoms of Chinese cyber attacks with real-world case studies to 	
	 enhance your attack detection capabilities
•	 Identify potential targets of attack to help establish pro-active cyber defences 		
	 moving forward
Seminar leader: Lieutenant Colonel William Hagestad II, Force Movement Control,
US MARINE CORPS
ABOUT THE SPEAKER:
Lieutenant Colonel Hagestad has a Bachelor of Arts in Mandarin Chinese, with minor emphasis in
Classical Chinese and Modern Japanese and a Master’s of Science in the Management Of Technology
from the Carlson School of Management, University of Minnesota; he will be receiving a second Master’s
of Science from the College of Computer Engineering in Security Technologies in 2011. Enlisting in the
United States Marine Corps in 1981 and having served in numerous command posts, in 2009 Lieutenant
Colonel Hagestad was reassigned to MarForPac, Camp H.M. Smith as the Force Movement Control Officer
in the G-4 section. His personal decorations in the Navy include the Achievement Medal with Gold Star,
the Navy Commendation Medal, the Operation Iraqi Freedom Medal with single campaign star and the
Selected Marine Corps Reserve Medal with 4 stars.
07.30 	 Coffee and Registration
08.00 	 Introductions
08.20 	Review Programme Agenda
08.30 	 Session 1 - Defining the Chinese Cyber Threat
	 •	History of threats
	 •	History of cooperation
	 •	Recent examples
10.00 	 Break
10.10 	 Session 2 - Organization of the People’s Liberation Army (PLA) Cyber 	
	Attack Command
12.00 	 Working Lunch
	 Session 3 - 8 Pillars of the PLA’s Cyber Warfare Strategy
13.00 	 Break
13.15 	 Session 4 - Specific examples & case studies of cyber-attack 	
	 methodologies used by the PLA
	 •	Operation Night Dragon
	 • Operation Aurora
	 • Wordpress DDoS
	 • Paris G-20 data exfiltration
14.00 	 Session 5 – Interests and intent of PLA Cyber Command
	 • Critical Infrastructure surface & gaps exploitation
	 • Energy industry – oil, gas & electricity
	 • Industry infiltration or data exfiltration?
	 • Commercial IP exodus
	 • DoD cyber-target
	 • Facebook the Chinese Financial Trojan Horse
	 • Huawei – Enemy in our firewall
	 • ZTE – firsthand look
16.00 	 Break
16.10 	 Conclusions
16.40 	Recommendations & Next Steps
SPONSORSHIP OPPORTUNITIES
3 easy ways to get involved
1) Thought Leadership: With an expected audience of senior military customers
and decision-makers from across the globe, Defence IQ events enable you to
build your reputation as a market-leader and to position yourself as an innovative
thought-leader in your chosen domain through speaking sessions and subject-
specific conference streams, workshops and focus days.
2) Branding: We bring together buyers and suppliers in a tailored location with
unbeatable facilities for onsite branding and exposure. Furthermore, our dedicated
marketing team can help you achieve your promotional aims in the months
leading up to the conference with dedicated mailings to cover 50,000 contacts,
through brochure drops, extensive email campaigns and tailored web coverage.
3) Featured Networking Events: Focused and high level, our events will
provide you with the perfect environment to initiate new business relationships
and achieve the face-to-face contact that overcrowded trade shows cannot
deliver. Sponsorship opportunities range from exhibition stands to sponsored
lunches, cocktail receptions, gala dinners and a host of informal social networking
events. For further details, or to discuss which option is best for your
organisation, please call +44 (0) 207 368 9300 or Email:
defence@iqpc.co.uk
www.cyberwarfare-europe.com
Join Defence IQ for this exclusive focus day, designed to solve the challenges facing
armed forces in recruiting, building, training and maintaining their cyber forces
and the Information Assurance (IA) practitioners of tomorrow. With case studies and
expert insights from the US Army, NATO, USAF and UK MoD, this day will arm you
with the information to help build your human cyber capability moving forward.
08.30 Coffee & Registration
09.00 Chairman’s Welcome & Opening Speech
09.10 Successfully Establishing a National Military CERT Capability: RCERT
Europe Case Study
Michael Boyer, Director, RCERT Europe, US ARMY
09.50 Augmenting the Cyber Force: Building A Cyber Capability
Rain Ottis, Scientist, NATO COOPERATIVE CYBER DEFENCE CENTRE OF
EXCELLENCE
10.30 Morning Coffee Break
11.00 Establishing a Training Environment for Public Sector Cyber Security
Dr Harald Niggemann, Department 1: Security of Applications, Critical Infrastructures
and Networks, GERMAN FEDERAL OFFICE FOR INFORMATION SECURITY (BSI)
11.40 Building a Cyber Operations Community: Cyber Training in the 39th
Information Operations Squadron (39 IOS)
Lieutenant Colonel Brian Cook, Director of Operations, 39th Information Operations
Squadron, USAF
12.20 Lunch
13.20 Filling the Human Capability Gap in Information Assurance: Educating
the IA Practitioners of Tomorrow
Christopher Richardson, Lecturer, Defence College of Communications & Information
Systems,  UK MOD
14.00 Building the Cyber Force: The Major Challenges Ahead and Ensuring
Successful Human Capability Building
14.40 Chairman’s Closing Remarks & End of Focus Day
E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
MAIN CONFERENCE DAY ONE:
27TH SEPTEMBER 2011
08.30 	 Coffee & Registration
09.00 	 Chairman’s Welcome & Opening Speech
09.10 	 Keynote: Cyber Defence in the German 	Armed 		
	 Forces
	 •	The future strategic approach for the German government 	 	
		 and defence cyber capabilities
	 •	Threat intelligence gathering and effectively anticipating 	 	
		 attacks
	 •	Moving from a ‘fortress’ mindset to a doctrine of 	 	
		 ‘defence in depth’
	 Lieutenant Colonel Volker Wetzler, Head of Cyber 		
	 Security, GERMAN MOD (pending final confirmation)
09.50 	 KEYNOTE: Security and Resilience in 			
	 Governmental Clouds: Making an Informed 		
	 Decision
	 •	Introduction to ENISA
	 •	Assessing the impact of moving to the cloud
		 	 The risks
		 	 The Information assurance framework
		 	 Maturity models
	 •	The implications of cloud computing for information 	 	
		 security and resilience
	 •	Incorporating the cloud service delivery model into 	 	
		 national and international CIIP strategies
	 Dr. Steve Purser, Head of Technical and Competence 		
	 Department, EUROPEAN NETWORK AND 			
	 INFORMATION SECURITY AGENCY
10.30 	 Coffee & Networking Break
	End Point Solutions Focus Session
11.00 	EU Military Staff Cyber Defence Strategy and 		
	Requirements: Getting the Balance Right to 		
	Meet the Challenge
	 •EU Crisis Management Operations within cyberspace.
	 •Understanding and responding to capability challenges.
	 •Current cyber defence activity within European External 	 	
		 Action Service.
	 •Using a risk management approach:
		 	 Define the risk (threat/vulnerability assessment)
		 	 Mitigate the risk (people, procedures and technology)
	 Wing Commander Chris Stace, CIS Directorate
	 (Policy & Requirements), European Union Military Staff, 		
	 EUROPEAN EXTERNAL ACTION SERVICE
11.40 	 Pragmatic management of Cyber Operations 		
	Across the Public and Private Sectors
	 •	UK Cyber Operations: understanding the whole situation
	 •Operating across a broad spectrum: Managing the Public – 	
		 Private sector boundaries
	 •	Effective management of resource:  Targeting for effect
	 •Operational Lessons learnt
	 Lieutenant Colonel Chris Barrington-Brown, Land 		
	 Information Assurance Group (LIAG),BRITISH ARMY
12.20 	 Lunch
	 Vulnerability Assessment & Simulation 		
	 Solution Focus Session
13.20 	 Clarifying the Legality of Cyber Conflict and 	
	 Creating a Legal Framework for International 	
	 Cyber Security
	 •	Addressing the need to clarify the legality of cyber warfare
	 •	Establishing the legal parameters of cyber warfare within the 	
	 	 existing laws governing armed conflict
	 •	Responding to incidents of cyber attack: ensuring 	 	
	 	 proportionality and legitimacy of response (NATO or EU?)
	 Eneken Tikk, Legal Advisor, NATO COOPERATIVE CYBER 		
	 DEFENCE CENTRE OF EXCELLENCE (NATO CCD COE)
14.00 	 The Law of Information Conflict: Establishing 	
	Rules of Engagement in Cyberspace
	 •	Governing cyber conflict as the 5th dimension of war
	 •	Adapting the Geneva and Hague conventions to deal with a 	
		 21st century issue
	 •	Protecting essential civilian cyber facilities from attack
	 Professor Thomas C. Wingfield, Professor of International 	
	 Law, MARSHALL CENTER
14.40 	 Coffee & Networking Break
15.10 	 Cyber Defence and the Need for Broad Cooperation
	 •	Overview of the Norwegian approach to cyber defence
	 •	The need for broad cooperation I: cooperation between 	 	
	 	 civilian and military actors in Norway
	 •	The need for broad cooperation II: a suggestion on how to 		
		 cooperate between the public and private sector at the 		
		 national level
	Kristin Mørkestøl, Senior Adviser, Department of Security 		
	 Policy, NORWEGIAN MOD
15.50 	Maximising Cyber Resources Through Effective 		
	Military – Government Co-operation & Co-		
	 ordination: Discussion Session
	 Due to the scarce nature of cyber security resources (both 		
	 technical and human) and tight budgets, smaller European 		
	 nations need to effectively co-ordinate their efforts between 		
	 the military and civilian government sectors, to maximise 	 	
	 the resources they have and enhance efficiency by avoiding 		
	 duplication of efforts. This session will analyse how 		
	 nations are currently co-coordinating their CERT teams and 		
	 other vital capabilities and discuss best practices and lessons 	
	 learnt. Panel will include:
	 Lieutenant Colonel Volker Wetzler, Head of Cyber Security, 	
	 GERMAN MOD
	 Dr. Steve Purser, Head of Technical and Competence 		
	 Department, EUROPEAN NETWORK AND INFORMATION 		
	 SECURITY AGENCY
	 Wing Commander Chris Stace, CIS Directorate (Policy & 		
	 Requirements), European Union Military Staff, EUROPEAN 		
	EXTERNAL ACTION SERVICE
	Kristin Mørkestøl, Senior Adviser, Department of Security 		
	 Policy, NORWEGIAN MOD
16.30 	 Chairman’s Closing Remarks & End of Day One
www.cyberwarfare-europe.com
ABOUT DEFENCE IQ
Defenceiq.com is a global online community that provides high quality information regarding current military and defence issues. Defenceiq.
com offers thought leadership resources such as interviews, presentations, whitepapers, as well as online webinars and online events.
Join Defenceiq.com to get exclusive interviews and event presentations. You can also network with new contacts made on-site, find new
business opportunities and access strategic resources online. Sign up today at www.defenceiq.com
E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301
MAIN CONFERENCE DAY TWO:
28TH SEPTEMBER 2011
08.30 	 Coffee & Registration
09.00 	 Chairman’s Welcome & Opening Speech
09.10 	 KEYNOTE: The Threat of Cyber Warfare and the 	
	 Challenges Facing the US Cyber Command
	 •	Assessing the threats to military networks
	 •	The challenges and areas of focus for the US Cyber Command’s 	
	 	 Current Operations directorate
	 •	Future requirements and strategic development of the cyber 	
		 warfare effort
	 Brigadier General John Davis, Director of Current 		
	 Operations, US Cyber Command (subject to final 		
	confirmation)
09.50 	 From Reactive to Proactive: Shifting the Cyber 	
	 Defence Doctrine
	 •	Creating a comprehensive cyber defence strategy for a 	 	
	 	 small and neutral nation: what are we really facing here?
		 	 Identifying the threats through effective risk management 	
			 and threat intelligence gathering
		 	 Setting responses to deal with anticipated threats
		 	 Putting in place the means to identify and neutralise 		
			 cyber attackers in cooperation with national and 		
			 international selected partners
	 •	Overcoming the problem of human and technical resourcing 	
		 in a society producing a limited amount of IT and security 		
		 policy specialists
	 •	Role of the military in a national cyber defence construct
	 Colonel (GS) Gerald Vernez, Deputy Director of Cyber 		
	 Defence, SWISS DEPARTMENT OF DEFENSE
	 Intrusion Detection, Monitoring & Incident 		
	 Logging Solution Focus Session
10.30 	 Coffee & Networking Break
11.00 	 Building Effective International Cyber Crisis 		
	Response Capabilities
	 •	The role of NATO as a driver for international cyber defence 	
		 initiatives
	 •	Work of the NATO Information Assurance Technical Centre 		
	 	 (NIATC) and Computer Incident Response Capability 	 	
	 	 (NCIRC)
		 	 Incident detection, response and recovery
	 •	The challenge of delivering network security for operational 	
		 and peacetime operations - the Afghanistan Mission 		
	 	 Network
	 Lieutenant Colonel Andreas Ulrich, Operations Officer, 		
	 NATO INFORMATION ASSURANCE TECHNICAL CENTRE
11.40 	Exploring NATO’s New Cyber Policy
	 •	The current status of international cyber defence and the 	 	
	 	 role of NATO moving forward
	 •	Stage 1: Bringing NATO networks under central protection
	 •	Critical Information Infrastructure Protection (CIIP) for NATO 	
		 member countries
	 •	Fostering greater co-operation between international public 	
		 bodies and private – public partnerships on cyber issues
	 Heli Tiirmaa-Klaar, Cyber Defence Section, Emerging 		
	 Security Challenges Division, NATO
12.20 	 Lunch
	 Cyber Forensics, Interception & Ethical 		
	 Hacking Solution Focus Session
13.20 	Operating in Cyberspace: A US Fleet Cyber 		
	 Command / 10th Fleet Perspective
	 •	Understanding the Domain
	 •	Evolution of Maritime Operations & Organizational Culture
	 •	Challenges & Opportunities
	 Confirmed Representative, US FLEET CYBER 			
	 COMMAND
14.00 	Analysing the Capabilities, Intentions and 		
	Organisation of State Cyber Adversaries: 		
	 Discussion Session
	 This session will act as an open forum to discuss the nature 		
	 of the threat NATO militaries’ face from state adversaries in 	 	
	 the cyber realm. As armed forces globally continue to 		
	 militarise their cyber capabilities, it is vital to understand the 	
	 real threat this poses and the adequate responses. With input 	
	 from guest speakers, this session will be the perfect prelude 		
	 to our post-conference seminar Analysing the Chinese 		
	 Cyber Warfare Threat – see page 2 for details.
14.40 	 Coffee & Networking Break
15.10 	Exploring the Canadian Forces’ Cyber Defence 	
	Operations
	 •	The mission we aim to achieve and our partners we work with
	 •	Analysing the nature of the cyber threat faced by Canadian forces
	 •	Cyber defence operations currently underway within the 	 	
	 	 Canadian Forces. What lessons have been learnt?
	 Lieutenant Colonel Tupper, Commanding Officer, 		
	 Canadian Forces Network Operations Centre
15.50 	 Cyber War: A Network Design and Analysis 		
	 Perspective to Identify Vulnerabilities and 		
	 Potential Sites of Attack
	 •	Network analysis and how it can identify potential nodes of 	
		 intrusion and attack
		 	 Application of game theory and formulaic models to 		
			 cyber networks
	 •	Resilience studies as helping to identify weak points in 	 	
		 critical information infrastructure
	 •	Design principles of covert networks and how they can aid 	
		 defence against a cyber attack
	 Roy Lindelauf, Researcher, NETHERLANDS DEFENCE 		
	 ACADEMY
16.30 	 Chairman’s Closing Remarks & End of 			
	 Conference
www.cyberwarfare-europe.com
MEDIA PARTNERS
MoD
5 Ways to Register
Freephone:	 0800 652 2363 or
	 +44 (0)20 7368 9300
Fax: 	 +44 (0)20 7368 9301
Post: 	 your booking form to	
		IQPC, 129 Wilton Road,
	 Victoria, London,
	 SW1 V1JZ
Email: 	 defence@iqpc.co.uk
WEB: 	 www.CYBERWARFARE-EUROPE.com
IQPC recognises the value of learning in teams. Groups of 3 or more booking at the
same time from the same company receive a 10% discount, 5 or more receive a
15% discount, 7 receive a 20% discount. Only one discount available per person.
Team Discounts*
Total price for your Organisation: (Add total of all individuals attending):
Card Number: VISA 6 M/C 6 AMEX 6
6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
Exp. Date: 6 6 6 6 Sec: 6 6 6 6
Name On Card:				 Signature:
Billing Address (if different from below):
City/County/Postcode			 Cheque enclosed for: €		 (Made payable to IQPC Ltd.)
(Please quote 20438.001 with remittance advice)
IQPC Bank details: HSBC Bank Plc, 67 George Street, Richmond, Surrey, TW9 1HG, United Kingdom
Sort Code: 40 05 15 Account No: 59090618 IBAN Code: GB98 MIDL 4005 1559 0906 18
Swift Code: MIDLGB22 Account name: International Quality & Productivity Centre Ltd
Please photocopy for each additional delegate
6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other
Rank		 First Name 				 Family Name		
Job Title 				
Tel No.
Email
6 Yes I would like to receive information about products and services via email
Organisation
Nature of business
Address
Postcode Country
Telephone 					 Fax
Approving Manager
Name of person completing form if different from delegate:
Signature
I agree to IQPC’s cancellation, substitution and payment terms.
Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify)
Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6
Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking.
Delegate Details
Payment Method
Venue & Accommodation
Venue: Berlin Marriott Hotel, Inge-Beisheim-Platz 1, Berlin 10785, Germany
Tel: +49-30-220000
ACCOMMODATION: Travel and accommodation is not included in the
registration fee, however a number of discounted bedrooms have been
reserved at the Berlin Marriott Hotel. Please call the hotel directly on
Tel: +49-30-220000 and quote booking reference IQPC to receive your
discounted rate, prices start from €175 including taxes, but excluding
breakfast. There is limited availability so we do encourage attendees to book
early to avoid disappointment. Alternatively for a further selection of hotels,
please visit: www.4cityhotels.com/berlin.ht
To claim a variety of articles, podcasts and other free resources please visit
www.cyberwarfare-europe.com
Free Online Resources
A digital version of the conference proceedings, including all
presentations, is available to buy. 
6 	 I cannot attend the event, please send me the
	 CD Rom priced at £599 plus VAT
	 Recent digital conferences available - £599 +VAT each
6	 Cyber Security, May, Brussels
6	 Information Operations, June, London
6	 Network Centric Warfare Europe, June, Brussels
6 	 Please send me conference materials indicated above
6 	 I have filled out credit card details below
For further information Please call:
0207 368 9300 or email: knowledgebank@iqpc.co.uk
To search IQPC’s archived conference documentation visit:
www.iqpcknowledgebank.com
Digital Conference On CD-ROM
Terms and Conditions
Please read the information listed below as each booking is subject to IQPC Ltd standard terms
and conditions. Payment Terms: Upon completion and return of the registration form, full
payment is required no later than 5 business days from the date of invoice. Payment of invoices
by means other than by credit card, or purchase order (UK Plc and UK government bodies only)
will be subject to a €65 (plus VAT) per delegate processing fee. Payment must be received prior
to the conference date.We reserve the right to refuse admission to the conference if payment
has not been received. IQPC Cancellation, Postponement and Substitution Policy: You
may substitute delegates at any time by providing reasonable advance notice to IQPC. For any
cancellations received in writing not less than eight (8) days prior to the conference, you will
receive a 90% credit to be used at another IQPC conference which must occur within one year
from the date of issuance of such credit.An administration fee of 10% of the contract fee will
be retained by IQPC for all permitted cancellations. No credit will be issued for any cancellations
occurring within seven (7) days (inclusive) of the conference. In the event that IQPC cancels an
event for any reason, you will receive a credit for 100% of the contract fee paid.You may use
this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one
year from the date of cancellation. In the event that IQPC postpones an event for any reason and
the delegate is unable or unwilling to attend in on the rescheduled date, you will receive a credit
for 100% of the contract fee paid.You may use this credit for another IQPC event to be mutually
agreed with IQPC, which must occur within one year from the date of postponement. Except as
specified above, no credits will be issued for cancellations.There are no refunds given under
any circumstances. IQPC is not responsible for any loss or damage as a result of a substitution,
alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever in
the event this conference is cancelled, rescheduled or postponed due to a fortuitous event,Act
of God, unforeseen occurrence or any other event that renders performance of this conference
impracticable, illegal or impossible. For purposes of this clause, a fortuitous event shall include,
but not be limited to: war, fire, labour strike, extreme weather or other emergency. Please
note that while speakers and topics were confirmed at the time of publishing, circumstances
beyond the control of the organizers may necessitate substitutions, alterations or cancellations
of the speakers and/or topics.As such, IQPC reserves the right to alter or modify the advertised
speakers and/or topics if necessary without any liability to you whatsoever.Any substitutions
or alterations will be updated on our web page as soon as possible. Discounts: All ‘Early Bird’
Discounts require payment at time of registration and before the cut-off date in order to receive
any discount.Any discounts offered by IQPC (including team discounts) also require payment at
the time of registration. Discount offers cannot be combined with any other offer.
PAYMENT MUST BE RECEIVED PRIOR TO THE CONFERENCE
Conferencecode:20438.001
To speed registration, please provide the priority code located on the mailing label or in the box below.
My registration code
Please contact our database manager on +44(0) 207 368 9300 or database@iqpc.co.uk quoting the
registration code above to inform us of any changes or to remove your details.
* To qualify for discounts, payment must be received with booking by the registration deadline. Early booking discounts are not valid in conjunction
with any other offer.
** Military & Government discounted rates apply to serving military officers, government and university personnel only.
*** Please select your choice of focus day: Building the Cyber Force 6 Chinese Cyber Threat 6
German VAT is charged at 19%. VAT Registration #: DE 261 1019 14
Cyber Warfare
Europe 2011
Main Conference: 27th – 28th September
Focus Day: Pre-conference focus day: 26th September
Seminar: Post-conference seminar: 29th September
Venue: Berlin Marriott Hotel, Inge-Beisheim-Platz 1, Berlin, 10785 Germany
MILITARY / GOVERNMENT / PUBLIC SECTOR**
Book & Pay by
3rd June 2011*
Book & Pay by
15th July 2011*
Book & Pay by 2nd
September 2011*
Standard Price
Main Conference and 2
Focus Days
€899 + VAT
Save €748
€1099 + VAT
Save €548
€1349 + VAT
Save €298
€1549 + VAT
Save €98
Main Conference and 1
Focus Day ***
€649 + VAT
Save €599
€899 + VAT
Save €349
€999 + VAT
Save €249
€1150 + VAT
Save €98
Main Conference Only
€499 + VAT
Save €350
€649 + VAT
Save €200
€749 + VAT
Save €100
€849 + VAT
Each Focus Day***
€249 + VAT
Save €150
€299 + VAT
Save €100
€349 + VAT
Save €50
€399 + VAT
INDUSTRY RATE
Book & Pay by
3rd June 2011*
Book & Pay by
15th July 2011*
Book & Pay by 2nd
September 2011*
Standard Price
Main Conference and 2
Focus Days
€2699 + VAT
Save €1248
€3149 + VAT
Save €798
€3499 + VAT
Save €448
€3799 + VAT
Save €148
Main Conference and 1
Focus Day ***
€2149 + VAT
Save €899
€2449 + VAT
Save €599
€2699 + VAT
Save €349
€2799 + VAT
Save €249
Main Conference Only
€1699 + VAT
Save €450
€1899 + VAT
Save €250
€1999 + VAT
Save €150
€2149 + VAT
Each Focus Day***
€549 + VAT
Save €350
€649 + VAT
Save €250
€749 + VAT
Save €150
€899 + VAT

Weitere ähnliche Inhalte

Was ist angesagt?

Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.ravitaurus
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Bill Hagestad II
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
SMi Group's 13th annual Border Security 2020 conference
SMi Group's 13th annual Border Security 2020 conferenceSMi Group's 13th annual Border Security 2020 conference
SMi Group's 13th annual Border Security 2020 conferenceDale Butler
 
Llb ii pil u 4.3 treaties
Llb ii pil u 4.3 treatiesLlb ii pil u 4.3 treaties
Llb ii pil u 4.3 treatiesRai University
 
Ethnic airport security essay
Ethnic airport security essay Ethnic airport security essay
Ethnic airport security essay kaidora
 

Was ist angesagt? (9)

Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.
 
Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队Evolving chinese military cyber doctrine 中国网络战部队
Evolving chinese military cyber doctrine 中国网络战部队
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Exp r35
Exp r35Exp r35
Exp r35
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
SMi Group's 13th annual Border Security 2020 conference
SMi Group's 13th annual Border Security 2020 conferenceSMi Group's 13th annual Border Security 2020 conference
SMi Group's 13th annual Border Security 2020 conference
 
Llb ii pil u 4.3 treaties
Llb ii pil u 4.3 treatiesLlb ii pil u 4.3 treaties
Llb ii pil u 4.3 treaties
 
Donald william reid resume 7 17
Donald william reid resume 7 17Donald william reid resume 7 17
Donald william reid resume 7 17
 
Ethnic airport security essay
Ethnic airport security essay Ethnic airport security essay
Ethnic airport security essay
 

Andere mochten auch

Directed Energy Systems 2012
Directed Energy Systems 2012Directed Energy Systems 2012
Directed Energy Systems 2012Sharmin Ahammad
 
Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011Sharmin Ahammad
 
Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012Sharmin Ahammad
 
Submarine Operations & Requirements
Submarine Operations & RequirementsSubmarine Operations & Requirements
Submarine Operations & RequirementsSharmin Ahammad
 
Fra tilsnakk til medsnakk - HiBu og sosiale medier
Fra tilsnakk til medsnakk - HiBu og sosiale medierFra tilsnakk til medsnakk - HiBu og sosiale medier
Fra tilsnakk til medsnakk - HiBu og sosiale medierJan-Henrik Kulberg
 
Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010Sharmin Ahammad
 
Defence IQ's Social media in Defence Report 2012
Defence IQ's Social media in Defence Report 2012Defence IQ's Social media in Defence Report 2012
Defence IQ's Social media in Defence Report 2012Sharmin Ahammad
 
Air Power Middle East 2012
Air Power Middle East 2012Air Power Middle East 2012
Air Power Middle East 2012Sharmin Ahammad
 

Andere mochten auch (8)

Directed Energy Systems 2012
Directed Energy Systems 2012Directed Energy Systems 2012
Directed Energy Systems 2012
 
Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011Defence IQ Events Calendar 2011
Defence IQ Events Calendar 2011
 
Forward Operating Bases 2012
Forward Operating Bases 2012Forward Operating Bases 2012
Forward Operating Bases 2012
 
Submarine Operations & Requirements
Submarine Operations & RequirementsSubmarine Operations & Requirements
Submarine Operations & Requirements
 
Fra tilsnakk til medsnakk - HiBu og sosiale medier
Fra tilsnakk til medsnakk - HiBu og sosiale medierFra tilsnakk til medsnakk - HiBu og sosiale medier
Fra tilsnakk til medsnakk - HiBu og sosiale medier
 
Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010Infantry Weapons Sector Report 2010
Infantry Weapons Sector Report 2010
 
Defence IQ's Social media in Defence Report 2012
Defence IQ's Social media in Defence Report 2012Defence IQ's Social media in Defence Report 2012
Defence IQ's Social media in Defence Report 2012
 
Air Power Middle East 2012
Air Power Middle East 2012Air Power Middle East 2012
Air Power Middle East 2012
 

Ähnlich wie Cyber Warfare Europe 2011

Future Artillery 2011 Conference Brochure
Future Artillery 2011 Conference BrochureFuture Artillery 2011 Conference Brochure
Future Artillery 2011 Conference BrochureSharmin Ahammad
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012Sharmin Ahammad
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09Richard Stiennon
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceDale Butler
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015AFCEA International
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceJarno Limnéll
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategiesEyesOpen Association
 
Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016Jarno Limnéll
 
Final Asarc Brochure
Final Asarc BrochureFinal Asarc Brochure
Final Asarc Brochurephelimrowe
 
SMi Group's Network Centric Warfare 2020 conference
SMi Group's Network Centric Warfare 2020 conferenceSMi Group's Network Centric Warfare 2020 conference
SMi Group's Network Centric Warfare 2020 conferenceDale Butler
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Avirot Mitamura
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 

Ähnlich wie Cyber Warfare Europe 2011 (20)

IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]
 
Future Artillery 2011 Conference Brochure
Future Artillery 2011 Conference BrochureFuture Artillery 2011 Conference Brochure
Future Artillery 2011 Conference Brochure
 
Ht f42
Ht f42Ht f42
Ht f42
 
International Cyber Security 2012
International Cyber Security 2012International Cyber Security 2012
International Cyber Security 2012
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conference
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016Keynote Jarno Limnéll DSSITSEC2016
Keynote Jarno Limnéll DSSITSEC2016
 
Final Asarc Brochure
Final Asarc BrochureFinal Asarc Brochure
Final Asarc Brochure
 
SMi Group's Network Centric Warfare 2020 conference
SMi Group's Network Centric Warfare 2020 conferenceSMi Group's Network Centric Warfare 2020 conference
SMi Group's Network Centric Warfare 2020 conference
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 

Mehr von Sharmin Ahammad

Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...
Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...
Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...Sharmin Ahammad
 
Directed Energy Systems 2012: Joseph Skaja USAF
Directed Energy Systems 2012: Joseph Skaja USAFDirected Energy Systems 2012: Joseph Skaja USAF
Directed Energy Systems 2012: Joseph Skaja USAFSharmin Ahammad
 
Armoured Vehicles India Market Report 2012 - 2022
Armoured Vehicles India Market Report 2012 - 2022Armoured Vehicles India Market Report 2012 - 2022
Armoured Vehicles India Market Report 2012 - 2022Sharmin Ahammad
 
Airborne Early Warning and Battle Management
Airborne Early Warning and Battle ManagementAirborne Early Warning and Battle Management
Airborne Early Warning and Battle ManagementSharmin Ahammad
 
Defence Logistics Europe 2011
Defence Logistics Europe 2011Defence Logistics Europe 2011
Defence Logistics Europe 2011Sharmin Ahammad
 

Mehr von Sharmin Ahammad (8)

Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...
Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...
Recent Developments and Current Projects in HEL Technology: Harro Ackermann -...
 
Directed Energy Systems 2012: Joseph Skaja USAF
Directed Energy Systems 2012: Joseph Skaja USAFDirected Energy Systems 2012: Joseph Skaja USAF
Directed Energy Systems 2012: Joseph Skaja USAF
 
Armoured Vehicles India Market Report 2012 - 2022
Armoured Vehicles India Market Report 2012 - 2022Armoured Vehicles India Market Report 2012 - 2022
Armoured Vehicles India Market Report 2012 - 2022
 
Airborne ISR 2012
Airborne ISR 2012Airborne ISR 2012
Airborne ISR 2012
 
Airborne Early Warning and Battle Management
Airborne Early Warning and Battle ManagementAirborne Early Warning and Battle Management
Airborne Early Warning and Battle Management
 
Defence Logistics Europe 2011
Defence Logistics Europe 2011Defence Logistics Europe 2011
Defence Logistics Europe 2011
 
CBRN Resilience 2011
CBRN Resilience 2011CBRN Resilience 2011
CBRN Resilience 2011
 
Defence Logistics UAE
Defence Logistics UAEDefence Logistics UAE
Defence Logistics UAE
 

Cyber Warfare Europe 2011

  • 1. E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301 www.cyberwarfare-europe.com Distinguished Speakers: Brigadier General John Davis, Director of Current Operations, US Cyber Command Wing Commander Chris Stace, CIS Directorate (Policy & Requirements), European Union Military Staff, EUROPEAN EXTERNAL ACTION SERVICE Colonel (GS) Gerald Vernez, Deputy Director of Cyber Defence, SWISS DEPARTMENT OF DEFENSE Lieutenant Colonel Chris Barrington-Brown, Land Information Assurance Group (LIAG), BRITISH ARMY Lieutenant Colonel Tupper, Commanding Officer, Canadian Forces Network Operations Centre Lieutenant Colonel William Hagestad II, Force Movement Control, US MARINE CORPS Lieutenant Colonel Volker Wetzler, Head of Cyber Security, GERMAN MOD Lieutenant Colonel Brian Cook, Director of Operations, 39th Information Operations Squadron, USAF Lieutenant Colonel Andreas Ulrich, Operations Officer, NATO INFORMATION ASSURANCE TECHNICAL CENTRE Dr Harald Niggemann, Department 1: Security of Applications, Critical Infrastructures and Networks, GERMAN FEDERAL OFFICE FOR INFORMATION SECURITY (BSI) Heli Tiirmaa-Klaar, Cyber Defence Section, Emerging Security Challenges Division, NATO Kristin Mørkestøl, Senior Adviser, Department of Security Policy, NORWEGIAN MOD Dr. Steve Purser, Head of Technical and Competence Department, EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY Michael Boyer, Director, RCERT Europe, US ARMY Rain Ottis, Scientist, NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE Christopher Richardson, Lecturer, Defence College of Communications & Information Systems, UK MOD Eneken Tikk, Legal Advisor, NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE (NATO CCD COE) Roy Lindelauf, Researcher, NETHERLANDS DEFENCE ACADEMY Professor Thomas C. Wingfield, Professor of International Law, MARSHALL CENTER Defence IQ Presents Book & pay by 3rd June and SAVE UP TO €450 Venue: Berlin Marriott Hotel, Germany Pre-conference Focus Day: 26th September 2011 Main Conference: 27th – 28th September 2011 Post-conference Seminar: 29th September 2011 Attending Cyber Warfare Europe 2011 Will Allow You To: Hear and meet senior European military officers responsible for newly announced cyber strategies including the Head of Cyber Security at the German MoD and Deputy Director of Cyber Defence for the Swiss Department of Defence. Keep informed of the real cyber threats facing military networks, methods of attack and denial by leading practitioners. PLUS Check out the post-conference seminar on the Chinese Cyber Threat with the US Marine Corps Understand global developments in cyber warfare; with presentations on building a ‘cyber force,’ civil – military cyber coordination and coordination efforts, clarifying the current legal status of cyber operations and the emerging ‘rules of engagement’ for cyber warfare practitioners. SEE our pre-conference workshop on ‘Building the Cyber Force.’ Building on the success of Defence IQ’s Cyber Warfare London in January, with over 150 military and defence industry delegates from across the globe. Pre-conference Focus Day: Building the Cyber Force 08.30 – 14.40 26th September Join this exclusive pre-conference focus day to examine the key issues faced by armed forces globally in building an effective ‘cyber force’ and the strategies to bridge the human capability gap in cyber warfare and Information Assurance (IA) practitioners. See page 2 for more details. Post-conference Seminar: Chinese Cyber Threat 07.30 – 17.00 29th September China has emerged as one of the global hubs for cyber warfare and is believed to be the source of a multitude of cyber attacks targeting both the public and private sectors of Western nations. Take part in this revealing seminar to cut through the disinformation and assess the real cyber threat posed by China. See page 2 for more details. ‘The IQPC Cyber Warfare Event in Berlin will be a fantastic event to liaise with international defence and intelligence colleagues, share ideas and learn from another. My anticipation in attending and participating in the event is eclipsed by the level of professionalism and knowledge that will be available to everyone who registers and participates’ Lieutenant Colonel William Hagestad II, Force Movement Control, US MARINE CORPS
  • 2. E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301 Dear Colleague, As you well know, cyberspace has established itself as the 5th domain of warfare. As the threats from individual hackers, organised crime, terrorist groups and rival governments proliferate, so western militaries (particularly in Europe) are looking to build their cyber warfare capabilities and implement the best cyber defence possible to counter these. As newly allocated cyber budgets fly against the wind of recent defence cuts, it is crucial that this money be spent wisely to protect against the real threats, using the most effective strategies and the correct solutions. Cyber Warfare Europe 2011 will give you the unique opportunity to discuss these issues and more, with military cyber strategists, decision makers and practitioners globally, to ensure your cyber warfare capabilities are as current as possible. I look forward to meeting you in Berlin. Best regards, Sam Collard – Conference Producer, Cyber Warfare Europe 2011 Pre-conference Focus Day ‘ Building the Cyber Force 26th September 08.30-14.40 Post-conference Seminar: ‘ Analysing the Chinese Cyber Warfare Threat – Full Day Seminar 29th September 07.30-17.00 The end of the 20th century and start of the 21st has seen the creation of a 5th domain in warfare – cyber warfare. Incidents of highly organised cyber attack in Estonia, Georgia and Iran among many others have prompted armed forces globally to assess their own cyber warfare capabilities and those of their potential adversaries, to ensure they remain as prepared as possible for any and all threats. Whilst China is hailed as a global ‘hub’ for cyber warfare and held responsible for a host of attacks by the media, armed forces globally still lack a thorough and educated understanding of the real Chinese cyber warfare threat. Attend this highly current full-day seminar to better understand the real cyber threat from China and how to prepare your cyber defences accordingly. Topics covered in the session include: • Definition of the Chinese cyber threat • Organization of China’s PLA Cyber Command, key personalities • The 8 Pillars of the PLA’s Cyber Warfare Strategy - mapping East to West • Specific case studies of cyber attacks by the PLA • Interests and Intent of the PLA Cyber Command   Benefits of attending:  • In-depth look at how the Chinese value history, the art of war and can inculcate information dominance • Understand the nature and intent of the Chinese cyber threat for cyber force planning • Analyse the symptoms of Chinese cyber attacks with real-world case studies to enhance your attack detection capabilities • Identify potential targets of attack to help establish pro-active cyber defences moving forward Seminar leader: Lieutenant Colonel William Hagestad II, Force Movement Control, US MARINE CORPS ABOUT THE SPEAKER: Lieutenant Colonel Hagestad has a Bachelor of Arts in Mandarin Chinese, with minor emphasis in Classical Chinese and Modern Japanese and a Master’s of Science in the Management Of Technology from the Carlson School of Management, University of Minnesota; he will be receiving a second Master’s of Science from the College of Computer Engineering in Security Technologies in 2011. Enlisting in the United States Marine Corps in 1981 and having served in numerous command posts, in 2009 Lieutenant Colonel Hagestad was reassigned to MarForPac, Camp H.M. Smith as the Force Movement Control Officer in the G-4 section. His personal decorations in the Navy include the Achievement Medal with Gold Star, the Navy Commendation Medal, the Operation Iraqi Freedom Medal with single campaign star and the Selected Marine Corps Reserve Medal with 4 stars. 07.30 Coffee and Registration 08.00 Introductions 08.20 Review Programme Agenda 08.30 Session 1 - Defining the Chinese Cyber Threat • History of threats • History of cooperation • Recent examples 10.00 Break 10.10 Session 2 - Organization of the People’s Liberation Army (PLA) Cyber Attack Command 12.00 Working Lunch Session 3 - 8 Pillars of the PLA’s Cyber Warfare Strategy 13.00 Break 13.15 Session 4 - Specific examples & case studies of cyber-attack methodologies used by the PLA • Operation Night Dragon • Operation Aurora • Wordpress DDoS • Paris G-20 data exfiltration 14.00 Session 5 – Interests and intent of PLA Cyber Command • Critical Infrastructure surface & gaps exploitation • Energy industry – oil, gas & electricity • Industry infiltration or data exfiltration? • Commercial IP exodus • DoD cyber-target • Facebook the Chinese Financial Trojan Horse • Huawei – Enemy in our firewall • ZTE – firsthand look 16.00 Break 16.10 Conclusions 16.40 Recommendations & Next Steps SPONSORSHIP OPPORTUNITIES 3 easy ways to get involved 1) Thought Leadership: With an expected audience of senior military customers and decision-makers from across the globe, Defence IQ events enable you to build your reputation as a market-leader and to position yourself as an innovative thought-leader in your chosen domain through speaking sessions and subject- specific conference streams, workshops and focus days. 2) Branding: We bring together buyers and suppliers in a tailored location with unbeatable facilities for onsite branding and exposure. Furthermore, our dedicated marketing team can help you achieve your promotional aims in the months leading up to the conference with dedicated mailings to cover 50,000 contacts, through brochure drops, extensive email campaigns and tailored web coverage. 3) Featured Networking Events: Focused and high level, our events will provide you with the perfect environment to initiate new business relationships and achieve the face-to-face contact that overcrowded trade shows cannot deliver. Sponsorship opportunities range from exhibition stands to sponsored lunches, cocktail receptions, gala dinners and a host of informal social networking events. For further details, or to discuss which option is best for your organisation, please call +44 (0) 207 368 9300 or Email: defence@iqpc.co.uk www.cyberwarfare-europe.com Join Defence IQ for this exclusive focus day, designed to solve the challenges facing armed forces in recruiting, building, training and maintaining their cyber forces and the Information Assurance (IA) practitioners of tomorrow. With case studies and expert insights from the US Army, NATO, USAF and UK MoD, this day will arm you with the information to help build your human cyber capability moving forward. 08.30 Coffee & Registration 09.00 Chairman’s Welcome & Opening Speech 09.10 Successfully Establishing a National Military CERT Capability: RCERT Europe Case Study Michael Boyer, Director, RCERT Europe, US ARMY 09.50 Augmenting the Cyber Force: Building A Cyber Capability Rain Ottis, Scientist, NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE 10.30 Morning Coffee Break 11.00 Establishing a Training Environment for Public Sector Cyber Security Dr Harald Niggemann, Department 1: Security of Applications, Critical Infrastructures and Networks, GERMAN FEDERAL OFFICE FOR INFORMATION SECURITY (BSI) 11.40 Building a Cyber Operations Community: Cyber Training in the 39th Information Operations Squadron (39 IOS) Lieutenant Colonel Brian Cook, Director of Operations, 39th Information Operations Squadron, USAF 12.20 Lunch 13.20 Filling the Human Capability Gap in Information Assurance: Educating the IA Practitioners of Tomorrow Christopher Richardson, Lecturer, Defence College of Communications & Information Systems, UK MOD 14.00 Building the Cyber Force: The Major Challenges Ahead and Ensuring Successful Human Capability Building 14.40 Chairman’s Closing Remarks & End of Focus Day
  • 3. E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301 MAIN CONFERENCE DAY ONE: 27TH SEPTEMBER 2011 08.30 Coffee & Registration 09.00 Chairman’s Welcome & Opening Speech 09.10 Keynote: Cyber Defence in the German Armed Forces • The future strategic approach for the German government and defence cyber capabilities • Threat intelligence gathering and effectively anticipating attacks • Moving from a ‘fortress’ mindset to a doctrine of ‘defence in depth’ Lieutenant Colonel Volker Wetzler, Head of Cyber Security, GERMAN MOD (pending final confirmation) 09.50 KEYNOTE: Security and Resilience in Governmental Clouds: Making an Informed Decision • Introduction to ENISA • Assessing the impact of moving to the cloud The risks The Information assurance framework Maturity models • The implications of cloud computing for information security and resilience • Incorporating the cloud service delivery model into national and international CIIP strategies Dr. Steve Purser, Head of Technical and Competence Department, EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY 10.30 Coffee & Networking Break End Point Solutions Focus Session 11.00 EU Military Staff Cyber Defence Strategy and Requirements: Getting the Balance Right to Meet the Challenge •EU Crisis Management Operations within cyberspace. •Understanding and responding to capability challenges. •Current cyber defence activity within European External Action Service. •Using a risk management approach: Define the risk (threat/vulnerability assessment) Mitigate the risk (people, procedures and technology) Wing Commander Chris Stace, CIS Directorate (Policy & Requirements), European Union Military Staff, EUROPEAN EXTERNAL ACTION SERVICE 11.40 Pragmatic management of Cyber Operations Across the Public and Private Sectors • UK Cyber Operations: understanding the whole situation •Operating across a broad spectrum: Managing the Public – Private sector boundaries • Effective management of resource: Targeting for effect •Operational Lessons learnt Lieutenant Colonel Chris Barrington-Brown, Land Information Assurance Group (LIAG),BRITISH ARMY 12.20 Lunch Vulnerability Assessment & Simulation Solution Focus Session 13.20 Clarifying the Legality of Cyber Conflict and Creating a Legal Framework for International Cyber Security • Addressing the need to clarify the legality of cyber warfare • Establishing the legal parameters of cyber warfare within the existing laws governing armed conflict • Responding to incidents of cyber attack: ensuring proportionality and legitimacy of response (NATO or EU?) Eneken Tikk, Legal Advisor, NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE (NATO CCD COE) 14.00 The Law of Information Conflict: Establishing Rules of Engagement in Cyberspace • Governing cyber conflict as the 5th dimension of war • Adapting the Geneva and Hague conventions to deal with a 21st century issue • Protecting essential civilian cyber facilities from attack Professor Thomas C. Wingfield, Professor of International Law, MARSHALL CENTER 14.40 Coffee & Networking Break 15.10 Cyber Defence and the Need for Broad Cooperation • Overview of the Norwegian approach to cyber defence • The need for broad cooperation I: cooperation between civilian and military actors in Norway • The need for broad cooperation II: a suggestion on how to cooperate between the public and private sector at the national level Kristin Mørkestøl, Senior Adviser, Department of Security Policy, NORWEGIAN MOD 15.50 Maximising Cyber Resources Through Effective Military – Government Co-operation & Co- ordination: Discussion Session Due to the scarce nature of cyber security resources (both technical and human) and tight budgets, smaller European nations need to effectively co-ordinate their efforts between the military and civilian government sectors, to maximise the resources they have and enhance efficiency by avoiding duplication of efforts. This session will analyse how nations are currently co-coordinating their CERT teams and other vital capabilities and discuss best practices and lessons learnt. Panel will include: Lieutenant Colonel Volker Wetzler, Head of Cyber Security, GERMAN MOD Dr. Steve Purser, Head of Technical and Competence Department, EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY Wing Commander Chris Stace, CIS Directorate (Policy & Requirements), European Union Military Staff, EUROPEAN EXTERNAL ACTION SERVICE Kristin Mørkestøl, Senior Adviser, Department of Security Policy, NORWEGIAN MOD 16.30 Chairman’s Closing Remarks & End of Day One www.cyberwarfare-europe.com ABOUT DEFENCE IQ Defenceiq.com is a global online community that provides high quality information regarding current military and defence issues. Defenceiq. com offers thought leadership resources such as interviews, presentations, whitepapers, as well as online webinars and online events. Join Defenceiq.com to get exclusive interviews and event presentations. You can also network with new contacts made on-site, find new business opportunities and access strategic resources online. Sign up today at www.defenceiq.com
  • 4. E: defence@iqpc.co.uk T: +44 (0)20 7368 9300 F: +44 (0)20 7368 9301 MAIN CONFERENCE DAY TWO: 28TH SEPTEMBER 2011 08.30 Coffee & Registration 09.00 Chairman’s Welcome & Opening Speech 09.10 KEYNOTE: The Threat of Cyber Warfare and the Challenges Facing the US Cyber Command • Assessing the threats to military networks • The challenges and areas of focus for the US Cyber Command’s Current Operations directorate • Future requirements and strategic development of the cyber warfare effort Brigadier General John Davis, Director of Current Operations, US Cyber Command (subject to final confirmation) 09.50 From Reactive to Proactive: Shifting the Cyber Defence Doctrine • Creating a comprehensive cyber defence strategy for a small and neutral nation: what are we really facing here? Identifying the threats through effective risk management and threat intelligence gathering Setting responses to deal with anticipated threats Putting in place the means to identify and neutralise cyber attackers in cooperation with national and international selected partners • Overcoming the problem of human and technical resourcing in a society producing a limited amount of IT and security policy specialists • Role of the military in a national cyber defence construct Colonel (GS) Gerald Vernez, Deputy Director of Cyber Defence, SWISS DEPARTMENT OF DEFENSE Intrusion Detection, Monitoring & Incident Logging Solution Focus Session 10.30 Coffee & Networking Break 11.00 Building Effective International Cyber Crisis Response Capabilities • The role of NATO as a driver for international cyber defence initiatives • Work of the NATO Information Assurance Technical Centre (NIATC) and Computer Incident Response Capability (NCIRC) Incident detection, response and recovery • The challenge of delivering network security for operational and peacetime operations - the Afghanistan Mission Network Lieutenant Colonel Andreas Ulrich, Operations Officer, NATO INFORMATION ASSURANCE TECHNICAL CENTRE 11.40 Exploring NATO’s New Cyber Policy • The current status of international cyber defence and the role of NATO moving forward • Stage 1: Bringing NATO networks under central protection • Critical Information Infrastructure Protection (CIIP) for NATO member countries • Fostering greater co-operation between international public bodies and private – public partnerships on cyber issues Heli Tiirmaa-Klaar, Cyber Defence Section, Emerging Security Challenges Division, NATO 12.20 Lunch Cyber Forensics, Interception & Ethical Hacking Solution Focus Session 13.20 Operating in Cyberspace: A US Fleet Cyber Command / 10th Fleet Perspective • Understanding the Domain • Evolution of Maritime Operations & Organizational Culture • Challenges & Opportunities Confirmed Representative, US FLEET CYBER COMMAND 14.00 Analysing the Capabilities, Intentions and Organisation of State Cyber Adversaries: Discussion Session This session will act as an open forum to discuss the nature of the threat NATO militaries’ face from state adversaries in the cyber realm. As armed forces globally continue to militarise their cyber capabilities, it is vital to understand the real threat this poses and the adequate responses. With input from guest speakers, this session will be the perfect prelude to our post-conference seminar Analysing the Chinese Cyber Warfare Threat – see page 2 for details. 14.40 Coffee & Networking Break 15.10 Exploring the Canadian Forces’ Cyber Defence Operations • The mission we aim to achieve and our partners we work with • Analysing the nature of the cyber threat faced by Canadian forces • Cyber defence operations currently underway within the Canadian Forces. What lessons have been learnt? Lieutenant Colonel Tupper, Commanding Officer, Canadian Forces Network Operations Centre 15.50 Cyber War: A Network Design and Analysis Perspective to Identify Vulnerabilities and Potential Sites of Attack • Network analysis and how it can identify potential nodes of intrusion and attack Application of game theory and formulaic models to cyber networks • Resilience studies as helping to identify weak points in critical information infrastructure • Design principles of covert networks and how they can aid defence against a cyber attack Roy Lindelauf, Researcher, NETHERLANDS DEFENCE ACADEMY 16.30 Chairman’s Closing Remarks & End of Conference www.cyberwarfare-europe.com MEDIA PARTNERS MoD
  • 5. 5 Ways to Register Freephone: 0800 652 2363 or +44 (0)20 7368 9300 Fax: +44 (0)20 7368 9301 Post: your booking form to IQPC, 129 Wilton Road, Victoria, London, SW1 V1JZ Email: defence@iqpc.co.uk WEB: www.CYBERWARFARE-EUROPE.com IQPC recognises the value of learning in teams. Groups of 3 or more booking at the same time from the same company receive a 10% discount, 5 or more receive a 15% discount, 7 receive a 20% discount. Only one discount available per person. Team Discounts* Total price for your Organisation: (Add total of all individuals attending): Card Number: VISA 6 M/C 6 AMEX 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 Exp. Date: 6 6 6 6 Sec: 6 6 6 6 Name On Card: Signature: Billing Address (if different from below): City/County/Postcode Cheque enclosed for: € (Made payable to IQPC Ltd.) (Please quote 20438.001 with remittance advice) IQPC Bank details: HSBC Bank Plc, 67 George Street, Richmond, Surrey, TW9 1HG, United Kingdom Sort Code: 40 05 15 Account No: 59090618 IBAN Code: GB98 MIDL 4005 1559 0906 18 Swift Code: MIDLGB22 Account name: International Quality & Productivity Centre Ltd Please photocopy for each additional delegate 6 Mr 6 Mrs 6 Miss 6 Ms 6 Dr 6 Other Rank First Name Family Name Job Title Tel No. Email 6 Yes I would like to receive information about products and services via email Organisation Nature of business Address Postcode Country Telephone Fax Approving Manager Name of person completing form if different from delegate: Signature I agree to IQPC’s cancellation, substitution and payment terms. Special dietary requirements: 6 Vegetarian 6 Non-dairy 6 Other (please specify) Please indicate if you have already registered by Phone 6 Fax 6 Email 6 Web 6 Please note: if you have not received an acknowledgement before the conference, please call us to confirm your booking. Delegate Details Payment Method Venue & Accommodation Venue: Berlin Marriott Hotel, Inge-Beisheim-Platz 1, Berlin 10785, Germany Tel: +49-30-220000 ACCOMMODATION: Travel and accommodation is not included in the registration fee, however a number of discounted bedrooms have been reserved at the Berlin Marriott Hotel. Please call the hotel directly on Tel: +49-30-220000 and quote booking reference IQPC to receive your discounted rate, prices start from €175 including taxes, but excluding breakfast. There is limited availability so we do encourage attendees to book early to avoid disappointment. Alternatively for a further selection of hotels, please visit: www.4cityhotels.com/berlin.ht To claim a variety of articles, podcasts and other free resources please visit www.cyberwarfare-europe.com Free Online Resources A digital version of the conference proceedings, including all presentations, is available to buy.  6 I cannot attend the event, please send me the CD Rom priced at £599 plus VAT Recent digital conferences available - £599 +VAT each 6 Cyber Security, May, Brussels 6 Information Operations, June, London 6 Network Centric Warfare Europe, June, Brussels 6 Please send me conference materials indicated above 6 I have filled out credit card details below For further information Please call: 0207 368 9300 or email: knowledgebank@iqpc.co.uk To search IQPC’s archived conference documentation visit: www.iqpcknowledgebank.com Digital Conference On CD-ROM Terms and Conditions Please read the information listed below as each booking is subject to IQPC Ltd standard terms and conditions. Payment Terms: Upon completion and return of the registration form, full payment is required no later than 5 business days from the date of invoice. Payment of invoices by means other than by credit card, or purchase order (UK Plc and UK government bodies only) will be subject to a €65 (plus VAT) per delegate processing fee. Payment must be received prior to the conference date.We reserve the right to refuse admission to the conference if payment has not been received. IQPC Cancellation, Postponement and Substitution Policy: You may substitute delegates at any time by providing reasonable advance notice to IQPC. For any cancellations received in writing not less than eight (8) days prior to the conference, you will receive a 90% credit to be used at another IQPC conference which must occur within one year from the date of issuance of such credit.An administration fee of 10% of the contract fee will be retained by IQPC for all permitted cancellations. No credit will be issued for any cancellations occurring within seven (7) days (inclusive) of the conference. In the event that IQPC cancels an event for any reason, you will receive a credit for 100% of the contract fee paid.You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of cancellation. In the event that IQPC postpones an event for any reason and the delegate is unable or unwilling to attend in on the rescheduled date, you will receive a credit for 100% of the contract fee paid.You may use this credit for another IQPC event to be mutually agreed with IQPC, which must occur within one year from the date of postponement. Except as specified above, no credits will be issued for cancellations.There are no refunds given under any circumstances. IQPC is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/postponement of an event. IQPC shall assume no liability whatsoever in the event this conference is cancelled, rescheduled or postponed due to a fortuitous event,Act of God, unforeseen occurrence or any other event that renders performance of this conference impracticable, illegal or impossible. For purposes of this clause, a fortuitous event shall include, but not be limited to: war, fire, labour strike, extreme weather or other emergency. Please note that while speakers and topics were confirmed at the time of publishing, circumstances beyond the control of the organizers may necessitate substitutions, alterations or cancellations of the speakers and/or topics.As such, IQPC reserves the right to alter or modify the advertised speakers and/or topics if necessary without any liability to you whatsoever.Any substitutions or alterations will be updated on our web page as soon as possible. Discounts: All ‘Early Bird’ Discounts require payment at time of registration and before the cut-off date in order to receive any discount.Any discounts offered by IQPC (including team discounts) also require payment at the time of registration. Discount offers cannot be combined with any other offer. PAYMENT MUST BE RECEIVED PRIOR TO THE CONFERENCE Conferencecode:20438.001 To speed registration, please provide the priority code located on the mailing label or in the box below. My registration code Please contact our database manager on +44(0) 207 368 9300 or database@iqpc.co.uk quoting the registration code above to inform us of any changes or to remove your details. * To qualify for discounts, payment must be received with booking by the registration deadline. Early booking discounts are not valid in conjunction with any other offer. ** Military & Government discounted rates apply to serving military officers, government and university personnel only. *** Please select your choice of focus day: Building the Cyber Force 6 Chinese Cyber Threat 6 German VAT is charged at 19%. VAT Registration #: DE 261 1019 14 Cyber Warfare Europe 2011 Main Conference: 27th – 28th September Focus Day: Pre-conference focus day: 26th September Seminar: Post-conference seminar: 29th September Venue: Berlin Marriott Hotel, Inge-Beisheim-Platz 1, Berlin, 10785 Germany MILITARY / GOVERNMENT / PUBLIC SECTOR** Book & Pay by 3rd June 2011* Book & Pay by 15th July 2011* Book & Pay by 2nd September 2011* Standard Price Main Conference and 2 Focus Days €899 + VAT Save €748 €1099 + VAT Save €548 €1349 + VAT Save €298 €1549 + VAT Save €98 Main Conference and 1 Focus Day *** €649 + VAT Save €599 €899 + VAT Save €349 €999 + VAT Save €249 €1150 + VAT Save €98 Main Conference Only €499 + VAT Save €350 €649 + VAT Save €200 €749 + VAT Save €100 €849 + VAT Each Focus Day*** €249 + VAT Save €150 €299 + VAT Save €100 €349 + VAT Save €50 €399 + VAT INDUSTRY RATE Book & Pay by 3rd June 2011* Book & Pay by 15th July 2011* Book & Pay by 2nd September 2011* Standard Price Main Conference and 2 Focus Days €2699 + VAT Save €1248 €3149 + VAT Save €798 €3499 + VAT Save €448 €3799 + VAT Save €148 Main Conference and 1 Focus Day *** €2149 + VAT Save €899 €2449 + VAT Save €599 €2699 + VAT Save €349 €2799 + VAT Save €249 Main Conference Only €1699 + VAT Save €450 €1899 + VAT Save €250 €1999 + VAT Save €150 €2149 + VAT Each Focus Day*** €549 + VAT Save €350 €649 + VAT Save €250 €749 + VAT Save €150 €899 + VAT