CSFI
International Conference on Cyber Conflict is NATO CCD COE’s annual conference and the next one will be held on June 5-8, 2012 in Tallinn, Estonia.
For the fourth year in a row the NATO Cooperative Cyber Defence Centre of Excellence invites experts from government, military, academia and the private sector to Tallinn to discuss recent trends in cyber security.
In 2012 the conference will focus on military and paramilitary activities in cyberspace. This topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track.
Introduction to Computers and Networks
This workshop is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Laptops are not required for this workshop.
The workshop is conducted in cooperation with the Cyber Security Forum Initiative (CSFI).
9:00-11:00 Internet and Internet Communication
Presenters: Roger Kuhn (CSFI) and Don Eijndhoven (CEO Argent Consulting/CSFI)
During this session, the architecture and the main components of the Internet will be described. Terms like “router”, “data packet”, “Tier 1 ISP” or “bit” will be explained. Further, it will be shown how information is passed through the Internet. The audience will also be provided information on possibilities and limits of blocking Internet communication at the “boarders” of a State.
11:00-11:30 Coffee Break
11:30-12:30 “tracking cyber tracks” with “Analyzing / Investigating Advanced
Presenters: Paul de Souza (CSFI) and Keren Elazari (VERINT)
The evolving cyber threat landscape has demonstrated in recent years the gap between the level of security and visibility afforded by classic IT Security solutions and the obvious need for powerful and comprehensive data gathering mechanisms and analysis methods to enable investigation of cyber attacks. Accordingly, more and more security organizations worldwide are looking into employing further analytics and forensic technologies at an ever increasing scale. These technologies include: Network forensics, deep packet inspection (DPI), full packet capture, net flow analysis, traffic intelligence, cyber intelligence, network analysis & visibility (NAV) , advanced HIPS and NIDS & next generation firewalls. In the workshop, we will present in brief & examine some of the available technologies and methods, and explain how they can be utilized in order to investigate and analyze sophisticated cyber attacks.
12:30-14:30 Lunch
14:30-15:30 Botnets
Presenters: Jeff Bardin (Treadstone 71)
The audience will be provided the information of what botnets are and how they are set up. The main criminal areas of the usage of botnets will be shown. Additionally, cases of main “real-life” botnets as well as their take-down by law enforcement authorities will be presented. This will include the explanation of the possibilities of monitoring, taking-over and taking-down of botnets.
Cyber Attack Scenario Discussion
Cyber Attack Scenario Discussion: Hacker? Criminal? Hactivist Group? Nation State?
Time: 8 June 10:00 – 11:40 and 12:10 – 12:50
Moderated by Colonel Timothy Evans, Esq., LL.M. of the 175th Network Warfare Squadron Ft. Meade, Maryland
A panel of experts walks you through the key points, concerning a realistic cyber attack scenario, in determining the intent and attribution of a cyber attack. For full description, please download the flyer here (PDF).
Panel members include Chris Painter, Cyber Coordinator, U.S. State Department, Megan Stifel, U.S. Department of Justice, Trent Teyema, Federal Bureau of Investigation, David Smith, Director, Georgia Security Analysis Center, Tbilisi, Sue Lee, Johns Hopkins University Applied Physics Lab, Laurel, MD, Jaan Priisalu, Director General, Estonian Information Systems Authority (RIA) and David Ferbrache, Head of Cyber Policy and Plans, UK Defence Cyber Security Programme.
* Views presented by panelists are personal and do not represent official organisational or US Government policy positions.
Paul de Souza, CSFI Founder Director
Filed under: Cybersecurity