4th International Conference on Cyber Conflict
International Conference on Cyber Conflict is NATO CCD COE’s annual conference and the next one will be held on
June 5-8, 2012 in Tallinn, Estonia.
For the fourth year in a row the NATO Cooperative Cyber Defence Centre of Excellence invites experts from government, military, academia and the private sector to Tallinn to discuss recent trends in cyber security.
In 2012 the conference will focus on military and paramilitary activities in cyberspace. This topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track.
https://web.archive.org/web/20120222100632/http://www.ccdcoe.org/cycon
https://web.archive.org/web/20120224170737/http://ccdcoe.org/cycon/
https://web.archive.org/web/20120222100632/http://www.ccdcoe.org/cycon
https://web.archive.org/web/20120224170737/http://ccdcoe.org/cycon/
February 2012
Registration opens for CyCon 2012
CyCon 2012 is the fourth annual International Conference on Cyber Conflict taking place in Tallinn, Estonia on 5-8 June this year. The conference, which is organised by the NATO Cooperative Cyber Defence Centre of Excellence, will focus on military and paramilitary activities in cyberspace. CyCon registration is now open (www.cycon.org/reg) and the Early Bird rate of €421 will apply for participants who sign up before 1 April.
The conference is targeted to experts from the government, military, academic and private sectors and the main topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track. Additionally three different workshops and a Strategy Breakout Session will be offered.
The conference is targeted to experts from the government, military, academic and private sectors and the main topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track. Additionally three different workshops and a Strategy Breakout Session will be offered.
The Law & Policy Track will focus on the challenges that cyberspace currently presents to legal and policy practitioners and academics. It will offer relatively short but intensive presentations, followed by moderated panel discussions providing the audience with an opportunity for active participation through questions, comments and statements. Confirmed speakers for this track include Prof. Dr Michael N. Schmitt (Chairman of the International Law Department, United States Naval War College), Prof. Dr Wolff Heintschel von Heinegg (European University Viadrina), Jason Healey (Atlantic Council, Head of the Cyber Statecraft Initiative) and Michele Markoff (Senior Policy Advisor in the Office of the Coordinator for Cyber Issues, United States Department of State).
The Technical Track will be exploring the practical side of cyber conflict, cyber attack and cyber weapons. The track will contain a mix of practitioner and researcher presentations and discussions. Confirmed speakers for this track include Latif Ladid (IPv6 Forum), Prof. Thomas Chen (Swansea University), Felix Lindner (Recurity Labs), Martin J. Muench (Gamma International), Ilias Chantzos (Symantec) and Florian Walther (Chaos Computer Club).
The Strategy Breakout Session will explore cyber conflict, cyber weapons and cyber attacks from the conceptual perspective. The session talks will be based on research papers that aim to explain the current situation as well as propose new approaches for the future.
The conference will feature three workshops on 5 June, two of which will be conducted in cooperation with the Cyber Security Forum Initiative (CSFI). “Introduction to Computers and Networks” (CSFI) is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. “Malware Analysis Workshop” (CFSI) is targeted at computer forensics investigators (law enforcement), incident responders, malware analysts and cyber commands. The audience will be given the understanding, tools and processes necessary to conduct malware analysis and produce reports which can endure legal scrutiny and serve as evidence. There will also be a special workshop for the members of media and its goal is to give journalists an introduction to some of the conference topics and current hot cyber issues in the world. Additionally, this workshop will allow them to have an extensive Q&A with the top speakers of the conference.
The conference registration fee is €495 and the government fee is €195. An Early Bird rate of €421 applies for participants who register before 1 April at www.cycon.org/reg. The fee covers the conference proceedings, all meals during the conference and all social networking events. Discounts apply to students, CSFI members and NATO CCD COE partner organisations, who should contact logistics.cycon-at-ccdcoe.org for information on how to apply for the discount. Journalists wishing to participate the conference are kindly asked to contact kristiina.pennar-at-ccdcoe.org for accreditation.
NATO Cooperative Cyber Defence Centre of Excellence is one of many NATO Centres of Excellence. Its mission is to enhance the capability, cooperation and information sharing among NATO, its member nations and partners in cyber defence by virtue of education, research and development, lessons learned and consultation.
For additional information:
Kristiina Pennar
Public Relations
+372 717 6811
Kristiina Pennar
Public Relations
+372 717 6811
16 May 2012
CyCon 2012 is fully booked
The conference is fully booked and registration is no longer available. Media representatives please turn to kristiina.pennar-at-ccdcoe.org for accreditation.
Introduction to Computers and Networks Workshop
Christopher Taylorr
Don EijndhovenKeren ElazariRoger KuhnPaul de Souza
This workshop is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Laptops are not required for this workshop.
The workshop is conducted in cooperation with the Cyber Security Forum Initiative (CSFI).
9:00-11:00 Internet and Internet Communication Presenters: Roger Kuhn (CSFI) and Don Eijndhoven (CEO Argent Consulting/CSFI) During this session, the architecture and the main components of the Internet will be described. Terms like “router”, “data packet”, “Tier 1 ISP” or “bit” will be explained. Further, it will be shown how information is passed through the Internet. The audience will also be provided information on possibilities and limits of blocking Internet communication at the “borders” of a State.
11:00-11:30 Coffee Break
11:30-12:30 Network Monitoring Technologies to Identify Cyber Threats
Presenters: Paul de Souza (CSFI) and Keren Elazari (VERINT)The evolving cyber threat landscape has demonstrated in recent years the gap between the level of security and visibility afforded by classic IT Security solutions and the obvious need for powerful and comprehensive data gathering mechanisms and analysis methods to enable investigation of cyber attacks. Accordingly, more and more security organizations worldwide are looking into employing further analytics and forensic technologies at an ever increasing scale. These technologies include: Network forensics, deep packet inspection (DPI), full packet capture, net flow analysis, traffic intelligence, cyber intelligence, network analysis & visibility (NAV) , advanced HIPS and NIDS & next generation firewalls. In the workshop, we will present in brief & examine some of the available technologies and methods, and explain how they can be utilized in order to investigate and analyze sophisticated cyber attacks.
12:30-14:30 Lunch
14:30-15:30 Botnets Presenter: Jeff Bardin (Treadstone 71)
The audience will be provided the information of what botnets are and how they are set up. The main criminal areas of the usage of botnets will be shown. Additionally, cases of main “real-life” botnets as well as their take-down by law enforcement authorities will be presented. This will include the explanation of the possibilities of monitoring, taking-over and taking-down of botnets.
15:30-16:30 Computer Emergency Response Teams (CERTs) Presenter: Christopher Taylor (Cytech)
The nature and working area of CERTs will be presented. Especially, it will be shown what measures CERTs usually use in order to monitor and protect a computer network. In this context, also the potential need and actual extend of national, bi-lateral and international (e.g. FIRST) cooperation between CERTs will be explained. This will include a general description of the information which of the exchange would be desirable.
Malware Workshop:
Michael Theuerzeit
4th International Conference on Cyber Conflict will be held in the centre of Tallinn in the charming art deco building of the Estonian Drama Theatre. This beautiful building presents the oldest theatre house in Estonia, dating back to 1910

Joint Sessions
Dr Myriam Dunn Cavelty
Dr Forrest Hare
H.E. Toomas Hendrik Ilves
Martin J. Muench
Dr Rain Ottis
Dr Mariarosaria Taddeo
Gerhard Stöhr
MG Jaap Willemse
Law & Policy Speakers
Dr Louise Arimatsu
Captain Geneviève Bernatchez
Dr William Boothby
Dr Robin Geiß
Jason Healey
Dr Wolff Heintschel von Heinegg
Dr Gleider I Hernández
Alexander Klimburg
Dr Itamara Lochard
Dr Nils Melzer
MAJ (Adv.) Nadav Minkovsky
Dinah PoKempner
Jody Prescott
Dr Michael N. Schmitt
Heli Tiirmaa-Klaar
Sean Watts
Dr Katharina Ziolkowski
Pedro Zwahlen
Tech Speakers
Rush Carskadden
Ilias Chantoz
Thomas M. Chen
Mario Golling
Diego Fernandez-Vazquez
Kim Hartmann
Harsha K. Kalutarage
Assaf Keren
Robert Koch
Dr Latif Ladid
Hillar Leoste
Felix Lindner
Hiro Onishi
Daniel Plohmann
Steve Purser
Enn Tyugu
Florian Walther
Sean Zadig
Strategy Speakers
Major Scott D. Applegate
Jeff Bardin
Jeffrey Caton
Jon Espenschied
Robert Fanelli
Dr Kenneth Geers
Keir Giles
Prof. Samuel Liles
Birgy Lorenz
MG (Ret) Harold Moulton
Timothy L. Thomas
LtCol Patrice Tromparent
Cyber Attack Scenario Discussion
Colonel Timothy J. Evans
David Ferbrache
Susan Lee
Jaan Priisalu
David J. Smith
Megan Stifel
Trent R. Teyema
Agenda |
---|
Day 0, 5 June | Last updated on 4 June |
---|
Time | Event | ||
8:00-9:00
|
Registration
Drama Theatre | ||
9:00-12:30 |
Introduction to Computers and NetworksDrama Theatre
| Malware Analysis Workshop Drama Theatre | Media WorkshopDrama Theatre |
12:30-13:30
| Lunch | ||
13:30-16:30 | Workshop continues | Workshop continues | |
19:00- 22:00 |
Ice Breaker, Restaurant Number 9Dresscode: smart casual (tie optional)
|
Day 1, 6 June
Time | Law & Policy Track | Technical Track | Strategy Breakout Session | Time |
8:00-9:00 | Registration, Drama Theatre |
8:00-9:00
| ||
9:00-9:10 | Opening Remarks COL Ilmar Tamm, Director of the NATO CCD COE |
9:00-9:10
| ||
9:10-9:50 | Keynote AddressMG Jaap Willemse NATO ACT, Assistant Chief of Staff Command, Control, Communication, Intelligence (ACOS C4I) |
9:10-9:50
| ||
9:50-10:00 | Administrative RemarksDr Rain Ottis & Dr Katharina Ziolkowski, NATO CCD COE |
9:50-10:00
| ||
Setting the Scene | ||||
10:00-10:30 |
New Technologies and the Applicability of the Law of Armed Conflict - A History Overview
Gerhard Stöhr German Armed Forces Command and Staff College |
10:00-10:30
| ||
10:30-11:00 | The Future of Cyber ConflictDr Rain Ottis, NATO CCD COE |
10:30-11:00
| ||
11:00-11:30 | Coffee Break |
11:00-11:30
| ||
Territorial Sovereignty versus Boundlessness of Cyberspace
|
Military Operations in Cyberspace
| |||
11:30-11:50 |
Legal Implications of Territorial Sovereignty in CyberspaceProf. Dr Wolff Heintschel von Heinegg
European University Viadrina, Professor of Law, Germany |
Applying Traditional Military Principles to Cyber Warfare
Dr Samuel Liles Associate Professor, National Defense University / iCollege Dulles | 11:30-12:00 | |
11:50-12:10 |
National Sovereignty in Cyberspace
Major (Adv.) Nadav Minkovsky The Military Advocate General´s Corps, International Law Department, Head of Strategic Section, Israel | |||
Internet as a Critical Infrastructure - A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere
Assaf Keren Product Manager, Cyber Security, Verint Systems, Inc. Co-author: Keren Elazari |
A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict
Robert Fanelli, Ph.D. US Cyber Command Co-author: Gregory Conti | 12:00-12:30 | ||
12:10-12:30 |
Impact of Cyberspace on Human Rights and Democracy
Dinah PoKempner Human Rights Watch, General Counsel, USA | |||
12:30- 13:00 |
Impact of Cyberspace on Diplomatic Relations
Minister Pedro Zwahlen Federal Department of Foreign Affairs, Deputy Head of Division for Security Policy and Crisis Management, Head of International Security Section, Switzerland | Natural Privacy Preservation Protocol for Electronic Mail Dipl.-Inf. Kim Hartmann Institute for Electronics, Signal Processing and Communications, Otto-von-Guericke University Co-author: Dipl.-Inf. Christoph Steup |
The Principle of Maneuver in Cyber Operations
Major Scott D. Applegate US Army / Volgenau School of Information Technology and Engineering, George Mason University | 12:30-13:00 |
13:00-14:00 |
Lunch
| |||
Attribution in Cyber Security
| ||||
14:00-14:30 |
Panel Discussion
|
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy
TBD | 14:00-14:30 | |
14:30-15:00 |
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning
Harsha K. Kalutarage Digital Security and Forensics (SaFe) Research Group, Department of Computing, Faculty of Engineering and Computing, Coventry University Co-authors: Siraj A. Shaikh, Qin Zhou, Anne E. James |
Beyond Domains, Beyond Commons: The Context and Theory of Conflict in Cyberspace
Prof Jeffrey Lee Caton US Army War College | 14:30-15:00 | |
15:00- 15:30 |
Coffee Break
| |||
The Notion of Battlefield and the Laws of Neutrality
|
Internet Security
| |||
15:30- 15:50 |
Notion of Battlefield and "Preparation of Battlefield"
CAPT (N) Geneviève Bernatchez Canadian Armed Forces, Deputy Judge Advocate General - Operational and International Law, Canada | 15:30-16:00 | ||
15:50-16:10 |
Law of Neutrality in Cyberspace
Prof. Dr Wolff Heintschel von Heinegg European University Viadrina, Professor of Law, Germany | |||
Panel discussion - Military Operations in Cyberspace
| 16:00-16:45 | |||
16:10-16:30 | Neutrality and Cyberspace - Political Considerations Jason Healey Atlantic Council, Director of the Cyber Statecraft Initiative, USA | |||
16:30-17:30 | Panel Discussion | Panel discussion | 16:45-17:30 | |
18:00
| Buses leave from the Nordic Hotel Forum for the ICT Demo Centre Tour |
18:00
| ||
19:00 |
Tallinn City Tour (starts at the Nordic Hotel Forum)
|
19:00
| ||
22:30 | Tallinn City Tour (starts at the Nordic Hotel Forum) |
22:30
|
Day 2, 7 June
Time | Law & Policy Track | Technical Track | Strategy Breakout Session | Time |
8:00-9:00 | Registration, Drama Theatre |
8:00-9:00
| ||
9:00-9:10 |
Administrative remarksDr Rain Ottis & Dr Katharina Ziolkowski, NATO CCD COE
|
9:00-9:10
| ||
Attribution & Accountability in Cyberspace | ||||
9:10-10:10 | Operational and Legal Aspects of Remote Monitoring Solutions (TECH DEMO) Martin J. Muench Managing Director, Gamma International GmbH, Germany |
9:10-10:10
| ||
10:10-10:30 | The Significance of Attribution to Cyberspace Coercion: A Political Perspective Dr Forrest Hare Georgetown University, Center for Peace and Security Studies, Adjunct Professor, USA |
10:10-10:30
| ||
10:30-10:40 | Short Break |
10:30-10:40
| ||
Attribution & Accountability in Cyberspace
| ||||
10:40-11:00
|
Safe Haven Theory and Possible Reactions to "Cyber Attacks" Committed by Non-State Actors
Heli Tiirmaa-Klaar European Union, European External Action Service, Conflict Prevention and Security Policy Directorate, Cyber Security Policy Advisor |
Challenges and way ahead for cooperative distributed Cyber Defense training and experimentation
Frédéric Dreier Head Cyber Threat Analysis, Swiss Armed Forces | 10:40-11:00 | |
11:00-11:30 |
Coffee Break
| 11:00-11:30 | ||
Models and Tools of Integrated Cyber Security
| ||||
11:30-11:50 |
Cyber Conflict and State Responsibility
Dr Gleider I Hernàndez Durham University, Lecturer in Law, UK |
Russia's Public Stance on Cyber/Information Warfare
Keir Giles Director, Conflict Studies Research Centre | 11:30-12:00 | |
11:50-12:30 |
Panel Discussion
| |||
Collaborative Scenarios for Sharing Information within Trust Relationships
Diego Fernandez-Vazquez Co-authors: Oscar Pastor Acosta, Emily E. Reid, Chris Spirito, Sarah A. Brown |
French Cyberdefence Policy
Lieutenant Colonel Patrice Tromparent French Ministry of Defence, Delegation for Strategic Affairs, Defence Policy Department | 12:00-12:30 | ||
Armed Attack
| ||||
12:30-13:00 |
Armed Attack - Legal Perspective
Prof. Michael N. Schmitt U.S. Naval War College, Chairman of the International Law Department, USA |
The Role of COTS Products in High Security Systems
Robert Koch Universität der Bundeswehr München Co-author: Gabi Dreo Rodosek |
Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present?
Birgy Lorenz Tallinn University Co-author: Kaido Kikkas | 12:30-13:00 |
13:00-14:00 | Lunch | |||
New Paradigms in Cyber Security | ||||
14:00-14:30 | Strategies for International Cyberspace StabilityDr. Itamara Lochard Senior Researcher, International Security Studies, The Fletcher School of Law & Diplomacy, USA | Command and Control of Cyber Weapons Enn Tyugu NATO CCD COE / Institute of Cybernetics of Tallinn University of Technology |
14:00-14:30
| |
14:30-15:15 | Panel Discussion | Paradigm Change of Vehicle Cyber Security Hiro Onishi Alpine Electronics Research of America | The Three Faces of the Cyber Dragon Timothy L. Thomas Foreign Military Studies Office |
14:30-15:15
|
15:15-15:45 | Coffee Break | |||
Actors in Cyber Conflict
|
Cyber Espionage
| |||
15:45-16:05 |
Actors and Attribution in Cyber-Conflict
Alexander Klimburg Austrian Institute for International Affairs, Fellow and Senior Adviser, Austria | Threat Behavior: Attackers & Patterns Jon Espenschied Microsoft | 15:45-16:15 | |
16:05-16:25 |
The Notion of Combatancy in Cyber Warfare
Prof. Sean Watts Creighton University, Associate Professor of Law, USA | |||
Panel discussion | 16:15-16:45 | |||
16:25-16:45 |
Direct Participation in Hostilities
Jody Prescott The U.S. Military Academy at West Point, Department of Law, Center for the Rule of Law, Senior Fellow, USA | |||
16:45-17:30 |
Panel Discussion
| Panel discussion - Cyber Espionage and Intelligence | 16:45-17:30 | |
18:30 |
Buses leave from Nordic Hotel Forum and Radisson Blu for the Dinner
|
18:30
|
Day 3, 8 June
Time |
Law & Policy Track
| Technical Track | Strategy Breakout Session | Time |
8:00-9:00 | Registration, Drama Theatre |
8:00-9:00
| ||
Targeting in Cyberspace
|
Cyber Attack Case Studies
| |||
9:00-9:20 |
The Notion of an "Attack"
(Art. 49 AP I) Prof. Michael N. Schmitt U.S. Naval War College, Chairman of the International Law Department, USA |
A Case Study of the Miner Botnet
Daniel Plohmann Cyber Defence Research Group, Fraunhofer FKIE Co-author: Elmar Gerhards-Padilla |
Cyber Attack Scenario Discussion: Hacker? Criminal? Hactivist Group?
Nation State? Panel members: Megan Stifel, Trent Teyema, David Smith, Sue Lee, Jaan Priisalu, David Ferbrache Moderator: Colonel Timothy Evans |
9:00-9:40
|
9:20-9:40 |
Precautions in Attack
Dr William Boothby, Royal Air Force (Ret.), UK | |||
9:40-10:00 |
Military Targets and Civilian Objects in Cyberspace
Dr Nils Melzer Geneva Academy for Humanitarian Law and Human Rights, Swiss Chair for International Humanitarian Law, Switzerland |
9:40-10:10
| ||
10:00-10:40 | Panel Discussion | Attack Trends in Present Computer Networks Mario Golling Faculty of Computer Science, Universität der Bundeswehr München Co-authors: Robert Koch, Björn Stelte |
10:10-10:40
| |
10:40-11:10 | Coffe Break |
10:40-11:10
| ||
Identifying Possible "Gaps" | Security Intelligence Modeling | |||
11:10-11:30 | Acts Short of Armed Attack and Low Intensity Conflicts in Cyberspace Prof. Dr Robin Geiß University of Potsdam, Professor of Law, Germany | A Game Theoretic View of Stuxnet and Its Implications Prof. Thomas M. Chen College of Engineering, Swansea University | Panel discussion on the Cyber Attack Scenario |
11:10-11:50
|
11:30-11:50 | A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations Dr Louise Arimatsu The Royal Institute of International Affairs, International Law Programme, Associate Fellow, UK | |||
11:50-12:10 | Manual on the International Law Applicable to Cyber Warfare Prof. Michael N. Schmitt U.S. Naval War College, Chairman of the International Law Department, USA | Security Intelligence Operations Rush Carskadden Manager, Threat Defense Strategy Cisco |
11:50-12:30
| |
12:10-12:30 | Is There a Need for New Law for Cyberspace? Dr Katharina Ziolkowski NATO CCD COE | |||
12:30-12:50 | Short Break |
12:30-12:50
| ||
12:50-13:30 | Address of the President of the Republic of Estonia H.E. Toomas Hendrik Ilves |
12:50-13:30
| ||
13:30-14:30 | Lunch |
13:30-14:30
| ||
Interdisciplinary Aspects | ||||
14:30-15:00 | Ethics of Cyber Warfare Dr Mariarosaria Taddeo University of Hertfordshire, Department of Philosophy, School of Humanities, Marie Curie Fellow / University of Oxford, Information Ethics Group (IEG), Senior Research Associate, UK |
14:30-15:00
| ||
15:00-15:30 | The Militarisation of Cyberspace: Why Less May be Better Dr Myriam Dunn Cavelty Swiss Federal Institute of Technology, Centre for Security Studies, Head of the New Risk & Resilience Research Group, Switzerland |
15:00-15:30
| ||
Closing Ceremony | ||||
15:30-15:45 | Concluding Remarks & Farewell COL Ilmar Tamm, Dr Rain Ottis, Dr Katharina Ziolkowski NATO CCD COE |
15:30-15:45
| ||
16:00 | Buses leave from the Nordic Hotel Forum for the ICT Demo Centre Tour |
16:00
|
https://web.archive.org/web/20120704101210/http://ccdcoe.org/cycon/agenda2012.html