teisipäev, 5. juuni 2012

2012 - CCDCOE - 4th - conference - Law & Policy Track and the Technical Track. Cyber Conflict) 5-8 June 2012




4th International Conference on Cyber Conflict

International Conference on Cyber Conflict is NATO CCD COE’s annual conference and the next one will be held on
June 5-8, 2012 in Tallinn, Estonia.
For the fourth year in a row the NATO Cooperative Cyber Defence Centre of Excellence invites experts from government, military, academia and the private sector to Tallinn to discuss recent trends in cyber security.
In 2012 the conference will focus on military and paramilitary activities in cyberspace. This topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track.

https://web.archive.org/web/20120222100632/http://www.ccdcoe.org/cycon
https://web.archive.org/web/20120224170737/http://ccdcoe.org/cycon/

 February 2012

Registration opens for CyCon 2012

CyCon 2012 is the fourth annual International Conference on Cyber Conflict taking place in Tallinn, Estonia on 5-8 June this year. The conference, which is organised by the NATO Cooperative Cyber Defence Centre of Excellence, will focus on military and paramilitary activities in cyberspace. CyCon registration is now open (www.cycon.org/reg) and the Early Bird rate of €421 will apply for participants who sign up before 1 April.

The conference is targeted to experts from the government, military, academic and private sectors and the main topic will be explored from the political, legal and technical perspectives within two parallel tracks: the Law & Policy Track and the Technical Track. Additionally three different workshops and a Strategy Breakout Session will be offered.
The Law & Policy Track will focus on the challenges that cyberspace currently presents to legal and policy practitioners and academics. It will offer relatively short but intensive presentations, followed by moderated panel discussions providing the audience with an opportunity for active participation through questions, comments and statements. Confirmed speakers for this track include Prof. Dr Michael N. Schmitt (Chairman of the International Law Department, United States Naval War College), Prof. Dr Wolff Heintschel von Heinegg (European University Viadrina), Jason Healey (Atlantic Council, Head of the Cyber Statecraft Initiative) and Michele Markoff (Senior Policy Advisor in the Office of the Coordinator for Cyber Issues, United States Department of State).
The Technical Track will be exploring the practical side of cyber conflict, cyber attack and cyber weapons. The track will contain a mix of practitioner and researcher presentations and discussions. Confirmed speakers for this track include Latif Ladid (IPv6 Forum), Prof. Thomas Chen (Swansea University), Felix Lindner (Recurity Labs), Martin J. Muench (Gamma International), Ilias Chantzos (Symantec) and Florian Walther (Chaos Computer Club).
The Strategy Breakout Session will explore cyber conflict, cyber weapons and cyber attacks from the conceptual perspective. The session talks will be based on research papers that aim to explain the current situation as well as propose new approaches for the future.
The conference will feature three workshops on 5 June, two of which will be conducted in cooperation with the Cyber Security Forum Initiative (CSFI). Introduction to Computers and Networks” (CSFI) is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Malware Analysis Workshop” (CFSI) is targeted at computer forensics investigators (law enforcement), incident responders, malware analysts and cyber commands. The audience will be given the understanding, tools and processes necessary to conduct malware analysis and produce reports which can endure legal scrutiny and serve as evidence. There will also be a special workshop for the members of media and its goal is to give journalists an introduction to some of the conference topics and current hot cyber issues in the world. Additionally, this workshop will allow them to have an extensive Q&A with the top speakers of the conference.
The conference registration fee is €495 and the government fee is €195. An Early Bird rate of €421 applies for participants who register before 1 April at www.cycon.org/reg. The fee covers the conference proceedings, all meals during the conference and all social networking events. Discounts apply to students, CSFI members and NATO CCD COE partner organisations, who should contact logistics.cycon-at-ccdcoe.org for information on how to apply for the discount. Journalists wishing to participate the conference are kindly asked to contact kristiina.pennar-at-ccdcoe.org for accreditation.
NATO Cooperative Cyber Defence Centre of Excellence is one of many NATO Centres of Excellence. Its mission is to enhance the capability, cooperation and information sharing among NATO, its member nations and partners in cyber defence by virtue of education, research and development, lessons learned and consultation.
For additional information:
Kristiina Pennar
Public Relations
+372 717 6811

16 May 2012

CyCon 2012 is fully booked

The conference is fully booked and registration is no longer available. Media representatives please turn to kristiina.pennar-at-ccdcoe.org for accreditation.




Introduction to Computers and Networks Workshop


Christopher Taylorr
Don EijndhovenKeren ElazariRoger KuhnPaul de Souza

This workshop is targeted at non-technical experts who would like to have a deeper understanding of the technical side of cyber. Laptops are not required for this workshop.

The workshop is conducted in cooperation with the Cyber Security Forum Initiative (CSFI).

9:00-11:00 Internet and Internet Communication PresentersRoger Kuhn (CSFI) and Don Eijndhoven (CEO Argent Consulting/CSFI) During this session, the architecture and the main components of the Internet will be described. Terms like “router”, “data packet”, “Tier 1 ISP” or “bit” will be explained. Further, it will be shown how information is passed through the Internet. The audience will also be provided information on possibilities and limits of blocking Internet communication at the “borders” of a State.

11:00-11:30 Coffee Break
11:30-12:30 Network Monitoring Technologies to Identify Cyber Threats
Presenters: Paul de Souza (CSFI) and Keren Elazari (VERINT)The evolving cyber threat landscape has demonstrated in recent years the gap between the level of security and visibility afforded by classic IT Security solutions and the obvious need for powerful and comprehensive data gathering mechanisms and analysis methods to enable investigation of cyber attacks. Accordingly, more and more security organizations worldwide are looking into employing further analytics and forensic technologies at an ever increasing scale. These technologies include: Network forensics, deep packet inspection (DPI), full packet capture, net flow analysis, traffic intelligence, cyber intelligence, network analysis & visibility (NAV) , advanced HIPS and NIDS & next generation firewalls. In the workshop, we will present in brief & examine some of the available technologies and methods, and explain how they can be utilized in order to investigate and analyze sophisticated cyber attacks.

12:30-14:30 Lunch

14:30-15:30 Botnets Presenter: Jeff Bardin (Treadstone 71) 
The audience will be provided the information of what botnets are and how they are set up. The main criminal areas of the usage of botnets will be shown. Additionally, cases of main “real-life” botnets as well as their take-down by law enforcement authorities will be presented. This will include the explanation of the possibilities of monitoring, taking-over and taking-down of botnets.

15:30-16:30 Computer Emergency Response Teams (CERTs) Presenter: Christopher Taylor (Cytech)
The nature and working area of CERTs will be presented. Especially, it will be shown what measures CERTs usually use in order to monitor and protect a computer network. In this context, also the potential need and actual extend of national, bi-lateral and international (e.g. FIRST) cooperation between CERTs will be explained. This will include a general description of the information which of the exchange would be desirable.


Malware Workshop:
Michael Theuerzeit


4th International Conference on Cyber Conflict will be held in the centre of Tallinn in the charming art deco building of the Estonian Drama Theatre. This beautiful building presents the oldest theatre house in Estonia, dating back to 1910




Joint Sessions
Dr Myriam Dunn Cavelty
Dr Forrest Hare
H.E. Toomas Hendrik Ilves
Martin J. Muench
Dr Rain Ottis
Dr Mariarosaria Taddeo
Gerhard Stöhr
MG Jaap Willemse


Law & Policy Speakers
Dr Louise Arimatsu
Captain Geneviève Bernatchez
Dr William Boothby
Dr Robin Geiß
Jason Healey
Dr Wolff Heintschel von Heinegg
Dr Gleider I Hernández
Alexander Klimburg
Dr Itamara Lochard
Dr Nils Melzer
MAJ (Adv.) Nadav Minkovsky
Dinah PoKempner
Jody Prescott
Dr Michael N. Schmitt
Heli Tiirmaa-Klaar
Sean Watts
Dr Katharina Ziolkowski
Pedro Zwahlen

Tech Speakers
Rush Carskadden
Ilias Chantoz
Thomas M. Chen
Mario Golling
Diego Fernandez-Vazquez
Kim Hartmann
Harsha K. Kalutarage
Assaf Keren
Robert Koch
Dr Latif Ladid
Hillar Leoste
Felix Lindner
Hiro Onishi
Daniel Plohmann
Steve Purser
Enn Tyugu
Florian Walther
Sean Zadig


Strategy Speakers
Major Scott D. Applegate
Jeff Bardin
Jeffrey Caton
Jon Espenschied
Robert Fanelli
Dr Kenneth Geers
Keir Giles
Prof. Samuel Liles
Birgy Lorenz
MG (Ret) Harold Moulton
Timothy L. Thomas
LtCol Patrice Tromparent


Cyber Attack Scenario Discussion
Colonel Timothy J. Evans
David Ferbrache
Susan Lee
Jaan Priisalu
David J. Smith
Megan Stifel
Trent R. Teyema


Agenda

 

Day 0, 5 June

Last updated on 4 June
TimeEvent
8:00-9:00
Registration
Drama Theatre
9:00-12:30 Malware Analysis Workshop
Drama Theatre
Media WorkshopDrama Theatre 
12:30-13:30
Lunch
13:30-16:30Workshop continuesWorkshop continues
19:00-
22:00
Ice BreakerRestaurant Number 9Dresscode: smart casual (tie optional)

Day 16 June

TimeLaw & Policy TrackTechnical TrackStrategy Breakout SessionTime
8:00-9:00Registration, Drama Theatre
8:00-9:00
9:00-9:10Opening Remarks
COL Ilmar Tamm, Director of the NATO CCD COE
9:00-9:10
9:10-9:50Keynote AddressMG Jaap Willemse
NATO ACT, Assistant Chief of Staff Command, Control, Communication, Intelligence (ACOS C4I)
9:10-9:50
9:50-10:00Administrative RemarksDr Rain Ottis & Dr Katharina ZiolkowskiNATO CCD COE
9:50-10:00
Setting the Scene
10:00-10:30
New Technologies and the Applicability of the Law of Armed Conflict - A History Overview 
Gerhard Stöhr
German Armed Forces Command and Staff College
10:00-10:30
10:30-11:00The Future of Cyber ConflictDr Rain Ottis, NATO CCD COE
10:30-11:00
11:00-11:30Coffee Break
11:00-11:30
Territorial Sovereignty versus Boundlessness of Cyberspace
Military Operations in Cyberspace

11:30-11:50
Legal Implications of Territorial Sovereignty in CyberspaceProf. Dr Wolff Heintschel von Heinegg
European University Viadrina, Professor of Law, Germany
Applying Traditional Military Principles to Cyber Warfare
Dr Samuel Liles
Associate Professor, National Defense University / iCollege Dulles
11:30-12:00
11:50-12:10
National Sovereignty in Cyberspace
Major (Adv.) Nadav Minkovsky
The Military Advocate General´s Corps, International Law Department, Head of Strategic Section, Israel
Internet as a Critical Infrastructure - A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere
Assaf Keren
Product Manager, Cyber Security, Verint Systems, Inc.
Co-author: Keren Elazari
12:00-12:30
12:10-12:30
Impact of Cyberspace on Human Rights and Democracy
Dinah PoKempner
Human Rights Watch, General Counsel, USA
12:30- 13:00
Impact of Cyberspace on Diplomatic Relations
Minister Pedro Zwahlen
Federal Department of Foreign Affairs, Deputy Head of Division for Security Policy and Crisis Management, Head of International Security Section, Switzerland
Natural Privacy Preservation Protocol for Electronic Mail
Dipl.-Inf. Kim Hartmann
Institute for Electronics, Signal Processing and Communications, Otto-von-Guericke University
Co-author: Dipl.-Inf. Christoph Steup
The Principle of Maneuver in Cyber Operations
Major Scott D. Applegate
US Army / Volgenau School of Information Technology and Engineering, George Mason University
12:30-13:00
13:00-14:00
Lunch
Attribution in Cyber Security
14:00-14:30
Panel Discussion
Attribution - why is it hard?
Florian Walther
Independent IT-Security Specialist
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy
TBD
14:00-14:30
14:30-15:00
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning
Harsha K. Kalutarage
Digital Security and Forensics (SaFe) Research Group, Department of Computing, Faculty of Engineering and Computing, Coventry University
Co-authors: Siraj A. Shaikh, Qin Zhou, Anne E. James
14:30-15:00
15:00-
15:30
Coffee Break
The Notion of Battlefield and the Laws of Neutrality
Internet Security
15:30-
15:50
Notion of Battlefield and "Preparation of Battlefield" 
CAPT (N) Geneviève Bernatchez Canadian Armed Forces, Deputy Judge Advocate General - Operational and International Law, Canada
Preparing a Military Cyber Attack
Felix Lindner (FX)
Head of Recurity Labs
Thinking About Cyberspace
MG (Ret) Harold "Punch" Moulton
Strategic Consultant, CSFI
15:30-16:00
15:50-16:10
Law of Neutrality in Cyberspace
Prof. Dr Wolff Heintschel von Heinegg
European University Viadrina, Professor of Law, Germany
Panel discussion - Military Operations in Cyberspace
Iran and Cyber 
Jeff Bardin
Chief Intelligence Officer, Treadstone71
16:00-16:45
16:10-16:30Neutrality and Cyberspace - Political Considerations
Jason Healey
Atlantic Council, Director of the Cyber Statecraft Initiative, USA
16:30-17:30Panel DiscussionPanel discussion16:45-17:30
18:00
Buses leave from the Nordic Hotel Forum for the ICT Demo Centre Tour
18:00
19:00
Tallinn City Tour (starts at the Nordic Hotel Forum)
19:00
22:30Tallinn City Tour (starts at the Nordic Hotel Forum)
22:30

Day 27 June

TimeLaw & Policy TrackTechnical TrackStrategy Breakout SessionTime
8:00-9:00Registration, Drama Theatre
8:00-9:00
9:00-9:10
Administrative remarksDr Rain Ottis & Dr Katharina ZiolkowskiNATO CCD COE
9:00-9:10
Attribution & Accountability in Cyberspace
9:10-10:10Operational and Legal Aspects of Remote Monitoring Solutions (TECH DEMO)
Martin J. Muench
Managing Director, Gamma International GmbH, Germany
9:10-10:10
10:10-10:30The Significance of Attribution to Cyberspace Coercion: A Political Perspective 
Dr Forrest Hare
Georgetown University, Center for Peace and Security Studies, Adjunct Professor, USA
10:10-10:30
10:30-10:40Short Break
10:30-10:40
Attribution & Accountability in Cyberspace


10:40-11:00
Safe Haven Theory and Possible Reactions to "Cyber Attacks" Committed by Non-State Actors
Heli Tiirmaa-Klaar
European Union, European External Action Service, Conflict Prevention and Security Policy Directorate, Cyber Security Policy Advisor
Challenges and way ahead for cooperative distributed Cyber Defense training and experimentation
Frédéric Dreier
Head Cyber Threat Analysis, Swiss Armed Forces
10:40-11:00
11:00-11:30
Coffee Break
11:00-11:30
Models and Tools of Integrated Cyber Security
11:30-11:50
Cyber Conflict and State Responsibility 
Dr Gleider I Hernàndez
Durham University, Lecturer in Law, UK
Russia's Public Stance on Cyber/Information Warfare
Keir Giles
Director, Conflict Studies Research Centre
11:30-12:00
11:50-12:30
Panel Discussion
Collaborative Scenarios for Sharing Information within Trust Relationships
Diego Fernandez-Vazquez
Co-authors: Oscar Pastor Acosta, Emily E. Reid, Chris Spirito, Sarah A. Brown
French Cyberdefence Policy
Lieutenant Colonel Patrice Tromparent
French Ministry of Defence, Delegation for Strategic Affairs, Defence Policy Department
12:00-12:30
Armed Attack
12:30-13:00
Armed Attack - Legal Perspective
Prof. Michael N. Schmitt
U.S. Naval War College, Chairman of the International Law Department, USA
The Role of COTS Products in High Security Systems
Robert Koch
Universität der Bundeswehr München
Co-author: Gabi Dreo Rodosek
Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present? 
Birgy Lorenz
Tallinn University
Co-author: Kaido Kikkas
12:30-13:00

13:00-14:00Lunch
New Paradigms in Cyber Security
14:00-14:30Strategies for International Cyberspace StabilityDr. Itamara Lochard
Senior Researcher, International Security Studies, The Fletcher School of Law & Diplomacy, USA
Command and Control of Cyber Weapons
Enn Tyugu
NATO CCD COE / Institute of Cybernetics of Tallinn University of Technology
The Art of Cyber War
Dr Kenneth Geers
Cyber Subject Matter Expert, NCIS
14:00-14:30
14:30-15:15

Panel Discussion
Paradigm Change of Vehicle Cyber Security
Hiro Onishi
Alpine Electronics Research of America
The Three Faces of the Cyber Dragon
Timothy L. Thomas
Foreign Military Studies Office
14:30-15:15
15:15-15:45Coffee Break
Actors in Cyber Conflict
Cyber Espionage
15:45-16:05
Actors and Attribution in Cyber-Conflict 
Alexander Klimburg
Austrian Institute for International Affairs, Fellow and Senior Adviser, Austria
Cyber Espionage Toolkits
Hillar Leoste
Shadowserver Foundation
Threat Behavior: Attackers & Patterns
Jon Espenschied
Microsoft
15:45-16:15
16:05-16:25
The Notion of Combatancy in Cyber Warfare 
Prof. Sean Watts
Creighton University, Associate Professor of Law, USA
Operation Ghost Click
Sean Zadig
NASA OIG Computer Crimes Division
Panel discussion16:15-16:45
16:25-16:45
Direct Participation in Hostilities 
Jody Prescott
The U.S. Military Academy at West Point, Department of Law, Center for the Rule of Law, Senior Fellow, USA
16:45-17:30
Panel Discussion
Panel discussion - Cyber Espionage and Intelligence16:45-17:30
18:30
Buses leave from Nordic Hotel Forum and Radisson Blu for the Dinner
18:30

Day 38 June

Time
Law & Policy Track
Technical TrackStrategy Breakout SessionTime
8:00-9:00Registration, Drama Theatre
8:00-9:00
Targeting in Cyberspace
Cyber Attack Case Studies
9:00-9:20
The Notion of an "Attack"
(Art. 49 AP I) 

Prof. Michael N. Schmitt
U.S. Naval War College, Chairman of the International Law Department, USA
A Case Study of the Miner Botnet
Daniel Plohmann
Cyber Defence Research Group, Fraunhofer FKIE
Co-author: Elmar Gerhards-Padilla 
Cyber Attack Scenario Discussion: Hacker? Criminal? Hactivist Group?
Nation State? 


Panel members: Megan Stifel, Trent Teyema, David Smith, Sue Lee, Jaan Priisalu, David Ferbrache

Moderator: Colonel Timothy Evans
9:00-9:40
9:20-9:40
Precautions in Attack
Dr William Boothby, Royal Air Force (Ret.), UK
9:40-10:00
Military Targets and Civilian Objects in Cyberspace
Dr Nils Melzer
Geneva Academy for Humanitarian Law and Human Rights, Swiss Chair for International Humanitarian Law, Switzerland
A Cyber Attack Case Study
Ilias Chantzos
Senior Director, Government Affairs, Symantec
9:40-10:10
10:00-10:40Panel DiscussionAttack Trends in Present Computer Networks
Mario Golling
Faculty of Computer Science, Universität der Bundeswehr München Co-authors: Robert Koch, Björn Stelte
10:10-10:40
10:40-11:10Coffe Break
10:40-11:10
Identifying Possible "Gaps"Security Intelligence Modeling
11:10-11:30Acts Short of Armed Attack and Low Intensity Conflicts in Cyberspace 
Prof. Dr Robin Geiß
University of Potsdam, Professor of Law, Germany
A Game Theoretic View of Stuxnet and Its Implications 
Prof. Thomas M. Chen
College of Engineering, Swansea University
Panel discussion on the Cyber Attack Scenario
11:10-11:50
11:30-11:50A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations 
Dr Louise Arimatsu
The Royal Institute of International Affairs, International Law Programme, Associate Fellow, UK
11:50-12:10Manual on the International Law Applicable to Cyber Warfare
Prof. Michael N. Schmitt
U.S. Naval War College, Chairman of the International Law Department, USA
Security Intelligence Operations
Rush Carskadden
Manager, Threat Defense Strategy
Cisco
11:50-12:30
12:10-12:30Is There a Need for New Law for Cyberspace? 
Dr Katharina Ziolkowski
NATO CCD COE
12:30-12:50Short Break
12:30-12:50
12:50-13:30Address of the President of the Republic of Estonia
H.E. Toomas Hendrik Ilves
12:50-13:30
13:30-14:30Lunch
13:30-14:30
Interdisciplinary Aspects
14:30-15:00Ethics of Cyber Warfare
Dr Mariarosaria Taddeo
University of Hertfordshire, Department of Philosophy, School of Humanities, Marie Curie Fellow / University of Oxford, Information Ethics Group (IEG), Senior Research Associate, UK
14:30-15:00
15:00-15:30The Militarisation of Cyberspace: Why Less May be Better
Dr Myriam Dunn Cavelty
Swiss Federal Institute of Technology, Centre for Security Studies, Head of the New Risk & Resilience Research Group, Switzerland
15:00-15:30
Closing Ceremony
15:30-15:45Concluding Remarks & Farewell 
COL Ilmar Tamm, Dr Rain Ottis, Dr Katharina Ziolkowski
NATO CCD COE
15:30-15:45
16:00Buses leave from the Nordic Hotel Forum for the ICT Demo Centre Tour
16:00




https://web.archive.org/web/20120704101210/http://ccdcoe.org/cycon/agenda2012.html








Kommentaare ei ole:

Postita kommentaar