“Information Dominance and Cyber Security at various
Crossroads – Challenges and Solutions in the Cyber-Physical World”
While IT and cyber security themselves are becoming more mature nowadays, they are simultaneously and continuously challenged by an ever-increasing and even more sophisticated level of threat. Moreover, as through digitalization the cyber and physical domain are more and more converging, it is about time to ask about the added value of connecting relevant actors of traditionally separated spheres where their respective responsibilities meet, cross, or overlap. The way we perceive and handle cyber security today (as being a rather new and dynamic phenomenon) and the way we deal with traditional physical assets (well known, somehow static) is fundamentally different and may well result in a “clash of cultures”, at least in hampering convergence. Joining forces at such “crossroads” and letting experts from different origins exchange on their experience and solutions will substantially increase security in the C5ISR (C4ISR and the fifth “C”: Cyber) spheres of government and society.
It will definitely help to close voids in security, voids which may protrude at such points of contact if not taken care of properly. It will also add to the legitimate governmental interest, both of the Armed Forces and law enforcement, to (re-)gain information superiority, or ultimately even information dominance, in situations where adversaries have almost unlimited access to affordable technology and take advantage of it.
At a conference, where traditional logistics supply chain best practices meet secure quality requirements for hard- and software, where advanced capabilities for detection, attribution and localization of cyberattack origins can meet the standard of judicially qualified evidence in prosecution, where military technology for high resolution on the battlefield or wide area surveillance can inspire modern means for border security and vice versa (including handling of mass data and biometrics), where ultimately the requirements for interoperability of embedded software of modern weapon systems and network capabilities need to be aligned, such positive encounters, if exploited jointly, will benefit various governmental institutions, including the Armed Forces, and will result in overall increased security and efficiency. Meeting at such a crossroads requires openness for unprecedented solutions and involving non-traditional partners in industry, academia and government. Connecting relevant partners in Government, Armed Forces, and Law Enforcement might also change the way they deal with cyber security issues habitually.
Two days of information, exchange of views, discussions amongst and between the two spheres of defence and internal and border security will provide an exceptional educational experience where concepts and solutions could also be traded between the two groups. This will be especially the case during sessions with a large share of connecting themes and subjects of mutual interest (“crossroads”). Such sessions take place on day one (in the afternoon) and day two (in the morning). In addition, a thematic block will focus on specific military aspects, and another thematic block will discuss the relevance of security in the supply chain for all aspects of national security and sovereignty.
1. Securing the IT supply chain – is it all we need for comprehensive cyber security?
2. “Smart perimeters” – what border security and military surveillance have in common
3. Securing weapon systems operations by deeper IT interoperability and increased cyber security
Possible speaking opportunity: you can submit an abstract for consideration for a speaking role in the conference programme, provided that the submitter can deliver the required profile and level of speaker required.