CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015



Similar documents
Privacy in the Digital Age of Encryption and Anonymity Online

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER am 1.00pm Green Park Conference Centre, Reading

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Promoting a cyber security culture and demand compliance with minimum security standards;

Addressing Cyber Risk Building robust cyber governance

2. Cyber security research in the Netherlands

Big 4 Information Security Forum

Introduction to Cybersecurity Overview. October 2014

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Master of Science in Cyber Security and Management

Oil & Gas Cybersecurity

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011

How To Teach Cyber Security

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

The enemies ashore Vulnerabilities & hackers: A relationship that works

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Gregg Gerber. Strategic Engagement, Emerging Markets

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES. Transforming Your Research and Analytic Skills

Information Security and Cryptography

Advanced Summer Programme

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

CYBER SECURITY TRAINING SAFE AND SECURE

Bertram Aitchison Art History Breaks January, 2016

Developments in cybercrime and cybersecurity

26 th Annual Texas Crime Stoppers Conference October 8-10, 2014

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

CONSULTING IMAGE PLACEHOLDER

CYBER SECURITY FOUNDATION - OUTLINE

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee , Geneva

Certified Cyber Security Analyst VS-1160

The UK cyber security strategy: Landscape review. Cross-government

New challenges in Data privacy.

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA

Cyber intelligence exchange in business environment : a battle for trust and data

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FINAL SCHEDULE YEAR 1 AUGUST WEEK 1

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

How To Become A Member Of Europol

The EU s approach to Cyber Security and Defence

Cyber Security Strategy

Certified Cyber Security Analyst VS-1160

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Academic Calendar for Faculty

Intelligence, Statecraft and Multi-dimensional Security in the Caribbean

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

Data Protection Compliance in the EU

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Cyber Security Review

Security & privacy in the cloud; an easy road?

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

Part-time Diploma in InfoComm and Digital Media (Information Systems) Certificate in Information Systems Course Schedule & Timetable

for the Caravan & Holiday Parks Industry

Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData. Free (ISC) 2 Workshop

Who s Doing the Hacking?

Bellevue University Cybersecurity Programs & Courses

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

Performance Management in Public Sector Organisations: The Contribution of the CAF

FOREST EUROPE EXPERT LEVEL MEETING FOR THE PREPARATIONS OF THE EXTRAORDINARY MINISTERIAL CONFERENCE PRACTICAL INFORMATION

Cybercrime: risks, penalties and prevention

Certificate in Cyber Security

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Cyber-Intelligence and Cyber-Espionage

August 16 August 22, 2009 November 1 November 7, 2009

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Practical Steps To Securing Process Control Networks

Special Focus: Fighting Botnets

Assessing the Legacy of the ICTY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Seminar on Ethical Hacking and Cyber Crime Get comprehensive Know-how in just one week! Introduced by your trusted security partner.

ARI 26/2013 (Translated from Spanish) 17 September Cyber cells: a tool for national cyber security and cyber defence

FOR ASIAN-PACIFIC SENIOR OFFICERS. General information

Invitation. International Series Part of Badminton Europe Circuit 2014/2015. Norwegian International Championships 2014

Europol Public Information VACANCY NOTICE

Risk Management in Global Operating Industry

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

EXHIBITOR AND SPONSORSHIP

Cyber Learning Solutions

Cyber security in an organization-transcending way

Middle Class Economics: Cybersecurity Updated August 7, 2015

A Primer on Cyber Threat Intelligence

Interparliamentary conferences Dutch EU Presidency Practical information. Conference venue. App. Hotels

Cyber security guide for boardroom members

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

Adult Education Course Bulletin. Winter and Spring 2015 January - June.

Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Executive Cyber Security Training. One Day Training Course

TUSKEGEE CYBER SECURITY PATH FORWARD

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Research Topics in the National Cyber Security Research Agenda

Seminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK

Training Workshop on Financial Analysis of Investment Project Scenarios with Application of COMFAR software. Training for Trainers

Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from the World s Top Experts in Homeland Security

Jan van den Berg. Delft University of Technology. Faculty of Technology, Policy and Management, section of ICT

Transcription:

BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting a fiveday course on Cyber Security, Intelligence and Awareness at the Park Hotel in The Hague, Netherlands. This five day hands-on program will provide the attendee with a comprehensive overview and understanding of the most current and pressing issues in the cyber domain. An encompassing overview of cyber will be given addressing cybercrime, hacktivism, cyber war, cyber espionage and intelligence. This course will not only create awareness of the risks and threats out there, but also equip you with an understanding of how the cyber domain works. This understanding will allow you to recognize and analyze these issues in your own organization. The cyber intelligence cycle and the cyber kill chain, are examples of many tools that will be used and help dissect and illustrate attacks. A broad comprehension of the most pressing issues and current events will be enhanced by the usage of examples of cyber offenses and the analysis thereof. The combination of getting a basic understanding of how the cyber domain works, learning to analyze risks and threats, against the backdrop of case studies and analysis of current issues and events in the cyber domain, will ensure awareness and a professional understanding that equips you to recognize future threats. WHO SHOULD ATTEND? Law Enforcement Personnel, (Military) Intelligence Officers, Security Officers, General Police Officers, Police Officers assigned to Anti-Terrorism activities, Intelligence Analysts, Financial Intelligence Officers, Academics, Security Managers, Protective Service Agents, Investigators, Threat Assessment Professionals and Corporate Managers and or CEOs. LEARNING OBJECTIVES Students attending the Cyber Security, Intelligence and Awareness Course will acquire the following skills and competencies: General knowledge of and familiarization with cyber concepts and attack forms Understanding the global threat landscape and actors Knowledge about strategic, tactical and operational cyber intelligence

Understanding cryptography, data security and financial intelligence Recognizing vulnerabilities and how to deal with that knowledge Acquire knowledge on cyber ethics and the legal framework SCHEDULE AND OUTLINE MONDAY 26 OCTOBER (DAY 1) INTRODUCTION TO CYBERSECURITY Evolution of Information Security Cyber security Theory Concepts and Definitions Government versus Private models Threats and Vulnerabilities Malware Analysis Strategies versus Defense/Cyber Kill Chain THREAT ACTORS AND INTELLIGENCE Understanding the threat landscape and Actors Identifying critical threats and how to counter them Critical Infrastructure Protection (CIP) Critical Energy Infrastructure Protection (CEIP) Cyber intelligence capabilities and Espionage Surveillance and Reconnaissance Big Data TUESDAY 27 OCTOBER (DAY 2) CRYPTOGRAPHY AND DATA SECURITY History of Cryptography and Cryptanalysis Conventional and public-key Cryptography Cryptographic Protocols and Cryptanalytic Techniques Electronic mail security/network Layer Security Transport layer and Web Security Virtual private networks ETHICS IN CYBER SECURITY AND CYBER LAW Privacy Intellectual Property Professional Ethics Fair User and Ethical Hacking

Internet Fraud Cybercrimes Forensic Technologies Digital Evidence Collection Evidentiary Reporting WEDNESDAY 28 OCTOBER (DAY 3) FINANCIAL CYBER INTELLIGENCE GLOBAL CYBER CAPABILITIES AND TRENDS Global trends Capabilities of Nation States Capabilities of non-state actors Theory and Practice of Cyber War THURSDAY 29 OCTOBER (DAY 4) CYBER WARFARE Emerging policies Doctrines and national strategies Operational requirements at nation state level Battle space perspective Cyber assets in warfare CASE STUDIES & EXERCISE FRIDAY 30 OCTOBER (DAY 5) COOPERATION AND FUTURE PROSPECTS International cooperation in Cyber Security Intelligence sharing Standardization of national cyber strategies Knowledge applied to case studies Lessons learned GRADUATION CEREMONY N.B. Please note that the specific items in the schedule may be subject to change

WHAT WILL YOU RECEIVE In addition to 36-hours of instruction, all students attending the Cyber Security and Awareness Course will receive the following: LSN Certificate of Completion suitable for framing; All course materials used throughout the 5-day course; One Year membership of Lowlands Solutions Netherlands(LSN) in which you receive a 20% discount on tuition on one LSN course and/or module until November 2016. ABOUT THE INSTRUCTORS During the course you will encounter numerous instructors with a background at the Dutch Ministry of Defence (Intelligence), The Hague University of Applied Sciences, EUROPOL, Home Office and the London Metropolitan University (LMU). ENROLLMENT Tuition: EURO 1549 (ex VAT) (Group discounts available, please contact lsn.info@mail.com for details.) Enrollment in the LSN course also includes catered lunches and coffee breaks Students that wish to enroll for this course should use the course enrollment form attached to this invitation or use the Adobe PDF on our website. When completed forward the enrollment form to LSN by email or to our postal address. When your registration form is processed, you will receive a confirmation by email after which an invoice will be sent for the total course fee. Once the payment has been received by our organisation your seat in the Criminal Intelligence Analysis Course is guaranteed. Please read the attached LSN Course Enrollment Terms and Conditions prior to registration. Questions regarding enrollment may be submitted to the following email: lsn.info@mail.com

LODGING AND TRAVEL INFORMATION The LSN Cyber Security, Intelligence and Awareness Course will be conducted on-site at the Park Hotel The Hague in the Netherlands. Parkhotel Den Haag Molenstraat 53, 2513 BJ, The Hague Phone: +31 (0)70 362 43 71 Fax: +31 (0)70 361 45 25 Email: info@parkhoteldenhaag.nl Website: www.parkhoteldenhaag.nl Available rates EUR 99 (budget room), EUR 129 (superior room for single use), EUR 139 (superior room for double use). Room rates are per night including the breakfast buffet and city tax EUR 4,60p.p.p.n. For hotel information please use the link on our website. Parking: there is limited availability for indoor parking. Reservation is required, EUR 22,50 per overnight stay. Payment: upon departure by the guest. Please do not make a reservation prior to course- and enrollment confirmation by Lowlands Solutions Netherlands (LSN).