CCDCOE 2010 June 15, 2010 to June 18, 2010, Estonia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Legal Training Anonymous Speaker Following the success of the Legal Training preceding the Legal & Policy Conference in 2009, ... Security Legal
Journalist Workshop Anonymous Speaker On the day before the conference, CCDCOE is hosting a journalist-only event on 15 June ... Workshops
Welcome Speech Jaak Aaviksoo Security Others
Opening Remarks Ilmar Tamm Security Others
Keynote Address: H.e. Toomas Hendrik Ilves Keynote
Track Keynote:Living In Compromise To Advanced Persistent Threats Eddie Schwartz Keynote
Pinprick Attacks: A Form Of Low Intensity Cyber Conflict Antoine Lemay Security Cyberwar
Cyber Conflict In The Frame Of Low Intensity Conflict Samuel Liles Security Cyberwar
Unskilled Volunteers In Cyber Conflicts Rain Ottis Security Others Cyberwar
Technology, Policy, Law, And Ethics Regarding U.S. Acquistition And Use Of Cyber Attack Capabilities - U.S. Lessons Learned Herb Lin Security Others Cyberwar
Panel Discussion: Non-State Actors In Cyber Conflicts Samuel Liles , Rain Ottis Panel
Five Years Of Persistent Targeted Attacks Maarten Van horenbeeck , Bruce Dang Security Deep Knowledge
State Of The Net 2010 Mikko Hypponen Security Web
Blurring Boundaries: Crime And Espionage Online Nart Villeneuve Security Others Legal Cyberwar
Cyber Warfare: Beyond The Beyond The Hype Talks Haroon Meer Security Others Cyberwar
Israeli Government Information Security Overview: Architecture, Attacks, And Incident Response Assaf Keren Security Cyberwar
Schmitt Revisited: Computer Network Attack And The Use Of Force Thomas Wingfield , Eneken Tikk Security Network Penetration
Cyber Security From Article 4 And 5 Perspective Ulf Häussler Security Intrusion Detection Incident Response Legal
Geographical Implications Of Cyber Security Wolf Heintschel Von heinegg Security Others
State Attribution Of Cyber Attacks Scott J. Shackelford Security Others Cyberwar
Different Legal Constructs For State Responsibility Maeve Dion Security Legal
Attribution And Responsibility Of Non-State Actors Russell Buchan , Lilian Edwards Security Others
Cyber Incident Data Exchange Eneken Tikk Security Data Exfiltration
Data Protection Gudielines For Nato Simona Rocchi Data Exfiltration Intrusion Prevention
It Supply Chain Risk Michael Aisenberg Security Others
Keynote Melissa Hathaway Keynote
Track Keynote:Preparing Nato For Cyber Conflicts – The Uk Perspective Gloria Craig Security Cyberwar
Panel Discussion: Nato And Cyber Conflicts Gloria Craig , Rex Hughes Panel
Building A Cyber Force Structure Stuart Starr Cyberwar Development
Mission Assurance Michael Grimaila Security Others
Finding Ideas, Technologies And Talent For The Cyber Force Michael B Jones Security Cyberwar
Definitions Framework For Cyber Conflict Peeter Lorents Security Infrastructure Cyberwar
Situation Management In Cyber Conflicts Gabriel Jakobson Security Intrusion Detection Incident Response Cyberwar
Track Keynote: Breakingpoint Systems – Deep Packet Inspection Richard Favier Security Infrastructure Others Analysis
The Future Of Browser Security Chris Evans Security Application Security Browser
Kim Jong-Il And Me: How To Build A Cyber Army To Attack The U.S. Charlie Miller Security Exploitation Risk Media Law Enforcement Application Security Cyberwar
Chinese Cyber Warfare And Computer Network Exploitation Bryan Krekel , George Bakos Security Network Penetration Cyberwar
A Multi-Criteria Clustering Approach To Support Attack Attribution In Cyberspace Olivier Thonnard Cyberwar
Track Keynote: Comprehensive Approach To International Cyber Security Eneken Tikk Security Legal Application Security
Developments In The Eu In The Field Of Cno Chris Stace Development
Recent Initiatives And Plans At The Osce Nemanja Malisevic Security Others
Criminal Law Approach To Cyber Defence In Coe, Eu And Un Marco Gercke Legal Cyberwar
Understanding Cyber Operations In A Canadian Strategic Context: More Than C4Isr, More Than Cno Melanie Bernier, J. Treurniet Infrastructure
Cyber Threats And National Security: Why Can’T We Agree? Forrest Hare Cyberwar
Cyber Deterrence And International Institutions Ryan Kaminski Security Intrusion Detection Incident Response Intrusion Prevention
Conceptual Framework For Cyber Security And Conflicts Heli Tiirmaa-klaar Security Infrastructure Cyberwar
Us And Chinese National Cyber Strategies Vincent Joubert Cyberwar
Optimizing It Security Costs By Evolutionary Algorithms Toomas Kirt , Jüri Kivimaa Security Others Business
Agent-Based Modeling And Simulation Of Botnets And Botnet Defense For Homeland Security Igor Kotenko Security Analysis Botnets
Domain Engineering For Cyber Defence: A Case Study And Implications Jaak Tepandi Security DNS Cyberwar
Cyber Attacks And The Resilience Of Internet Infrastructure Rytis Rainys Security Infrastructure Intrusion Detection Incident Response Cyberwar
Background Of Cyber Security Regulation Struggle - Examples Of Analogies Dan Ryan Security Compliance
Cyber Conflict: Multidisciplinary Perspective James Bret Michael Security Cyberwar
Panel Discussion Julie Ryan , Ilias Chantzos , Jason Healey , Derek Jinks Panel
Keynote Address Peter Flory Keynote