2022 International Security Conference
The International Security Conference will see a host of leading experts come together to deliver CPD certified content that will help you understand security best practice as applied to a range of different scenarios – an ideal opportunity to get practical advice from some of the most qualified names in the security industry. View the full timetable below.
Both days will be Moderated by the Association of Security Consultants.
SPONSORED BY
SPONSORED BY
-
30 mins
- International Security Conference
A case study of the recent Stade de France incident (crowd management, policing, event management)
-
30 mins
- International Security Conference
The leading role of NaCTSO in the delivery of the new Protect Duty and its implementation within Counter Terrorism Policing. Superintendent Adam Thomson explains the drivers for change, the elements o ...
-
30 mins
- International Security Conference
Share how security technologies provide data that delivers value to tenants, property managers and building owners. A focus on existing security technologies and how to leverage these to deliver that ...
-
30 mins
- International Security Conference
- Improved protection; contemporary security is arising from thoroughly elaborated HVM-Schemes
- Improved liveability; combining VSBs with urban greening is enhancing a projects versatility and carbon footprint
- Improved efficiency; multipurpose driven progress is positively affecting global application of HVM measures
- Hostile Vehicle Attacks are now common due to the diversification of motives and triggers
-
30 mins
- International Security Conference
- Understand the scale of the challenge
- Understand the progress being made in Martyn's Law
- Understand the likely breadth and impact of the legislation
-
15 mins
- International Security Conference
Technology is critical to protecting publicly accessible locations. This update highlights some of the key capabilities available to keep the public safe from terror.
-
45 mins
- International Security Conference
High functioning teams. Mitigating group think social representation in security resulting in an increased influence. Authentic businesses performing ethically with strong moral foundations in ED&I wi ...
-
45 mins
- International Security Conference
- An introduction to hostile reconnaissance, including case studies and the hostile mindset
- How the police use Project Servator to disrupt hostile reconnaissance
- See Check and Notify (SCaN) – training to help organisations disrupt hostile reconnaissance
-
45 mins
- International Security Conference
- Understand the benefit of Behavioural Threat Assessments
- Recognising differences between those who pose a threat from those who make a threat
- The Pathway to Violence – recognising the process of an escalating threat
- Identify pre-attack warning behaviours for targeted violence
-
30 mins
- International Security Conference
Addressing the issues of equality in the digital and technology sector Focus on the "forgotten workforce" – that is professional women in prison, with the knowledge, skills and behaviours to contribut ...
-
30 mins
- International Security Conference
Protect and Prepare – how is it changing and what do organisations need to be aware of? Insights from the national lead.
-
30 mins
- International Security Conference
PERSON INITIATED THREATS and EXTERNAL THREATS
Deliberate acts from outside the industry presumption of knowledge or ‘imagined’ idea that, in this case, the OIM has specific training to deal with an unquantifiable level of security risk. This apparent training gap would be supported by the findings of Hollnagel (2006 p.86) who alludes to risk evaluation as “work as imagined” and “work as done” current status and recommendations.
-
30 mins
- International Security Conference
The importance of understanding your site and considering crime prevention measures to prevent cable theft within it, following the recent sharp rise in metal theft across the UK.
-
30 mins
- International Security Conference
OSINT has transitioned from being a largely untrusted source, but now stands shoulder to shoulder with the other ‘INTs’ OSINT is used not only to uncover valuable insight but has now become a critica ...
-
30 mins
- International Security Conference
- Why innovation is needed
- What is the Defence and Security Accelerator (DASA) doing to support this?
- How innovators can benefit working with DASA
-
30 mins
- International Security Conference
Mental Health Crisis – a presentation on the Harm Reduction Team - who are we and what do we do.
-
15 mins
- International Security Conference
Technology is critical to protecting publicly accessible locations. This update highlights some of the key capabilities available to keep the public safe from terror.
-
30 mins
- International Security Conference
-
45 mins
- International Security Conference
-
30 mins
- International Security Conference
The world is constantly changing, and in particular the way we work and where we work has shifted dramatically. I will cover how Government Security is reacting to that, from a supply base that uses insecure technology, to a complex federated infrastructure with no clear leader. I'll cover the newest evolution of access control technologies, and how we are deploying it across hundreds of sites, hundreds of thousands of staff and enabling staff mobility and flexibility in a modern era.
-
30 mins
- International Security Conference
- Real Life Cases
- How are we vulnerable to cyber crime
- How to avoid cyber crime