Skip to main content
ISE logo

26-27 SEPTEMBER 2023
OLYMPIA LONDON

2022 International Security Conference

Hero Subpage

Image

Hero Subpage ISE

ISE

2022 International Security Conference

International Security Conference

The International Security Conference will see a host of leading experts come together to deliver CPD certified content that will help you understand security best practice as applied to a range of different scenarios – an ideal opportunity to get practical advice from some of the most qualified names in the security industry. View the full timetable below.

Both days will be Moderated by the Association of Security Consultants.

SPONSORED BY

PatriotOne Technologies

SPONSORED BY

Rekor Systems

Loading
10:30
  1. 30 mins
    • International Security Conference
    A case study of the recent Stade de France incident (crowd management, policing, event management)
11:00
  1. 30 mins
    • International Security Conference
    The leading role of NaCTSO in the delivery of the new Protect Duty and its implementation within Counter Terrorism Policing. Superintendent Adam Thomson explains the drivers for change, the elements o ...
11:30
  1. 30 mins
    • International Security Conference
    Share how security technologies provide data that delivers value to tenants, property managers and building owners.  A focus on existing security technologies and how to leverage these to deliver that ...
12:00
  1. 30 mins
    • International Security Conference
    • Improved protection; contemporary security is arising from thoroughly elaborated HVM-Schemes
    • Improved liveability; combining VSBs with urban greening is enhancing a projects versatility and carbon footprint
    • Improved efficiency; multipurpose driven progress is positively affecting global application of HVM measures
    • Hostile Vehicle Attacks are now common due to the diversification of motives and triggers 
12:30
  1. 30 mins
    • International Security Conference
    • Understand the scale of the challenge
    • Understand the progress being made in Martyn's Law
    • Understand the likely breadth and impact of the legislation
13:00
  1. 15 mins
    • International Security Conference
    Technology is critical to protecting publicly accessible locations. This update highlights some of the key capabilities available to keep the public safe from terror.
14:30
  1. 45 mins
    • International Security Conference
    • An introduction to hostile reconnaissance, including case studies and the hostile mindset
    • How the police use Project Servator to disrupt hostile reconnaissance
    • See Check and Notify (SCaN) – training to help organisations disrupt hostile reconnaissance
15:15
  1. 45 mins
    • International Security Conference
    • Understand the benefit of Behavioural Threat Assessments 
    • Recognising differences between those who pose a threat from those who make a threat 
    • The Pathway to Violence – recognising the process of an escalating threat 
    • Identify pre-attack warning behaviours for targeted violence   
16:00
  1. 30 mins
    • International Security Conference
    Addressing the issues of equality in the digital and technology sector Focus on the "forgotten workforce" – that is professional women in prison, with the knowledge, skills and behaviours to contribut ...
16:30
  1. 30 mins
    • International Security Conference
    Protect and Prepare – how is it changing and what do organisations need to be aware of? Insights from the national lead.
10:30
  1. 30 mins
    • International Security Conference

    PERSON INITIATED THREATS and EXTERNAL THREATS

    Deliberate acts from outside the industry presumption of knowledge or ‘imagined’ idea that, in this case, the OIM has specific training to deal with an unquantifiable level of security risk.  This apparent training gap would be supported by the findings of Hollnagel (2006 p.86) who alludes to risk evaluation as “work as imagined” and “work as done” current status and recommendations.

11:00
  1. 30 mins
    • International Security Conference
    The importance of understanding your site and considering crime prevention measures to prevent cable theft within it, following the recent sharp rise in metal theft across the UK.
11:30
  1. 30 mins
    • International Security Conference
    OSINT has transitioned from being a largely untrusted source, but now stands shoulder to shoulder with the other ‘INTs’  OSINT is used not only to uncover valuable insight but has now become a critica ...
12:00
  1. 30 mins
    • International Security Conference
    • Why innovation is needed
    • What is the Defence and Security Accelerator (DASA) doing to support this?
    • How innovators can benefit working with DASA  
12:30
  1. 30 mins
    • International Security Conference
    Mental Health Crisis – a presentation on the Harm Reduction Team - who are we and what do we do.
13:00
  1. 15 mins
    • International Security Conference
    Technology is critical to protecting publicly accessible locations. This update highlights some of the key capabilities available to keep the public safe from terror.
14:30
  1. 30 mins
    • International Security Conference
    The world is constantly changing, and in particular the way we work and where we work has shifted dramatically. I will cover how Government Security is reacting to that, from a supply base that uses insecure technology, to a complex federated infrastructure with no clear leader. I'll cover the newest evolution of access control technologies, and how we are deploying it across hundreds of sites, hundreds of thousands of staff and enabling staff mobility and flexibility in a modern era.

Sign up to The Security Bulletin, our fortnightly e-newsletter bringing the latest trends, global news and updates straight into your inbox

Subscribe to your newsletter

 

2022 International Security Conference

Hero Subpage

Image

Hero Subpage ISE

ISE