Noah Rauch shares a behind-the-scenes look at the Museum and its unique leadership and mission-based programming for public and private sector organizations around the world.
Access Control Tokens, commonly used as keys, could serve as portable identities across various locations and systems. This single token would enable user authentication and verification for access, r
…
• Examining the often-neglected topic of how organisations recover from a terrorist attack their properties or people were involved in. • Police cordons create business interruption and loss of attrac
…
• Detecting what cameras don't see – how sound analytics reveal critical incidents even in blind spots, darkness, crowded environments. • Operational Efficiency – Alerting operators only to meaningful
…
Andy will be talking about capability building and how the partnership model has been helping support improved management of critical incidents and harnessing the learning from experiences. He will be
…
• Tom will be exploring opportunities to build resilience and counter security threats at a Neighbourhood level. • He will outline the latest developments in Neighbourhood Policing – a key tenet of th
…
An academic view of temporary vehicle security barriers; key features and advantages; vulnerabilities & complexities and best practice & cost effective strategies.
• What are the emerging geopolitical security trends? • Where are these trends likely to impact most on communities, businesses and states? • Why do we need to learn to live with uncertainty in an inc
…
• Strategic Risk Assessment: Demonstrating the role of intelligence-led security planning in countering emerging threats. • Incident and Crisis Response: Best practices in managing major incidents, fr
…
Counter-terrorism advisor Yan St-Pierre and international HVM expert Christian Schneider will discuss current and emerging hostile vehicle attack trends and how to deal with the new challenges they pr
…
Terrorist threats are evolving. We see a move from al-Qaeda operations to lone-wolf Isil inspired attacks. It is unrealistic to expect Governments, solely, to protect the security of a nation. Public/
…
How can you better use data and digital technology to tackle your team’s challenges? Join experts from government, industry and academia in changing the way you think about problems and how to approac
…
1. Why Men’s Health Matters in the Security Sector • The physical and mental demands of frontline security roles • The stigma around discussing health and well-being in male-dominated industries 2. Ph
…
Through viewpoint of their recent research article published in the Journal of Business Continuity and Emergency Planning (Henry Stewart Publications) “After the horse has bolted? A quantitative asses
…
As time passes, the lessons of 9/11 emerge with deeper clarity, highlighting key elements of crisis response that continue to resonate. Drawing from its access to government and corporate leaders and
…
The origins of the model, the model itself, what it’s aiming to achieve, some examples, the need to address short acute events but also longer-term strains and stresses, the balance between strategic
…
Recognised for his heroic actions during the Leicester Square attack, Abdullah brings a deeply personal perspective to the conversation around frontline safety and preparedness. He’ll be joining Satia
…
Memorial museums have emerged in response to traumatic events, particularly those involving acts of terrorism. To discuss how these institutions convey the human experience of these attacks, this pane
…
Panellists will provide examples on how up-to-date the resilience of their industry is and how far off or on par we are with where we want to be, some of the biggest threats to Infrastructure at the m
…
• An unpacking of the importance of understanding the histories and factors that contribute towards making certain individuals vulnerable to radicalisation • An overview of the disproportionality of e
…
A rapidly shifting world order, frontier technologies and a new breed of adversaries are converging to redefine the western cyber security agenda. We are seeing State-backed operators such as China’s
…
A central focus of insider risk is the individual, but organisations often hold equal responsibility. Using case studies, Lorna will examine organisational responses to real-world insider behaviour, a
…
With spiking set to become a standalone criminal offence under the Police and Crime Bill currently progressing through UK Parliament, security professionals and venue operators face a pivotal moment f
…
Vehicle Rammings: • How the tactic evolved particularly in “developed” countries • Attacker Motives: Ideological and Non-ideological • Attacker Methods: Vehicle Acquisition, Type and Use • Other Weapo
…
Patrick will discuss how adversaries like Russia used open-source type information and data to conduct very successful influence campaigns against the United States, especially during the national ele
…
• Nuances of doing business with US Security Agencies • Market intelligence (spending, activity, needs) • The Do’s as and the Don’ts • The current landscape of the Three Letter Agencies • Internationa
…