ISE logo

27-28 SEPTEMBER 2022
OLYMPIA LONDON

Product Innovation Theatre

Hero Subpage

Image

Hero Subpage ISE

ISE

Product Innovation Theatre

Product Innovation Theatre

Product Innovation Theatre

Focusing on innovation, discover the latest products and technologies that are shaping the future of the security industry.

A vital platform for leading brands and companies with launch products to showcase solutions that are fundamental to the development of this industry whilst enabling visitors the opportunity to listen to product experts talk about their latest security innovations with real-life applications.

International Security Expo                International Cyber Expo

Loading
10:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Ultra slim profile shallow mount Anti-Terrorist bollards 

    Spring Steel Crash Rated  Street Furniture in the Public Realm

    Cost Effective, Large Perimeter HVM

11:20
  1. Theatre 6
    20 mins
    • Product Innovation

    This talk first outlines the main problems traditional Network Detection & Response (NDR) solutions face: encrypted traffic, increasing network bandwidths and a shift towards distributed hybrid networks.


    Then we show how an analytics approach that replaces traffic mirroring with specialized algorithms that reconstruct network activities from light-weight network log data copes with these challenges.


    Further, we'll show with practical examples why not only detection but also visibility, that is establishing a bird's-eye view over the IT network, is crucial for an effective NDR approach

11:45
  1. Theatre 6
    20 mins
    • Product Innovation
    As drones become more affordable and accessible, new threats appear
    Drones are now playing an active role in various international conflicts
12:10
  1. Theatre 6
    20 mins
    • Product Innovation
    • What cloud and edge computing means for the security sector (conceptual model) and what are the benefits of using it?
    • Threat Modelling Analysis – What are the key threat agents that affect edge computing ecosystem, the natural risks that this type of products may be vulnerable to and the related cyber threats?
    • How can information security assessments help improve the resilience of this ecosystem? By providing full visibility of their risk posture, helping them integrate innovation in cybersecurity and show them the opportunities for improvement in order to maintain the confidentiality, integrity, and availability of data and operations.
    • Examples from previous work we have done that are relevant and applicable to this sector.
12:35
  1. Theatre 6
    20 mins
    • Product Innovation
    The emerging drone threat: smuggling, espionage, attack and beyond.
    State of the art sensors to monitor, detect, track, classify and alert of drone intrusions.
12:55
  1. Theatre 6
    20 mins
    • Product Innovation
    How to deliver operational efficiency without compromising physical security
    Managing the rush to Keyless technology
    Minimum standards for Critical Infrastructure
13:20
  1. 20 mins
    • Product Innovation

    Risk Quantification can be both an enticing and intimidating exercise for a business to pursue. How does an organization get from point A to point B (and back again) to score and value risk? In this webinar, we'll take a back-to-basics approach to break down the concept of risk, contrast this understanding with some of the modern applications of risk in business, and discuss how people across your organization may interpret the meaning of risk. We'll diagnose some of the common pitfalls companies fall into and identify perspectives to help account for variables that do not have defined parameters when understanding risk.  

13:45
  1. Theatre 6
    20 mins
    • Product Innovation
    Deep Learning and Artificial Intelligence (AI) facilitating Public Venue security
    Securing the Mailroom from explosives to biological pathogens
    An Integrated Security Eco-system
14:10
  1. Theatre 6
    20 mins
    • Product Innovation
    Public Authorities are particular vulnerable to visual hacking attacks
    The changing workplace - an IT-Security threat
    The art of visual hacking
    Effects of visual hacking on your organisation
    How best to protect your data from visual hackers
14:35
  1. Theatre 6
    20 mins
    • Product Innovation
    How to bring a synergy to IT operations and security departments.
    How to tackle cost reduction in resource and training requirements.
    How to reduce your portfolio of point products yet still achieve the same results.
14:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. Operations also continue to grow, involving more systems, more data, and many more users. In this session learn how the Police and London Underground are using PSIM to connect disparate security systems, devices, and sensors into a common operating picture that provides visibility and control “inside the perimeter” to enable faster response to critical events.

15:45
  1. Theatre 6
    20 mins
    • Product Innovation
    • The need for a next gen cybersecurity approach to ransomware and malware attacks.
    • How Votiro Secure File Gateway disarms undisclosed and disclosed ransomware, malware and zero-day attacks.
    • Case study - Real time email and other file gateway protection without business disruption.
    • Votiro + SureDrop for secure encrypted remote worker file sharing and collaboration.
16:10
  1. Theatre 6
    20 mins
    • Product Innovation

    This session will present concepts and solutions for different approaches to contend with the emerging threat of rogue drones in sensitive and challenging environments.

    • Traditional Technologies Are Insufficient – while traditional c-UAS technologies, based on radar, jamming, and/or kinetic mitigation certainly have had an impressive record of success and will continue to play a role in multi-layered defense strategies, these methods also have drawbacks, which render them less suitable for sensitive and challenging environments, due to the high risks of collateral damage, and interference and disturbance to communications, commerce, transportation, and the continuity of everyday life.
    • Cyber-Takeover, Counter-Drone Technology Offers Many Advantages – emerging drone challenges require different counter-drone solutions, with innovative approaches based on key counter-drone concepts: control, safety, focus and future-readiness.
    • Best Practices & Actionable Insights – the session will cover approaches to safely neutralize the most dangerous drone threats of today and tomorrow, and enabling the safest possible outcome of a rogue drone incident, in any environment or scenario, ultimately ensuring the seamless continuity of everyday life.
10:05
  1. Theatre 6
    20 mins
    • Product Innovation

    This talk will introduce the Attack Tree methodology and explain how Attack Tree diagrams are constructed.

    It will discuss how attack paths are identified using based on the logic of the Attack Tree diagram.

    It will demonstrate how the likelihood of each attack path may be estimated based on the obstacles faced by the attacker.

10:30
  1. Theatre 6
    20 mins
    • Product Innovation
    Password policies that are inadequate for modern account protection
    Accounts with elevated privileges in place that haven't been adequately reviewed
    Accounts with delegated permissions over Active Directory that have unwanted consequences on AD security that have proliferated over time
    Weak Group Policy configuration, which creates a variety of holes that attackers can drive through
10:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Understanding what your network’s technology is doing vs what it is intended to do

    How digital transformation can sometimes increase complexity, exacerbating information security issues

    How a systemic approach reduces the knowledge gap for key decisionmakers through practical changes

11:20
  1. Theatre 6
    20 mins
    • Product Innovation
    5G and Time Sensitive Networking (TSN) are key enablers for Industry 4.0 innovation
    Traditional security solutions and approaches introduce latency, which inhibit the benefits of these technologies
    Leonardo's cyber resilience approach delivers appropriate security posture and achieves the benefits of TSN

     
11:45
  1. Theatre 6
    20 mins
    • Product Innovation
    There is a new standard, EN17646 relating to encryption of data/entry credentials to remote enabled Safe locking
    Safe Locking Standard EN1300 Vs prEN17646
    In operational practice – what is best?
12:10
  1. 20 mins
    • Product Innovation

    The Defence and Security Accelerator (DASA) have been instrumental in supporting innovators develop novel ideas to enhance the UK security sector

    • In this session, DASA will provide an overview of:
    • Our two core funding mechanisms of Themed Competitions and the Open Call for Innovation
    • DASA mentoring and supplier support services
    • The new Security Rapid Impact Innovations Open Call, a cross-government competition that focuses on tackling challenges across the UK security landscape.
    • Find out more about how you can get involved, what the benefits of working with DASA are, and understand how your innovation could support the UK security sector.
12:35
  1. Theatre 6
    20 mins
    • Product Innovation

    Ultra slim profile shallow mount Anti-Terrorist bollards 

    Spring Steel Crash Rated  Street Furniture in the Public Realm

    Cost Effective, Large Perimeter HVM

12:55
  1. Theatre 6
    20 mins
    • Product Innovation

    CEM CertificationTM provides an organization’s employees, customers, and stakeholders with the confidence their company stands at the forefront of digital transformation and operates from a position of enterprise-wide resilience.

    Global organisations including Discover, Goldman Sachs, NBCUniversal, Dow and Alexion have already earned 'Best in Enterprise ResilienceTM' designation through rigorous CEM CertificationTM benchmarking.

13:20
  1. 20 mins
    • Product Innovation
    Partnership between Corps Security & MoonHub
    The Offering / Capabilities (Demo)
    Partnership Security Modules
    Linking in with all facets of organisations
     
13:45
  1. Theatre 6
    20 mins
    • Product Innovation
    Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities. GRC must transcend the traditional lines of defense specifically risk managers and audit professionals. In this webinar we'll discuss roles and responsivities of effective risk management practices. What can businesses do to better align key stakeholders? How can businesses incorporate Security by Design process and practices and where can technology support with structured data sets and automation?   
14:10
  1. Theatre 6
    20 mins
    • Product Innovation
    • How to protect critical assets through systematic, proactive threat intel.
    • What tools and information you need before you can start planning for threat hunting.
    • How to set priorities and build a threat-hunting road map.
    • The five steps involved in a threat hunt and how to perform them effectively.
    • How you can make the most of the information you gather through threat hunting.
14:35
  1. Theatre 6
    20 mins
    • Product Innovation
    • …how cyber-defenders can continue to acquire and hone their skills entirely through a browser but still in a hands-on fashion.
    • …how they can learn essential real-world skills, in real networks and real VMs. From security operations to forensics to secure DevOps, modules cover a breadth of mission-critical topics.
    • …how users learn to defend against advanced attacks, quickly recognise and fix vulnerabilities and develop muscle memory in how best to react when it happens in the real world.
    • …how actionable insights and metrics about performance and skill levels of team members can help identify the cybersecurity superstars, both already in your organisation and amongst those that may want to join.
    • …how a combination of self-paced learning together with pressurised group exercises is the best way to prepare your teams for every eventuality – at a fraction of the cost of traditional learning.

Sign up to our bi-weekly e-newsletter, bringing the latest trends, global news and updates straight into your inbox

Subscribe to your newsletter