ISE logo

27-28 SEPTEMBER 2022
OLYMPIA LONDON

Seminar Agendas

Hero Subpage

Image

Hero Subpage ISE

ISE

Seminar Agendas

Seminar Agendas

Loading
10:00
  1. 30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
10:30
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • To understand the fragmented nature of the phenomenon (from Templarism to Satanism).
    • To understand the importance of the far-right evolving symbolic and ideological settings to identify groups' activities and their online presence.
    • To learn current radicalisation strategies and the challenges to contrast them.
  2. Theatre 3
    30 mins
    • International Security Conference
    • What is ISO31030
    • How it can help drive improvements in safety and security in travel and hospitality
    • How should these sectors respond
  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    Importance of identifying and reporting threats, creating sustained resilience throughout an organisation.
    Using intelligence to drive resilience throughout an organisation during major global crisis.
    Back to business strategies, maintaining resilience to end of 2021 and beyond.
10:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Ultra slim profile shallow mount Anti-Terrorist bollards 

    Spring Steel Crash Rated  Street Furniture in the Public Realm

    Cost Effective, Large Perimeter HVM

11:00
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • The developing challenges facing the fight to counter terrorism in the UK today.
    • How state-sponsored activities, the rapid growth in extreme right-wing terror and how the threat has developed, throughout the pandemic.
  2. Theatre 3
    30 mins
    • International Security Conference
    20 years after 9/11: what are we doing better, what have we got wrong? Vulnerabilities to the aviation security system resulting from the pandemic Championing best practice and creating professionalism in the avsec arena  
  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
11:20
  1. Theatre 6
    20 mins
    • Product Innovation

    This talk first outlines the main problems traditional Network Detection & Response (NDR) solutions face: encrypted traffic, increasing network bandwidths and a shift towards distributed hybrid networks.


    Then we show how an analytics approach that replaces traffic mirroring with specialized algorithms that reconstruct network activities from light-weight network log data copes with these challenges.


    Further, we'll show with practical examples why not only detection but also visibility, that is establishing a bird's-eye view over the IT network, is crucial for an effective NDR approach

11:30
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • The Counter Terror challenges in the USA are slightly different to those in the UK, however lessons in dealing with the terrorist threat have a commonality that makes international understanding and cooperation essential.
    • An overview of the US approach will be delivered. 
  2. Theatre 3
    30 mins
    • International Security Conference
    • Development of behavioural detection within the UK
    • The component parts for effective use, complying with the latest CPNI guidelines
    • The achievable benefits of using behavioural detection as an added security layer
  3. Theatre 5
    60 mins
    • Disaster and Resilience Conference
    How to Achieve Operational Resilience and Keep People Safe During Disruptive Events
11:45
  1. Theatre 6
    20 mins
    • Product Innovation
    As drones become more affordable and accessible, new threats appear
    Drones are now playing an active role in various international conflicts
12:00
  1. 45 mins
    • International Security Conference
    How do you practically spot a liar, what are the skills you need what are the tips for security professionals?
  2. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • People who lead nations and set rules, need to understand the opportunities from
    technology so they can make good decisions
    • Blockchain philosophy and technology is critical to keep us safe and minimise crime
    • Digital trust requires greater investment in opportunity gains through technology strategy
12:10
  1. Theatre 6
    20 mins
    • Product Innovation
    • What cloud and edge computing means for the security sector (conceptual model) and what are the benefits of using it?
    • Threat Modelling Analysis – What are the key threat agents that affect edge computing ecosystem, the natural risks that this type of products may be vulnerable to and the related cyber threats?
    • How can information security assessments help improve the resilience of this ecosystem? By providing full visibility of their risk posture, helping them integrate innovation in cybersecurity and show them the opportunities for improvement in order to maintain the confidentiality, integrity, and availability of data and operations.
    • Examples from previous work we have done that are relevant and applicable to this sector.
12:35
  1. Theatre 6
    20 mins
    • Product Innovation
    The emerging drone threat: smuggling, espionage, attack and beyond.
    State of the art sensors to monitor, detect, track, classify and alert of drone intrusions.
12:55
  1. Theatre 6
    20 mins
    • Product Innovation
    How to deliver operational efficiency without compromising physical security
    Managing the rush to Keyless technology
    Minimum standards for Critical Infrastructure
13:20
  1. 20 mins

    Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities. GRC must transcend the traditional lines of defense specifically risk managers and audit professionals. In this webinar we'll discuss roles and responsivities of effective risk management practices. What can businesses do to better align key stakeholders? How can businesses incorporate Security by Design process and practices and where can technology support with structured data sets and automation?   

  2. 20 mins
    • Product Innovation

    Risk Quantification can be both an enticing and intimidating exercise for a business to pursue. How does an organization get from point A to point B (and back again) to score and value risk? In this webinar, we'll take a back-to-basics approach to break down the concept of risk, contrast this understanding with some of the modern applications of risk in business, and discuss how people across your organization may interpret the meaning of risk. We'll diagnose some of the common pitfalls companies fall into and identify perspectives to help account for variables that do not have defined parameters when understanding risk.  

13:30
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
  2. Theatre 3
    30 mins
    • International Security Conference
    The current cyber threat landscape and current risk: International examples Impact of an attack on the railway and/or its supply chain Solutions and preventative measures Key Learnings: Domestic and i ...
  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    How adopting Human Capital Risk Management can increase your organisational resilience. • What really motivates employees to become a threat? • Who really owns the risk within the Organisation? • Collaborative, Collective and Intelligent Risk Management • Wargaming: Improve and test Organisational Resilience.  
13:45
  1. Theatre 6
    20 mins
    • Product Innovation
    Deep Learning and Artificial Intelligence (AI) facilitating Public Venue security
    Securing the Mailroom from explosives to biological pathogens
    An Integrated Security Eco-system
14:00
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    Peter’s account of being taken hostage for 946 days whilst a contractor in Iraq in 2007 will
    highlight his hard‑hitting reality of living with terrorists for two years, seven months and
    one day. He was the only hostage out of five to be released alive
    • The impact of living in such proximity to his hostage‑takers, and how he has rebuilt his life
    to where he is today, is an inspiration
    Peter Moore, Software Development, Community
  2. Theatre 5
    30 mins
    • Disaster and Resilience Conference

    Natural disasters and violent incidents are increasing in frequency and severity:

    • How can organisations monitor and respond to adverse events in real-time?
    • How organisations can integrate disparate systems and risk feeds into a unified security platform  ?
    • How do integrated technology solutions drive greater efficiencies / cost savings ?
14:10
  1. Theatre 6
    20 mins
    • Product Innovation
    Public Authorities are particular vulnerable to visual hacking attacks
    The changing workplace - an IT-Security threat
    The art of visual hacking
    Effects of visual hacking on your organisation
    How best to protect your data from visual hackers
14:30
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • The emotional impact of trauma
    • Empathy and a family approach to leadership
    • Resilience and vulnerability – they are both equally important to thrive 
  2. Theatre 3
    30 mins
    • International Security Conference

    Are we viewing convergence as a defence method or an attack method? Does convergence begin, and end at the management level? Is convergence about infosec, physical security, or other? 

  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    • Examine remote workforce challenges faced by organisations and incident responders
    • Gain insight from recent remote working case study incidents
    • Explore preparation strategies for remote incident response 
14:35
  1. Theatre 6
    20 mins
    • Product Innovation
    How to bring a synergy to IT operations and security departments.
    How to tackle cost reduction in resource and training requirements.
    How to reduce your portfolio of point products yet still achieve the same results.
14:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. Operations also continue to grow, involving more systems, more data, and many more users. In this session learn how the Police and London Underground are using PSIM to connect disparate security systems, devices, and sensors into a common operating picture that provides visibility and control “inside the perimeter” to enable faster response to critical events.

15:00
  1. 30 mins
    • Disaster and Resilience Conference

    Resilience isn't just about disaster recovery, Practical steps now to build our business resilience, Resilience in the face of adversity is easier and more cost-effective than recovery afterwards 

  2. Olympia Room
    60 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • The international security landscape has been transformed since the Cold War
    • Terrorist groups and organised crime groups constantly adapt to these changes
    • Terrorists and organised criminals are dark networks, making them difficult to combat 
  3. Theatre 3
    60 mins
    • International Security Conference
15:45
  1. Theatre 6
    20 mins
    • Product Innovation
    • The need for a next gen cybersecurity approach to ransomware and malware attacks.
    • How Votiro Secure File Gateway disarms undisclosed and disclosed ransomware, malware and zero-day attacks.
    • Case study - Real time email and other file gateway protection without business disruption.
    • Votiro + SureDrop for secure encrypted remote worker file sharing and collaboration.
16:10
  1. Theatre 6
    20 mins
    • Product Innovation

    This session will present concepts and solutions for different approaches to contend with the emerging threat of rogue drones in sensitive and challenging environments.

    • Traditional Technologies Are Insufficient – while traditional c-UAS technologies, based on radar, jamming, and/or kinetic mitigation certainly have had an impressive record of success and will continue to play a role in multi-layered defense strategies, these methods also have drawbacks, which render them less suitable for sensitive and challenging environments, due to the high risks of collateral damage, and interference and disturbance to communications, commerce, transportation, and the continuity of everyday life.
    • Cyber-Takeover, Counter-Drone Technology Offers Many Advantages – emerging drone challenges require different counter-drone solutions, with innovative approaches based on key counter-drone concepts: control, safety, focus and future-readiness.
    • Best Practices & Actionable Insights – the session will cover approaches to safely neutralize the most dangerous drone threats of today and tomorrow, and enabling the safest possible outcome of a rogue drone incident, in any environment or scenario, ultimately ensuring the seamless continuity of everyday life.
17:00
  1. 90 mins
    • Global Counter Terror and Serious and Organised Crime Summit
  2. 90 mins
    • Disaster and Resilience Conference
  3. 90 mins
    • International Security Conference
10:00
  1. 30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
10:05
  1. Theatre 6
    20 mins
    • Product Innovation

    This talk will introduce the Attack Tree methodology and explain how Attack Tree diagrams are constructed.

    It will discuss how attack paths are identified using based on the logic of the Attack Tree diagram.

    It will demonstrate how the likelihood of each attack path may be estimated based on the obstacles faced by the attacker.

10:30
  1. Theatre 3
    30 mins
    • International Security Conference
    • Improved protection
    • Contemporary security is arising from thoroughly elaborated HVM-Schemes + improved flexibility
    • Combining permanent with transient VSBs is enhancing a projects versatility + improved efficiency
    • Multipurpose driven progress is positively affecting global application of HVM measures  
  2. Theatre 5
    30 mins
    • Disaster and Resilience Conference

    Disaster risk arises when hazards interact with physical, social, economic, and environmental vulnerabilities. Authorities and business need to understand the impact on people, property and day-to-day operations in order to decide how and when to take action.
    In this session we’ll ask key questions about where disaster risk intelligence comes from and how to coordinate a rapid response to critical events in order to keep people safe and operations running.

  3. Theatre 6
    20 mins
    • Product Innovation
    Password policies that are inadequate for modern account protection
    Accounts with elevated privileges in place that haven't been adequately reviewed
    Accounts with delegated permissions over Active Directory that have unwanted consequences on AD security that have proliferated over time
    Weak Group Policy configuration, which creates a variety of holes that attackers can drive through
10:55
  1. Theatre 6
    20 mins
    • Product Innovation

    Understanding what your network’s technology is doing vs what it is intended to do

    How digital transformation can sometimes increase complexity, exacerbating information security issues

    How a systemic approach reduces the knowledge gap for key decisionmakers through practical changes

11:00
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    The UK is a leading global exporter of security capability and products. DIT DSE helps  businesses achieve greater overseas opportunities and Mark Glodsack who heads DSE explains how to get best use of the capability.
  2. Theatre 3
    30 mins
    • International Security Conference
    Introduction to IWM Collection Challenges faced by National museums Strategy 
  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    Why resilience? Some practical tips are including in in business planning. How do you ensure you get what you plan for?
11:20
  1. Theatre 6
    20 mins
    • Product Innovation
    5G and Time Sensitive Networking (TSN) are key enablers for Industry 4.0 innovation
    Traditional security solutions and approaches introduce latency, which inhibit the benefits of these technologies
    Leonardo's cyber resilience approach delivers appropriate security posture and achieves the benefits of TSN

     
11:30
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    What are the priorities for Homeland Security in the UK. This session gives detailed insights from a senior director.
  2. Theatre 3
    30 mins
    • International Security Conference
    The operational failures behind the Fishmongers Hall tragedy
    The opportunity for change
    The solution

     
  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    The Nexus explained - how climate change is affecting our security
    Energy transition  and the fragility of supply lines
    Implications - from migration to insurance liability
     
11:45
  1. Theatre 6
    20 mins
    • Product Innovation
    There is a new standard, EN17646 relating to encryption of data/entry credentials to remote enabled Safe locking
    Safe Locking Standard EN1300 Vs prEN17646
    In operational practice – what is best?
12:00
  1. Olympia Room
    45 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    The New Protect Duty based on Martyns Law will be debated in Parliament and be the single biggest change to security legislation for years. NaCTSO, leading on advice to meet new requirements are launching their current thinking.
  2. Theatre 3
    30 mins
    • International Security Conference
    • What are the components of the night-time economy?
    • What risk -generating threats do these components face
    • How these risks can be mitigated 
12:10
  1. 20 mins
    • Product Innovation

    The Defence and Security Accelerator (DASA) have been instrumental in supporting innovators develop novel ideas to enhance the UK security sector

    • In this session, DASA will provide an overview of:
    • Our two core funding mechanisms of Themed Competitions and the Open Call for Innovation
    • DASA mentoring and supplier support services
    • The new Security Rapid Impact Innovations Open Call, a cross-government competition that focuses on tackling challenges across the UK security landscape.
    • Find out more about how you can get involved, what the benefits of working with DASA are, and understand how your innovation could support the UK security sector.
  2. Olympia Room
    30 mins
    • Disaster and Resilience Conference

    Consider relevant upcoming changes in legislation Explore the new National Resilience Strategy Look to the future....  

12:30
  1. 30 mins
    • International Security Conference

    People borne threats are real

    Threats vary across applications

    What treats are relevant to you?

    What technologies are available?

    Many technologies exist o How do they work?

    What are the strengths/limitations of different technologies o An overview – no one technology fits all applications

    How do you decide which is best for you?  

12:35
  1. Theatre 6
    20 mins
    • Product Innovation

    Ultra slim profile shallow mount Anti-Terrorist bollards 

    Spring Steel Crash Rated  Street Furniture in the Public Realm

    Cost Effective, Large Perimeter HVM

12:55
  1. Theatre 6
    20 mins
    • Product Innovation

    CEM CertificationTM provides an organization’s employees, customers, and stakeholders with the confidence their company stands at the forefront of digital transformation and operates from a position of enterprise-wide resilience.

    Global organisations including Discover, Goldman Sachs, NBCUniversal, Dow and Alexion have already earned 'Best in Enterprise ResilienceTM' designation through rigorous CEM CertificationTM benchmarking.

13:20
  1. 20 mins
    • Product Innovation
    Partnership between Corps Security & MoonHub
    The Offering / Capabilities (Demo)
    Partnership Security Modules
    Linking in with all facets of organisations
     
13:30
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • The face of terrorism is evolving
    • Modern drivers of radicalisation are no longer black and white
    • Nations must rewrite their CVE strategy to win the war on terror
    • Community driven CVE is the antidote to the evolving threat of terrorism
  2. Theatre 3
    30 mins
    • International Security Conference

    Understanding threats to major events

    Developing a major event integrated command, control, communication & coordination structure for event management & incident response

    Principles of protective security layers of operation to enable safety, security & service at major events

  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    • Understanding outcomes when planning
    • A whole systems approach
    • Leadership in the voluntary sector 
13:45
  1. Theatre 6
    20 mins
    • Product Innovation
    Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities. GRC must transcend the traditional lines of defense specifically risk managers and audit professionals. In this webinar we'll discuss roles and responsivities of effective risk management practices. What can businesses do to better align key stakeholders? How can businesses incorporate Security by Design process and practices and where can technology support with structured data sets and automation?   
14:00
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    • International partners appetite to harness capabilities in UK Industry
    • Government assurance enhances benefits and reduces risks to all parties
    • CEDE Office has proven the concept
    • Time to grow the model 
  2. Theatre 3
    30 mins
    • International Security Conference
    • What is the science behind human super recognisers?
    • Methods of finding super recognisers
    • How they can reduce crime by quickly finding suspects and persons of interest
    • How they can link multiple offences from images and increase the likelihood of convictions
  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    • Understanding the atypical behavioral changes after critical events
    • Preparing your organization to various insider risks after the pandemic
    • Recommendations to HR and Security functions to prevent rising risks 
14:10
  1. Theatre 6
    20 mins
    • Product Innovation
    • How to protect critical assets through systematic, proactive threat intel.
    • What tools and information you need before you can start planning for threat hunting.
    • How to set priorities and build a threat-hunting road map.
    • The five steps involved in a threat hunt and how to perform them effectively.
    • How you can make the most of the information you gather through threat hunting.
14:30
  1. Olympia Room
    30 mins
    • Global Counter Terror and Serious and Organised Crime Summit
    Investigating the capacity of Martyn’s Law to save lives through social attitude change
  2. Theatre 3
    30 mins
    • International Security Conference
    • An introduction to hostile reconnaissance
    • Using operations, community engagement, communications to disrupt hostile activity
    • Case studies
  3. Theatre 5
    30 mins
    • Disaster and Resilience Conference
    • High volume/low impact incidents
    • Low volume/high impact stochastic risks of Cyber / Environmental / Terrorism
    • Digitally empowering the frontline and the community to self serve 
14:35
  1. Theatre 6
    20 mins
    • Product Innovation
    • …how cyber-defenders can continue to acquire and hone their skills entirely through a browser but still in a hands-on fashion.
    • …how they can learn essential real-world skills, in real networks and real VMs. From security operations to forensics to secure DevOps, modules cover a breadth of mission-critical topics.
    • …how users learn to defend against advanced attacks, quickly recognise and fix vulnerabilities and develop muscle memory in how best to react when it happens in the real world.
    • …how actionable insights and metrics about performance and skill levels of team members can help identify the cybersecurity superstars, both already in your organisation and amongst those that may want to join.
    • …how a combination of self-paced learning together with pressurised group exercises is the best way to prepare your teams for every eventuality – at a fraction of the cost of traditional learning.
15:00
  1. 45 mins
    • International Security Conference
    Threats to the security of people, assets, and places are bolder and deadlier than ever before, however traditional security
    solutions are proving time and time again to be outdated and insufficient to combat both well-planned and spontaneous attacks.
    More sophisticated and modern approaches, utilizing advanced technology, must be employed and this has to include utilizing all
    of the technological advancements available to us.
  2. Olympia Room
    60 mins
    • Global Counter Terror and Serious and Organised Crime Summit

    Information can and does lead to deaths and physical damage, what should security professionals be aware of in todays Information Age?

Sign up to our bi-weekly e-newsletter, bringing the latest trends, global news and updates straight into your inbox

Subscribe to your newsletter