IFSEC Seminars

All times displayed for Europe/London timezone.

IFSEC 2019 Keynote Arena

The Converged Security operations centre– Unifying physical security and cyber security
11:00 - 12:00
Broadcaster and Security Journalist
Micro Focus
Industry Liaison - Architecture & Engineering
Axis Communications
Virtually Informed Ltd
Unified Security Ltd

This panel session will discuss the concept, reality, and evolution of having both physical and cyber security teams managing and collaborating in the same Security Operations Centre.

In today’s high-risk and high-threat environment, there is a real and immediate need for a converged security approach that unifies monitoring of both physical and cyber security events under a unified platform. By leveraging disparate sources of data, organisations can effectively manage a situation in real-time without having to go to multiple individual subsystems to get the job done.

keynote address: A Global Political and Security Outlook from Frank Gardner OBE
12:15 - 13:00
Broadcaster and Security Journalist

As well as delivering a fascinating analysis of the global political and security outlook, Frank recounts his personal story of surviving against the odds and a recovery that took months and over a dozen operations. He also looks at what a journalist risks to cover a story and foster understanding of complex issues.

Cost vs Safety & Security - Which is most important? What is the right balance?
13:30 - 14:30
Head of Security and Contingency Planning (Southampton Port)
Associated British Ports
Broadcaster and Security Journalist
Emergency Planning Manager
London Luton Airport and Vice-Chair of UK Aviation Emergency Planning Group
Technical Security Director

This panel discussion hosted by the IFSEC Transport Security Council will debate whether cost or safety and security is most important in an organisation.

The discussion will also focus on how organisations should go about finding the right balance between controlling costs and having appropriate security and safety.

Using Drones to secure the future
14:45 - 15:15
Managing Director
Aerial Motion Pictures
Professional Drone Pilot
Box Cottage
Azur Drones

This panel will discuss the uses of unmanned aerial vehicles and how forward-thinking companies using this technology are likely to become leaders in the market.

With the fast-moving technology advancements in cameras and high definition imagery, drones can now be looked upon as a powerful weapon in security. Fast maturity of unmanned aerial vehicle development is seeing increasing versatility of its uses for solutions in the security world.

Crime reduction - overcoming the disruptive effects of criminality
15:30 - 16:30
Principal Psychologist
Broadcaster and Security Journalist
Border Security Manager
Gatwick Airport
Vice President Sales, EMEA & APAC

This session assesses the disruptive effects of organised crime and everyday criminality. It also will consider the likely implications for your business and its people, and looks at potential technology solutions for tackling these threats.

Serious and organised crime is a significant national security threat faced by the UK and costs the country at least £37 billion each year; and the government is committed to prevent and defend against serious and organised crime in all its forms. Everyday criminality also has a significant cost to the country and organisations that do business in the UK. Technological advances and digital trends are escalating the scale of this problem and changing the face of the criminal marketplace.


Engineer of Tomorrow: Heats Winners
16:40 - 16:50

PRESENTED BY: Frank Gardner OBE, Broadcaster and Security Journalist

Converged Security

How Converged Security Centres Respond in Real-Time to Physical and Online Threats
13:30 - 14:15
Perpetuity Research & Consultancy International (PRCI) Ltd
Virtually Informed Ltd

The teams from Vidsys, Micro Focus and AXIS Communications will show how their technologies can be integrated in one centre, to prioritise emerging security risks from high volumes of data and respond in near real time. They will provide a fascinating view on how large events and campuses can be managed in a fast moving and dynamic environment. This includes:

  • a stadium where large numbers of fans are congregating. Tweets start pouring in about an upcoming protest to disrupt the game at a certain time, some threaten to march inside the stadium and stop the game – all from anonymous sources whose identities cannot be confirmed
  • Security officers begin to view live video feeds from stationary cameras, drones and the incoming tweets all under one common operating picture and monitor the situation
  • facial recognition and biometrics to prevent cyber physical attacks

Prof. Martin Gill will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by Sarb Sembhi


How Converged Technologies Ease Prevention and Response to Unauthorised Physical/ Logical Access to Corporate Facilities and Networks?
14:45 - 15:30
Internet of Things Security Foundation
Unified Security Ltd

This presentation will show how one converged team can identify and respond to fraudulent activity on a corporate network, in near real time with the power of Vidsys, Micro Focus and AXIS solutions. The teams will demonstrate:

  • How the logical and physical id of an employee do not match
  • The operators can look at the office CCTV footage of the employee physically badging on the access control device in the morning
  • The screenshot captured is matched with the access card information
  • Vidsys and SIEM technologies correlate all this data and determine a case of Insider or OutsiderThreat

Prof. Paul Dorey will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by James Willison


How Chief Security Ofiicers Can Benefit from Data Analytics and Converged Platforms to Understand the Complex Physical and Cyber Risks Posed to Transport Systems?
16:00 - 16:45
HJA Consult, Vice Chair
ASIS UK Chapter
Virtually Informed Ltd

This presentation will explore how CSOs can benefit from deploying multi disciplinary teams in one security operations centre and use converged technologies to identify and respond to fast moving events in transport systems. The teams from Vidsys, Micro Focus and AXIS Communiations will demonstrate:

  • Visual displays of various incidents related to UK Transport (Highway Accidents, Broken streetlights, Systems down, Networking issues, cyber attacks, insider threats, property damage, protests, Broken vehicles) 
  • Event is identified and a report is sent to the CSO with actions outlined
  • Upon detecting a drone within 1 km of the airport perimeter an event gets created automatically
  • Operators monitor presence of a drone and use counter drone systems if possible

Mike Hurst will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by Sarb Sembhi

The Future of Security Theatre brought to you by Tavcom

Counteracting the Menace of Cybercrime
11:00 - 11:25

Cybercrime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone. Cybercrime can be divided into three categories: crimes in which the computing device is the target; crimes in which the computer is used as a weapon; and crimes in which the computer is used as an accessory to a crime.This seminar will examine these aspects of cybercrime and look at proven ways of counteractingthese methods of computer-based fraud.

Security for the Fourth Industrial Revolution
11:35 - 12:00
Senior Lecturer
Security Risk Management

Synopsis coming soon

Autonomous Vehicles - Can They be Hacked
12:10 - 12:35
Vice President
Centre for Strategic Cyberspace + International Studies (CSCIS)

Has the rush to technology once again proven to be a dangerous path? Are we really ready for genuinely autonomous vehicles or are we creating not only more risk to safety but potential weapons? How long before cars come with biometrics instead of keys? All this and more discussed with Mike Gillespie..


Will AI Change the Face of Electronic Security industry
12:45 - 13:10

Artificial intelligence (AI), the ability of a digital computer to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience.

Psychologists generally do not characterise human intelligence by just one trait but by the combination of many diverse abilities. Research in AI has focused chiefly on the following components of intelligence: learning, reasoning, problem solving, perception, and using language.

This seminar will examine one aspect of AI – Connectionism with reference to Machine Learning and Neural Networks.

Connectionism, or neuronlike computing, developed out of attempts to understand how the human brain works at the neural level and, in particular, how people learn and remember, of which each neuron in the brain is a simple digital processor and the brain as a whole is a form of computing machine.

GDPR - Video Surveillance: Balancing Privacy and Security
13:20 - 13:45
Senior Management Tutor
Tavcom Training

Integrating security systems is nothing new. For some, having to integrate robust governance and accountability is. Installation and use of security technologies, particularly surveillance systems and the more advanced technologies including biometrics, exist in a complex legal and regulatory environment. The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements. Whilst they provide a more comprehensive basis in law for the management of personal data, they are only a part of a wider legal consideration for security technologies, not the all. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect.

The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with respective Codes of Practice, provide a bedrock for effective governance. Increasing overlaps between state law enforcement agencies and commercial private sector systems will attract the attention of regulators. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weighted alongside the benefits. This session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.


Future Proof your CCTV Networks
14:00 - 14:25

More and more CCTV (VSS) systems are being installed over IP. What makes a good, stable, reliable network? What if the CCTV network  needs to share with the existing network? What do you have to take into consideration? Bandwidth, IP addressing, subnets, security, cable types and lengths, upgrading, managing –the list is endless. This presentation will deal with the essential issuesin putting together a network which will perform –and can be proved to perform.

BSIA Cyber Security Best Practice Guidance
14:35 - 15:00
Technical Manager

The presentation ‘BSIA Cyber Security Best Practice Guidance’ highlights key points raised within the recently published ‘Cyber Secure It’ guidance document. This provides manufacturers with basic guidance from design through to product support, installers and maintainers with factsand issues specifically related to the electronic security industry, as well as some guidance for end-users. There are three key areas which the talk will cover and the first looks at understanding cyber security trends. Secondly, the focus will be on the outlook of potential challenges encountered in day to day electronic security related activities. Finally, some solutions and ‘food for thought’ as the talk comes to an end. 

The Digital Switchover - Are you Ready?
15:15 - 15:40

We would be addressing BT’s aim to have all voice communications working on IP by 2025 and the implications this would have on alarm signalling and telehealth care in particular –brief synopsis here.

Intruder Alarm standards Update involving PD6662
15:50 - 16:15

Dave will provide an update on Intruder and Hold Up Alarms standard involving PD6662.

Networking & Drinks
16:15 - 17:00