The Security Partners’ Forum branched out into several domestic & global networks including the Canadian Cybersecurity Alliance, the Women in Security & Resilience Alliance (WISECRA), and most recently the International Council of Security & Resilience Educators (ICSRE). Over the last several years the SPF has helped to develop capacity in numerous areas across Canada and the globe including:
- Help launch women in security and business continuity groups in Canada, the US and Australia;
- Work with the CIO Association of Canada to develop a new entity for the Canadian Chief Information Security Officer (CISO) community;
- Work with the mining community in Canada and abroad to develop a new not-for-profit nexus for sharing cybersecurity best practice
For many organisations, investment in security for their buildings and infrastructure is often a grudge purchase. In existing buildings, measures may be implemented reactively, only when mandated by a regulator or a property insurer. When procuring new assets or refurbishing existing assets, the developer may leave it to their project team to determine what security, if any, is implemented. With this approach, it is no wonder that organisations query their return on investment, as they will inevitably have visibility of the costs associated with security, but a limited understanding of the benefits that their security offers, that is of course, assuming there are any benefits. This presentation will outline the benefits of implementing a facility security risk management system and obtaining 3rd party SABRE certification at the design, construction and in-use stages of the built asset life cycle.
Our modern societies function depends upon the seamless operation of countless strategic assets. The vast majority of these assets for decades have been unmonitored. However in these days of accountability, reporting and terrorism there is a call to bring these assets on-line through monitoring. This paper will try to highlight some of the real life barriers to monitoring, try to develop an optimum specification for a monitoring system we call “The Critical Network of Things” and then uses this model as a “criticality test” the various types of technologies on the market from IoT, licenced radio through to cellular.
This presentation looks at Enterprise Security Risk Management (ESRM), and in particular the issue of buying and selling by and to, siloed physical and logical security teams. Converged Security Management utilises an approach which brings together both physical and logical security professionals and teams and gets beyond the silos that have traditionally restricted a single view of Security Risks. It will identify the changes which have led to why now is an important turning point for many security teams to take action, and what the stakeholders need to do to support a converged buying security team. It covers product information and support to stakeholders throughout its lifespan, ensuring clear messaging on the security of the devices / systems and their contribution to the overall solution of ESRM. It also considers the security of the product and its design. By acting on these areas physical security vendors will be able to not only level the playing field compared with logical security vendors, but in some cases over-take them in terms of maturity in integration.
- Assessing the threat
- Identifying the key risks
- Technologies for detecting/screening
- Screening solutions
- Designing the appropriate security responses and selecting and deploying the right technologies
More information coming soon...
- Demonstrating the ROI of security and earning a seat at the C-Suite
- Risks through increased global connectivity
- Mitigating risks caused by increasingly common agile working/working from home policies
- Moving from Security Management to Enterprise Risk Management
- Convergence between physical and cyber security
- Attracting young professionals from non-traditional backgrounds into security
If you have a network video system then you need to know about the benefits of network lighting.
LED Network Lighting is the key ingredient to unlocking more performance - getting the best images at all times, improving video analytics, and responding instantly to any event.
Join the Raytec experts to learn how to design an IP lighting system which puts you in control – which responds to any live incident, there and then, even if your site is unmanned.
Raytec will also share their views on the future trends of network lighting, and how it is becoming more deeply integrated into IP systems with even more intelligence and efficiency.
Innovation hour is a series of rapid presentations. Up to 6 speakers will be given 5 minutes each to tell the audience about an innovation/what they think is innovative in this area. After all of the speakers have taken to the stage there will be audience Q&A. N.B. the 5 minute presentations may be filmed by IFSEC TV.
Digital Video Recorders have almost become ubiquitous in the UK. Nearly every retailer - from the largest supermarkets to small independents - will use one to store their CCTV footage. Most of these DVRs are connected to the Internet to allow for remote control and viewing. But what many people don't realise is that DVRs are powerful embedded computers that can be used by hackers to attack your network and the Internet as a whole.
This was illustrated by the Mirai bot-net, which rose up and commanded tens of thousands of vulnerable DVRs. The vulnerability they suffered from was simple - hardcoded logins. But many DVRs don't suffer from such a simple vulnerability. We thought that we'd look at this part of the market, to find out what Mirai missed. With over 15 different DVRs examined and tens of vulnerabilities, we think we have the best picture of just how bad security really is.
Auditing CCTV systems for 20 years as an independent consultant, the same avoidable mistakes are found time after time. Don’t get caught out.
- For CCTV buyers and managers.
- If you sell CCTV: learn what buyers want.
- Created for both non-technical and technical.
- Lots of images. Very few words.
- Introduction to Cloud Technology and Products
- Benefits and Drawbacks of Cloud Technology
- Cloud and the Security Industry
- Utilizing Cloud Technology to Create Value
With every energy supplier offering customers a smart meter by 2020:
- What are the benefits of smart energy devices that enable smarter analytics and bring about intelligent efficiency?
- How can smart meters move the public discussion on personal data forward?
Speaker Q&A + Meet & Greet - 11:30 - 11:50
This would cover the work NCSC currently do with UK organisations, businesses and individuals to provide cyber security advice and cyber incident management.
Along with practical advice on how you can to prevent attacks – and deal with any incidents that happen (incident response).
Speaker Q&A + Meet & Greet: 12:30 - 12:50
‘Intelligent’ behaviour does not necessarily equate to ‘smart’ behaviour. Because the internet of things is not actually really about Smart things; it’s about Smart data,
How do you analyse and use the insight extracted from that data.
Speaker Q&A + Meet & Greet: 13:30 - 13:50
If the smart devices can't talk to each other they're just dumb devices. The success of every Smart Home depends upon the communications between devices. Wireless is part of the solution but all new properties should have a robust wiring infrastructure installed to enable home owners to enjoy the benefits IoT communications, streaming services and cloud connections
Speaker Q&A + Meet & Greet: 14:30 - 14:50
The presentation will examine trends for subscribers and key technologies in the smart home by providing market sizing and forecast data to help attendees analyze the market opportunity. The presentation will also evaluate various business models and how dealers, equipment vendors and service providers can take advantage of this nascent market (lessons learned from past 5 years). Lastly, relying on adjacent market research in healthcare, consumer electronics, networking and connectivity, IHS will discuss the top disruptive trends that will impact the smart home by 2020. At the conclusion of the presentation, attendees will be in a better position to make strategic decisions regarding product development and route to market.
Speaker Q&A + Meet & Greet: 15:30 - 15:50