The Future of Security Theatre brought to you by Tavcom

All times displayed for Europe/London timezone.

Counteracting the Menace of Cybercrime
11:00 - 11:25

Cybercrime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone. Cybercrime can be divided into three categories: crimes in which the computing device is the target; crimes in which the computer is used as a weapon; and crimes in which the computer is used as an accessory to a crime.This seminar will examine these aspects of cybercrime and look at proven ways of counteractingthese methods of computer-based fraud.

Security for the Fourth Industrial Revolution
11:35 - 12:00
Senior Lecturer
Security Risk Management

Synopsis coming soon

Autonomous Vehicles - Can They be Hacked
12:10 - 12:35
Vice President
Centre for Strategic Cyberspace + International Studies (CSCIS)

Has the rush to technology once again proven to be a dangerous path? Are we really ready for genuinely autonomous vehicles or are we creating not only more risk to safety but potential weapons? How long before cars come with biometrics instead of keys? All this and more discussed with Mike Gillespie..


Will AI Change the Face of Electronic Security industry
12:45 - 13:10

Artificial intelligence (AI), the ability of a digital computer to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience.

Psychologists generally do not characterise human intelligence by just one trait but by the combination of many diverse abilities. Research in AI has focused chiefly on the following components of intelligence: learning, reasoning, problem solving, perception, and using language.

This seminar will examine one aspect of AI – Connectionism with reference to Machine Learning and Neural Networks.

Connectionism, or neuronlike computing, developed out of attempts to understand how the human brain works at the neural level and, in particular, how people learn and remember, of which each neuron in the brain is a simple digital processor and the brain as a whole is a form of computing machine.

GDPR - Video Surveillance: Balancing Privacy and Security
13:20 - 13:45
Senior Management Tutor
Tavcom Training

Integrating security systems is nothing new. For some, having to integrate robust governance and accountability is. Installation and use of security technologies, particularly surveillance systems and the more advanced technologies including biometrics, exist in a complex legal and regulatory environment. The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements. Whilst they provide a more comprehensive basis in law for the management of personal data, they are only a part of a wider legal consideration for security technologies, not the all. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect.

The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with respective Codes of Practice, provide a bedrock for effective governance. Increasing overlaps between state law enforcement agencies and commercial private sector systems will attract the attention of regulators. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weighted alongside the benefits. This session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.


Future Proof your CCTV Networks
14:00 - 14:25

More and more CCTV (VSS) systems are being installed over IP. What makes a good, stable, reliable network? What if the CCTV network  needs to share with the existing network? What do you have to take into consideration? Bandwidth, IP addressing, subnets, security, cable types and lengths, upgrading, managing –the list is endless. This presentation will deal with the essential issuesin putting together a network which will perform –and can be proved to perform.

BSIA Cyber Security Best Practice Guidance
14:35 - 15:00
Technical Manager

The presentation ‘BSIA Cyber Security Best Practice Guidance’ highlights key points raised within the recently published ‘Cyber Secure It’ guidance document. This provides manufacturers with basic guidance from design through to product support, installers and maintainers with factsand issues specifically related to the electronic security industry, as well as some guidance for end-users. There are three key areas which the talk will cover and the first looks at understanding cyber security trends. Secondly, the focus will be on the outlook of potential challenges encountered in day to day electronic security related activities. Finally, some solutions and ‘food for thought’ as the talk comes to an end. 

The Digital Switchover - Are you Ready?
15:15 - 15:40

We would be addressing BT’s aim to have all voice communications working on IP by 2025 and the implications this would have on alarm signalling and telehealth care in particular –brief synopsis here.

Intruder Alarm standards Update involving PD6662
15:50 - 16:15

Dave will provide an update on Intruder and Hold Up Alarms standard involving PD6662.

Networking & Drinks
16:15 - 17:00