IFSEC Seminars

All times displayed for Europe/London timezone.

IFSEC 2019 Keynote Arena

Is your security culture fit for purpose?
11:00 - 12:00
CEO & Founder
Head of Group Security - Edwardian Hotels London, Chairman - Institute of Hotel Security Management and Director ASIS UK
Broadcaster and Security Journalist
Director of Sales for Physical Access Control Solutions
HID Global
Global Head of Security Compliance
DHL Express Security

This session will help you to assess your organisation's security culture and if it is fit for purpose, and share the benefits of embedding an effective security culture in your organisation.

Reducing the possibility of insider incidents requires a security culture which defines how everyone in an organisation is expected to act and think when it comes to security. A security culture that is fit for purpose will result in a security aware workforce which demonstrates all necessary security behaviours including taking responsibility for security issues, compliance with protective security measures, better appreciation of common security threats and being more likely to be security aware

Understanding Drones - Everything you need to know from the technology to the legislation
12:15 - 12:45
Managing Director
Regional Sales Manager UK & I
Aerial Motion Pictures
Professional Drone Pilot
Box Cottage
Assistant Director Communications
Civil Aviation Authority

This panel will discuss all aspects of unmanned aerial vehicles use from legislation to how the security industry is adapting to this useful aerial asset.

The word ‘drone’ brings many different images to mind. From an exciting technology that is being adopted in industry to a controversial one when used maliciously. This ground-breaking technology and the tasks which these unmanned aerial vehicles can undertake can reduce both cost and time.

Social Media and Internet Security: A new Opportunity
13:00 - 13:50
Vice President, Security Industry
TrackTik Software
Broadcaster and Security Journalist
Consultant Director Cyber Security
The Risk Advisory Group and former Head of Cyber Security for London 2012

This session focuses on the evolving relationship between social media and security and will consider multimedia content threats, traditional threats and social threats and associated risks including information and data disclosure, reputation loss, location leakage, safety loss, blackmail and cyber harassment.

It will also look at how social media data and technologies can be used to improve and positively influence security and assess how social media and social media companies can help businesses become more secure.

Private Public Partnerships in Security
14:00 - 14:40
Chief Security Officer & Head of Logistics, Chair
The Francis Crick Institute and ASIS UK Chapter
Vice Chair SyCom & Chair of Association of Security Consultants
Chair SyCom & Chair of Food and Drinks Security Association
The Association of Security Consultants (ASC)
Director Security & Resilience at ADS Group and Secretary to Security & Resilience Industry Suppliers Community (RISC)

'How public-private partnerships can bring a step change in addressing current and future security challenges’.

In 2018 the Security Commonwealth (SyCom) announced its support of the UK government's revised CONTEST Counter Terrorism strategy. This open panel debate, comprising leading figures from the UK public and private security sectors, will address audience questions and explore the challenges and opportunities for greater public-private sector security collaboration.

Introduction and overview of the Security Commonwealth: Guy Mathias, Chair SyCom & Chair of Food and Drinks Security Association

Introduction: Guy Mathias, Chair SyCom & Chair of Food and Drinks Security Association
Moderator : Joe Connell, Vice Chair SyCom & Chair of Association of Security Consultants

- David Clark, Vice Chair SyCom, and Chair of ASIS (UK Chapter) 
- Hugo Rosemont, Director Security & Resilience at ADS Group and Secretary to Security & Resilience Industry Suppliers Community (RISC)
- Julie Nel, Director, The Assocation of Security Consultants (ASC)

Secure by design
14:50 - 15:40
IP CCTV Business Development Manager
Norbain SD
Broadcaster and Security Journalist
Vice President
Centre for Strategic Cyberspace + International Studies (CSCIS)
Director of Security and Technology
BuroHappold Engineering

This session will discuss how and why products and services should be designed with security as a default, from product development through their entire lifecycle and to how initiate and facilitate positive security change throughout the entire product supply chain.

Security and privacy standards are continually developing to ensure that no vulnerabilities exist which can be exploited for malicious purposes. Secure by Default takes an all-inclusive approach which focuses on solving security issues at the outset of hardware and operating system development rather than when problems arise. Only by shifting to a security mindset and investing in a secure development lifecycle can organisations succeed in creating secure products and services where security is built in to software and hardware from the outset.

PAS 1085:2018: Establishing and implementing a security-minded approach
- Andrew Sieradzki, Director of Security and Technology, BuroHappold Engineering

Secure by Default Guide for Manufacturers
- Mike Gillespie, Vice President, Centre for Strategic Cyberspace + International Studies (CSCIS)
- Buzz Coates, IP CCTV Business Development Manager, Norbain SD

Everyday digital threats: What are the risks?
15:50 - 16:40
Biometrics and Digital Identity Expert
Broadcaster and Security Journalist
Head of Security Engineering
Digital Shadows
Industry Liaison - Architecture & Engineering
Axis Communications

This session assesses the risks posed by everyday hazards which can lead to lead to high profile breaches including visual hacking, insider threat, social engineering, biometric presentation attacks and digital identity fraud.

The pros and cons of biometrics solutions will be discussed and as well as practical steps and technology solutions which can help mitigate the risks.

Engineer of Tomorrow: Heats Winners
16:45 - 17:00

PRESENTED BY: Frank Gardner OBE, Broadcaster and Security Journalist

Converged Security

How Converged Security Centres Respond in Real-Time to Physical and Online Threats
11:00 - 11:45
Head of Advisory Services at 2|SEC Consulting
Cyber Security Pilotage
Unified Security Ltd

The teams from Vidsys, Micro Focus and AXIS Communications will show how their technologies can be integrated in one centre, to prioritise emerging security risks from high volumes of data and respond in near real time. They will provide a fascinating view on how large events and campuses can be managed in a fast moving and dynamic environment. This includes:

  • a stadium where large numbers of fans are congregating. Tweets start pouring in about an upcoming protest to disrupt the game at a certain time, some threaten to march inside the stadium and stop the game – all from anonymous sources whose identities cannot be confirmed
  • Security officers begin to view live video feeds from stationary cameras, drones and the incoming tweets all under one common operating picture and monitor the situation
  • facial recognition and biometrics to prevent cyber physical attacks

Alan Jenkins will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by James Willison

How Converged Technologies Ease Prevention and Response to Unauthorised Physical/ Logical Access to Corporate Facilities and Networks?
13:45 - 14:30
Head of Advisory Services at 2|SEC Consulting
Cyber Security Pilotage
Virtually Informed Ltd

This presentation will show how one converged team can identify and respond to fraudulent activity on a corporate network, in near real time with the power of Vidsys, Micro Focus and AXIS solutions. The teams will demonstrate:

  • How the logical and physical id of an employee do not match
  • The operators can look at the office CCTV footage of the employee physically badging on the access control device in the morning
  • The screenshot captured is matched with the access card information
  • Vidsys and SIEM technologies correlate all this data and determine a case of Insider or OutsiderThreat

Brian Sims will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by Sarb Sembhi

How Chief Security Officers Can Benefit from Data Analytics and Converged Platforms to Understand the Complex Physical and Cyber Risks Posed to Transport Systems?
15:00 - 15:45
President Elect & Business Development Director
ASIS International and Revolution Retail Systems
Unified Security Ltd

This presentation will explore how CSOs can benefit from deploying multi disciplinary teams in one security operations centre and use converged technologies to identify and respond to fast moving events in transport systems. The teams from Vidsys, Micro Focus and AXIS Communiations will demonstrate:

  • Visual displays of various incidents related to UK Transport (Highway Accidents, Broken streetlights, Systems down, Networking issues, cyber attacks, insider threats, property damage, protests, Broken vehicles) 
  • Event is identified and a report is sent to the CSO with actions outlined
  • Upon detecting a drone within 1 km of the airport perimeter an event gets created automatically
  • Operators monitor presence of a drone and use counter drone systems if possible

Godfried Hendriks will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by James Willison

The Future of Security Theatre brought to you by Tavcom

Future Leaders of Security
11:00 - 11:25
Director of Young Professionals

What does the security professional of the future look like? How do security professionals prepare to meet the risks and embrace the opportunities that business presents? How will technology and the evolving workforce affect the industry? In this brief talk, James Morris will share his perspective from industry and as Director of Young Professionals for ASIS UK.


GDPR - Video Surveillance: Balancing Privacy and Security
11:35 - 12:00
Senior Management Tutor
Tavcom Training

Integrating security systems is nothing new. For some, having to integrate robust governance and accountability is. Installation and use of security technologies, particularly surveillance systems and the more advanced technologies including biometrics, exist in a complex legal and regulatory environment. The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements. Whilst they provide a more comprehensive basis in law for the management of personal data, they are only a part of a wider legal consideration for security technologies, not the all. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect.

The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with respective Codes of Practice, provide a bedrock for effective governance. Increasing overlaps between state law enforcement agencies and commercial private sector systems will attract the attention of regulators. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weighted alongside the benefits. This session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.



Is the Security World Ready for 5G
12:10 - 12:35
Senior Technical Tutor
Tavcom Training

Increasingly, overarching securityand intelligence handlingsystems are becoming greatly more connected and considerablymorevaried andflexible.  The arrival of Long Term Evolution (LTE), 5G, Internet-of-Things and similar technologies means that security systems, especially mobile security systems,will not only become greatly more connected, they willhave tobecomesmarter and, in data processing terms,faster.  The days of discretesecurity systems are coming to an end andold technology systemswill be replaced by intelligence gathering, intelligence processingand data analysissystems. These systems will take data in many different formats from a wide variety of sources.  Once processed, the data would enable law enforcement, militaryand intelligence agencies to makeimportantand trulyinformed decisionsbased ontheempirically gathered, quickly processedand the easily searched data they have to hand.Security systems that incorporate all the traditionalsecurity technologies (CCTV, Access Control, Intruder, Perimeter) will be connected to intelligent managementand data handlingsystems where evolving technologies such as Video and Audio Analytics, Image and Audio Forensics and Artificial Intelligence will be applied to the incoming streams of raw source data.Without these evolving intelligence handingsystems, we might just find ourselves overloadedand overburdenedwith increasing amounts of unsorted and not entirely usable raw data. 

Drone - Threats and Countermeasures
12:45 - 13:10
CEO and Drone Matter Expert

The aerial threat of drones challenges all existing risk strategies for security. Education and understanding of the drone capability is still at a very low level. Airports are in a state of panic -ISIS are using them for mortar delivery, spying is a regular occurrence and your walls and CCTV have limited protection from an unwarranted visitor. Your foe has a technology advantage that can easily be acquire from any high-street –the time is right for you to get the edge back!

Counteracting the Menace of Cybercrime
13:20 - 13:45

Cybercrime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone. Cybercrime can be divided into three categories: crimes in which the computing device is the target; crimes in which the computer is used as a weapon; and crimes in which the computer is used as an accessory to a crime.This seminar will examine these aspects of cybercrime and look at proven ways of counteractingthese methods of computer-based fraud.

Improving Security Through Intergrated Systems
14:00 - 14:25
Business Development Manager
Cathexis Europe

What is integration? Is it complicated? Is it expensive? What does it do? How will it improve my site/life? These are some of the questions I get asked on an almost daily basis. Increasingly we are seeing several different security & non-security systems deployed on a site for which Security/Site management are responsible. This session looks at the questions above along with our modern expectations of system automation and how these can be achieved within security site solution.


ECHO and the transition to next Generation Networks
14:35 - 15:00
Director of Technical Services

Digital transformation is a key agenda item for Government and this is no exception in the electronic security industry. Technology is changing at an exponential pace, and our industry sector is adapting to the challenge this brings, having to seek new innovative ways to increase efficiency, whilst maintaining quality and reducing errors; a key mantra for the professional security industry.

Blue light services are under pressure to deliver the above changes, and through collaboration with our Police partners at NPCC, we are delivering these benefits by adopting an Electronic Call Handling process; this is known as ECHO. ECHO is expected to go live later this year and will involve ARCs and installers of approved alarm systems.

In line with the theme of digital transformation, the UK telephony infrastructure is undergoing a similar change and will see the end of analogue transmission technology in the coming years. This has a big impact on installed alarm signalling systems, where newproduct innovations are starting to emerge and are already being installed.

Learn how both ECHO and the transition to NGN technology will change your business model. Explore how this challenge could lead to new opportunities to increase the end-user experience and differentiate between the approved / non-approved security systems market.

The digital switchover – are you ready?
15:15 - 15:40

We would be addressing BT’s aim to have all voice communications working on IP by 2025 and the implications this would have on alarm signalling and telehealth care in particular –brief synopsis here.

Autonomous Vehicles - Can They be Hacked
15:50 - 16:15
Vice President
Centre for Strategic Cyberspace + International Studies (CSCIS)

Has the rush to technology once again proven to be a dangerous path? Are we really ready for genuinely autonomous vehicles or are we creating not only more risk to safety but potential weapons? How long before cars come with biometrics instead of keys? All this and more discussed with Mike Gillespie..