IFSEC Seminars

All times displayed for Europe/London timezone.

IFSEC 2019 Keynote Arena

Attack Aware - Secure by Default
10:15 - 10:45
the Surveillance Camera Commissioner for England and Wales
Surveillance Camera Commissioner for England and Wales

As part of Surveillance Camera Day Tony Porter, the Surveillance Camera Commissioner for England and Wales, will be launching new secure by default/secure by design minimum requirement for the manufacture of video surveillance systems and components at IFSEC. Several high profile and well publicised compromises of systems demonstrated that they were being left live and internet- facing in an unacceptable security configuration. Some of these compromises, like Mirai botnet, that took out social media and financial websites across the globe, also showed the root cause was down to poor design and manufacturing. Driven by the need to ensure the UK’s resilience against this and other forms of cyber security vulnerability, as well as to provide the best possible assurance stakeholders, the new requirements are an important step forward for manufacturers, installers and users alike. 

Secure by default
10:45 - 11:05
Sales Director
Hikvision UK and Ireland
Managing Director
Norbain Holdings
Marketing Director
Cyber Crime Protect Officer
West Midlands Regional Organised Crime Unit
the Surveillance Camera Commissioner for England and Wales
Surveillance Camera Commissioner for England and Wales

As part of the National Surveillance Camera Day, Tony Porter, the Surveillance Camera Commissioner is launching “Secure by Default”.

Secure by Default are a minimum set of requirements for all manufacturers to ship network video productsto installers in the most hardened, cyber-security-optimal form possible, with default settings which provide minimal vulnerabilities on first use.

The panel will be answering questions about the wider purpose and implications for the industry.

Secure by Default for Manufacturers:

Chair: Justin Hollis, Marketing Director, Hikvision

- Tony Porter, the Surveillance Camera Commissioner for England and Wales
- Patrick McBrearty, Cyber Crime Protect Officer, West Midlands Regional Organised Crime Unit
- Gary Harmer, Sales Director, Hikvision UK and Ireland
- Jeremy Hockham, Managing Director, Norbain Holdings

Tackling the Cyber Security Threat
11:15 - 12:10
CEO & Co-founder
Academic Coordinator for Cyber Security
University of Manchester
Director & Senior Adviser
NCC Group
Alan Taylor Research Fellow
The University of Oxford
Partner and UK Lead for Cyber in the Boardroom

This session will assess evolving cyber security threats, offer the latest advice on mitigation strategies and look at the role the UK's most promising cyber security innovators can play in addressing industry's biggest challenge.

Preventing data breaches of business-critical information in an organisation requires a comprehensive cyber security strategy in line with overall business objectives. Cyber security can be complex and difficult to embed in an organisation and therefore it not only

Keynote Address: It takes a network to defeat a network
12:15 - 13:00
Alan Taylor Research Fellow
The University of Oxford

Dr Dave Sloggett, Alan Taylor Research Fellow at The University of Oxford, will share an absorbing analysis of the current threats and evolving attack vectors that are present in what is an ever more complex world.

Not so long ago the range of existing and evolving threats were relatively easy to consider in silos, whereas now they appear connected. Dr Sloggett will offer his thoughts on the security approaches that are needed now and the role that technology must play in an increasingly connected security landscape.

Artificial Intelligence and Machine Learning for Security: has its time come?
13:10 - 14:10
Alan Taylor Research Fellow
The University of Oxford
Trilateral Research

This session will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection.

• Is Artificial Intelligence and Machine Learning a technology looking for a problem to solve?
• What are the benefits of AI and what positive outcomes for security can it deliver?
• Is the technology mature enough for mainstream use in security scenarios or is it more of a data gathering tool that is yet to have its day?
• Does the double-edged nature of AI present a significant risk due to both enterprises and attackers having access to the same tools? 

Modelling Risk and Crisis Management for 2030
14:20 - 15:15
Crisis and Resilience Partner
Director of Risk Management, Ecosystem Risk
Executive Director, Institute of Strategic Risk Management
Editor & Publisher, Security Today, India

The risks and threats that the world is facing seem to be changing on an almost daily basis and this session will be part of the launch of the ‘ISRM Manifesto: Crisis 2030’. Whether it is climate change, severe weather systems, increasingly failing national infrastructures, IT dependency and systems fragility, pandemics, mutational viruses (both biological and cyber), and the increasingly destructive and non-recoverable nature of many of their impacts and long-term consequences, it seems as though the traditional models of risk management are no longer able to engage with – or even understand – how these emerging threats will impact on every aspect of our lives. The panellists will explore whether the nature of the changes in these emerging threats are evolutionary, revolutionary or whether in fact they are mutational – in that they are creating a completely new class of risk for which the models and frameworks that we used to describe previous classes of risks will no longer be applicable, or even relevant.

Engineer of Tomorrow: Prize Winners Presentation
15:20 - 15:30

PRESENTED BY: Dr Dave Sloggett, Alan Taylor Research Fellow, The University of Oxford

Converged Security

How Converged Security Centres Respond in Real-Time to Physical and Online Threats
11:00 - 11:45
Chief Security Officer & Head of Logistics, Chair
The Francis Crick Institute and ASIS UK Chapter
Unified Security Ltd

The teams from Vidsys, Micro Focus and AXIS Communications will show how their technologies can be integrated in one centre, to prioritise emerging security risks from high volumes of data and respond in near real time. They will provide a fascinating view on how large events and campuses can be managed in a fast moving and dynamic environment. This includes:

  • a stadium where large numbers of fans are congregating. Tweets start pouring in about an upcoming protest to disrupt the game at a certain time, some threaten to march inside the stadium and stop the game – all from anonymous sources whose identities cannot be confirmed
  • Security officers begin to view live video feeds from stationary cameras, drones and the incoming tweets all under one common operating picture and monitor the situation
  • facial recognition and biometrics to prevent cyber physical attacks.

David Clark will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by James Willison

How Converged Technologies Ease Prevention and Response to Unauthorised Physical/ Logical Access to Corporate Facilities and Networks?
14:00 - 14:45
Co-Founder and Director of Research
IASME Consortium

This presentation will show how one converged team can identify and respond to fraudulent activity on a corporate network, in near real time with the power of Vidsys, Micro Focus and AXIS solutions. The teams will demonstrate:

  • How the logical and physical id of an employee do not match
  • The operators can look at the office CCTV footage of the employee physically badging on the access control device in the morning
  • The screenshot captured is matched with the access card information
  • Vidsys and SIEM technologies correlate all this data and determine a case of Insider or OutsiderThreat

Dr. Daniel Dresner will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

Chaired by Sarb Sembhi

The Future of Security Theatre brought to you by Tavcom

Doctor or Dalek? Security Managers evolving space
11:00 - 11:25

Angus discusses the contemporary security environment and how the sector is adapting to meet changing threat landscapes and new challenges.

Counteracting the menace of cybercrime
11:35 - 12:00

Cybercrime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone. Cybercrime can be divided into three categories: crimes in which the computing device is the target; crimes in which the computer is used as a weapon; and crimes in which the computer is used as an accessory to a crime.This seminar will examine these aspects of cybercrime and look at proven ways of counteractingthese methods of computer-based fraud.

The digital switchover – are you ready ?
12:10 - 12:35

We would be addressing BT’s aim to have all voice communications working on IP by 2025 and the implications this would have on alarm signalling and telehealth care in particular –brief synopsis here.

IoT, Smart Homes & Security
12:45 - 13:10
President and CTO

Synopsis coming soon

Managing Security and public safety within the museum sector
13:20 - 13:45
Security & Estate Project Manager
Victoria & Albert Museum

Challenges  faced  by  museums  and  art  stores  are  unique.  Allowing  a  connection  between  the masterpieces and the beholders requires generous amounts of planning, some cool technology, and a  little  inventiveness.Managing  the  security  of  objects,  assets,  staff,  and  the  public  in  the  heritage environment is specifically difficult as installing or upgrading security systems infrastructure is not easy because of the building restrictions. This presentation will serveas a reminder of those challenges and what strategies could be usedto mitigate these risks. 

Future Proof your CCTV Networks
14:00 - 14:25

More and more CCTV (VSS) systems are being installed over IP. What makes a good, stable, reliable network? What if the CCTV network  needs to share with the existing network? What do you have to take into consideration? Bandwidth, IP addressing, subnets, security, cable types and lengths, upgrading, managing –the list is endless. This presentation will deal with the essential issuesin putting together a network which will perform –and can be proved to perform.

15:15 - 15:45