Avatar photo

Contributor

Author Bio ▼

Adam Bannister is a contributor to IFSEC Global, having been in the role of Editor from 2014 through to November 2019. Adam also had stints as a journalist at cybersecurity publication, The Daily Swig, and as Managing Editor at Dynamis Online Media Group.
June 11, 2019

Download

Whitepaper: Enhancing security, resilience and efficiency across a range of industries

IFSEC 2019

WATCH: 7 editor’s picks for IFSEC 2019 seminars

Across three days IFSEC 2019 visitors will have access to more than 35 hours of educational content.

Covering social media, autonomous cars and crisis management, as well as featuring Frank Gardner OBE, Dr Dave Sloggett and Surveillance Camera Commissioner Tony Porter, the video below runs through seven of the most intriguing seminars taking place at London ExCeL between 18-20 June 2019.

IFSEC International is Europe’s leading integrated security event. Your IFSEC badge gives you access to multiple theatres and a forward-thinking seminar programme taking place in:

  • The IFSEC Keynote Arena
  • Converged Security Centre brought to you by Vidsys
  • Future of Security Theatre, powered by Tavcom

View the full IFSEC 2019 seminar programme.

Find out more about my picks from the IFSEC 2019 education programme below.

#1. Can autonomous vehicles be hacked?

  • Mike Gillespie, VP, CSCIS and founder, Advent IM
  • The Future of Security Theatre brought to you by Tavcom
  • DAY ONE: 12:10 – 12:35; DAY TWO: 15:50 – 16:15

Has the rush to technology once again proven to be a dangerous path? Are we really ready for genuinely autonomous vehicles or are we creating not only more risk to safety but potential weapons? How long before cars come with biometrics instead of keys? All this and more discussed with Mike Gillespie.

#2. Secure by default for video surveillance technology

Attack aware – Secure by Default

  • Surveillance Camera Commissioner Tony Porter
  • IFSEC 2019 Keynote Arena
  • DAY THREE: 10:15 – 10:45

As part of Surveillance Camera Day Tony Porter, the Surveillance Camera Commissioner for England and Wales, will be launching new secure by default/secure by design minimum requirement for the manufacture of video surveillance systems and components at IFSEC. Several high profile and well publicised compromises of systems demonstrated that they were being left live and internet- facing in an unacceptable security configuration. Some of these compromises, like Mirai botnet, that took out social media and financial websites across the globe, also showed the root cause was down to poor design and manufacturing. Driven by the need to ensure the UK’s resilience against this and other forms of cyber security vulnerability, as well as to provide the best possible assurance stakeholders, the new requirements are an important step forward for manufacturers, installers and users alike.

Secure by Default panel debate

  • Surveillance Camera Commissioner Tony Porter; Gary Harmer, Sales Director, Hikvision UK and Ireland; Jeremy Hockham, Managing Director, Norbain Holdings; Patrick McBrearty, Cyber Crime Protect Officer, West Midlands Regional Organised Crime Unit; CHAIR: Justin Hollis, Marketing Director, Hikvision
  • IFSEC 2019 Keynote Arena
  • DAY THREE: 10:45 – 11:05

As part of the National Surveillance Camera Day, Tony Porter, the Surveillance Camera Commissioner is launching “Secure by Default”.

Secure by Default are a minimum set of requirements for all manufacturers to ship network video products to installers in the most hardened, cyber-security-optimal form possible, with default settings which provide minimal vulnerabilities on first use.

The panel will be answering questions about the wider purpose and implications for the industry.

#3. Is the security world ready for 5G?

  • Richard Broom CTSP, Senior Technical Tutor, Tavcom Training
  • The Future of Security Theatre brought to you by Tavcom
  • DAY TWO: 12:10 – 12:35

Increasingly, overarching security and intelligence handling systems are becoming greatly more connected and considerably more varied and flexible.  The arrival of Long Term Evolution (LTE), 5G, Internet-of-Things and similar technologies means that security systems, especially mobile security systems,will not only become greatly more connected, they will have to become smarter and, in data processing terms,faster.

The days of discrete security systems are coming to an end and old technology systems will be replaced by intelligence gathering, intelligence processing and data analysis systems. These systems will take data in many different formats from a wide variety of sources.

Once processed, the data would enable law enforcement, military and intelligence agencies to make important and truly informed decisions based on the empirically gathered, quickly processed and the easily searched data they have to hand.

Security systems that incorporate all the traditional security technologies (CCTV, Access Control, Intruder, Perimeter) will be connected to intelligent management and data handling systems where evolving technologies such as Video and Audio Analytics, Image and Audio Forensics and Artificial Intelligence will be applied to the incoming streams of raw source data. Without these evolving intelligence handing systems, we might just find ourselves overloaded and overburdened with increasing amounts of unsorted and not entirely usable raw data.

#4. AI and machine learning for security: has its time come?

  • Alexander Babuta, Research Fellow, National Security and Resilience, Royal United Services Institute for Defence and Security Studies (RUSI)
  • Dr Dave Sloggett, Alan Taylor Research Fellow, The University of Oxford
  • David Wright, Director, Trilateral Research
  • DAY THREE: 13:10 – 14:10

This session will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection.

  • Is Artificial Intelligence and Machine Learning a technology looking for a problem to solve?
  • What are the benefits of AI and what positive outcomes for security can it deliver?
  • Is the technology mature enough for mainstream use in security scenarios or is it more of a data gathering tool that is yet to have its day?
  • Does the double-edged nature of AI present a significant risk due to both enterprises and attackers having access to the same tools?

#5. Modelling risk and crisis management for 2030

  • Rick Cudworth, Crisis and Resilience Partner, Deloitte; Brian Kinch, Director of Risk Management, Ecosystem Risk; Dr David Rubens D.SyRM, CSyP, F.ISRM, FSyI, Executive Director, Institute of Strategic Risk Management; GB Singh, Editor & Publisher, Security Today, India
  • IFSEC 2019 Keynote Arena
  • DAY THREE: 14:20 – 15:15

The risks and threats that the world is facing seem to be changing on an almost daily basis and this session will be part of the launch of the ‘ISRM Manifesto: Crisis 2030’. Whether it is climate change, severe weather systems, increasingly failing national infrastructures, IT dependency and systems fragility, pandemics, mutational viruses (both biological and cyber), and the increasingly destructive and non-recoverable nature of many of their impacts and long-term consequences, it seems as though the traditional models of risk management are no longer able to engage with – or even understand – how these emerging threats will impact on every aspect of our lives.

The panellists will explore whether the nature of the changes in these emerging threats are evolutionary, revolutionary or whether in fact they are mutational – in that they are creating a completely new class of risk for which the models and frameworks that we used to describe previous classes of risks will no longer be applicable, or even relevant.

#6. Social media and internet security: A new opportunity

  • Mark Folmer, Vice President, Security Industry, TrackTik Software
  • Frank Gardner OBE, Broadcaster and Security Journalist
  • Oliver Hoare, Consultant Director Cyber Security, The Risk Advisory Group and former Head of Cyber Security for London 2012
  • IFSEC 2019 Keynote Arena
  • DAY TWO: 13:00 – 13:50

This session focuses on the evolving relationship between social media and security and will consider multimedia content threats, traditional threats and social threats and associated risks including information and data disclosure, reputation loss, location leakage, safety loss, blackmail and cyber harassment.

It will also look at how social media data and technologies can be used to improve and positively influence security and assess how social media and social media companies can help businesses become more secure.

#7. How converged security centres respond in real-time to physical & online threats

  • Professor Martin Gill, Perpetuity Research; Sarb Sembhi, Virtually Informed
  • Converged Security Centre
  • DAY ONE: 13:30 – 14:15

 

  • Alan Jenkins, Head of Advisory Services at 2|SEC Consulting, Cyber Security Pilotage
  • James Willison MA Msyl, Founder, Unified Security Ltd
  • Converged Security Centre
  • DAY TWO: 11:00 – 11:45

 

  • David Clark, Chief Security Officer & Head of Logistics, Chair, The Francis Crick Institute and ASIS UK Chapter
  • James Willison MA Msyl, Founder, Unified Security Ltd
  • Converged Security Centre
  • DAY THREE: 11:00 – 11:45

The teams from Vidsys, Micro Focus and AXIS Communications will show how their technologies can be integrated in one centre, to prioritise emerging security risks from high volumes of data and respond in near real time. They will provide a fascinating view on how large events and campuses can be managed in a fast moving and dynamic environment. This includes:

  • a stadium where large numbers of fans are congregating. Tweets start pouring in about an upcoming protest to disrupt the game at a certain time, some threaten to march inside the stadium and stop the game – all from anonymous sources whose identities cannot be confirmed
  • Security officers begin to view live video feeds from stationary cameras, drones and the incoming tweets all under one common operating picture and monitor the situation
  • facial recognition and biometrics to prevent cyber physical attacks
  • David Clark will follow up on key benefits of this converged approach and we will invite the audience to explore with us how these can be realised in the future.

 

Related Topics

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
Topics: