" />

28 - 29 November 2018 Grand Hall, Olympia, London

2018 logo

Reserve a free pass Book a stand

28 - 29 November 2018
Grand Hall, Olympia, London

workshopsSecurity Institute

                                                              

 

                                                                        Earn up to: 18 Hours CPD
(Day 1 - 10 hours - Day 2 - 8 hours)

  

Loading
Access Control and Biometrics
  1. Theatre 3
    5 mins
  2. Theatre 3
    15 mins
    Combined protection against various threats  International test standards for blast, bullet and forced entry resistance  Realized projects with high security windows, facades and doors 
  3. Theatre 3
    15 mins
    Why today anybody can copy your house key: a technology assessment.  The Stealth Key: embracing 3D metal printing to create the solution  The positive implications and disruption of 3D printing mechan ...
  4. Theatre 3
    15 mins
    How ABLOY has mitigated the risk normally associated with mechanical master key systems especially from lost or stolen keys  Using technology and security systems to enforce compliance, reduce H&S ris ...
CBRNE
  1. Theatre 3
    5 mins
  2. Theatre 3
    20 mins
    Geographical dose mapping of a large area survey  Radiological hazard  detection through data fusion  A deployable solution for nuclear threads detection in different application fields 
  3. Theatre 3
    20 mins
    Evolving threats require flexible and mobile solutions for trace explosives detection;   Speed and accuracy of results are required to ensure continuous throughput;   Ease of use and high availability ...
  4. Theatre 3
    15 mins
    CBRN Hazard Evaluation  The Hazard Evaluation and Response Toolset (HEART)  Case studies:  3D mobile demonstration  Distributed hazard simulation  Earth and Sea Observation System (EASOS) 
CCTV and Video Surveillance
  1. Theatre 3
    5 mins
  2. Theatre 3
    15 mins
    • Applications – where to use ruggedized cameras
    • Measurements of Durability and Performance
    • Added value opportunity when using ruggedized CCTV – Multiple Uses
  3. Theatre 3
    20 mins
    •How unique software changes the operation of CCTV surveillance  •Enabling CCTV surveillance by delivering automated information to the operator  •Demonstrate the effectiveness of dynamic live monitor ...
  4. Theatre 3
    15 mins
    Vast amount of video content is generated by surveillance cameras, little of it reviewed or evaluated. Briefcam’s technology allows to review, research and respond to video streams efficiently. Briefc ...
Drones, UAV and Counter Drones
  1. Theatre 3
    15 mins
  2. Theatre 3
    15 mins
    Short Introduction about Droptec: Who we are and what we do.  What are the threats posed by UAV's for prisons  Introduction of Droptec's counter-UAV netgun 'Dropster' 
  3. Theatre 3
    15 mins
    How to reconstruct Incident and Crime Scenes Automatic or semi-automatic analysis of scene models Presenting scene investigations in briefings or courtrooms
  4. Theatre 3
    15 mins
  5. Theatre 3
    15 mins
    identifying rogue drones using Unifly’s Flight Viewer Make use of geocage to delineate the inspection zone Creating dynamic no-drone zones on the fly by Civil security authorities
Perimeter Protection and Intrusion Detection
  1. Theatre 3
    5 mins
  2. Theatre 3
    15 mins
             Getting the basics right – perimeter security to deter and delay.          Entrance controls – things to consider.          Automated gates and barriers – safety of users is paramount.
  3. Theatre 3
    15 mins
    Identifying the key vulnerabilities of your perimeter  Using threat planning assumptions to support the business case for security measures  Implementing effective perimeter security programmes in a c ...
  4. Theatre 3
    15 mins
    Facial Recognition, no longer the best kept secret.  What are EWIDS, I’ve got you there.  What next, so you have found it, now what. 
  5. Theatre 3
    15 mins
    The complete range of IWA14 & PAS68 impact tested HVM (Hostile Vehicle Mitigation) solutions Explanation of all the specifications LPS1175 Forcible Attack security product range
  6. Theatre 3
    15 mins
    •             Designing HVM to meet the Machinery Directive. •             Control philosophy, creating safe and secure operation. •             Post-handover responsibilities, training & maintenance.
Surveillance, Communications and Data
  1. Theatre 3
    5 mins
  2. Theatre 3
    20 mins
    Clients are becoming more sophisticated in their requirement from clients and shippers.  Quality of goods up to delivery to final clients is a winning factor for obtaining supply contracts.  The marke ...
  3. Theatre 3
    20 mins
    Powerful and affordable computer processing, and advances in AI enables sophisticated facial screening. Silent Talker, use non-verbal facial indicators to reliably determine credibility and mal-intent ...
  4. Theatre 3
    20 mins
    What is visual hacking and the need for visual security   How to protect from the risks – 3M privacy & protection  Research and studies   Privacy and regulations (ISO27001, GDPR, etc.) 
Cyber Threat and Cyber Capability
  1. Theatre 3
    15 mins
    •         Understanding the risk from documents and why current industry approaches are flawed
    •         Paradigm shift of ‘looking for good’ and generating clean, compliant files in real-time
    •         Use cases of where this content, disarm and reconstruct technology fits
  2. Theatre 3
    15 mins
    Global terrorism and crime rely on secrecy.  Threats grow more dangerous and the criminals become more sophisticated every year  Law enforcement must have the most sophisticated technology to protect ...
  3. Theatre 3
    15 mins
    Dangers of compromised credentials, and vectors of compromise – Every organization has them  Finding, compromising and monetizing your company’s data: the underground economy  Preventing and avoiding ...
  4. Theatre 3
    15 mins
    The transition that cyber crime is going through  The 3 Simple and effective steps you can take to fight back   How digital intelligence is at your fingertips  How to use the cloud and automation to s ...
  5. Theatre 3
    15 mins
  6. Theatre 3
    15 mins
    IA Inside, the essential security concept for all organisations procuring technology  Learn how IA concept inside can help organisations reduce their cyber risks  Find out how IA Inside can help to im ...
  7. Theatre 3
    15 mins
    Email is vulnerable and 91% of cyber attacks start with phishing.  The NCSC recommends implementing DMARC to defend against targeted cyber threats.   OnDMARC makes DMARC implementation quick and easy ...
  8. Theatre 3
    15 mins
     Why should you find out where your data is located globally?    How can you proactively identify vulnerabilities as soon as they are introduced? 
  9. Theatre 3
    15 mins
  10. Theatre 3
    15 mins
    Is your organization ready for the GDPR? Data Protection Principles Lawful basis for processing and Consent Rights of Data Subjects Risk assessment game
  11. Theatre 3
    15 mins
    Discuss the challenges of IoT facing organisations.  Learn how to keep employees, properties and assets secure in an IoT environment.   Provide a comprehensive security-of-security strategy to safegua ...
Screening and Scanning
  1. Theatre 3
    5 mins
  2. Theatre 3
    20 mins
  3. Theatre 3
    15 mins
    Security challenges in crowded spaces  Review of security screening approaches  Radio Physics MiRTLE stand-off security solution 
  4. Theatre 3
    20 mins
    The threat and nature of person borne suicide attacks;  Highlighting challenges of screening for suicide threats and the attitude to risk;  Introducing new security paradigms for protecting public pla ...
  5. Theatre 3
    20 mins
    Current technology challenges to detect explosives hidden in common materials that act as shielding (i.e. water, gravel, etc…).  Cosmic Ray Tomography - new software driven scanning system, the MMPDS ...
  6. Theatre 3
    20 mins
    •Next generation screening platforms are emerging  •This present huge opportunities for airports and regulators  •Advantages include improved security, automation, less divestment, addressing new thre ...
  7. Theatre 3
    20 mins
    Threat evolution - different explosives, lower quantities and masses  Passenger facilitation and satisfaction - need to keep passengers wanting to fly  Cost minimization - capital and operational cost ...
  8. Theatre 3
    20 mins
    The next generation of cargo scanners will require high speed imaging  Teledyne e2v works with customers to understand technical requirements of new scanners  Teledyne e2v has a technical roadmap to e ...
  9. Theatre 3
    20 mins
    • Requirements for ETD (explsoves trace detection) equipment in harsh environments
    • The commercial customer vs. the federal customer
    • Detection probability vs screening procedures
    • The importance of Con-Op development for successful deployment

 

Newsletter Sign Up