Counter Terror Expo is the premier international event delivering buyers and specifiers from across the world within Government, Military, Law Enforcement, Emergency Services, Critical National Infrastructure, Private Sector and the Security Services.
The 6th edition of Counter Terror Expo offers a comprehensive display of technology, equipment and services alongside a high level education programme designed to
inform against the evolving security threat.
Around 9,500 attendees and 400+ exhibitors will participate in a free to attend
exhibition featuring multiple show floor workshops, new show feature zones, IEDD demo area, high level conference streams, behind closed door briefings and networking events in one secure environment.
CYBER
SECURITY & ELECTRONIC TERRORISM - Day 2 - Wednesday 30 April 2014
0900-0920 Coffee & Registration
0920-0930 Chairman’s Welcome & Introduction
0930-1000 The World is Changing!
What is the 21st century cyber threat?
Why you don't have to defeat an army on the battlefield to win a war
What this change means for nation states in terms of impacts, opportunities and threats
James Stuart, Director, Alt3
1000 -1030 Cyber Terrorism - A Real or Imagined Threat?
An assessment of where the generation of cyber terrorists will arise from?
Use of the Internet by terrorist groups active in Sub Saharan Africa
How social media is being used by terrorist and how this differs from previous web technologies
Application of theoretical models of terrorist engagement to the practice of terrorism in cyber space
Stewart K. Bertram, Cyber Capability Manager, Control Risks
1030-1100 Cyber Security - The Priority
The role of OCSIA on cyber security, information assurance and e-crime
Ensuring the resilience and security of government ICT infrastructures
New ways to protect businesses and make the UK more resilient to cyber-attacks and crime
Neil Kenward, Deputy Director, Cyber Programme & Intelligence Finance & Capabilities, Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office
1110 - 1130 Coffee/Tea/ Exhibition Visit
1040-1110 Cyber Security - The Priority
The role of OCSIA on cyber security, information assurance and e-crime
Ensuring the resilience and security of government ICT infrastructures
New ways to protect businesses and make the UK more resilient to cyber-attacks and crime
Neil Kenward, Deputy Director, Cyber Programme & Intelligence Finance & Capabilities, Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office
1110-1130 Coffee/Tea/ Exhibition Visit
1130-1155 Tackling the Threat of Cyber Crime and Cyber Terrorism
Unravelling cyber warfare and cyber terrorism from cyber crime
The threat to governments and commerce from cybercrime and cyber terrorism
The role of EC3 in implementing and delivering a concerted strategy to combat cybercrime in Europe
Importance of reinforcing existing cooperation across Europe to address cross-border collaboration and jurisdiction issues
Speaker TBC
1155-1220 Introduction to the National Cyber Crime Unit
Working proactively to target criminal vulnerabilities and prevent criminal opportunities
Importance of mainstreaming of cyber investigative capabilities
Addressing key challenges - the international dimension
Future plans to grow capability to respond in fast time to rapidly changing threats
Andy Archibald, Head of the National Cyber Crime Unit (NCCU)
1220-1240 The ACPO E-crime Strategy
What the police service and other agencies are doing to combat e-crime
Importance of mainstream cyber awareness and capabilities
Protecting against terrorism-incitement and inappropriate material online
Peter Goodman QPM, Deputy Chief Constable, East Midlands & ACPO lead on Cyber Crime
1240-1300 Panel Discussion & Q&A
1300-1400 Lunch, Networking and Exhibition Visit
1400-1420 Pro-Government Cyber Attacks with Virtual Armies
How the Syrian Electronic Army has been active during the Syrian conflict.
The intensity and scope of activities and implications for media groups, government institutions and others which have been hijacked
Dr Dave Sloggett, Author and Independent Academic
1420-1440 Cyber Resilience - Building a Defence Strategy that Works
The array and complexity of cybersecurity threats
Why traditional risk management can't deal with the risks from activity in cyberspace
Managing information risk with resilience
The importance of cyber governance and partnering
Steve Durbin, Global Vice President, Information Security Forum (ISF)
1440-1500 The Big Data Battle for Cyber Space
Why the war for control of cyber space is real
Why global collaboration is needed for this new kind of warfare
Big data as a useful weapon in the defence of the cyber threat
Mike Loginov, Chief Cyber Security Strategy Officer - Government, Hewlett Packard (HP) ESS
1500-1520 Cyber Crime and Cyber Terrorism
Defining a research agenda on cyber-crime and cyber-terrorism in Europe
How to protect critical European infrastructures against cyberattack and misuse
Combatting terrorists’ use of the Internet to spread propaganda and recruit followers
Chief Inspector David Fortune, Seconded Police/Security Research and Innovation Expert, CENTRIC - Sheffield Hallam University,
and Det. Inspector Andrew Staniforth, International Research Team, West Yorkshire Police
1520-1540 Information Security in the Age of Social Media
The way companies should manage their twitter and facebook presence against potential attackers, both social-engineering hacks and information-warfare exploits (black PR).
Edward Lucas, Senior Editor, The Economist
1540-1600 Security on Social Network Sites - The Case of the British Army
A critical examination of the use of SNSs in the British Army
Possible privacy and security risks associated with fast growing use of Social Network Sites (SNSs)
Identifying the risks from digital footprints
An assessment of efforts made towards education and creating awareness
Sylvester Abanseka, Independent Security Consultant
1600-1620 Cyber Attacks on Mobile Devices
An update on new and emerging threats to mobile devices
Importance of guarding against attacks and threats in the electronic, cyber and physical domains
An example attack on a mobile network device
John Bayliss, Director (Security), Communications Risk Management
1620-1640 Panel Discussion & Q&A
All Speakers
1640 Close
PRACTICAL
COUNTER TERRORISM CONFERENCE - - Day 2 - Wednesday 30 April 2014
0900-0920 Coffee & Registration
0920-0930 Chairman’s Welcome & Introduction
0930-1000 The Threat from Solo Terrorists
The creativity and level of sophistication demonstrated by solo terrorists
The challenge these actors represent for security services and law enforcement agencies
Examples of solo terrorists including Swedish Malmö-shooter Peter Mangs
Cato Hemmingby, Research Fellow, Norwegian Police University College
1000-1030 Do Terrorists Exploit Relative Superiority?
Assessment of the tactical success and failure of individual terrorist attacks
Analysis of methods employed by disparate terrorist groups
A review of the six fundamentals of special operations (simplicity, security, repetition, speed, surprise, and purpose)
Examples from over 20 separate terrorist attacks, both successful and unsuccessful
Alternative methods to predict and prevent terrorist attacks
Major Erik Davis, Downing Scholar, Combating Terrorism Center
1030-1100 Coffee, Networking and Exhibition Visit
1100-1130 Counterinsurgency Operations (COIN)
Key skills required for COIN missions
How to fight terrorists in hostile environments
Importance of discriminate use of force
The role for COIN in future conflicts
Colonel Tim Collins OBE BSc MA PSC, Late R Irish, Chief Executive Officer, New Century
1130-1200 Protecting Soft Targets From Hardline Terror
Ensuring correct balance between intelligence, physical means, correct manpower and realistic procedures
Balancing covert, overt and low profile methods of security
How to attain maximum protection whilst maintaining realistic budgets
Ivor Terret, Director,Training & Consulting, AS Solution
1200-1230 Private vs Public Sector Protective Security
Understanding the corporate risk appetite and identified threats
The need for an objective, balanced and informed approach when considering protective security
Case study examples
Lee Doddridge, Director, Covenant
1230-1300 Panel Discussion and Q&A
1300-1400 Lunch, Networking and Exhibition Visit
1400-1425 Counter IED Search
The importance of training for Police and Security Officers in the Homeland Security environment
Benefits of deploying IED Search personnel for VIP visits and significant events
The drive for equipment to counter the IED threat
Steve Kettle LCGI, CEO and Principal Consultant C-TAP
1425-1450 Profiling Analysis in Counter Terrorism
How the age of information has globalised terrorism
Why find the terrorists before they even adopt terrorist ideas?
The need for a reliable tool for early detection of suspicious behaviour of terrorism
Using profiling platforms that could identify individuals with significant risk factors
Benefits and paybacks
Adrian Brezulianu, Ph.D., Managing Director at Greensoft SRL and Professor, Technical University of
Iasi, Romania
1450-1515 Counter Terrorism Surveillance - New Solutions
CCTV and OCC standards under development for counter terror activities in passenger transport
Dave Gorshkov CEng, FIET, Managing Director, Digital Grape Business Services and Chairman of the CCTV and PSIM Standards Working Group
1515-1540 Soft Mitigation of Hostile Threats
Assessment of the increasing adoption in numerous theatres of 'soft security'
Using positive engagement with host communities to mitigate hostile security threats
Using open ethical engagement to build links and enhance security
Importance of a transparent and demonstrable commitment to upholding human rights
Gabriel Carter, LPD Risk Management
1540-1605 Countering the Terrorist Threat via Digital Media Analysis
Exploiting digital media to enhance public safety whilst reducing operational budgets
Easy and cost-effective routes to access the intelligence in digital media held by law enforcement and intelligence agencies
Using face recognition technology to depict individuals of interest
Carl Gohringer, Founder, Allevate
1605-1630 Panel Discussion and Q&A
1630 Close
SPONSORS
Synergy™,
security management software, is the cornerstone of the Synectics solution. Powerful, adaptable and easy to use, Synergy incorporates a common bridge and user interface for legacy and contemporary security systems to interact together without costly replacement or
customization.
CONTACTS
LINKS
http://www.cipre-expo.com/
http://www.counterterrorexpo.com/
http://www.2020visionnetwork.eu/sme/
http://erc.europa.eu/funding-schemes
http://ec.europa.eu/research/horizon2020/index_en.cfm
EU
funding schemes Horizon
2020
http://cordis.europa.eu/fp7/ncp_en.html
Protect
your sovereign shoreline with littoral robotic drone patrols, 24/7 and 365
days of the year. Ideal for fishery and military applications where
persistent monitoring is essential for early warning.
|