| Counter Terror Expo is the premier international event delivering buyers and specifiers from across the world within Government, Military, Law Enforcement, Emergency Services, Critical National Infrastructure, Private Sector and the Security Services.
 
 The 6th edition of Counter Terror Expo offers a comprehensive display of technology, equipment and services alongside a high level education programme designed to
        inform against the evolving security threat.
 
 Around 9,500 attendees and 400+ exhibitors will participate in a free to attend
        exhibition featuring multiple show floor workshops, new show feature zones, IEDD demo area, high level conference streams, behind closed door briefings and networking events in one secure environment.
     
     CYBER
        SECURITY & ELECTRONIC TERRORISM - Day 2 - Wednesday 30 April 2014   0900-0920   Coffee & Registration   0920-0930   Chairman’s Welcome & Introduction   0930-1000   The World is Changing!
 What is the 21st century cyber threat?
 Why you don't have to defeat an army on the battlefield to win a war
 What this change means for nation states in terms of impacts, opportunities and threats
 
 James Stuart, Director, Alt3
   1000 -1030   Cyber Terrorism - A Real or Imagined Threat?
 An assessment of where the generation of cyber terrorists will arise from?
 
 Use of the Internet by terrorist groups active in Sub Saharan Africa
 How social media is being used by terrorist and how this differs from previous web technologies
 Application of theoretical models of terrorist engagement to the practice of terrorism in cyber space
 
 Stewart K. Bertram, Cyber Capability Manager, Control Risks
   1030-1100  Cyber Security - The Priority
 The role of OCSIA on cyber security, information assurance and e-crime
 Ensuring the resilience and security of government ICT infrastructures
 New ways to protect businesses and make the UK more resilient to cyber-attacks and crime
 
 Neil Kenward, Deputy Director, Cyber Programme & Intelligence Finance & Capabilities, Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office
   1110 - 1130   Coffee/Tea/ Exhibition Visit    1040-1110   Cyber Security - The Priority
 The role of OCSIA on cyber security, information assurance and e-crime
 Ensuring the resilience and security of government ICT infrastructures
 New ways to protect businesses and make the UK more resilient to cyber-attacks and crime
 
 Neil Kenward, Deputy Director, Cyber Programme & Intelligence Finance & Capabilities, Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office
   1110-1130   Coffee/Tea/ Exhibition Visit    1130-1155   Tackling the Threat of Cyber Crime and Cyber Terrorism
 Unravelling cyber warfare and cyber terrorism from cyber crime
 The threat to governments and commerce from cybercrime and cyber terrorism
 The role of EC3 in implementing and delivering a concerted strategy to combat cybercrime in Europe
 
 Importance of reinforcing existing cooperation across Europe to address cross-border collaboration and jurisdiction issues
 
 Speaker TBC
   1155-1220   Introduction to the National Cyber Crime Unit
 Working proactively to target criminal vulnerabilities and prevent criminal opportunities
 Importance of mainstreaming of cyber investigative capabilities
 Addressing key challenges - the international dimension
 Future plans to grow capability to respond in fast time to rapidly changing threats
 
 Andy Archibald, Head of the National Cyber Crime Unit (NCCU)
   1220-1240   The ACPO E-crime Strategy
 What the police service and other agencies are doing to combat e-crime
 Importance of mainstream cyber awareness and capabilities
 Protecting against terrorism-incitement and inappropriate material online
 
 Peter Goodman QPM, Deputy Chief Constable, East Midlands & ACPO lead on Cyber Crime
   1240-1300   Panel Discussion & Q&A   1300-1400   Lunch, Networking and Exhibition Visit   1400-1420   Pro-Government Cyber Attacks with Virtual Armies
 How the Syrian Electronic Army has been active during the Syrian conflict.
 The intensity and scope of activities and implications for media groups, government institutions and others which have been hijacked
 
 Dr Dave Sloggett, Author and Independent Academic
   1420-1440   Cyber Resilience - Building a Defence Strategy that Works
 The array and complexity of cybersecurity threats
 Why traditional risk management can't deal with the risks from activity in cyberspace
 Managing information risk with resilience
 The importance of cyber governance and partnering
 
 Steve Durbin, Global Vice President, Information Security Forum (ISF)
   1440-1500   The Big Data Battle for Cyber Space
 Why the war for control of cyber space is real
 Why global collaboration is needed for this new kind of warfare
 Big data as a useful weapon in the defence of the cyber threat
 
 Mike Loginov, Chief Cyber Security Strategy Officer - Government, Hewlett Packard (HP) ESS
   1500-1520   Cyber Crime and Cyber Terrorism
 Defining a research agenda on cyber-crime and cyber-terrorism in Europe
 How to protect critical European infrastructures against cyberattack and misuse
 Combatting terrorists’ use of the Internet to spread propaganda and recruit followers
 
 Chief Inspector David Fortune, Seconded Police/Security Research and Innovation Expert, CENTRIC - Sheffield Hallam University,
        and Det. Inspector  Andrew Staniforth, International Research Team, West Yorkshire Police
   1520-1540   Information Security in the Age of Social Media
 The way companies should manage their twitter and facebook presence against potential attackers, both social-engineering hacks and information-warfare exploits (black PR).
 
 Edward Lucas, Senior Editor, The Economist
   1540-1600   Security on Social Network Sites - The Case of the British Army
 A critical examination of the use of SNSs in the British Army
 Possible privacy and security risks associated with fast growing use of Social Network Sites (SNSs)
 Identifying the risks from digital footprints
 An assessment of efforts made towards education and creating awareness
 
 Sylvester Abanseka, Independent Security Consultant
   1600-1620   Cyber Attacks on Mobile Devices
 An update on new and emerging threats to mobile devices
 Importance of guarding against attacks and threats in the electronic, cyber and physical domains
 An example attack on a mobile network device
 
 John Bayliss, Director (Security), Communications Risk Management
   1620-1640   Panel Discussion & Q&A
 All Speakers
 
 1640   Close
     
     PRACTICAL
        COUNTER TERRORISM CONFERENCE - - Day 2 - Wednesday 30 April 2014   0900-0920   Coffee & Registration   0920-0930   Chairman’s Welcome & Introduction   0930-1000   The Threat from Solo Terrorists
 The creativity and level of sophistication demonstrated by solo terrorists
 The challenge these actors represent for security services and law enforcement agencies
 Examples of solo terrorists including Swedish Malmö-shooter Peter Mangs
 
 Cato Hemmingby, Research Fellow, Norwegian Police University College
   1000-1030   Do Terrorists Exploit Relative Superiority?
 Assessment of the tactical success and failure of individual terrorist attacks
 Analysis of methods employed by disparate terrorist groups
 A review of the six fundamentals of special operations (simplicity, security, repetition, speed, surprise, and purpose)
 Examples from over 20 separate terrorist attacks, both successful and unsuccessful
 Alternative methods to predict and prevent terrorist attacks
 
 Major Erik Davis, Downing Scholar, Combating Terrorism Center
   1030-1100   Coffee, Networking and Exhibition Visit   1100-1130   Counterinsurgency Operations (COIN)
 Key skills required for COIN missions
 How to fight terrorists in hostile environments
 Importance of discriminate use of force
 The role for COIN in future conflicts
 
 Colonel Tim Collins OBE BSc MA PSC, Late R Irish, Chief Executive Officer, New Century
   1130-1200   Protecting Soft Targets From Hardline Terror
 Ensuring correct balance between intelligence, physical means, correct manpower and realistic procedures
 Balancing covert, overt and low profile methods of security
 How to attain maximum protection whilst maintaining realistic budgets
 
 Ivor Terret, Director,Training & Consulting, AS Solution
   1200-1230   Private vs Public Sector Protective Security
 Understanding the corporate risk appetite and identified threats
 The need for an objective, balanced and informed approach when considering protective security
 Case study examples
 
 Lee Doddridge, Director, Covenant
   1230-1300   Panel Discussion and Q&A   1300-1400   Lunch, Networking and Exhibition Visit   1400-1425   Counter IED Search
 The importance of training for Police and Security Officers in the Homeland Security environment
 Benefits of deploying IED Search personnel for VIP visits and significant events
 The drive for equipment to counter the IED threat
 
 Steve Kettle LCGI, CEO and Principal Consultant C-TAP
   1425-1450   Profiling Analysis in Counter Terrorism 
 How the age of information has globalised terrorism
 Why find the terrorists before they even adopt terrorist ideas?
 The need for a reliable tool for early detection of suspicious behaviour of terrorism
 Using profiling platforms that could identify individuals with significant risk factors
 Benefits and paybacks
 
 Adrian Brezulianu, Ph.D., Managing Director at Greensoft SRL and Professor, Technical University of
        Iasi, Romania
   1450-1515   Counter Terrorism Surveillance - New Solutions
 CCTV and OCC standards under development for counter terror activities in passenger transport
 
 Dave Gorshkov CEng, FIET, Managing Director, Digital Grape Business Services and Chairman of the CCTV and PSIM Standards Working Group
   1515-1540   Soft Mitigation of Hostile Threats
 Assessment of the increasing adoption in numerous theatres of 'soft security'
 Using positive engagement with host communities to mitigate hostile security threats
 Using open ethical engagement to build links and enhance security
 Importance of a transparent and demonstrable commitment to upholding human rights
 
 Gabriel Carter, LPD Risk Management
   1540-1605   Countering the Terrorist Threat via Digital Media Analysis   Exploiting digital media to enhance public safety whilst reducing operational budgetsEasy and cost-effective routes to access the intelligence in digital media held by law enforcement and intelligence agencies
 Using face recognition technology to depict individuals of interest
 
 Carl Gohringer, Founder, Allevate
   1605-1630   Panel Discussion and Q&A
 1630   Close
 
   
     
     SPONSORS       
   
   Synergy™,
      security management software, is the cornerstone of the Synectics solution. Powerful, adaptable and easy to use, Synergy incorporates a common bridge and user interface for legacy and contemporary security systems to interact together without costly replacement or
      customization.         CONTACTS   
 
   LINKS   http://www.cipre-expo.com/
         http://www.counterterrorexpo.com/
         http://www.2020visionnetwork.eu/sme/
         http://erc.europa.eu/funding-schemes
         http://ec.europa.eu/research/horizon2020/index_en.cfm
       EU
      funding schemes Horizon
      2020
       http://cordis.europa.eu/fp7/ncp_en.html
        
        
       
   Protect
      your sovereign shoreline with littoral robotic drone patrols, 24/7 and 365
      days of the year.  Ideal for fishery and military applications where
      persistent monitoring is essential for early warning.          
         |