Summary is AI-generated, newsdesk-reviewed
  • CNI Security Group hosts 'Protecting CNI Scotland' cybersecurity event on 19th November.
  • The event features key insights into cyber-secure solutions for critical national infrastructure.
  • Keynote by Mike Gillespie on cyber and physical security; book early due to limited space.

The CNI Security Group is organising their next high-security solutions event in Scotland, titled "Protecting CNI Scotland – The importance of cyber-secure solutions in critical national infrastructure."

Aimed at end users, consultants, and system designers in the CNI sector, the free event will be held at Dakota Eurocentral, Motherwell, on 19th November, from 9:30 am to 4 pm. Attendees will gain insights into the significance of cyber-secure solutions within critical national infrastructure settings.

Cybersecurity and End-User Interaction

The event will feature presentations and panel discussions with cybersecurity specialists and end-users within the CNI sector, sharing their real-world experiences.

Several pioneering security industry manufacturers, including barox Kommunikation, Hirsch UK, Nedap Security, ISM Ltd, Commend, Overview, and Lochrin Bain, will present the latest CNI/NPSA security technologies, designed for use in high-security environments like utilities, power, prisons, nuclear, and airports.

Keynote on Cyber and Physical Security

Mike Gillespie, FCIIS MSyl CIRM of Advent IM, will deliver a keynote presentation. Recognised for his expertise in Cyber Security and Governance, Mike, who is also the Senior Vice President Europe at CSCIS and a Chartered Institute of Information Security Fellow, will address cyber and physical security, aiming to enhance awareness of organisational threats.

Exploring National Security Policy

Malcolm has headed numerous international defence and security conferences

An engaging panel discussion in the afternoon, entitled "What lessons have we learnt from experience? What does the future hold? How can we be more CNI resilient?" will be overseen by Malcolm Warr OBE, Chair of CNI Scotland.

With over two decades of experience in national security policy and implementation, Malcolm has headed numerous international defence and security conferences. Further details on additional speakers and panellists will be provided shortly.

Global Perspectives on Cybersecurity

"We are so excited about our first event in Scotland, particularly as it is building up to be the best one so far. Once again, we have a fantastic line-up of presenters and panellists, from specialists in cyber security on a global scale, to end users in the CNI space," commented Sara Fisher, Chairperson of the CNI Security Group. She expressed her gratitude for the dedicated team and experts sharing their knowledge at the event.

Event Agenda and Registration

Participants will enjoy lunch, and the event will conclude with post-event drinks. Those interested can view the full agenda and register for free by visiting the event's website.

Tickets will be granted on a first-come, first-served basis, so early registration is recommended. Due to space constraints, additional manufacturers or suppliers cannot be accommodated at this event.

Understand how converged physical and cybersecurity systems can scale protection.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...