SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alcatraz achieves SOC 2 for biometric security
    • Datalogic AI tech drives retail innovation at NRF 2026
    • Deep Sentinel launches Mobile Monitoring Trailer
    • Eplan and CADENAS partnership enhances data access
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why open matters in the age of AI
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Reed Exhibitions announce confirmed keynote speakers for Infosecurity Europe 2022

3 Mar 2022

Reed Exhibitions announce confirmed keynote speakers for Infosecurity Europe 2022
Contact company
Contact RX USA
icon Add as a preferred source Download PDF version
Related Links
  • Infosecurity Europe 2021 converts to virtual exhibition and conference on 13-15 July
  • Infosecurity Europe 2021 confirms keynote speaker line-up for its virtual conference

Reed Exhibitions Ltd, the organiser of Infosecurity Europe, Europe’s most influential information security event, has announced the Keynote agenda and some of the speakers who will be presenting as part of the rich and extensive conference programme. 

Visitor registration opened on 1st March for the 2022 event, which will run from Tuesday 21-Thursday 23 June 2022 at ExCeL London. Cybersecurity professionals and members of the infosec community are invited to sign up and secure their place in the audience to hear these fantastic speakers sharing their invaluable experience and knowledge.  

 The confirmed keynote speakers are as follows:

Baroness Eliza Manningham-Buller

Baroness Eliza Manningham-Buller, former head of MI5, led the service through significant change as it dealt with the growth of Al-Qaida terrorism. She now serves on the Lord's Select Committee on Science and Technology. 

In her session, Leadership in an Age of Uncertainty (Wednesday 22 June, 10:10), she will explore how agility has become more important during the global pandemic. How can businesses become nimbler? How do you lead an organisation when little is certain? 

Eliza says, “I am much looking forward to this conference, and hope that my talk will suggest the qualities of leadership that we should deploy when faced by so many threats in the world today.” 

Misha Glenny

We are witnessing the mesh between the physical and digital threat landscape close tighter"

Misha Glenny, author, journalist, and specialist in organised crime and cybersecurity, has acted as a consultant to European governments and the EU on the Balkans and advised the US departments of State and Justice on US-European relationships.

He wrote the acclaimed book McMafia. In his talk, Geopolitics and Cyber Insecurity (Tuesday 21 June, 15:20), Glenny will offer unique insights into the challenges geopolitical tensions are creating across the tech sector and the current climate between superpowers. 

He says, “As we watch superpowers stride strategically across the world map, we are witnessing the mesh between the physical and digital threat landscape close tighter. How do we deal with it all? I will look at how tensions are created across nation-states, and what are the immediate and evolving threats.”  

Geoff White 

Investigative journalist Geoff White reports for the BBC and Channel 4 and is the author of The Lazarus Heist. In his session Lessons Learned from Most Recent Cybercrime Investigations (Wednesday 22 June, 16:10) he will tell the fascinating story of North Korea’s rise to become a cyber superpower.  

“Within it is lessons about how nation-states apply cyber tactics to wage war against their enemies, exert influence in the world and, in some instances, make lots of money,” he says. “We’ve seen the Russian invasion into Ukraine and the cyber activity around it that’s unfolding as we speak.”

“It’s no surprise nation-states use these tactics in aggressive military campaigns. What we need to understand is the background; the interface between the cyber attackers who work for governments and the cybercriminals that set up the networks, and how that plays out in terms of geopolitics.” 

Mandy Hickson 

Former RAF fast-jet pilot Mandy Hickson is an entrepreneur and bestselling author of An Officer, Not a Gentleman: The inspirational journey of a pioneering female fighter pilot.

She offers visitors the opportunity to learn from her journey in her presentation, Perspective from the Front Line - How to Overcome Great Hurdles to Realise your Full Potential (Thursday 23 June, 10:10). Mandy will share insight into how she remained resilient in difficult situations, and the inspiration she has drawn from her experiences. 

James Lyne 

I’ll be explaining what the cybercrime world looks like today, what their latest tactics are, and how they make money"

James Lyne is CEO of Helical Levity, which built CyberStart – the gamified cybersecurity education platform for young adults. He has worked with many organisations on security strategy, handled several severe incidents, and is a frequent industry advisor.

During his presentation, How Hacking Works (Wednesday 22 June, 15:20), he will reveal how cybercriminals operate in the real world – including hands-on demonstrations of attacks.  James says, “I’ll be explaining what the cybercrime world looks like today, what their latest tactics are, and how they make money.”

“There’s a disconnect between expectations of what a scam looks like versus the reality of what criminals are doing. I’ll dig a little deeper into the nuts and bolts. As a self-professed massive geek, I’m looking forward to Infosecurity Europe – to walk the floor and see the trends in new tech. If you’re a fellow geek come and find me, I’d love to connect." 

Professor Keith Martin 

Professor Keith Martin is Professor of Information Security at Royal Holloway, University of London, and Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday.

In his presentation Applying Cryptography in a Real-World Setting to Build Secure Systems (Tuesday 21 June, 16:30), Professor Martin will explain how cryptography is used today, highlighting the security benefits and pain points, and demystifying its controversial applications and the nuances behind alarming headlines. 

Learning cybersecurity through real experiences

Cybersecurity is a dynamic discipline, and the opportunity to overcome these challenges is not to be missed"

Nicole Mills, Exhibition Director at Infosecurity Group, comments, “Cybersecurity is a dynamic discipline, and the opportunity to learn directly from those with real-world experience of overcoming challenges and managing high-pressure situations is not to be missed.”

“Our Keynote Speakers have achieved great things and steered organisations through the toughest times. Their expertise covers a phenomenal range of topics, from personal resilience to geopolitics on a global scale. Visitors will come away from these presentations energised, inspired, and enlightened, with actionable knowledge and fresh ideas to take back to their organisations.” 

Discussion on cybersecurity

Other topics explored on the Keynote Stage at Infosecurity Europe 2022 will include key threats and adversaries, tackling insider threats, building a security culture, the paradigm change in ransomware, monetisation of threats, Cybercrime-as-a-Service (CaaS), third party risk, how cybercriminals are changing their approaches, and improving detection of known and unknown threats. 

Full details of the conference programme are live on the Infosecurity Europe website.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office surveillance
  • Commercial security
  • Factory security
  • Security management
  • Security devices
  • Intrusion detection
  • Facility security
  • Security training
  • Institute security
  • Museum surveillance
  • Museum security
  • Security communication
  • Cyber security
  • Crime prevention
  • Crowd Management
  • Corporate Security
  • Data Security
  • Warning Devices
  • Cloud security
  • COVID-19
  • Related links
  • Infosecurity Europe 2022
  • Related categories
  • CCTV software
  • Intruder detectors
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec