SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Counter terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers

Counter Terror Expo to reflect responsiveness to real world events in next year's themes

Contact company
Contact Clarion Events Limited
icon Add as a preferred source Download PDF version
Counter Terror Expo 2014 will focus in its conference themes on the nature of the specific threats that have emerged, or are emerging
Counter Terror Expo 2014 will also feature a co-located event, AMBITION 2014

Key to the success of Counter Terror Expo, which has grown year-on-year to become the largest international counter terrorism and security event of its kind, is its responsiveness to real world events. This responsiveness will be fully reflected in the themes of the centrepiece conference at Counter Terror Expo, 29 - 30 April 2014, Olympia, London.

Global counter terrorism

The threat from international terrorism remains at a significantly high level and those with the desire, intent and means to do harm continue to demonstrate that they are both highly determined and persistent. Any doubts about that were clearly dispelled by the head of the UK’s domestic security agency, MI5, who recently revealed that since the July 7 attacks in London in 2005, there have been 34 plots disrupted in the UK alone, some of which were deliberately planned to create mass casualties. This keynote stream will feature a number of leading government, police and security figureheads discussing the evolving international security threat over the next 12 months.

Risk, resilience & security – protecting national infrastructure

As nations become ever more dependent on their critical national infrastructure so it becomes an ever higher priority that such vital assets are protected from the risk of terrorist attack. That risk was brought to mind in January 2013 when terrorists launched an attack in Algeria on the Tigantourine gas facility, operated jointly by the Algerian state oil company Sonatrach, BP and the Norwegian firm Statoil. Delegates will discover what threats, both UK and international, face their businesses and how best to protect assets, both personnel and property.

Securing public spaces

The vulnerability of public spaces was highlighted dramatically in April and again in September 2013. In the first instance, two bombs were detonated near the finish line of the 2013 Boston Marathon, killing at least 3 people and leaving more than 180 others injured. In the second, terrorists entered the Westgate Shopping Mall in the Kenyan capital Nairobi and caused multiple deaths and injuries in a sustained gun and grenade attack. This stream will bring together those responsible for protecting public spaces in order to discuss and debate best practice and the development of the most effective strategies to keep the public safe from harm. 

Emergency services

How prepared are we for another mass casualty event on the scale of the 7/7 tube bombings or a possible CBRN attack? In this conference stream, delegates will be examining the key issues, including emergency services training, the equipment needs of first responders and the response protocols currently in place. Counter Terror Expo 2014 will also feature a co-located event, AMBITION 2014, with a focus on excellence in pre-hospital care, resilience and interoperability across the emergency response sector.   

Cyber security & electronic terrorism

Counter Terror Expo 2014 will help to address critical need by focusing in its conference themes on the nature of the specific threats that have emerged, or are emerging, and how best to counter them

Cyber attacks from hostile nations, activist groups and criminal gangs continued to grow throughout 2013, aimed at a wide range of targets across the globe. In March, computer networks at three major South Korean banks, as well as two TV broadcasters, crashed simultaneously, putting cash machines and online banking systems out of action across the country for several hours. Two months later, in May, the Twitter account of The Associated Press was hacked and a tweet sent claiming there had been two explosions at the White House and that President Barack Obama was injured, causing temporary turmoil on the stock market. This highly topical conference stream will once again analyse current and future threats and how best to protect critical national infrastructure, Government departments, the police and other organisations from cyber attack by terrorists.

Future policing & border security

Incidents of illegal border crossing attempts abounded throughout 2013, raising new challenges for effective future policing as ever more inventive ways of evading border security are employed. Participants in this conference stream will be considering how we protect our borders – both at points of entry and while potential terrorists are still in transit – and how effectively we track those who may already have passed through those borders.

As all of the above examples show (and they are just examples – serious terrorist attacks have taken place several times a month throughout 2013 in various parts of the world) there is a critical need for an evolving counter terrorism and security response to match the evolving international threat. Counter Terror Expo 2014 will help to address that need by focusing in its conference themes on the nature of the specific threats that have emerged, or are emerging, and how best to counter them.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Perimeter security
  • Security management
  • Intrusion detection
  • Public security
  • Security service
  • Counter terror
  • Related links
  • Counter Terror Expo 2014
  • Related categories
  • CCTV cameras
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • Intruder alarm communicators
  • Intruder warning devices
Related white papers
Monitoring traffic flow: Everywhere, all the time

Monitoring traffic flow: Everywhere, all the time

Download
The critical importance of Trusted Execution Environment in access control

The critical importance of Trusted Execution Environment in access control

Download
How to ramp up perimeter security with license plate reader technology

How to ramp up perimeter security with license plate reader technology

Download
Related articles
Physical and cyber security precautions when travelling

Physical and cyber security precautions when travelling

Mass security screening technology for large events

Mass security screening technology for large events

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Counter terror
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec