SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

ASIS concludes 15th European Security Conference and Exhibition with over 650 security professionals in attendance

icon Add as a preferred source Download PDF version
Related Links
  • ASIS 2015 President Dave Tyson sees more M&As and futuristic trends impacting the security market
  • ASIS Europe 2016: Assistant Commissioner Mark Rowley, Metropolitan Police Service of London announced as keynote speaker
  • ASIS European Security Conference & Exhibition 2016: Nedap to discuss vulnerability of access control systems to cyber attacks
The social hub of the event was the exhibition floor where 34 exhibitors displayed cutting edge technology
The educational programme covered security management topics such as the terrorism risk outlook & IoT

Over 650 security professionals gathered for the ASIS 15th European Security Conference and Exhibition at the Business Design Centre in London from 6 to 8 April.

Education program of over 50 sessions

The educational programme provided more than 50 sessions across 5 tracks, covering the full spectrum of security management topics such as the terrorism risk outlook, internet of things, insider threat, cyber, duty of care, organisational resilience and many others.

The opening keynote from Superintendent David Roney, UK National Counter Terrorism Policing HQ, outlined the UK’s counterterror approach and the police’s “prepare and protect” strategies, highlighting the need for partnership between law enforcement, businesses and security service providers.

With conference delegates primarily in senior management positions, the dedicated sessions from the ASIS CSO (Chief Security Officer) Roundtable and the keynote address on leadership from Juan Carlos Pastor PhD, Professor of Organisational Behaviour at IE Business School, provided direction and debate for those responsible for large operational teams.

Event highlights and security industry sponsors

One of the event highlights was the closing keynote speech from Aimen Dean aka “the Spy Who Came in from Al-Qaeda” who provided an insider view on the origins and current state of a range of Islamic extremist groups operating across the Middle East, Europe and Africa. His analysis concluded that ISIS’s strategy is to weaken the European Union by causing turmoil and tension within member states. According to Dean, ISIS view the UK’s EU membership referendum as an opportunity to advance that aim by targeting the UK in the run up to the polling day, hoping to cause panic, reinforce the chances of a vote to exit the EU, and ultimately claim the UK’s exit from the EU as a victory in their propaganda campaign.

The social hub of the event was the exhibition floor where 34 exhibitors displayed cutting edge technology, services and solutions for today’s security challenges. Exhibitors also had the opportunity to present their latest analysis and research in the technology and solutions track, a new feature in this year’s event, which was standing room only for many sessions. Event sponsors were Tyco Integrated Fire & Security, Axis Communications, Securitas, HID Global, Nedap, Prosegur, QCC Global and The S2 Safety and Intelligence Institute.

Three evening receptions extended the networking time outside the main venue; the Welcome Party at the Leadenhall Building, the President's Reception in the iconic Egyptian Sculpture Gallery of the British Museum, and the Closing Reception hosted by the ASIS United Kingdom Chapter at the House of Lords. Baroness Harris of Richmond stepped down as ASIS UK Chapter patron at the end of the event, going out on a high note, having entertained and charmed her guests on the terrace of the House of Lords.

ASIS Europe 2017 will take place in Milan, Italy from 29-31 March 2017.

Find out about secure physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Security camera systems
  • Counter terror
  • Cyber security
  • Internet of Things (IoT)
  • Fire Safety
  • Related links
  • ASIS 15th European Security Conference & Exhibition
  • Nedap AEOS Access control systems & kits
  • Related categories
  • CCTV cameras
  • Access control systems & kits
  • Intruder alarm system control panels & accessories
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec