SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

INTERPOL World Congress to feature technology-driven security solutions from leading industry players

icon Add as a preferred source Download PDF version
INTERPOL World Congress will address pressing global security challenges like cybersecurity, border management, supply chain security etc.

Congress will be held alongside the INTERPOL World Exhibition in Singapore (14 - 16 April 2015)

Technology-driven security solutions developed by leading industry players will be presented at the INTERPOL World Congress, a knowledge sharing forum anchoring the inaugural INTERPOL World in 2015.

With an emphasis on public-private partnerships, the Congress will feature forums on each of the four areas of focus – Cybersecurity, Safe cities, Border management and Supply chain security – chaired by the following experts:

  • Michael O’Connell, INTERPOL Director of Operational Police Support, for Border Management;
  • Dr Madan Mohan Oberoi, Director, Cyber Innovation and Outreach, INTERPOL Global Complex for Innovation, for Cyber Security;
  • Anselm Lopez, Director, Capability Development and International Partnerships Directorate, International Cooperation and Partnerships Division, Ministry of Home Affairs, Singapore, for Safe Cities;
  • Michael Ellis, Assistant Director, Trafficking in Illicit Goods and Counterfeiting Sub-Directorate, INTERPOL, for Supply Chain Security;
  • Kingsley Ejiofor, Deputy Director and Head of Legal Division, National Agency for Food and Drugs Administration and Control (NAFDAC), for Supply Chain Security.

The INTERPOL World Congress is timely and critical, given the urgent need for countries to address pressing global security challenges. Solutions for countering these challenges will be presented by INTERPOL World’s strategic partners:

  • Cybersecurity: Microsoft, RSA, The Security Division of EMC and Symantec;
  • Border management: 3M Identity Management, Entrust Datacard and Securiport;
  • Safe cities: Motorola, Thales Solutions Asia Pte Ltd;
  • Supply chain security: Digital Coding and Tracking Association and SICPA.

The Congress will be held alongside the INTERPOL World Exhibition, a biennial international security trade event in Singapore (14 - 16 April 2015).

Border management

Our increasingly globalised world has made it is easier for people and goods to cross international borders. This has led border authorities to search for new automated data-sharing systems and border screening solutions that address technological and logistical challenges while enhancing and integrating border security procedures.

"We aim now to apply this technology to situational forecast and real-time risk assessment during large events”

“In the current security landscape, there is a need for law enforcement agencies to have access to relevant, informative and timely information, while at the same time guaranteeing that basic principles of privacy are maintained,” said Michael O’Connell, INTERPOL Director of Operational Police Support. “The aim of the border management forum will therefore be to address key security challenges and the importance of exchanging security data while ensuring high standards of data protection.”

Cybersecurity

With more than 60,000 malware software created daily to infiltrate security systems, it is essential for global efforts to enhance cybersecurity through robust partnerships between law enforcement and private sector Internet security companies, as well as coordinated regulations across countries.

“The world is swiftly moving into cyberspace and more people are living their lives virtually, from social interactions to personal and business transactions. There is an imperative need for the IT and security industry to invest in the development of essential technology, tools and training to generate and share actionable information and intelligence on cybersecurity trends and threats,” said Keshav Dhakad, Regional Director, Asia, IPR & Digital Crimes Unit (DCU), Legal and Corporate Affairs, Microsoft.

Safe cities

A nation’s well-being and prosperity hinges on the safety, functionality and resilience of its critical national assets, which include organisational and physical structures as well as facilities that are vital to society and its economy. Therefore, discussions at the INTERPOL World Congress will focus on the development of command and control system integration, prediction, modelling and simulation, which will influence the way information is shared between multiple sources, and ensure reliable access to real-time information that provides actionable insights to identify potential security threats or trends.

“The key to combating illicit trade and ensuring the security of supply chains lies in innovative security solutions"

“Thales has been working for more than a decade on advanced adaptive systems using biomimetic simulation for training, risk management and decision making. We aim now to apply this technology to situational forecast and real-time risk assessment during large events,” said Jean-Marie Decaux, Safe and Smart Cities Development Director at Thales Solutions Asia. “Smart cities and critical infrastructure are generally equipped with numerous sensors. We can use the data captured by these sensors to simulate the real environment, enabling us to better plan the event and enhancing our overall situational awareness. This provides a powerful ‘What If’ tool to create possible scenarios and to prepare for incidents when they occur.”

Supply chain security

One of four key domains to be discussed at the INTERPOL World Congress, supply chain security addresses the challenges of the trade supply that is highly susceptible to threats such as terrorism, piracy, theft and illicit trade. The forum will discuss product verification solutions that will allow the public, private industry and frontline law enforcement officials to access extensive product security information in a quick and easy manner, in order to make an informed decision about a product’s legitimacy.

“The key to combating illicit trade and ensuring the security of supply chains lies in innovative security solutions and enhanced collaborative action between governments, the law enforcement community, the private sector and consumers,” said Pierre Viaud, Senior Director Public Affairs & Government Relations, SICPA Security Solutions SA. “SICPA invests significantly in R & D and is committed to working in close partnership with all stakeholders, so as to provide the best level of protection for governments, companies and the millions of people who depend on the integrity and value of their currency, personal identity, products and brands.”

Understand how converged physical and cybersecurity systems can scale protection.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Identity management
  • Counter terror
  • Cyber security
  • Related links
  • INTERPOL World 2015
  • Related categories
  • CCTV cameras
  • Access control controllers
  • Access control systems & kits
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec