SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

Prominent experts in national security prepare to gather at Counter Terror Expo 2015

icon Add as a preferred source Download PDF version
The CTX conference programme promises to encourage debate and discussion and find solutions to highly prevalent terrorist risks

The topics raised in the CTX conference will be reflected within zones on the exhibition floor

With just under a week to go until Counter Terror Expo (CTX), the world's most prominent experts in national security are preparing to gather at the leading international exhibition and conference which will be staged at Olympia, London on April 21 and 22.

CTX is a global platform which attracts thousands of buyers and specifiers from government, military, policing, emergency services and private security. The CTX conference programme promises to encourage debate and discussion and, in light of recent events, find solutions to highly prevalent terrorist risks. Split into four main programme streams: The World Terror Congress, Critical National Infrastructure, Cyber Threat Intelligence and Transport Security Live. The topics raised in the CTX conference will be reflected within zones on the exhibition floor: Policing & Special Operations; Advanced Technologies; Transport Security Live; and Cyber Threat Intelligence.

The first World Counter Terror Congress

Proceedings will begin on Tuesday 21 April at 09:50 with the inaugural World Counter Terror Congress. This historic session will address to picks such as mitigating the threat of 'lone wolf' attacks, home grown radicalisation, the practicalities of policing terror on the ground, countering digital terror as well as providing an update on all major terrorist groups' activity. Confirmed speakers include Mark Rowley, Head of Specialist Operations and Assistant Commissioner, Metropolitan Police; Dr. Jamie Shea, Deputy ASG, Emerging Security Challenges Division, NATO, Raffaello Pantuci, Director of International Security Studies, RUSI, Jonathan Powell, CEO, Inter-Mediate and former Chief of Staff to Tony Blair and British Governments chief negotiator on Northern Ireland peace agreement and Dr. Brooke Rogers, Reader in Risk & Terror, King's College London.

Andrew Majoran, General Manager, The Mackenzie Institute, a terrorism think tank in Toronto, Canada, will use the Counter Terror Congress to examine the complex issue of radicalisation. "Cooperation at all levels is paramount to the success of countering all forms of violent extremism" he explains, "Both civil society and government must cooperate to ensure violent extremism and radicalisation are being combated from all directions, be it at the law enforcement and intelligence level, or the grassroots and educational level. When it comes to security, civil society and government operating on different levels would be counter-intuitive, and would likely have disastrous results. Cooperation is integral."

Evidence of this cooperation will be apparent on the show floor. The Policing & Special Operations Zone will showcase counter terror solutions from the private sector that are currently deployed by law enforcement to protect civilian citizens. Visitors to this area will have an opportunity to see counter terror training company, Caliber-3, an example of private/civil sector and government cooperation. Among its list of clients are SWAT teams from all over the world, law enforcement agencies, global security agencies and large private and public companies. Based in Jerusalem, Israel, the company is fully certified by the Israeli Defence Forces, Prime Minister's Office, Ministry of Defence, Police Forces, Ministry of Homeland Security, Ministry of Commerce and Industry and Ministry of Foreign Affairs.                                                                             

"Cooperation at all levels is paramount to the success of countering all forms of violent extremism"

Critical national infrastructure

The Critical National Infrastructure conference will illustrate how best to mitigate the risk to and guarantee the safety and resilience of public buildings, major events spaces, crowded places, and energy, transport, communications and banking infrastructure. Participants will include Francis Morgan, Security Director, Heathrow Airport; Graham Wright, CISO & Head of Digital, National Grid; and Thomas Wuchte, Head of Anti-Terrorism Issues, Action Against Terrorism Unit, Organisation for Security Co-operation in Europe.

On the show floor, security specialist, Townscape Products Limited, will launch a new prestige collection for its PAS 68 hostile vehicle mitigation (HVM) CT Blocks. These blocks of Granite, Quartz or Dekton are designed to stop vehicles having a free run up to infrastructure or buildings and enable facilities managers to protect their people and property discreetly and sympathetically to the local environment.

Countering the cyber threat

The Cyber Threat Intelligence conference stream will draw on the expertise of those responsible for preventing or preparing for cyber-attack: UK and international governments, policing and security organisations; academic experts; businesses and professional associations. The conference will also unveil new developments in cyber security. Confirmed speakers include Dr. Allison Wylde, International Commission on Standards, ASIS International; Steve Durbin, Managing Director, Information Security Forum; John Lyons, CEO, International Cyber Security Protection Alliance (ICSPA); and Laurent Olmedo, Programme Director, Global Security, CEA.

Cyber terror solutions will be evident in the exhibition. In the Cyber Threat Intelligence Zone, iStorage, a leading specialist in portable data storage and digital encryption, will officially launch a super speed, high-performance USB 3.0 drive with hardware encryption to the UK market. The new datAshur SolidStateDrive encrypts information at rapid speed and encompasses a robust, shock-proof design. It was developed in response to a growing demand for vast capacity and high-performance USB drives that allowed the secure and easy portability of confidential data.

Transport security

Finally, Transport Security Live will bring together the key stakeholders from UK and international governments and security organisations, aviation, rail, secure transport, supply chain and major events sectors to provide a guide to best practice in transport security. It also offers an opportunity to unveil new developments in transport security. Key addresses will be given from the UK's Civil Aviation Authority, and industry players such as Boeing. The Transport Security Live Zone will showcase relevant transport security solutions.

The Advanced Technology Zone will display solutions across the spectrum of threats discussed in the conference streams. Among exhibiting companies, Morse Watchmans will be showing its portfolio of key control and asset management systems, offering organisations of all sizes a full range of choices to access the benefits of managed key control. Among its products on display will be the KeyWatcher Touch enterprise key control and management system.

Find out about secure physical access control systems through layered cybersecurity practices.

Try our KeyWatcher Configurator tool to design your ideal system to meet your requirements (Note: if using a mobile device, please turn the phone to landscape mode.)

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Aviation security
  • Railway security
  • Building security
  • Counter terror
  • Key management
  • Cyber security
  • Related links
  • Counter Terror Expo 2015
  • Morse Watchmans Access control system accessories
  • Related categories
  • CCTV cameras
  • Access control system accessories
  • Barriers
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec