SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Reed Exhibitions announce confirmed keynote speakers for Infosecurity Europe 2022

3 Mar 2022

Reed Exhibitions announce confirmed keynote speakers for Infosecurity Europe 2022
Contact company
Contact RX USA
icon Add as a preferred source Download PDF version

Reed Exhibitions Ltd, the organiser of Infosecurity Europe, Europe’s most influential information security event, has announced the Keynote agenda and some of the speakers who will be presenting as part of the rich and extensive conference programme. 

Visitor registration opened on 1st March for the 2022 event, which will run from Tuesday 21-Thursday 23 June 2022 at ExCeL London. Cybersecurity professionals and members of the infosec community are invited to sign up and secure their place in the audience to hear these fantastic speakers sharing their invaluable experience and knowledge.  

 The confirmed keynote speakers are as follows:

Baroness Eliza Manningham-Buller

Baroness Eliza Manningham-Buller, former head of MI5, led the service through significant change as it dealt with the growth of Al-Qaida terrorism. She now serves on the Lord's Select Committee on Science and Technology. 

In her session, Leadership in an Age of Uncertainty (Wednesday 22 June, 10:10), she will explore how agility has become more important during the global pandemic. How can businesses become nimbler? How do you lead an organisation when little is certain? 

Eliza says, “I am much looking forward to this conference, and hope that my talk will suggest the qualities of leadership that we should deploy when faced by so many threats in the world today.” 

Misha Glenny

We are witnessing the mesh between the physical and digital threat landscape close tighter"

Misha Glenny, author, journalist, and specialist in organised crime and cybersecurity, has acted as a consultant to European governments and the EU on the Balkans and advised the US departments of State and Justice on US-European relationships.

He wrote the acclaimed book McMafia. In his talk, Geopolitics and Cyber Insecurity (Tuesday 21 June, 15:20), Glenny will offer unique insights into the challenges geopolitical tensions are creating across the tech sector and the current climate between superpowers. 

He says, “As we watch superpowers stride strategically across the world map, we are witnessing the mesh between the physical and digital threat landscape close tighter. How do we deal with it all? I will look at how tensions are created across nation-states, and what are the immediate and evolving threats.”  

Geoff White 

Investigative journalist Geoff White reports for the BBC and Channel 4 and is the author of The Lazarus Heist. In his session Lessons Learned from Most Recent Cybercrime Investigations (Wednesday 22 June, 16:10) he will tell the fascinating story of North Korea’s rise to become a cyber superpower.  

“Within it is lessons about how nation-states apply cyber tactics to wage war against their enemies, exert influence in the world and, in some instances, make lots of money,” he says. “We’ve seen the Russian invasion into Ukraine and the cyber activity around it that’s unfolding as we speak.”

“It’s no surprise nation-states use these tactics in aggressive military campaigns. What we need to understand is the background; the interface between the cyber attackers who work for governments and the cybercriminals that set up the networks, and how that plays out in terms of geopolitics.” 

Mandy Hickson 

Former RAF fast-jet pilot Mandy Hickson is an entrepreneur and bestselling author of An Officer, Not a Gentleman: The inspirational journey of a pioneering female fighter pilot.

She offers visitors the opportunity to learn from her journey in her presentation, Perspective from the Front Line - How to Overcome Great Hurdles to Realise your Full Potential (Thursday 23 June, 10:10). Mandy will share insight into how she remained resilient in difficult situations, and the inspiration she has drawn from her experiences. 

James Lyne 

I’ll be explaining what the cybercrime world looks like today, what their latest tactics are, and how they make money"

James Lyne is CEO of Helical Levity, which built CyberStart – the gamified cybersecurity education platform for young adults. He has worked with many organisations on security strategy, handled several severe incidents, and is a frequent industry advisor.

During his presentation, How Hacking Works (Wednesday 22 June, 15:20), he will reveal how cybercriminals operate in the real world – including hands-on demonstrations of attacks.  James says, “I’ll be explaining what the cybercrime world looks like today, what their latest tactics are, and how they make money.”

“There’s a disconnect between expectations of what a scam looks like versus the reality of what criminals are doing. I’ll dig a little deeper into the nuts and bolts. As a self-professed massive geek, I’m looking forward to Infosecurity Europe – to walk the floor and see the trends in new tech. If you’re a fellow geek come and find me, I’d love to connect." 

Professor Keith Martin 

Professor Keith Martin is Professor of Information Security at Royal Holloway, University of London, and Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday.

In his presentation Applying Cryptography in a Real-World Setting to Build Secure Systems (Tuesday 21 June, 16:30), Professor Martin will explain how cryptography is used today, highlighting the security benefits and pain points, and demystifying its controversial applications and the nuances behind alarming headlines. 

Learning cybersecurity through real experiences

Cybersecurity is a dynamic discipline, and the opportunity to overcome these challenges is not to be missed"

Nicole Mills, Exhibition Director at Infosecurity Group, comments, “Cybersecurity is a dynamic discipline, and the opportunity to learn directly from those with real-world experience of overcoming challenges and managing high-pressure situations is not to be missed.”

“Our Keynote Speakers have achieved great things and steered organisations through the toughest times. Their expertise covers a phenomenal range of topics, from personal resilience to geopolitics on a global scale. Visitors will come away from these presentations energised, inspired, and enlightened, with actionable knowledge and fresh ideas to take back to their organisations.” 

Discussion on cybersecurity

Other topics explored on the Keynote Stage at Infosecurity Europe 2022 will include key threats and adversaries, tackling insider threats, building a security culture, the paradigm change in ransomware, monetisation of threats, Cybercrime-as-a-Service (CaaS), third party risk, how cybercriminals are changing their approaches, and improving detection of known and unknown threats. 

Full details of the conference programme are live on the Infosecurity Europe website.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office surveillance
  • Commercial security
  • Factory security
  • Security management
  • Security devices
  • Intrusion detection
  • Facility security
  • Security training
  • Institute security
  • Museum surveillance
  • Museum security
  • Security communication
  • Cyber security
  • Crime prevention
  • Crowd Management
  • Corporate Security
  • Data Security
  • Warning Devices
  • Cloud security
  • COVID-19
  • Related links
  • Infosecurity Europe 2022
  • Related categories
  • CCTV software
  • Intruder detectors
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec