o 4t
14 re o ef
%
5 3 e av
kb
o
Bo
Fe
y
da o T
y
ar
u br
1 20
S
CONFERENCE PROGRAMME
WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERN
Conference Streams Include:
Book Your Conference Pass Today to Learn From Leading Counter Terrorism and Security Experts Including:
Global Counter Terrorism Risk, Resilience & Security – Protecting
Charles Farr, Director General, Office for Security and
Counter Terrorism, Home Office
Daniel Köhler, Director of Research Operations, The
National Infrastructure
Institute for the Study of Radical Movements
Securing Public Places
Dr Jamie Shea, Deputy ASG, Emerging Security Challenges
Practical Counter Terrorism
Division, NATO
Cressida Dick QPM, Assistant Commissioner, Metropolitan
Emergency Services Cyber Security & Electronic Terrorism
Police Service
Neil Kenward, Deputy Director, Cyber Programme & Intelligence
Finance & Capabilities, Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office
National Counter Terrorism Security Office (NaCTSO)
Co-Located with
Lead Media Partner
Integrated Security Sponsor
Scanning & Screening Supported by Sponsor
29-30 APRIL 2014
International Security for an Evolving World
OLYMPIA, LONDON Now in its 6th edition, Counter Terror Expo is the premier international event delivering buyers and specifiers from across the world within Government, Military, Law Enforcement, Emergency Services, Critical National Infrastructure, Private Sector and the Security Services. Counter Terror Expo offers the most comprehensive display of technology, equipment and services alongside a high level education programme designed to help protect against the evolving security threat. Over 9,500 attendees and 400+ exhibitors will participate in a free to attend exhibition, multiple show floor workshops, new show feature zones, C-IED demo area, high level conference streams, behind closed door briefings and networking events in one secure environment.
Counter Terror Expo 2014 Conference Counter Terror Expo will once again hold its centrepiece, multi stream conference programme which delivers exclusive insight, analysis and perspective on a range of key themes and issues arising throughout the year.
Who should attend? How to make the most of your visit? With over 9,500 attendees in 2013, Counter Terror Expo has cemented its position as the must attend leading counter terrorism and security event to visit, where you can:
Attend the FREE exhibition where you can meet and do business with over 400 leading suppliers Meet and network with over 9,500 counter terrorism, law enforcement and corporate security professionals from over 82 countries Attend the internationally acclaimed multi stream conference programme to further grow your expertise
Compare and contrast latest products and solutions available to the market through a range of live demonstrations and briefings
Attend multiple educational show floor features and learn from industry experts
Find new business opportunities by keeping up to date with industry innovations and trends for the next year
Explore dedicated feature zones reflecting specific threats
Be the first to see leading suppliers and speakers introduce their latest products and services
Mitigating terror threat is a critical priority for civil, military and private sector stakeholders. Counter Terror Expo is designed for industry professionals from the following sectors:
Banking/Finance Border Control/ Immigration Communications/IT Critical National Infrastructure Emergency Services/ Ambulance Services/ Fire Brigades Energy/Oil & Gas/Nuclear Government/Intelligence Agencies
Health Logistics/Supply Chain Maritime/Anti-Piracy MOD/Military/IEDD Regiments Police/Gendarmerie Private Sector Security Companies Security Services Transport Security Utilities/Water
BOOK YOUR CONFERENCE PASS TODAY – VISIT
WWW.COUNTERTERROREXPO.COM/REGISTER
Global Counter Terrorism Conference
29-30 APRIL 2014
OLYMPIA, LONDON GLOBAL COUNTER TERRORISM Day One – Tuesday 29 April 2014
Supported by: SECURING BRITIAN – ADDRESSING THE DOMESTIC TERRORIST THREAT
0900-0920 Coffee & Registration 0920-0930 Chairman’s Welcome & Introduction COUNTERING GLOBAL TERRORISM 0930-1000 National Security, Human Rights and Risk Assessment Pre-emptive and preventative counterterrorism measures in the UK applicable to external jurisdictions Examples of UK counterterrorism measures Assessing the effectiveness of counterterrorism measures and strategies Christopher Wood, Barrister and PhD Researcher, Durham University 1000-1030 The CONTEST Strategy Developments and improvements to protect the UK from terrorism Implications of the increased terrorist threat to the UK and its overseas interests Assessing potential threats – the challenge of cyber security Strategies to address the changing nature of the terror threat to the UK Charles Farr, Director General, Office for Security and Counter Terrorism, Home Office 1030-1100 Global Terrorism and the Syrian Connection Implications for terrorism from the evolving Syrian conflict Reviewing the importance of Syria as the principal front in the global jihad An assessment of jihadi migration as a terror threat in Europe and beyond Dr Michael Rubin, The American Enterprise Institute 1100-1130 Coffee, Tea, Networking and Exhibition Visit 1130-1200 Preventing and Combating Terrorism – A Global Assessment of Progress The importance of regional cooperation and robust international collaboration in implementing the UN Global Counter-Terrorism Strategy The role of capacity building programmes as a cornerstone in countering terrorism Strategies for countering the terrorist narrative Jehangir Khan, Director a.i., Counter-Terrorism Implementation Task Force Office, United Nations 1200-1230 Internal security tools and mechanisms for the EU to counter current and future threats Impact of the proliferation of al-Qaida franchises and other manifestations How radicalization in Europe has changed – managing the threat Effects of evolving cyber-threats and serious organised crime Speaker tbc 1230-1300 Responses to 21st Century Security Challenges The impact of emerging security challenges in the fight against terrorism Responses to the changing faces of transnational terrorism, the cyber threat and the enemy within Achievements and future challenges Dr Jamie Shea, Deputy ASG, Emerging Security Challenges Division, NATO 1300-1400 Lunch, Networking and Exhibition Visit
1400-1425 Understanding Terrorism in the UK Impact of local and external factors on the domestic terrorist threat Assessment of the evolution of terrorism and political violence in Northern Ireland The role of prevention and de-radicalisation Dr Douglas Weeks, Research Fellow, The Handa Centre for the Study of Terrorism and Political Violence, St Andrews Centre for the Study of Terrorism and Political Violence (CSTPV) 1425-1450 Safeguarding Citizens and Countering Terrorism Assessment of the terrorist threat to the UK, both from al-Qaida related terrorism, Northern Ireland related terrorism and extreme right wing terrorism The need for a review of anti-terrorism law and the breadth of the definition of terrorism Possible future changes to UK anti-terrorism laws David Anderson QC, Independent Reviewer of Terrorism Legislation 1450-1515 Preventing the Threat of Home-grown Terrorism The role of policing in supporting and delivering Prevent Mainstreaming Prevent into day to day policing Success, challenges and future plans Assistant Commissioner Cressida Dick QPM, Metropolitan Police Service 1515-1540 Combating Extremism Understanding the threat from home grown terror The threats of far-right ‘counter-Jihad’ groups and Islamist extremism to the UK The UK’s evolving counter-extremism conversation Ghaffar Hussain, Head of Research, Quilliam 1540-1600 Panel Discussion & Q&A 1600-1630 Coffee, Tea, Networking and Exhibition Visit RADICALISATION – THE THREAT TO EUROPE 1630-1650 Countering Populist Extremism in Europe Why populist extremism is one of the most pressing challenges to democracies in Europe Threats from the emergence of ‘counter-Jihad’ groups The need to actively challenge counter-Jihad narratives Dr Matthew Goodwin, Associate Fellow – Europe, Chatham House and Associate Professor, School of Politics and IR, University of Nottingham 1650-1710 Radicalisation in the Digital Era Overview of the internet as a domain of activity for terrorist activities The evidence on online radicalisation The role of the internet in accelerating the radicalisation process The need for an effective and appropriate counter-narrative Ines von Behr, Analyst, RAND Europe 1710-1730 Community Based Counter-Terrorism and Anti -Extremism Tools Overview of the “Community Coaching” developed and introduced by the Centre for Democratic Culture (ZDK) in Berlin Using community based tools and analyses– originally designed to counter right-wing extremism – to counter militant Salafism. Daniel Köhler, Director of Research Operations, The Institute for the Study of Radical Movements (ISRM) 1730-1745 Panel Discussion & Q&A 1745
Chairman’s Closing Remarks & Close of Day One
BOOK YOUR CONFERENCE PASS TODAY – VISIT
WWW.COUNTERTERROREXPO.COM/REGISTER
Global Counter Terrorism Conference GLOBAL COUNTER TERRORISM Day Two – Wednesday 30 April 2014
Supported by:
0900-0920 Coffee & Registration
1230-1300 Panel Discussion & Q&A
0920-0930 Chairman’s Welcome & Introduction
1300-1400 Lunch, Networking and Exhibition Visit
IMPACT OF GLOBAL EXTERNAL THREATS 0930-0950 Boko Haram – Implications for Global Terrorism An assessment of Boko Haram’s success in targeting US and Nigerian interests Public perception of Boko Haram and the government response to the insurgency Possible future capabilities for attacks beyond Nigeria Bernard Nnamdi, Associate Professor, Nizwa College of Applied Sciences, Oman 0950-1010 The Impact of the Muslim Brotherhood’s Fall Implications of the removal of President Mohamad Mursi – likely timeframes and scales Impact in Egypt and elsewhere in North Africa Long term consequences for the Gulf Tim Williams, Managing Director, Stirling Assynt 1010-1030 The Diversified Threat from al-Qaida Assessment of the transnational influence of al-Qaida Attack plans for the global al-Qaida movement Impact of geographical diversity and targeted attacks An assessment of the Westgate attack Raffaello Pantucci, Senior Research Fellow, Counter-Terrorism, RUSI 1030-1100 The Global Terrorism Context A global security assessment Consequences of the unravelling Arab Spring and Al-Qaida’s changing tactics Hezbollah’s emergence as the Shia counterbalance to the Sunni al-Qaida movement What this means for international terrorism now and in the immediate future Dr Dave Sloggett, Author and Independent Academic 1100-1120 Coffee, Tea, Networking and Exhibition Visit 1120-1145 Drugs and Terrorism: Myths and Realities The interconnection between the drug trade and terrorism The challenges ‘narco-terrorism’ presents governance, society and international security Issues with current assessments of the security threat Why important underlying issues including weak governance, corruption and poor economic and social policies must be addressed Benoît Gomis, Research Analyst, International Security Research Department, Chatham House 1145-1210 Terrorism in the Middle East – Socio-cultural Metrics Why younger generations have set themselves against the social system and the state in the industrially developed democracies Why states with authoritarian rule create a strong attraction to terrorism The part the media plays in the simulation of and fight against terrorism Professor Debashis Chakrabarti, Professor and Head of the Department of Communication Studies, Ministry of Higher Education, Oman 1210-1230 Maritime Terrorism – Is History Repeating Itself? The extent to which maritime terrorism is a risk – a vulnerability assessment Focus on countries which have been victims of maritime terrorism Implications of the wide networking of al-Qaida across the Indian Ocean region The need to acknowledge the evolution of new forms of terrorism Ms Riddhi Shah, Research Associate, National Maritime Foundation (NMF), New Delhi
INFLUENCES ON THE FUTURE OF TERRORISM 1400-1425 Snowden – Hero or Traitor? The effect of NSA leaks on public confidence in state security The damage done to transatlantic relations, to public confidence in the security and intelligence agencies, and to the image of the West abroad Implications for state security in the future Edward Lucas, Senior Editor, The Economist 1425-1450 Improving Threat Assessment – Europe’s Shared View of Extremism Weaknesses in Europe’s transnational counter terrorism effort The extent of a shared perception of the threat among European Union member states Assessment of previous levels of genuine baseline terrorist threat assessment Improvements in the depiction of national threat perception in the last 5 years Chris Tomlinson BSc (Hons) MSc CSyP FSyI MCGI, Senior Consultant – Resilience, Security & Risk, Arup 1450-1515 The Threat from Solo Terrorists The creativity and level of sophistication demonstrated by solo terrorists The challenge these actors represent for security services and law enforcement agencies Examples of solo terrorists including Swedish Malmö-shooter Peter Mangs Cato Hemmingby, Research Fellow, Norwegian Police University College 1515-1540 Crowdsourcing Counter Terrorism The role of social and mobile media for advancing public knowledge and assisting law enforcement Lessons and advances from the Boston Marathon bombing Incorporating social and mobile media information to support and corroborate investigations Managing the dangers of crowdsourcing a serious criminal investigation Advantages and possibilities from combining traditional and opensource intelligence Professor Babak Akhgar, PhD, FBCS, Professor of Informatics – Sheffield Hallam University and Director of CENTRIC 1540-1605 Lessons from Syrian Chemical Warfare Incidents Implications for protection, decontamination, munitions countermeasures, emergency management, forensics and intelligence The 8/21 Ghouta incident – a case study Dan Kaszeta, Senior Research Fellow, International Institute of Nonproliferation Studies 1605-1630 Bio-terrorism – Are we Secure or Just Prepared? Assessment of the risks from biomedical advances in the production of biological weapons Consequences potential breaches of bio-security and the impact for nation states Biological agents – how much an increasing threat to national security? The importance of bio-surveillance, prevention and appropriate response David M Love, BVMS MRCVS DVA, Veterinary Public Health Consultant 1630
Chairman’s Closing Remarks & Close of Global Counter Terrorism Conference
BOOK YOUR CONFERENCE PASS TODAY
Critical National Infrastructure Conference
29-30 APRIL 2014
OLYMPIA, LONDON RISK, RESILIENCE & SECURITY – PROTECTING NATIONAL INFRASTRUCTURE Day One – Tuesday 29 April 2014 0900-0920 Coffee & Registration 0920-0930 Chairman’s Welcome & Introduction ADDRESSING THE CHALLENGES OF RESILIENCE AND SECURITY 0930-0950 Protecting the UK’s National Infrastructure The “critical” assets in the nation’s critical national infrastructure (CNI) The impact to the UK from the evolving threat picture Interdependencies between national infrastructure sectors The importance of contingency planning in building security, resilience and integrity Speaker tbc 0950-1010 Building Resilience for Infrastructure and Essential Services What are the significant hazards and threats facing the UK? Importance of the resilience of infrastructure against attack, damage or destruction The UK government approach to the resilience of critical infrastructure and essential services Importance of reducing the UK’s vulnerability to natural hazards Robert MacFarlane, Assistant Director, Civil Contingencies Secretariat, Cabinet Office 1010-1030 Infrastructure Resilience The National Grid’s approach to infrastructure resilience Shaping infrastructure resilience in line with government requirements Advances in resilience to safeguard the integrity of the grid Mark Abbott, UK Head of Resilience, National Grid Plc 1030-1100 Panel Discussion and Q&A 1100-1130 Coffee, Networking and Exhibition Visit HUMAN FACTORS IN SECURITY AND RESILIENCE 1130-1150 Personnel Security Measures for Employee Risk An introduction to HoMER (Holistic Management of Employee Risk) Principles, policies, procedures and examples of good practice How to manage the risk of counterproductive behaviour in the workplace Ways to strengthen compliance with legal and regulatory frameworks Improving trust amongst employees, customers and shareholders Speaker tbc 1150-1210 The Role of the CSO – Challenges and Opportunities Challenges presented by the combination of physical and digital aspects of security Issues and tensions facing the Chief Security Officer (CSO/CISO) role Development, support and backing required to deliver more empowerment Bharat Thakrar, Head of Business Resilience Services, BT Security Enterprise, BT Group 1210-1230 Risk Communication, Risk Perception and Behaviour The relationship between risk communication, risk perception and behaviour Primary drivers and primary targets of all risk communication Actions to enable practitioners and policy-makers to inform perceptions of risk Strategies for more effective crisis and risk communication Dr Brooke Rogers, Senior Lecturer in Risk and Terror, Department of War Studies, King’s College London
Supported by:
CRISIS MANAGEMENT 1400-1420 Resilience and Crisis Management The role of local resilience in the national picture The importance of robust planning to deal with major incidents Crisis management capabilities and recent experiences Robert Flute, Head of Resilience and Special Operations, East of England Ambulance Service NHS Trust 1420-1440 From Preparedness to Crisis Management Linkages between security threats, hazards, risk and resilience The potential impact from a crisis Benefits of using real risk scenarios to assist in the development of crisis management schemes Using resilience war-gaming to test and examine the robustness of resilience strategies Speaker tbc 1440-1500 Social and Digital Media Crisis Management Assessing the impact of social and digital media Reviewing the challenges social and digital media bring to a crisis Key components of a crisis media strategy – do’s and don’t’s Anna Averkiou, International Media & Communications Consultant, Trainer & Journalist 1500-1530 Panel Discussion and Q&A 1530-1600 Tea, Coffee, Networking and Exhibition Visit EVOLVING AND EMERGING THREATS 1600-1620 Bio-terrorism – Are we Secure or Just Prepared? Assessment of the risks from biomedical advances in the production of biological weapons Consequences potential breaches of bio-security and the impact for nation states Biological agents – how much an increasing threat to national security? The importance of bio-surveillance, prevention and appropriate response David M Love, BVMS MRCVS DVA, Veterinary Public Health Consultant 1620-1640 Emerging Threats from Biological Weapons How simple or naturally occurring biological material(s) can be weaponised A review of possible enhancements and modifications Clearance and disposal methods for weaponised materials David Bailey BVSc., MSc. (Forensic Science), Cert. CBRN., MRCVS. Research Fellow, Staffordshire University 1640-1700 Lessons from Syrian Chemical Warfare Incidents Implications for protection, decontamination, munitions countermeasures, emergency management, forensics and intelligence The 8/21 Ghouta incident – a case study Dan Kaszeta, Senior Research Fellow, International Institute of Nonproliferation Studies 1700-1730 Panel Discussion and Q&A
1230-1300 Panel Discussion and Q&A 1300-1400 Lunch, Networking and Exhibition Visit
VISIT WWW.COUNTERTERROREXPO.COM/REGISTER
Critical National Infrastructure Conference RISK, RESILIENCE & SECURITY – PROTECTING NATIONAL INFRASTRUCTURE Day Two – Wednesday 30 April 2014
Supported by:
RISK, RESILIENCE AND SECURITY SOLUTIONS
0900-0920 Coffee & Registration 0920-0930 Chairman’s Welcome & Introduction SECURING BUILDINGS, INFRASTRUCTURE AND TRANSPORT 0930-0950 Countering Threats to Buildings and Infrastructure Protection of key buildings and infrastructure Strategies and solutions for blast mitigation Examples of effective solutions from some of the most hostile regions on earth Julian Greenwood, Director of Operations, Explora Security 0950-1010 Lessons from Israel Lessons from the implementation of contemporary security measures The roadmap to effective airport security Working towards a common intelligence platform across all airports Dvir Rubinshtein, Aviation Security Operation Centre Manager – Security Department, State of Israel 1010-1030 Secure Design – Reducing the Risks Design strategies to decrease the risk of illicit activity and terrorism Using materials selection to help reduce casualty numbers from incidents Vulnerability reduction examples from railway stations and airports The importance of cost effective and realistic measures Chris Stevens, Technical Security Director, SIDOS UK 1030-1100 Panel Discussion and Q&A 1100-1130 Coffee, Networking and Exhibition Visit CYBER EXPLOITATION AND THE IMPACT ON NATIONAL INFRASTRUCTURE 1130-1150 Cyber Terrorism – A Real or Imagined Threat? An assessment of where the generation of cyber terrorists will arise from How social media is being used by terrorists and how this differs from previous web technologies Application of theoretical models of terrorist engagement to the practice of terrorism in cyber space Stewart K. Bertram, Cyber Capability Manager, Control Risks 1150-1210 Big Data in Defence of Cyber Why the war for control of cyber space is real Why global collaboration is needed for this new kind of warfare Big data as a useful weapon in the defence of the cyber threat Mike Loginov, Chief Cyber Security Strategy Officer – Government, Hewlett Packard (HP) ESS 1210-1230 The Convergence of Physical and Cyber Exploitation The emerging threat from the convergence of physical and cyber exploitation The role of unbiased stress testing to confirm or expose vulnerabilities and ‘attack vectors’ Using exposed vulnerabilities to evaluate and formulate corrective actions to mitigate against known risks and threats Peter Connolly, Operations Director, GHT-Global Ltd and Bob Quick QPM MBA, CEO, GHT-Global Ltd
1400-1425 Managing the Insider Threat – New World Trade Centre Case Study Using Personal Identity & Access Management (PIAM) to proactively manage the insider threat Practical solutions to bridge the gap of physical security convergence with IT and HR systems The counter-terrorism and security strategy – new World Trade Centre (New York) case study Deb Sidhu, Chairman & CEO, DG510 1425-1450 Corporate Counterintelligence – Bolstering the Human Firewall Implications of persistent and nuanced threats to intellectual property and confidential data The role of corporate counterintelligence and counterespionage Why corporations often lack the resources or to undertake enhanced and proactive counterintelligence Importance of active technical and HUMINT (HUMan INTelligence) collection efforts for specific targets Joel Krauss, Director, North American Operations, Optimal Risk 1450-1515 Contingency Planning – Remote Surveillance and Facilities Management Advances Using remote monitoring and access control to ensure full site control post-evacuation The systems and technologies available for remote monitoring and access control A review of available technology platforms and how the contingency strategy can be implemented How the systems can be used to protect potential targets in the City of London and other locations Simon Chapman, Managing Director, Lodge Service 1515-1540 Scientific Innovation in the Prevention and Management of CBRN-E Threats Major challenges in the prevention and management of CBRN-E threats Examples of successful industrial transfers of technologies including N/R and bio detection A review of collaborative projects and specific program outcomes (STANDEX, SECUR-ED, RATP, Roissy Airport etc) Benefits from standardisation of CBRN-E detection technologies Laurent Olmedo, Program Manager – Global Security Research, CEA 1540-1600 Panel Discussion and Q&A 1600
Conference Close
1230-1300 Panel Discussion and Q&A 1300-1400 Lunch, Networking and Exhibition Visit
BOOK YOUR CONFERENCE PASS TODAY
Securing Public Spaces Conference
29-30 APRIL 2014
OLYMPIA, LONDON SECURING PUBLIC SPACES CONFERENCE Day One – Tuesday 29 April 2014 0900-0920 Coffee & Registration 0920-0930 Chairman’s Welcome & Introduction Professor Chris Kemp BA MA PhD MIOD FIMPSPA AIOSH, Director, Mind over Matter USING DESIGN EXCELLENCE TO COUNTER THE TERRORIST THREAT 0930-0955 Terrorism and Urban Spaces Hazards and security threats to urban spaces Current weaknesses in the design, planning and management of crowded spaces The role of resilient design to address security risks in cities and create safer urban spaces Professor Jon Coaffee, Professor in Urban Geography, University of Warwick 0955-1020 Counter-terrorism Protective Security Design What is the threat to crowded places from terrorism? The challenge of blending counter-terrorism protective security measures with urban design principles Key considerations for external areas, building structures and internal layout, facilities and services Typical counter-terrorism design attributes for hostile vehicle mitigation measures Speaker tbc 1020-1045 Innovative Methods to Overcome Inadequacies in the Design of Structures The risks to infrastructure from blast and impact threats Results from extensive series of blast tests to assess the vulnerability of structural components Questions about current design practices Examples of effective and ineffective design tools John E. Crawford, President, Karagozian & Case 1045-1100 Panel Discussion and Q&A 1100-1130 Coffee, Networking and Exhibition Visit 1130-1155 Design-led Crime Prevention in the Built Environment Designing out crime through tactical design and the effective use of the built environment The role of surveillance, access management, territoriality and environmental quality How good design can deliver natural crime prevention strategies Nick Goldby MSyI PGDip GCGI LCGI, Senior Consultant, Resilience, Security and Risk, Arup & Secured by Design Licensed Consultant 1155-1220 Resilience and Cyber Security in the Built Environment Technology developments in the built environment and why cyber security and resilience is an issue Sources of threats across the building lifecycle Gaps in security between digital, electronic and physical space Appropriate measures to reduce the risks Hugh Boyes CEng FIET CISSP 1220-1245 Counter Terror Physical Security – Reducing the Risks? Can counter terror physical security be effective? A review of internationally recognized physical security measures using easily recognized and known buildings and facilities Physical security measures, the intended threat and realistic reductions to risk The need to focus on cost effective and realistic measures Chris Stevens, Technical Security Director, SIDOS UK
1400-1430 Explosive Threats – Implications for Buildings and Crowded Places Blasts and their effects on buildings and crowded places A review of common building design – the good and the not so good Addressing counter terrorism in building elements Darius Aibara, Director, Aibara Associates 1430-1500 Blast Effects on Glazed Facades Potential and significance of glazing hazards in a blast environment Key factors causing glazing failure in response to a blast event Consequences of delamination and need for tighter specifications Case study examples of large glass façade installations Tim Morgan, Consultant Engineer, Michael Crossley Consult 1500-1520 Panel Discussion and Q&A 1520-1540 Tea, Coffee, Networking and Exhibition Visit PROTECTING PUBLIC SPACES FROM TERRORIST ATTACK 1540-1605 Securing the UK’s Crowded Places from Terrorist Attack Assessing the evolving threat to the UK’s crowded places from terrorism Contemporary and emerging attack methods used by terrorist groups and lone actors Protective security measures to reduce the vulnerability to and impact from terrorist attacks National Counter Terrorism Security Office (NaCTSO) 1605-1630 Securing and Policing Britain’s Transport Hubs Assessing the terrorist threat to major transport hubs Protecting the UK rail system – security and policing options for crowded places Practical security advice to prevent an attack Superintendent David Roney, Counter Terrorism Lead, British Transport Police 1630-1655 Safeguarding Airport Terminals Assessing the impact of a potential terrorist attack at an airport terminal Common vulnerabilities and weaknesses in terminal security Practical ways to reduce terrorist opportunities and protect terminals, staff and passengers from terrorist attack Lessons from the implementation of security measures Dvir Rubinshtein, Aviation Security Operation Centre Manager, Ministry of Transport, State of Israel 1655-1720 Protecting Soft Targets from Hardline Terror Ensuring correct balance between intelligence, physical means, correct manpower and realistic procedures Balancing covert, overt and low profile methods of security How to attain maximum protection whilst maintaining realistic budgets Ivor Terret, Director, Training & Consulting, AS Solution 1720-1740 Panel Discussion and Q&A 1740
Close
1245-1300 Panel Discussion and Q&A 1300-1400 Lunch, Networking and Exhibition Visit
VISIT WWW.COUNTERTERROREXPO.COM/REGISTER
Emergency Services Conference EMERGENCY PREPAREDNESS, RESILIENCE AND RESPONSE Day One – Tuesday 29 April 2014 INTEROPERABILITY AND MULTI AGENCY RESPONSE
0900-0920 Coffee & Registration 0920-0930 Chairman’s Welcome & Introduction THE EMERGENCY SERVICES AND TERRORISM – RESPONDING TO THE THREAT 0930-0955 Managing Common Consequences of Terrorism Emergency response and recovery capabilities Responding to unconventional terrorist attacks Importance of emergency services interoperability A look to the future Jim Busby QPM, National Counter Terrorism Co-ordinator Protect Prepare & Acting Director of Strategy ACPO TAM 0955-1020 Resilience for Major Emergencies Reducing the risk from emergencies through planning at the national level Ensuring an effective response from local and national bodies to respond to and recover from emergencies The importance of coordinated local emergency response plans Jon Hall MIRM FIFireE, Chief Fire Officer, Gloucestershire Fire and Rescue Service and Chief Fire Officers Association lead for National Resilience 1020-1045 Challenges from Terrorism for Emergency Services Terrorism threat assessment Implications for the emergency services The role of resilience and interoperability and the importance of mutual aid Dr Dave Sloggett, Independent Academic and Author 1045-1100 Panel Discussion and Q&A 1100-1130 Coffee, Networking and Exhibition Visit ENSURING NATIONAL RESILIENCE 1130-1155 Ensuring Resilience across Rural Communities How to ensure resilience in the face of local cutbacks The role of local resilience in the national picture The importance of robust planning to deal with major incidents Robert Flute, Head of Resilience and Special Operations, East of England Ambulance Service NHS Trust 1155-1220 Urban Fire Resilience – Prevention and Preparedness Addressing the risks and consequences of urban fires Effective mitigation strategies Dan Stephens, Chief Fire Officer, Merseyside Fire and Rescue Service 1220-1245 Resilience in the Face of Marauding Firearms Attack Preparing for high threat incidents Lessons from Westgate and Mumbai Incorporating realism in to training and exercising David Bull QAM, Head of Education, National Ambulance Resilience Unit (NARU) 1245-1300 Panel Discussion and Q&A 1300-1400 Lunch, Networking and Exhibition Visit
1400-1430 The Effective Commander Workplace features that enable commanders to remain resilient Features that challenge and damage resilient commanders Personal qualities, skills and behaviours of effective commanders How the evidence base can be used to inform interventions for commander selection, training and resilience Dr Antonio Zarola PhD Cpsychol, Director, Zeal Solutions 1430-1500 Emergency Response in Large-Scale Terrorist Attacks The role of the Fire Brigade and co-operation with other agencies UK capabilities in attack response and management The importance of interoperability and mutual aid when responding to attacks and other incidents National planning for the future Deputy Assistant Commissioner Tim Cutbill, Head of Special Operations Group, London Fire Brigade 1500-1530 Providing Mutual Aid & Interoperability across Services Key aspects of ensuring mutual aid and interoperability Roles, responsibilities and capabilities for tri-service responders Lessons from joint testing and exercising Speaker tbc 1530-1600 Panel Discussion and Q&A 1600-1630 Tea, Coffee, Networking and Exhibition Visit HAZARDOUS MATERIALS AND CBRN PREPAREDNESS AND RESPONSE 1630-1655 Preparedness for Chemical Terrorism Potential concerns from the chemical aspects of the Syrian conflict Strategic plans for preparedness and response to chemical terrorism Multi-agency CBRN capability and response arrangements Key features in assessing and developing a proportionate emergency response Speaker tbc 1655-1720 Hazmat and CBRN Response Possible consequences of Hazmat and CBRN incidents Implications for emergency services from the illicit use of chemicals for terrorism The implications of new technology on hazmat and CBRN response Speaker tbc 1720-1740 Panel Discussion and Q&A 1740
Conference Close
Ambition – The Dedicated UK Ambulance and Pre- Hospital Care Exhibition and Conference Grand Hall, Olympia For the first time this year, Ambition will run alongside CTX. Ambition is the only show with the full support of all NHS ambulance services and therefore the guaranteed attendance of a broad range of frontline staff and senior managers from across the emergency services sector with 70 exhibitors and 2,000 attendees expected to attend. Ambition 2014 will be enhanced to provide a one-stop-shop for visitors from organisations involved in emergency response, crisis management, interoperability, resilience and pre-hospital care. CTX visitors can attend Ambition without extra charge by using their CTX visitor badge.
BOOK YOUR CONFERENCE PASS TODAY
Practical Counter Terrorism Conference
29-30 APRIL 2014
OLYMPIA, LONDON Practical Counter Terrorism Conference Day Two – Wednesday 30 April 2014 0900-0920 Coffee & Registration 0920-0930 Chairman’s Welcome & Introduction 0930-1000 The Threat from Solo Terrorists The creativity and level of sophistication demonstrated by solo terrorists The challenge these actors represent for security services and law enforcement agencies Examples of solo terrorists including Swedish Malmö-shooter Peter Mangs Cato Hemmingby, Research Fellow, Norwegian Police University College 1000-1030 Do Terrorists Exploit Relative Superiority? Assessment of the tactical success and failure of individual terrorist attacks Analysis of methods employed by disparate terrorist groups A review of the six fundamentals of special operations (simplicity, security, repetition, speed, surprise, and purpose) Examples from over 20 separate terrorist attacks, both successful and unsuccessful Alternative methods to predict and prevent terrorist attacks Major Erik Davis, Downing Scholar, Combating Terrorism Centre 1030-1100 Coffee, Networking and Exhibition Visit 1100-1130 Counterinsurgency Operations (COIN) Key skills required for COIN missions How to fight terrorists in hostile environments Importance of discriminate use of force The role for COIN in future conflicts Colonel Tim Collins OBE BSc MA PSC, Late R Irish, Chief Executive Officer, New Century 1130-1200 Protecting Soft Targets From Hardline Terror Ensuring correct balance between intelligence, physical means, correct manpower and realistic procedures Balancing covert, overt and low profile methods of security How to attain maximum protection whilst maintaining realistic budgets Ivor Terret, Director,Training & Consulting, AS Solution 1200-1230 Private vs Public Sector Protective Security Understanding the corporate risk appetite and identified threats The need for an objective, balanced and informed approach when considering protective security Case study examples Lee Doddridge, Director, Ncompass Solutions
1400-1425 Counter IED Search The importance of training for Police and Security Officers in the Homeland Security environment Benefits of deploying IED Search personnel for VIP visits and significant events The drive for equipment to counter the IED threat Steve Kettle LCGI, CEO and Principal Consultant C-TAP 1425-1450 Profiling Analysis in Counter Terrorism How the age of information has globalised terrorism Why find the terrorists before they even adopt terrorist ideas? The need for a reliable tool for early detection of suspicious behaviour of terrorism Using profiling platforms that could identify individuals with significant risk factors Benefits and paybacks Adrian Brezulianu, Ph.D., Managing Director at Greensoft SRL and Professor, Technical University of Iasi, Romania 1450-1515 Counter Terrorism Surveillance – New Solutions CCTV and OCC standards under development for counter terror activities in passenger transport Dave Gorshkov CEng, FIET, Managing Director, Digital Grape Business Services and Chairman of the CCTV and PSIM Standards Working Group 1515-1540 Soft Mitigation of Hostile Threats Assessment of the increasing adoption in numerous theatres of ‘ soft security’ Using positive engagement with host communities to mitigate hostile security threats Using open ethical engagement to build links and enhance security Importance of a transparent and demonstrable commitment to upholding human rights Gabriel Carter, LPD Risk Management 1540-1605 Countering the Terrorist Threat via Digital Media Analysis Exploiting digital media to enhance public safety whilst reducing operational budgets Easy and cost-effective routes to access the intelligence in digital media held by law enforcement and intelligence agencies Using face recognition technology to depict individuals of interest Carl Gohringer, Founder, Allevate 1605-1630 Panel Discussion and Q&A 1630
Close
1230-1300 Panel Discussion and Q&A 1300-1400 Lunch, Networking and Exhibition Visit
VISIT WWW.COUNTERTERROREXPO.COM/REGISTER
Cyber Security and Electronic Terrorism Conference Cyber Terrorism Conference Day Two – Wednesday 30 April 2014 0900-0920 Coffee & Registration 0920-0930 Chairman’s Welcome & Introduction 0930-1000 The World is Changing! What is the 21st century cyber threat? Why you don’t have to defeat an army on the battlefield to win a war What this change means for nation states in terms of impacts, opportunities and threats James Stuart, Director, Alt3 1000-1030 Cyber Terrorism – A Real or Imagined Threat? An assessment of where the generation of cyber terrorists will arise from Use of the Internet by terrorist groups active in Sub Saharan Africa How social media is being used by terrorist and how this differs from previous web technologies Application of theoretical models of terrorist engagement to the practice of terrorism in cyber space Stewart K. Bertram, Cyber Capability Manager, Control Risks 1030-1100 Cyber Security – The Priority The role of OCSIA on cyber security, information assurance and e-crime Ensuring the resilience and security of government ICT infrastructures New ways to protect businesses and make the UK more resilient to cyber-attacks and crime Neil Kenward, Deputy Director, Cyber Programme & Intelligence Finance & Capabilities, Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office 1110-1130 Coffee/Tea/ Exhibition Visit 1130-1155 Tackling the Threat of Cyber Crime and Cyber Terrorism Unravelling cyber warfare and cyber terrorism from cyber crime The threat to governments and commerce from cybercrime and cyber terrorism The role of EC3 in implementing and delivering a concerted strategy to combat cybercrime in Europe Importance of reinforcing existing cooperation across Europe to address cross-border collaboration and jurisdiction issues Speaker tbc 1155-1220 Introduction to the National Cyber Crime Unit Working proactively to target criminal vulnerabilities and prevent criminal opportunities Importance of mainstreaming of cyber investigative capabilities Addressing key challenges – the international dimension Future plans to grow capability to respond in fast time to rapidly changing threats Andy Archibald, Head of the National Cyber Crime Unit (NCCU) 1220-1240 The ACPO E-crime Strategy What the police service and other agencies are doing to combat e-crime Importance of mainstream cyber awareness and capabilities Protecting against terrorism-incitement and inappropriate material online Peter Goodman QPM, Deputy Chief Constable, East Midlands & ACPO lead on Cyber Crime 1240-1300 Panel Discussion & Q&A
1400-1420 Pro-Government Cyber Attacks with Virtual Armies How the Syrian Electronic Army has been active during the Syrian conflict The intensity and scope of activities and implications for media groups, government institutions and others which have been hijacked Dr Dave Sloggett, Author and Independent Academic 1420-1440 Cyber Resilience – Building a Defence Strategy that Works The array and complexity of cybersecurity threats Why traditional risk management can’t deal with the risks from activity in cyberspace Managing information risk with resilience The importance of cyber governance and partnering Steve Durbin, Global Vice President, Information Security Forum (ISF) 1440-1500 The Big Data Battle for Cyber Space Why the war for control of cyber space is real Why global collaboration is needed for this new kind of warfare Big data as a useful weapon in the defence of the cyber threat Mike Loginov, Chief Cyber Security Strategy Officer – Government, Hewlett Packard (HP) ESS 1500-1520 Cyber Crime and Cyber Terrorism Defining a research agenda on cyber-crime and cyber-terrorism in Europe How to protect critical European infrastructures against cyberattack and misuse Combatting terrorists’ use of the Internet to spread propaganda and recruit followers Chief Inspector David Fortune, Seconded Police/Security Research and Innovation Expert, CENTRIC – Sheffield Hallam University and Det. Inspector Andrew Staniforth, International Research Team, West Yorkshire Police 1520-1540 Information Security in the Age of Social Media The way companies should manage their twitter and facebook presence against potential attackers, both social-engineering hacks and information-warfare exploits (black PR). Edward Lucas, Senior Editor, The Economist 1540-1600 Security on Social Network Sites – The Case of the British Army A critical examination of the use of SNSs in the British Army Possible privacy and security risks associated with fast growing use of Social Network Sites (SNSs) Identifying the risks from digital footprints An assessment of efforts made towards education and creating awareness Sylvester Abanseka, Independent Security Consultant 1600-1620 Cyber Attacks on Mobile Devices An update on new and emerging threats to mobile devices Importance of guarding against attacks and threats in the electronic, cyber and physical domains An example attack on a mobile network device John Bayliss, Director (Security), Communications Risk Management 1620-1640 Panel Discussion & Q&A All Speakers 1640
Close
1300-1400 Lunch, Networking and Exhibition Visit
BOOK YOUR CONFERENCE PASS TODAY
Why Attend Counter Terror Expo? 29-30 APRIL 2014
OLYMPIA, LONDON Counter Terror Expo will host an exhibition of over 400 leading suppliers which is free to attend using your Conference Delegate Pass. Attend the exhibition to see leading top companies showcase their latest products, services and solutions during multiple product launch and industry briefings workshops. The event will also provide an ideal platform for networking with leading experts and suppliers internationally.
Workshops at CTX 2014 Supported by: Attend a range of educational show floor workshops located in three theatres on the exhibition floor where industry leaders within counter terrorism and security will share expertise and industry updates. Industry briefings from leading organisations and experts within counter terrorism and security Company updates from top suppliers – keeping you in the loop with the latest techniques and technologies available on the market Product launches from leading exhibitors allowing you to be one of the first professionals within the industry to see the latest innovations
C-IED Demonstration Zone The extremely popular Counter-IED Demonstration Area is set to return with 5 new scenarios which will touch upon civilian and field based operations, CBRN, and Vehicle Bourne IED Car Clearance, relevant to both police and military teams, both pre and during the operation, and then during post operation forensic analysis. The C-IED Zone will showcase the following scenarios: Law Enforcement team raid into a suspected bomb making factory Post room scenario with a manual approach to x-ray the package Expeditionary VNIED car clearance in a high risk theatre Humanitarian demining and battlefield area clearance (ERW) Homeland CMD task with the defusing and removal of an AC Bomb
Networking Drinks Reception sponsored by The Security Institute Join us from 16.00 on Tuesday 29 April 2014 for an afternoon of networking with colleagues and peers and leading suppliers from across counter-terrorism and security industry, located on the show floor.
CTX visitors can use their visitor badge free of charge to access both, Forensics Europe Expo and AMBITION which will run alongside CTX.
Forensic Innovations to Solve Investigations Upper West Hall, Olympia The show will once again connect over 3,000 attendees and 70+ international exhibitors during the free to attend exhibition, workshops and live demonstrations of cutting edge technology and products. Visitors to Forensics Europe Expo will also have the opportunity to take part in an interactive Crime House Feature as well as attend conference streams on Digital Forensics and Forensics Innovations
Leading Organisations speaking at the Conference include: Office for Security and Counter Terrorism, Home Office Emerging Security Challenges Division, NATO Centre for the Protection of National Infrastructure National Counter Terrorism Security Office Counter Terrorism Implementation Task Force Office, UN European Cybercrime Centre The Security Services Metropolitan Police Service British Transport Police Ministry of Transport European CBRNE Centre Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office National Cybercrime Unit (NCCU) Information Security Forum The Economist Sheffield Hallam University Norwegian Police University College Combatting Terrorism Centre Centre for the Study of Terrorism and Political Violence, University of St Andrews CCTV and PSIM Standards Working Group The Institute for Study of Radical Movement American Enterprise Institute University of Warwick
Ambition – The Dedicated UK Ambulance and Pre- Hospital Care Exhibition and Conference Grand Hall, Olympia Ambition is the only show with the full support of all NHS ambulance services and therefore the guaranteed attendance of a broad range of frontline staff and senior managers from across the emergency services sector with 70 exhibitors and 2,000 attendees expected to attend. Ambition 2014 will be enhanced to provide a one-stop-shop for visitors from organisations involved in emergency response, crisis management, interoperability, resilience and pre-hospital care.
VISIT WWW.COUNTERTERROREXPO.COM/REGISTER
How to Book Your Conference Pass 29-30 APRIL 2014
OLYMPIA, LONDON Register to attend as a conference delegate and find out about the latest insight, analysis, trends and perspectives from top speakers within counter terrorism, law enforcement and corporate security.
To register for your conference delegate pass to gain access to all areas of the show including networking events and the conference, please visit www.counterterrorexpo.com/register. To register for your free exhibition only pass to receive access to live demonstrations, workshops and the exhibition, please visit www.counterterrorexpo.com/register. If you have already registered to attend the show with a free exhibition pass and would like to upgrade to a conference delegate pass, please visit www.counterterroeexpo.com/register and enter your current login details to upgrade.
Pick the sessions that you want to attend and your sector: If you are a user of counter terrorism and security products and services and work within Military/Police/Academic/Public Sector/ Emergency Services/CNI/Government: Early Bird 1 Book before 14th February 2014
Early Bird 2 Book before 18th April 2014
SAVE over £100
SAVE UP TO £50
£205 + VAT
£289 + VAT
£326 + VAT
£375 + VAT
£454 + VAT
£495 + VAT
Academic / Public Sector/Military/Police 1 Day Pass includes 25% Discount Academic / Public Sector/Military/Police 2 Day Pass
If you are a supplier or end user in all other sectors and work with elements of counter terrorism or security:
Onsite Book from 19th April 2014 onwards
Early Bird 1 Book before 14th February 2014
Early Bird 2 Book before 18th April 2014
Onsite Book from 19th April 2014 onwards
SAVE over £100
SAVE UP TO £50
Industry 1 day pass
£275 + VAT
£385 + VAT
£435 + VAT
Industry 2 day pass
£499 + VAT
£610 + VAT
£660 + VAT
Take Advantage of the Exclusive Conference Discount Counter Terror Expo is also pleased to provide delegates with exclusive group offers on conference passes. If you wish to register a group of professionals from your organisations, we will provide you with an extra 25% saving on the prevalent rate for a group of four. Make sure you visit www.counterterrorexpo.com/register and register a group of 4 conference delegates to take advantage of the 3 for 4 offer as well as the Early Bird booking discount.
Organise Free Hosted Exhibition Tour The exhibition will provide visitors with the opportunity to see, touch, compare and contrast the latest products and services available to the market. If you are bringing colleagues and are interested in a specific area of the show, please contact a member of the team today to discuss organising a free hosted tour. Please email steve.baker@clarionevents.com
Free Exhibition Pass You can visit the show floor exhibition and the two day workshop programme by registering for a free exhibition only pass. The exhibition only pass will also allow entry into the networking drinks reception and the chance to arrange a free hosted exhibition tour. To register for a free exhibition only pass, please visit www.counterterrorexpo.com/register
When and Where Counter Terror Expo will take place on Tuesday 29 April 2014 0930 – 1800 Wednesday 30 April 2014 0930 – 1630 For more information about the venue and travel, please visit www.counterterrorexpo.com/venue. Counter Terror Expo is working in partnership with Fresh Reservations who are providing exclusive rates to all attendees. For further information, please visit www.miceconcierge.com/events/ctx2014 or call 01438 908777.
Counter Terror Expo is a pre-registration only event. Please make sure you pre-register in time to be approved.
Register for your tailored conference pass or a free exhibition only pass by visiting www.counterterrorexpo.com/register or call +44 20 7384 7806