Skip to main content
The Security Event

8 - 10 April 2025 | NEC Birmingham, UK

The Security Leaders Summit

Security Cameras

The Security Leaders Summit

Security Leaders Summit

The Security Leaders Summit will feature leading expert speakers who will uncover emerging technologies, latest trends and best practice case studies for security professionals. With a specially curated agenda, attendees will come away with plenty of inspiring ideas and actionable strategies that can be applied to their respective businesses and profession.

 

Loading
10:30
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Violence and Intimidation against women and girls is a societal problem that needs a whole society response.  It is everyone’s business to want to see and drive the changes needed to promote safer communities that will allow them to prosper and flourish.     We need to see a collective and cohesive response beyond law enforcement, driven by society, businesses and organisations across all sectors.   This informative session will showcase how collaboration across the industry, working with the Police, and third-party organisations, can enable safer communities.
11:05
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
11:40
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Physical security is more crucial than ever, as risks escalate due to skilled labour shortages, operational costs rise and businesses face threats from all directions. Modern organisations must embrace innovative and efficient technologies to not only safeguard their people and properties but also transform their business. In this session, Verkada will explore a live customer story with Grainger PLC discussing the benefits of a cloud software approach to physical security. Discover how Grainger plc has implemented a cutting-edge system to future-proof their business.
12:50
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    • Recognise the six stages of delivering effective security
    • Considerations when selecting appropriate security performance standards
    • The ingredients of an effective specification
    • The hierarchy of evidence available to support the selection of  effective solutions
13:30
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Drawing from extensive global research and observations, this discussion explores the transformative forces reshaping today's security landscape. As the traditional $10B high-security sector faces unprecedented change, a new $100B mainstream security market is emerging - one that builds upon historical foundations while breaking free from conventional constraints. Through insights gathered worldwide by Lee Odess, CEO of The Access Control Collective, we'll examine the critical shifts driving this evolution, their timing, and their implications for all stakeholders. The presentation reveals both challenges and opportunities facing industry players, mapping out how organizations can navigate this transformation successfully. By understanding these changes and their cascading effects, security leaders can better position themselves in an industry that's rapidly redefining its boundaries, capabilities, and future direction.​​
14:05
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Women in the private security sector face unique challenges, yet their contributions are vital to the industry’s success. This panel will focus on strategies for retaining women in the sector, exploring how organisations can support, empower, and advance female talent in frontline and leadership roles. Through insightful discussions, we will uncover the barriers women face, the value they bring, and how the industry can create a culture of inclusion that ensures long-term retention and growth.
14:40
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    In this session, we explored the critical importance of effective event security, emphasizing that security is not just about showing presence or fulfilling minimum requirements. True protection goes far beyond token gestures and requires a deep commitment to thorough planning, vigilance, and professionalism.  Key discussion points included:  Understanding the Threat Landscape: Security isn't one-size-fits-all. It requires careful assessment of potential risks specific to each event and environment.  Comprehensive Planning: Effective security starts well before the event begins, with detailed risk analysis, strategic placement of personnel, and emergency response plans.  Proactive vs. Reactive Measures: The focus should be on preventing incidents rather than merely reacting to them. This means staying ahead of potential threats through constant surveillance and real-time decision-making.  Training and Professionalism: Staff must be highly trained not just in traditional security methods, but also in crowd management, de-escalation techniques, and the latest security technology.  Dynamic Adaptability: Each event is different, and the security strategy must be flexible enough to adjust to unforeseen circumstances while maintaining control and safety.
10:30
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    This session will explore the career journeys of front-line officers who offer the first line of security defence. The session will use case studies , sector information and engagement with the delegates to explore career journeys, discuss training and what role membership of professional bodies play in supporting the aspirations of front-line officers.  
11:05
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
11:40
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    The rise of generative AI provides the capability to alter video footage in subtle yet sophisticated ways. Ensuring the authenticity and integrity of the footage is paramount, particularly for security practitioners responsible for legal proceedings and internal investigations. Traditional techniques, such as timestamping, watermarking and hashes, can all be useful, but a standardized approach to ensuring video integrity can enable faster protection of security video. This presentation will focus on the threats facing security video and how standards in this area can preserve trust in video surveillance footage.
12:15
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    AuKUS is the multi billion co operative programme between USA, UK and Australia. Pillar 2 focuses on Hi Tech knowledge sharing and cyber and digital protection. Some innovative ways of doing this include working up cyber resilience and physical security as an holistic capability
13:30
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Join Dave as he shares insights on common technical audit findings and discusses best practices for installing Radio/Radio dual-path signalling systems.  This talk will highlight frequent technical findings and provide practical steps to enhance system reliability and compliance. Whether you’re an installer, designer, or internal auditor, this session will offer actionable guidance to optimise system performance and avoid common pitfalls.
14:05
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Staff training, loss prevention, reducing fraudulent claims and quality control are just a few of the reasons GAIL's Bakery, a prominent British brand, needed a scalable security solution. Attend this session as Verkada dives into a live case study with Brett Parker, Property Director at GAIL's Bakery to see how GAIL's was able to deploy Verkada across 100+ stores, all managed by their small facilities team who can now monitor security at scale.
14:40
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Post ISIS era, highlight the crime terrorism nexus as well as the dramatic changes the field of terrorism has been going through. The profile of terrorism and terrorists has changed extensively in the last decades, affecting the terrorists’ individuals and organisations mind set, behaviour and motivations. In this lecture I’ll explore the dramatic changes of terrorism and terrorists’ motivational and behavioural aspects in general, while giving examples from specific case studies I have worked on, in order to understand how we can deal with the threat better.
15:15
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit

    Do you know your Governance Gin from your Risk Rum?  Discover the perfect cocktail for cyber security resilience:

    • Ingredients for the Cyber Resilience Martini
    • Mixing the Cyber Resilience Martini
    • Garnish and Serve
    • Cheers to Cyber Resilience!

10:30
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit

    Introduction

    • The Evolution of Home Security
    o Traditional locks vs. smart locks
    o The rise of the connected smart home

    • Why Smart Home Security Matters for Professionals
    o Increasing adoption of IoT in residential security
    o Threat landscape: Hacking, physical breaches, and integration vulnerabilities

    Smart Locks & Doors: Features, Benefits, and Risks

    Types of Smart Locks & Doors

    o Keypad-based locks
    o Biometric authentication
    o Wi-Fi vs. Bluetooth vs. Z-Wave connectivity

    • Security Benefits
    o Remote access and control
    o Temporary access for guests & service providers
    o Activity logs and real-time alerts

    • Potential Threats & Attack Vectors
    o Cybersecurity risks: Hacking, credential theft, spoofing
    o Physical vulnerabilities: Lock-picking, battery failures
    o Social engineering & user-based security gaps
    Integration with the Smart Home Ecosystem

    • Why Integration is Critical
    o A holistic approach to smart home security
    o Centralized management via smart home hubs (Amazon Alexa, Google Home, Apple HomeKit)
    o The role of AI-driven automation (geofencing, behaviour-based alerts)

    • Cross-Device Security Considerations
    o Secure pairing with security cameras, motion sensors, and alarms
    o Encryption and secure communication protocols
    o Managing third-party app integrations and API risks

    • Real-World Examples & Case Studies
    o Best practices in integrated smart home security
    o Notable breaches and lessons learned

    Best Practices & Recommendations

    • Choosing the Right Smart Lock & Door System
    o Evaluating security certifications and encryption standards
    o Balancing convenience with security (e.g., biometric vs. PIN-based access)

    • User Awareness & Maintenance
    o Regular software updates & patching vulnerabilities
    o Strong authentication practices (multi-factor authentication, unique access codes)
    o Periodic security audits and penetration testing

    Conclusion & Q&A

    • Summary of key takeaways

11:05
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit

    92% of security leaders agree: the future of physical security is in the cloud. With this inevitable shift from on-premise setups to feature-rich cloud systems join us as we explore the past, present and future of cloud-based security. In this session, we’ll discuss:

    • The benefits and considerations of pure cloud, hybrid cloud, and old-school security setups.
    • How AI can revolutionise physical security across any industry.
    • Why security pros are moving away from vintage on-prem solutions in favour of the cloud (spoiler: it’s all about speed and flexibility).
    • How can integrated systems improve threat detection and response in real-time?

11:40
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Through the use of insider case studies, the session will illustrate why an organisational response, rather than just a converged security approach is required to manage insider risks. Will look at some of the challenges, pitfalls to avoid and offer some thoughts on the best way to approach this growing risk.
12:15
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    It is widely accepted in the security and risk arena that training acts as a force-multiplier when devising appropriate, layered risk mitigation strategies. Getting into the mindset of motivated threat actors equips decision-makers with the opportunity to get-ahead, ensuring organisational resilience and adding to the bottom-line of the organisation. This session analyses a series of complex challenges faced by modern organisations and includes an in-depth evaluation of the importance of criminology/security science imparted through effective training regimes when promoting security as a business enabler.
14:40
  1. Security Leaders Summit
    30 mins
    • Security Leaders Summit
    Setting the international geopolitical security scene.

COLLECTING YOUR CPD CERTIFICATES

CPDMeWe are proud to be able to offer a CPD-accredited educational programme designed to provide expert insight and learnings for professionals. This year we have partnered with CPDMe who will be available onsite to help facilitate your certificates of attendance and build your CPD points portfolio.

Please ensure you scan the QR code at the end of each session as this will register your attendance and issue you a downloadable certificate of attendance. 

Visitors will need to contact their professional body, employer or association to add their certification of attendance to their personal record to show the further learning they have achieved for that year.

Contact CPDMe: Office: 01254 943 159 (9am – 4pm, Mon – Fri), team@cpdme.com

The Safety & Security Event Series