SCHEDULE DETAILS Event Schedules
-
11:00 - 14:30
KEYNOTE LECTURES
-
10:40 - 11:00
Opening Ceremony
MAIN CONFERENCE HALL
-
11:00 – 11:30
Mirza AgicExperience the Power of Video in a Smart City
Speaker: Mirza Agić, Sales & Technical Operations Director, APAC Milestone
MAIN CONFERENCE HALL
What makes a smart city?
Why is planning for a smart city important?
Where can we use Video AI to solve smart city challenges?
In a city today we have competing systems and accessing data across the board is increasingly challenging.
A platform is needed that converges and delivers a consistent end-user experience.
Only then can we start to make use of real time alerts, that drive cause and effect, among multiple agencies.
-
11:30 – 12:00
Kaloyan VasilevUsing the IoT to make a building smart and secure! Why, what and how?
Speakers: Raphael Lindenmeyer, Senior Sales Manager – IoT & Kaloyan Vasilev, Partner Manager, Bosch.IO
MAIN CONFERENCE HALL
We welcome you to join us in this keynote to learn about:
Why – are buildings getting more and more intelligent? What are the key drivers and trends for these developments?
What – are IoT use cases that increase the security of a building and its user?
How – does Bosch.IO bring IoT into buildings? Learn how Bosch connects equipment and building infrastructure and creates a digital map of the facility to assess its current and historic condition. We introduce to you the Bosch IoT Suite and our building IoT platform - the Connected Building Services.
-
11:00 - 14:30
KEYNOTE LECTURES
-
11:30 – 12:00
Pierpaolo PiracciAdvanced Security Solutions Perimeter Protection for Critical Infrastructures
Speaker: Pierpaolo Piracci, Distribution Sales Manager, FLIR Systems
MAIN CONFERENCE HALL
Critical infrastructures demand solutions that integrates multi-layered security systems, FLIR offers an unmatched, end-to-end security solution that includes feature-rich visible cameras, the most advanced thermal security cameras, open-platform software, robust analytics, and market-leading radars. FLIR thermal security cameras serve as standalone solutions or integrated perimeter protection systems with radar for long-range detection, superior tracking, and video verification for alarms.
-
12:00 – 12:30
Katerina RyanIncrease your profit and customer loyalty with VMS
Speaker: Katerina Ryan, Business Development SEE Europe, Cathexis
MAIN CONFERENCE HALL
Different users have different needs and challenges. Surveillance can be more than just a security system. A modern and sophisticated VMS can go far further than merely recording and playing back video. Learn how using intelligent VMS rules combined with data from 3rd party systems, along with a good understanding of the customer’s needs, can provide maximum effectiveness and efficiency and get a better return on investment.
-
11:00 - 14:30
KEYNOTE LECTURES
-
11:00 – 11:30
Security Industry Distribution Channel - impacts, future trends and what we can do about it?
Speakers: Israel Gogol, Group Manager - Media and International Sales, Messe Frankfurt New Era
MAIN CONFERENCE HALL
-
11:30 – 12:00
Security benefits of 3rd party evaluation in software development industry
Speaker: Yoann Klein, Senior Cyber Security Advisor at Huawei
MAIN CONFERENCE HALL
An open, digital, and prosperous world requires a secure and trustworthy digital environment that meets the challenges of today and tomorrow. Trust and security are not something you unilaterally declare but something you gain along a fruitful journey with your partners and customers. We believe that 3rd parties have an crucial role to play in this journey. For instance, beyond creating a level playing field for an industry, standards and certifications are vital to establishing trust.
Moreover, software development involves many different and evolving practices. We use software in a myriad of different contexts: lifecycles, sensitivity levels, coding languages, etc. Still, we need to ensure that the lines of code we produced are secured before being into production and along the customer products lifecycle. In this multifaceted landscape, 3rd party have also an important role to play. The ICT and security solution provider should not be afraid of more transparency and openness, even it requires in some cases that the source code is reviewed by external party. Security by obscurity has never been the right choice.
In the face of increasing numbers of cyber security challenges, Huawei has always accepted to take on its role as leading global ICT solution provider and to be evaluated against the highest security standards and certifications. We also promoted disruptive initiatives such as the creation of first Cyber Security Transparency Centre in Brussels and in-house pentesting department against its own R&D teams.
-
12:10 – 12:30
ZK Teco
MAIN CONFERENCE HALL