ASIAL Conference

The ASIAL Security Conference is your annual opportunity to receive crucial updates from the organisations shaping today's security landscape in a program carefully curated by the industry's lead association.

This year’s ASIAL Conference program covers a breadth of topics from supply chain management to terrorism. Following feedback from the industry, we have refreshed the format of the Conference so you can receive all of the critical industry updates on the first day.

The second and third day of the Conference allows you to tailor your program to hear from the speakers that are most relevant to you. In-depth Executive Briefings run concurrently on Thursday 27 and Friday 28 July focusing on specific areas to help you tackle operational security challenges.

Delegates earn up to 9 CPD points for attending the ASIAL Conference. See the full program below or download the Conference brochure here. The ASIAL Conference takes place in Meeting Room 3.7 and the Executive Briefings are in Rooms 3.6 and 3.7 on Level 3 of the ICC Sydney’s Exhibition Centre. All delegates are required to collect their badges from the Delegate Registration on Level 2 upon arrival.

Any remaining passes for the ASIAL Conference and Executive Briefings are now available to purchase from the Delegate Registration on Level 2 at the ICC Sydney (open from 8:30am on Wednesday 26 July). 

Wednesday 26 July

Lunch included on Day One of the Conference

Is your business safe from future cyber threats? In this presentation, Shara Evans will open your eyes on how emerging technologies can be leveraged by cyber criminals in new and inventive ways. This includes examples that may seem straight out of a science fiction movie, but are eminently possible with technology available now or in the very near future.

In this keynote session we are shown how and where sensitive business and personal information may be compromised in the future, from spying drones to connected cars to mobile apps, Shara will provide you with insights that will help you navigate the new world of ubiquitous connectivity and how these lessons can relate to securing your most valuable information. Can you afford not to understand the imminent threats that lie ahead?

Topics covered include:
• Current State of Play: Data Security, Hacking Targets, Privacy and Social Media – The bottom line impact of data breaches
• The Next Generation of Wearables: Augmented Reality, Facial Recognition, and over the horizon technologies
• Health Services + Embedded Technology
• Connecting to the Internet of Things
• Cities of the Future: Sensors, Next Generation Vehicles, Drones and Robots
• Artificial Intelligence: The next wave of Big Data, Expert Systems, Machine Learning and Digital Avatars

In a world with real-time news media, viral social media, instantaneous video uploads and international connectedness, news travels faster and further than ever before. Organisations need to be ready and know what the different stakeholders expect to see in your actions and communications during crisis. Mario will discuss how you can prepare your organisation to communicate promptly, accurately and confidently on all platforms, with affected people, employees, media and the wider community, and in so doing protect your brand.

A strategic look at organisational risk, raising the discussion above traditional risk management tenets which tend to center around alternately preventative and reactionary checklists and processes, as well as the standards that establish the integrity of those processes. This presentation examines the impacts to organisations resulting from external dependencies; the interdependent nature of the services – and risks - that we all share; and how and why we need to start thinking about these vulnerabilities in a more strategic context. Key to this is expectation management, stakeholder engagement and relationship building… all of which allow for the identification and prioritization of critical nodes which are necessary in ensuring continued business continuity.

The Gold Coast 2018 Organising Committee will deliver an athlete-focused Games providing long lasting benefits for the Gold Coast, Queensland, Australia and the Commonwealth. Safety and Security is critical to this event.

Security at major events relies heavily on multi-level, local, state and federal government relationships as well as public and private partnerships. Cohesive planning and deliver in this unique and multifaceted environment will depend on real integration between partners. The theme that joins partners in this endeavour is risk.

A critical phase of government agency integration is the early agreement to roles and responsibilities and the agreement on risk ownership. The process follows defined stages and culminates in venue operational plans. A critical phase of public and private partnerships involves a detailed scope of works and an understanding of the capabilities of private safety and security industry.

This presentation will discuss the risk and opportunities that relate to safety and security at mega events such as the Commonwealth Games.

It is common place for employers and principal contractors to drive down employment costs by illegitimately disguising workers as independent contractors, particularly in sub-contracting out the works required. The security industry is vulnerable to ‘turning a blind eye’ to the compliance with the Fair Work in competing for security work.

The Fair Work Ombudsman has adopted a Supply Chain Strategy that aims to provide industries with a level playing field through education, employer assistance, working with employer associations such as ASIAL, and where necessary take legal action in the worst cases of exploitation. Understanding your legal obligations and taking proactive steps to be a good employer / contractor will safeguard you family name, business name and protects you from being personally liable for being an accessory to sham arrangements. Taking some simple steps will safeguard both you and your industry.

Many small businesses think they are simply not big enough to be the target of cyber-attacks, but this is increasingly not the case. In fact, online threats are one of the fastest growing security risks facing small businesses; with scanners becoming progressively sophisticated in the way they target unsuspecting businesses. In the past year alone there's been a range of scams aimed at small businesses, from fraudulent emails claiming to be from government regulators to hackers seeking the details of a small business' suppliers list. Therefore its vital small businesses insulate themselves against cyber threats to their online systems.

More and more small businesses are going online, not only to increase their competitiveness domestically but to tap into global markets, particularly the millions of potential customers located throughout Asia. While digital economy presents enormous opportunities, it also brings with it significant risks so small businesses need to ensure that cyber security measures are a part of their business plan, and they invest the time and money necessary to safeguard against hackers, computer viruses, and other online threats.

In this session, Mark will outline planning and preparedness to protect critical infrastructure, private and public assets from acts of terrorism.

The proliferation of IP in electronic security and IoT devices presents both challenge and opportunity for organisations that want to remain competitive in a dynamic market. Add to that increasing cyber threats posed by security devices and a holistic security system becomes more a necessity than ideal. Learn why electronic and cyber security can no longer operate in isolation and hear real life examples of how simple it can be to start reaping the benefits of an integrated security posture.

Cyber security breaches are in the news every single day. These breaches happen because of weak or poorly configured information security systems, lack of user awareness and systems that are badly managed and maintained. This applies particularly to physical security systems, IoT and SCADA.

In this presentation, Tony discusses information security trends, demonstrates a live hack into a mobile device and talks delegates through how they can adopt strong cyber security defences to protect both your own organisation as well as your customers.

Thursday 27 July

When an organisation is in crisis, the world watches very closely. You must have trained and prepared spokespeople who can engage with the media and effectively represent the company during crisis; spokespeople at head office and at other business locations, who are prepared and trained to deliver key messages in high-pressure situations can significantly improve the public perception during crisis. An effective spokesperson can help protect reputation and aid the path to recovery. This practical briefing will provide delegates with:

• Skills to be confident when interacting with the media and to deliver key messages.
• An understanding of the importance of planning for a crisis
• Learning how a crisis communication can protect your brand
• How to develop crisis communication Holding Statements
• Internal communications to stakeholders and crisis management
• Lessons learned - why institutional memory prevents repeated mistakes

Participants will gain an understanding of how to develop a holistic approach to their organisational CCTV and security requirements and how to avoid costly variations associated with poor system design through lack of detail on specifications.
Key learning outcomes for this briefing include:
• The typical organisational experience – where you are now
• The limitations of Australian Standards
• How to define your imaging and security outcomes
• The right questions to ask in relation to consultants and integrators
• How to ensure equipment procured and installed meets outcomes before sign off
• How to develop a holistic approach to CCTV and security requirements
• How to avoid variations and additional expenses
• The benefits of a cohesive training strategy for stakeholders
• Where to next – CCTV technologies

Social media has accelerated exponentially the speed with which information is circulated. The prevalence of social media presents opportunity as well as risk. It can be a powerful crisis communications tool to dispel rumour, provide information, calm fears and demonstrate commitment.

This executive briefing considers an approach that can be taken and a methodology applied in designing secure buildings, and specifically the security design of tall buildings. These are different in both the needs of security, and how the design solution is applied, regardless of where they are located in the world today. The impact of such incidents as 9/11, although now a decade and a half ago, will be with us still for decades to come, and although one cannot protect against that type of attack, one must be able to countenance the impact in both realistic as well as perception terms.

The briefing will include consideration of the types of incidents that the world has experienced specifically in the last two years, examining a step by step methodology that explores:
• The operational, and security management to be applied
• The physical security design considered in both in planning and hardware terms
• The integration of the project security technology into the physical aspects of the building, and the human machine interface

Each of the above must be complimentary and compatible to, and, with one another across all elements that comprise the complete to solution.

Friday 28 July

Airports are one, if not the most complex of integrated security environments that security professionals have to operate in today’s challenging security environment. Securing the huge volume of passengers and freight that transit through them each year, not to mention the thousands of support personnel and retail staff who work there is no easy feat. An efficient, safe, and secure aviation system is integral to our social and economic well-being.

Security outcomes for airports are mandated by national agreements with the International Civil Aviation Authority, yet the method of achieving those outcomes is left to the contracted states (countries) and individual airport authorities. The serious nature of the threats airports face, regardless of their size, means that airport operators must ensure that there is no weak link in their security chain. Any failure can have significant consequences. As a result, security arrangements in place at most airports is extensive and comprehensive. In Australia the approach is based on the principle of 'security in depth', meaning the more layers of security, the less chance an attack will occur or be successful.

The airport security model is one that provides many lessons for other sectors in the threats they face. Drawing on his extensive experience working in the airport security environment, Kerran Campbell will explore:
• The approaches taken by airports to secure their operating environment
• Lessons that other industry sectors can learn and apply to their own organisation

An IP surveillance system may be used to observe people, objects, and activity inside premises as well as traffic and vehicles outside including money handling in banks and games in casinos. These objects of interest may have different clarity when displayed on a workstation screen. The image clarity depends primarily on the camera used, the imaging sensor, its lens and the distance from the object.

There is one parameter in IP CCTV that expresses the image clarity in a simple way with just one number - Pixel Density. The advantage of expressing object clarity with its Pixel Density is that it combines the sensor size, pixel count, focal length and distance to the object in just one parameter. When using Pixel Density metrics all variables are included and makes it universally understandable what details you will get on an operator’s workstation screen.

In this detailed executive briefing Dr Gav Schneider will discuss leadership and the psychology of risk and the security industry and how we need to manage the realities of a Volatile, Uncertain, Complex and Ambiguous (VUCA) World to ensure that we can capitalise on opportunity whilst being able to manage downside.

Aspects discussed will include:
• What is Risk Intelligence (RI)
• How do we develop RI
• How does RI affect leadership
• Introduction to the psychology of risk
• Risk, culture and leadership

With over 30,000 students, the University of Tasmania has campuses within the three main regions of Tasmania - Hobart in the south, Launceston in the north and Burnie in the north-west. The university’s security arrangements include over 850 CCTV cameras (650 Analogue Streams and 200 IP streams), with assets distributed throughout the state.

The project scope included developing:
• A base level of understanding (within the organisation) in relation to the technical requirements and security outcomes for the systems and Technology to be installed.
• Proof of concept framework to allow manufacturer's to showcase their offering in a real world scenario;
• A threat, vulnerability and risk assessment matrix for assessment for the 90 or so buildings across the sites;
• A strategy to “grandfather” elements of the existing technology on a structured value for money basis;
• Procurement guidelines for testing (of new cameras), procurement, installation and commissioning of CCTV systems and infrastructure.
• A detailed design specification for the migration from the largely analogue environment to a digital video management System incorporation high levels of resilience and redundancy with no single point of failure.
• Standardised training requirements for future use to be in place prior to handover.

This in-depth briefing will help delegates to:
• Address the challenges of migrating from analogue to IP.
• Explain the planning and implementation challenges associated with successfully delivering a project such as this.

Information correct at time of publishing and the organisers reserve the right to alter the content of the program at any time due to reasons beyond their control. Please check back for the latest information.

Where to next

What’s On

Read More

Executive Briefings

Read More

Gala Dinner

Read More