Conference Agenda

Day 1: Thursday, June 27th, 2019





Inaugural Session


  • Welcome Address: Mr. Yogesh Mudras, Managing Director, UBM India


  • Keynote Address: TBC


  • Special Address: TBC


  • Guest of Honour Address: TBC


  • Chief Guest Address: TBC


  • Closing remarks: Mr. Pankaj Jain, Group Director, UBM India



12.00 -12.30

Tea and Networking


12.30 -13.30



Session 1: Carrying Out Threat Assessment in the Rapidly Evolving Technology Era (panel discussion)


Discussion Points

  • Evolution of new physical and information threats to corporate organizations require an overhaul of corporate risk management strategies.

  • Risk alleviation strategies must be business-relevant and ensure the protection of the organization’s most vital assets including people, information, material assets, and brand.

  • CSOs should ensure threat-vulnerability-risk-assessment, deploy the right mix of systems and technologies and develop the right processes well integrated with the systems.

India is among the world’s most dynamic regions and keeping in line business expectations from security professionals are changing rapidly.


13.30 – 14.30

Lunch and Networking

14.30 - 15.00

Session 2: The Changing Role of a CSO in Crisis Management and Ensuring Business Continuity (Speaker Session)

Discussion points:

  • With CSOs required to manage the security of assets spread over a very large area, the security management processes have witnessed a paradigm shift.

  • The convergence of physical security with information security has also added to the existing security responsibilities of a CSO.

  • New-age threats demand a completely new approach to integrated security management with increasing knowledge of technologies used in security devices.


15:00 – 15:30



Session 3: Using Artificial Intelligence to Get Strategic Insights from Security Systems (speaker session)

Discussion Points

  • AI takes security surveillance a step further by enabling even more powerful analytics to recognize suspicious activity without much human supervision.

  • Facial recognition allows for easy identification of suspects, vehicle detection, and also behavior analysis.

  • With connected devices all around us, there is a need to make security systems more intelligent in order to ease challenges in managing them.


15.30 – 16.30

Session 4: Understanding the Full Spectrum of Cyber Security Risks to an Organisation (Panel Discussion)

Discussion points:

  • There is an urgent need to secure the security infrastructure both at design and execution phase through proactive identification and protection from cyber attacks.

  • In terms of user privacy also there are challenges related to control over personal information and the risk of leaking a person’s physical location and movement details.

  • Another key issue is the challenge to manage and maintain communication among heterogeneous devices and manage a large amount of information emanating from them.

16:30 onwards

Tea and networking


End of Day 1

Day 2: Friday, 28th June 2019

10.00 – 10.30

Tea and networking

10.30 - 11.00

Session 1: Use of AI & IoT in Building Safer Cities (speaker session)

11.00 – 11.30

Session 2: The Enemy Within - Detecting and Mitigating Insider Threats (speaker session)

11.30 – 12.00

Session 3: The Role of Advanced Data Analytics in Transforming Security Systems

12.00 – 13.00

Session 4: Using Unmanned Aerial Vehicles to Mitigate Threats to Homeland Security (panel discussion)

Discussion Points

  • India shares 15,106.7 km of its boundary with seven nations— Nepal, Bhutan, Afghanistan, Pakistan, China, Myanmar, and Bangladesh. Managing such diverse land borders is a complex task and these land borders run through different terrains.

  • The western border, in particular, is an eternal hotbed with terrorists, drug traffickers, smugglers, and human trafficking gangs always on the lookout for opportunities to sneak past the BSF and enter our territory.

  • Unmanned aerial vehicles and drones can play an effective role in keeping an eye on such intruders and also help reduce casualties among our security forces patrolling the borders.

13.00 – 14.30

Networking lunch

14.30 - 15.00


Session 5: Development of Smart Police Services and Control Center Ensuring Real-time Tracking, Monitoring and Action for Public Safety (speaker session)

15.00 – 15.30

Session 6: Data Age 2025 - Surveillance Trends, Technologies Driving Data Growth and the Impact on Storage Requirements (speaker session)

15.30 -16.30

Session 7: Using AI to make Security Systems Smarter, Intelligent, Efficient & self-learning (panel discussion)

Discussion Points

  • AI, ML, IoT, Cloud, Mobile, Blockchain and other contemporary technologies are potentially disruptive and game-changing. Deep Learning systems and advanced analytics strengthen surveillance and make real-time extraction and sharing of actionable intelligence easy. They assist intel, security and law enforcement agencies to recognize suspicious activities without much human supervision and to act pre-emptively and decisively.

  • The benefits of Deep learning for face recognition and image classification makes it extremely valuable in the field of security as it allows for easy identification of suspects, vehicle detection, and behavior analysis.

  • The panel will examine the technologies that would redefine surveillance, security (including those of devices, networks, and applications), fire, transport and life safety, incident and emergency management landscape. The discussion would include, but not be limited to AI, ML, AA, IoT, Cloud, internet, Social Media, Blockchain, etc.

16.30 - 16.35

Vote of thanks

16.35 onwards

Tea and networking



For Conference Registration kindly click to below Link...


Contact Us

For Sales
Sanjeev Rao
Assistant Project Director
Mobile: 098452 93126
Email: [email protected]

For Media and Alliances
Pankaj Sharma
Tel:  011 66517660
Email: [email protected]

Disclaimer: This is a B2B Show. Children below the age of 18 are not allowed. Right of Admission Reserved