Counter Terrorism

It incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcement, business, and intelligence agencies use to combat or prevent terrorism. Most counter-terrorism strategies involve an increase in standard police and domestic intelligence. Counter Intelligence is a great challenge with the security of cell-based systems, since the ideal, but nearly impossible, goal is to obtain a clandestine source within the cell.

Innovation & Safe City

Public safety is a pressing issue for the police around the world. Technological innovation needs to pick up the pace to provide better solutions.

Extensive portfolio of public safety solutions for the government sector include innovation in high definition video surveillance, broadband trunking, Multi-media dispatching and intelligent analytics will deliver better situational awareness to emergency service agencies. Currently, most public safety communication systems are being deployed, but many countries still are yet to wake to the call. So when emergency strikes, it is difficult to coordinate different systems efficiently. Technology, especially smart technology and broadband communications technology, can help resolve these issues more effectively.


With video surveillance, mobile devices, and social media generating vast amounts of data, command and control centers will need to interpret, analyze data so that more informed decisions are made in emergency situations. Well-designed ICT solutions can contribute to effective public safety management in cities, and allow them to develop more sustainably.

Cyber Forensics

Cyber forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. Computers may constitute a ‘scene of a crime’, for example with hacking or denial of service attacks or they may hold evidence in the form of emails, internet history, documents or other files relevant to crimes such as murder, kidnap, fraud and drug trafficking.

It is not just the content of emails, documents and other files which may be of interest to investigators but also the ‘metadata’ associated with those files. A computer forensic examination may reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions.

Cyber Terrorism

It is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this can be seen as a form of terrorism.

The use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of- service attacks, or terroristic threats made via electronic communication.

There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.

Economic Intelligence

Economic intelligence (also known as EI) means smart information management in order to know, understand and anticipate the outside environment, (key competitors, rules, stakes, trends...) to prevent risks, particularly in immaterial fields, and to exert ethical influence.

EI is closely linked to knowledge management and to human resources, because people have explicit and implicit knowledge that will be revealed only if reliable processes and real motivation exist in the organisation. For all international players, be they states, big firms, or non-state organisations, EI is a tool for competition as well as a tool for governance and for national security.

The ultimate goal of EI and knowledge management is to produce added value, in two steps: transform information into knowledge and knowledge into sustainable added value. The EI concept gathers several other concepts and practices: competitive intelligence, economic security, risk management, lobbying, public diplomacy, soft power (governments), business diplomacy (companies).

Electronic Surveillance

Observing or listening to persons, places, or activities-usually in a secretive or unobtrusive manner- with the aid of elecronic devices such as cameras, microphones, tape recorders, or wire taps.

The objective of electronic surveillance when usedin law enforcement is to gather evidence of a crime or to eccumulate intelligence about suspect criminal activity. Corporations use electronic surveillance to maintain security of their bulidings and ground or to gather information about competitors

Next Generation Networks

A next-generation network (NGN) is a packet-based network which can provide services including Telecommunication Services and is able to make use of multiple broadband, quality of Service-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users.

Data Analytics

Data analytics (DA) is the science of examining raw data with the purpose of drawing conclusions about that information.

Data analytics is distinguished from data mining by the scope, purpose and focus of the analysis. Data miners sort through hugedata sets using sophisticated software to identify undiscovered patterns and establish hidden relationships.

The science is generally divided into exploratory data analysis (EDA), where new features in the data are discovered, and confirmatory data analysis (CDA), where existing hypotheses are proven true or false. Qualitative data analysis (QDA) is used in the social sciences to draw conclusions from non-numerical data like words, photographs or video.

Topics to be discussed

• Smart security solutions for smart cities
• Cyber security technology & standards & best practices for mobile security
• The road ahead : Cyber Intelligence sharing & co-operation
• Increasing awareness on Cyber attack
• Cyber crime detection & preventation
• Improving the security of the National's critical Infracture
• Collaborative & cross-cutting approaches to Cyber Security
• Cyber crime & Social Media
• Cybersecurity Legislation & Information sharing
• Trends for Cybersecurity
• Surveillance
• Electronic evidence & Legalities


• Transcription (Voice to Text)
• Video Analytics
• Mobile Forensics
• Penetration testing
• Big Data Analytics

*Note: The Summit Organisers reserve the right to change, add to, or cancel any of the workshop or Topics of dicussion, without affecting the motive of the event.

Copyright© 2016 DGP Summit. All Rights Reserved.