Thursday, 7 December 2017

IAASF: International Arts and Antiquities Security Forum


The International Arts and Antiquities Security Forum (IAASF) is a leading conference and exhibition dedicated to the protection of arts, antiquities and cultural heritage. Providing those involved in the protection and safe custody of buildings, artefacts and events with an understanding of existing and emerging threats that can impact them. This year Andy Davis, Chairman of IAASF, kindly invited UKRG Committee members to attend their 2-day conference at Kensington Olympia and as a group we wanted to feedback to the membership on the insightful and interesting talks we attended.
 
Adversarial Threats to the Arts, Antiquities and Cultural Heritage Sectors
Professor Erroll Southers, Managing Director – Tal Global Corporation
 
Our first talk of the day was delivered by Professor Erroll Southers, former FBI agent in counterterrorism, Professor of Practice of Governance at University of Southern California, Managing Director in counterterrorism and infrastructure protection at TAL Global Corporation to name but a few of his achievements.
 
Professor Southers delivered a fascinating talk focusing on the different types of threats cultural institutions are facing in today's world. Although theft continues to be a threat we must protect ourselves against, we are now becoming targets for ideological attacks. This can be in the form of physical attacks on cultural sites or through the sale of looted property to fund causes.
 
To mitigate the risk of these types of attacks, Professor Southers recommended sites ‘reverse engineer the plot’ in order to understand where their weaknesses may lie. He also recommended using external consultants to find information we, as institutions, don’t think can be found.
 
Importance of Planned Protection – Meeting GIS Standards
William Brown, National Security Advisor, Arts Council England
 
William Brown attended the conference and delivered a talk on meeting GIS standards and risks to be aware of when assessing venues. Things to consider included:

  • Site locations: remote locations may be at higher risk of theft as response times or even ability to respond may be significantly reduced.
  • Natural forces: although not a common occurrence in the UK we should be ensuring we consider venue locations in terms of typical weather, both domestic and internationally
    • Are they in an area susceptible to storms, floods, brush fires, earthquakes, volcanoes?
    • Athough not common the UK has experienced forest fires in recent years
  • Cyber threat: can venue information be accessed remotely? Is your site or the borrowing venue on Google Maps and how much can you see?
William also emphasized the reputational risks museums face should they be the victims of theft or damage, accidental or malicious. As an example, William discussed the recent cases of the Maple Leaf coin at the Bode Museum in Berlin and the University Museum of Bergen. Both situations were pventable using simple measures to ensure the security of collections. William highlighted the need to demonstrate a proactive, not reactive, approach to security whilst also highlighting the need for ongoing training. Museum staff need to be aware of their responsibility for museum collections and equipped with the skills and knowledge needed to protect them. 
 
Jenni Fewery, Assistant Registrar, Science Museum

1 comment:



  1. ✅COMPOSITE HACKS✅

    •• Are you Seeking for the Best Legit Professional Hackers online?
    Congratulations Your search ends right here with us. •• ⚡️⚡️

    ✅✅ For Years Now We have Been helping companies secure there Infrastructures against malicious Attacks, however private individuals have been making use of our services to provide Optimum solutions to their cyber and Hacking related Issues, such as providing them unlimited Access to their desired informations from their Target. 📲

    ✅✅ COMPOSITE HACKS is a vibrant squad of dedicated online hackers maintaining the highest standards and unparalleled professionalism in every aspect.
    We Are One Of The Leading Hack Teams In The United States With So Much Accolades From The Deep Web And IT Companies. ••
    ••We Offer Varieties Of LEGIT Hacking Services With the Help Of Our Root HackTools, Special HackTools and Our Technical Hacking Strategies Which Surpasses All Other Hackers.
    Our Major Services Includes:
    - PenTesting ⚡️
    - JailBreaking 🚀
    - Website & Blog Hacking 💻
    - PHONE HACK (which allows you to gain unnoticeable access to everything that is happening on your Target’s Phone such as Calls, Text Messages, Chats, Social Media Apps etc)📲📲
    - RECOVERY OF LOST FUNDS ON BINARY OPTIONS AND CAPITAL INVESTMENTS⛏
    - Retrieval Of Lost Files and Datas.💻📲
    - CREDIT CARD MISHAPS 💳 💳 🔥
    - CLEARING OF CRIMINAL RECORDS ❌❌
    - SOCIAL MEDIA ACCOUNT HACK etc

    ✅ We have a team of seasoned PROFESSIONALS under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record Called “HackerOne” and have cracked even the toughest of barriers to intrude and capture or recapture all relevant data needed by our Clients. Some Of These Specialist Includes ⭐️ PETER YAWORSKI ⭐️FRANS ROSEN⭐️ JACK CABLE ⭐️JOBERT ABMA⭐️ ARNE SWINNEN ⭐️And More. All you Need To do is To Write us a Mail Then We’ll Assign any of These Hackers To You Instantly.

    ✅✅ COMPOSITE HACKS is available for customer care 24/7. Feel Free to Place your Requests.

    ✅CONTACT:
    * Email:
    •• compositehacks@cyberservices.com
    •• Wickr >> compositehacks

    * Hire a Hacker!
    * Want faster service? Contact us!
    * HackerOne©️LLC 2018.
    * All Rights Reserved ®️

    ReplyDelete