The Securika Moscow 2024 exhibition has come to an end. More than 300 companies from Russia, Belarus, Kazakhstan, China, Turkey, Korea, and Taiwan demonstrated comprehensive solutions and new security equipment .
Yesterday, the Securika Moscow exhibition was visited by the Trade Attaché of the Embassy of the Kingdom of Saudi Arabia, Mr. Saleh Al Ottaibi. The diplomat got acquainted with the products and advanced solutions of domestic companies producing access control systems and video surveillance systems, and exchanged contacts with manufacturers and suppliers of equipment. According to him, the advanced solutions demonstrated at the Securika Moscow exhibition can improve the security of the banking sector of the Kingdom of Saudi Arabia.
It is also important to note that within the framework of the Securika Moscow 2024 exhibition, a bilateral Cooperation Agreement was signed between the Federal State Unitary Enterprise Russian Broadcasting and Alert Networks and Sigur.
The official ceremony took place on April 17, 2024 in the FORUM HALL plenary session hall.
The signing ceremony was attended by Dmitry Moiseev, Commercial Director of FSUE RSVO , and Olga Karapetyants , Head of Distributor and Technology Partners at Sigur.
The parties officially confirmed their intentions to cooperate in the areas of comprehensive security, development of joint solutions in the area of operational management and public notification.
The agreement also provides for the participation of companies in promising events and the promotion of industry products and solutions.
![]() | ![]() |
Today, 4 business events took place – we are sharing with you a brief summary of the business program of the final day.
Brief summary of the business program of the 3rd day: conference halls Forum and Lecture Hall
The business program of the final day began with the conference “Cybersecurity and its role in physical security” , which was moderated by Oleg Sedov, Development Director of Rostelecom-Solar .
Dmitry Pudov, Director of Strategic Development at NGR Softlab , spoke about current information security tools .
Considering the problems observed in the field of cybersecurity, the speaker identified several factors that negatively affect the activities of enterprises. These are:
// The intensity of attacks remains high;
// The IT security landscape is still very dynamic;
// Difficulties with human resources;
// Low expertise in new solutions.
However, there are monitoring and control tools that help CISOs manage security more effectively. As an example, the expert highlighted control over what “usually remains out of sight.” To implement this approach, it is necessary to monitor despite changes, perform detection that does not depend on clear logic, and also identify abnormal/non-standard behavior.
In addition, Dmitry Pudov shared intellectual security tools for combating external threats. He identified two solutions for the audience:
// Universal (scalable across connected sources, with an interface for customizing work logic)
// Specialized (as part of a solution, based on the data processed by the solution)
As a result, the speaker highlighted the key properties of effective solutions that are important for eliminating current cybersecurity problems:
// Interoperability
// Working with fuzzy logic (intelligence)
// Adaptability
// High development dynamics, the manufacturer's readiness to promptly respond to customer requests, vendor predictability
Information security expert and CEO of Phishman Alexey Gorelkin explained in his speech why physical security equals cybersecurity.
Starting with theory, the expert noted the main features of information security:
// Integrity
// Availability
// Confidentiality
And then he added that there are many solutions to ensure these information states: from endpoint protection to industrial cybersecurity. However, according to the expert, not everyone knows about this.
"Information security is everywhere now. And that's why cybersecurity is going through the same mutation as application development once did. There was a time when developers simply made a new application without thinking about anything, so the resulting products were full of vulnerabilities. That was the case with the famous Adobe, which was hacked without any problems at one time, because the developers didn't bother to think about protection. Now, fortunately, there are development processes that are tailored for security ," Alexey emphasized.
In his presentation, the speaker presented a chart illustrating P. Hudson's "Security Culture Ladder" and noted that in personal security, the weakest link is a person, which is why it is so important to develop cyber culture among employees of both small and large enterprises. Alexey Gorelkin identified five stages from P. Hudson's work :
// Pathological (concealment)
// Reactive (reaction only after the fact)
// Accounting (in general there is information security, but there are no significant improvements)
// Proactive (understanding information security and helping colleagues to immerse themselves in information security)
// Generative
According to the expert, the overwhelming majority of both employees and managers are either at the “pathological” or “reactive” stage.
“If you don’t think about information security as step “0” in the business sphere, then you won’t be able to avoid problems with physical security ,” Alexey added.
Next, Oleg Sedov, Development Director of Rostelecom-Solar , shared data on information leaks in various industries, as well as life hacks for managing digital footprints online.
As the speaker added, there are active and passive digital footprints . And you can use a few simple life hacks that will help you control your own digital footprint:
// Google allows hotspot administrators to opt out of adding your router's coordinates to the global database. Add _nomap to the end of the network name, like mynetwork_nomap, and Google will no longer track it.
// Clear not only the browser history, but also the cache. You can do this by pressing ctrl-shift-del. On the other hand, the HstEx utility will help you restore deleted browser history and cache.
// Use Incognito mode. This mode does not save cookies, site data, browsing history, or information you enter into forms.
// "The right to be forgotten" or the Streisand effect. To exercise your right, you need to fill out a special form in each of the popular search engines in the Support sections.
The final event of the Forum was the session "Safety at Work and Labor Protection" . During the session, industry experts discussed why it is easier to prevent an incident than to deal with its consequences, what are the precedents of judicial practice in labor protection issues, and what are the practices of accident investigation.
The moderator was Anastasia Kashina, Occupational Safety and Health expert .
Anastasia gave a welcoming speech, raising the topic of "why occupational safety and health are important" . According to the speaker, in practice, occupational safety rules are most often ignored. She highlighted several points why safety at the enterprise should be maintained:
// The risks of administrative and criminal liability are reduced (Article 5.27.1 of the Code of Administrative Offenses of the Russian Federation, Articles 143, 216 of the Criminal Code of the Russian Federation);
// The risk of inspections is reduced;
// The highest value is a person and his life, in this case the value of a person as an employee with his skills and knowledge should not be neglected by the employer;
// The discipline of workers increases, and this leads to increased labor productivity;
// This gives employees a sense of security, stability and interest in the employer;
// Caring for security is not an additional expense, but an investment that pays off because it creates the image of the enterprise and its reputation;
// Reduced staff turnover;
// Reducing the likelihood of loss of time, resources, productivity and finances of the enterprise due to a reduction in the risk of emergency situations and accidents;
// Advantage when participating in tenders.
The next presentation discussed how psychological factors can cause dangerous behavior . The report was given by the Chairman of the Council for the Formation of a Culture of Safe Behavior in Work and Everyday Activities of the KS NSB of Russia, member of the working group on labor protection, expert of the Committee on Labor and Social Policy of the Moscow Chamber of Commerce and Industry Andrey Felixovich Laptev .
The speaker identified 10 reasons that can influence a person's psychology and motivate them to violate safety rules, thereby putting their lives in danger. The following reasons were named:
Reason 1. The broken windows theory (a person stops following the rules where others do not follow them).
Reason 2. The edge effect (characterized by overestimation of probable and underestimation of unlikely events).
Reason 3. Saving effort (i.e. laziness).
Reason 4. Hoping for “maybe”.
Reason 5. The last centimeter factor (when there is little left, a person wants to reach out).
Reason 6. Haste.
Reason 7. Loss of sense of danger.
Reason 8. The desire to violate.
Reason 9. The 5 percent law (herd mentality or “others are breaking it too”).
Reason 10. Not my area of responsibility.
As Andrei Felixovich noted, if there is psychology in violations, then there should also be psychology in rewards .
After this, the experts considered the specifics of investigating industrial accidents. The speaker was a forensic expert, member of the Leningrad Region Business Russia Council, and director of the ANO DPO SZRTsOT, Konstantin Golovyashkin . Speaking about the specifics of the investigation, the speaker emphasized that there are 5 parameters in labor protection that determine the severity of the crime:
// Socially dangerous (causing serious bodily harm or death)
// Illegal (violation of labor protection standards)
// Guilty (carelessness - thoughtlessness or negligence)
// Act (action or inaction)
// Responsibility provided for by the Criminal Code (Articles 143, 216, 217).
To confirm guilt, an accident investigation is created , which can be conducted by:
// Within the framework of the Criminal Procedure Code (CPC),
// Investigation of the National Assembly (Articles 143, 216) – jurisdiction of the Investigative Committee,
// Investigated at the place of commission (district investigative department),
// Complex and significant (high-profile) cases are investigated by the Internal Affairs Department of the Investigative Committee of the Russian Federation.
The expert also explained how evidence collection is organized within the framework of a criminal investigation. First of all, the scene of the WMD incident is inspected, then witnesses are questioned, experts give their opinions, documents are requested, investigation materials are attached - act H1, examinations are conducted, a search is conducted, after which charges are brought and the case is sent to court through the prosecutor's office.
The Lecture program began with the session “UAVs – how to detect and how to combat them?” The fight against drones, or unmanned aerial vehicles (UAVs), has become an important task in light of their increasing prevalence and potential use for espionage, terrorist attacks, or lawbreaking. Invited experts answered a number of key questions at the event: how to protect against them? What detection and suppression methods exist? How to “make friends” with an existing enterprise security system and UAV protection?
The event was moderated by Vladimir Kleshnin, Director of Business Development for Unmanned Aerial Technologies at Kaspersky Antidrone . Co-organizer – Kaspersky Antidrone UAV Detection and Countermeasures System.
After the moderator's welcoming speech , Sergey Romayev , Deputy Head of the Sales Department at Cross Technologies, delivered the first report on "Assessment of Threats from "Commercial" Unmanned Aerial Vehicles" . The expert began his report by defining modern commercial UAVs and presented the advantages and disadvantages of UAV detection tools, which are divided into two main groups:
// Radio frequency detection equipment.
They allow detecting up to 80% of UAVs, even those "jumping" on standard frequencies. However, for UAVs with non-standard purities, these reconnaissances remain "blind". The solution to this problem, according to the expert, is scanners of the entire frequency range, which have a high scanning speed and detection range of UAV and operator signals.
// Radar detection equipment.
They can see everything that moves in the air, but they do not identify them. UAVs hovering in the air are also invisible to them. As the expert reported, they require optical systems of objective control and identification - both for day and night.
Next, Sergey Romayev described the means of countering UAVs. The means of influence for civilian objects are jammers in the frequency range from 400 MHz to 6000 MHz and are divided into two types: those operating in certain frequency ranges (2-12 suppression channels) and synthesizer type. The speaker also spoke about new products, in particular, software and hardware systems based on artificial intelligence and neural networks.
Evgeny Parfenov, Director of the Business Development Department, ELVIS-NeoTek , spoke about the use of neural network technologies and computer multispectral vision to ensure comprehensive security of facilities . The speaker presented the advantages of using neural algorithms. They allow achieving a high level of accuracy in detecting and classifying potential threats, minimizing false alarms. The advantages of neural algorithms also include the ability to customize the system for operating conditions and modify the functionality to meet customer requirements. The speaker emphasized the importance of an integrated approach to countering UAVs, and drew special attention to the software and hardware complex for detecting targets using UAVs. It is a single universal means of protecting the perimeter and approaches to the facility, based on the principles of radar detection, thermal imaging analytics and the use of UAVs to identify and track detected targets.
Andrey Klyuev, CEO of YUMIRS, spoke about countermeasures against small UAVs in facility security systems . The expert presented the ANTIDRON countermeasure complex against UAVs. The series of complexes was developed on the basis of unified modules for various configuration options operating in sectors of 90, 180, 270 and 360 degrees in azimuth. The design is formed from radio frequency suppression units for UAV signals, video surveillance modules, power supply, switching, and installation kits.
The speaker noted the following as features of the complex:
// No mechanical scanning of the antenna beam,
// 360 degree sector review at 5 Hz,
// Software with video analytics option for visual target identification.
The report on the topic "Basic principles of organizing the protection of an object from the impact of UAVs" was presented by Konstantin Yanovich, Head of the Anti-drone department, PSC Electronica . The expert began the report by setting the project task, the technical tasks were to ensure the detection and neutralization of civilian UAVs in the factory version, as well as software-modified UAVs. The maximum success criterion was the fact of detection and suppression of the AUTEL 4TMAX drone model. The threat boundaries were defined at a level from moderate (factory firmware, 2.4 GHz, etc.) to high (increased flight range, extended frequency ranges, etc.).
At the same time, an important budget task was to implement the technical specifications with a level of expenditure on hardware and software modules cheaper than analogues by 25-30%. Based on the results of the work and tests, the project was successful only within the framework of moderate and average threat levels. The expert came to the conclusion that the use of "No name" products is advisable with a clear understanding of their limitations. The speaker also noted the general need to develop "norms" or technical requirements common to UAV protection systems and differentiated in relation to the criticality of the protected object.
After the reports were completed, a discussion began, with Denis Ovchinnikov, head of the center for the development of innovative technologies and UAV accounting of the Federal State Unitary Enterprise "State ATM Corporation" , taking part first . The speaker warned against the thoughtless installation of anti-drones and predicted that in the future the number of flights will only increase, where the incentive will be the implementation of national projects in the field of UAVs.