Your SlideShare is downloading. ×
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
London oil and gas security summit 2013 neah ges
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

London oil and gas security summit 2013 neah ges

676

Published on

Published in: Business, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
676
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 2ndAnnualwww.oilgassecurity.comSupported by:Gold sponsors:Maritime RiskSolutionsLunch Time sponsors:Gala Dinner sponsor:12th-13th June 2013Double Tree Hilton Hotel - Tower of London
  • 2. The 2ndAnnual Oil & Gas Security 2013 Summit:Strengtheningyoursecuritystrategiesandoperationstoeffectivelycombatemerginginternationalthreats…Forcompaniesthat want to develop the most cost-effective strategies to reducevulnerability to theft, sabotage, terrorism, piracy and problems arising from civil unrest…Forbusinessesthat want to enhance their corporate security plan to improve theirresponse rate and performance…Forexecutiveswho want to increase their knowledge of innovative securitypractices and the latest cutting edge technologies to minimise security threats
  • 3. The landscape of security threats to the oil and gas industry isquickly evolving and regrettably expanding, with several highprofile attacks to the oil and gas industry in recent years. Withexpenditureonoilandgassecurityissettorisesharplyoverthenextfew years, oil and gas companies must strengthen the efficiencyand cost effectiveness of risk assessment surveys, preventionmeasures and crisis management to be as secure and financiallycompetitive as possible. The 2nd Annual Oil and Gas Security2013 Summit is structured to carefully analyse best practices inthe industry so that you can effectively benchmark your strategiesand discover new methods and technologies to prevent threat oftheft, sabotage, terrorism, piracy and hostility. You’ll also learn ofthe latest developments in emergency responses and evacuationplanning to help you restructure and enhance your security plansin light of new threats.The 2ndOGS Summit is a unique platform to share your experiencewith all the senior level experts in the oil and gas industry, whereyou can discuss tried and tested solutions to the many evolvingthreats. The agenda is designed to address the most prominentissues around terrorism, civil unrest, piracy, theft and sabotage.Youwill get the opportunity to examine, assess and discuss the bestanti-terrorist and anti-piracy strategies as well as look at enhancedonshore and offshore security measures along with the latesttechnology to enhance security of your operations.IRN is recognised within the Oil and Gas industry for providingexclusive niche platforms that bring together senior levelexecutives from various aspects of the Hydrocarbon industry todiscuss and share best practices around focused issues. IRN is onceagain pleased to bring you The 2nd Annual Oil & Gas SecuritySummit- with exclusive focus on addressing key risks to securityoperations in multiple regions. This Summit will bring all thekey players in security in the oil and gas industry to discuss howyou can improve your re-entry and implementation strategies,enhance your evacuation plans, what you can do to protectyour pipes and equipment, and identify how to spot the gaps inyour risk assessment strategies. You’ll find out how your peersare implementing and aligning their business models with theircrisis management approach to reduce their vulnerability, whilstremaining efficient and utilising all resources effectively.The 2nd Annual Oil & Gas Security 2013 Summit:For businesses who want to implement effective measuresto enhance and re-align their security practices to reducevulnerabilityA senior level summit analysing best strategies and mostcost effective measures to prevent and mitigate securitythreatsto oil and gas infrastructure, assets and personnelYourexpertspeakerpanel• Robert Missen, Head of Unit, Maritime & Land Transport Security,European Commission• Mehmet Kinaci, Strategic Analyst, NATO Allied Command Transformation• Chris Phillips Former Head of National Counter Terrorism Security Office atCPNI (part of MI 5)/Managing Director International Protect and PrepareSecurity Office• Patrick Black, Senior Expert Protective Security, OMV• MP Eric Joyce, Member of Parliament for Falkirk, House of Commons• John Hamilton, Director, CBI Intelligence• Grahame Bullock, Security and Resilience Manager, Nexen Petroleum• David Blackhouse, Head of Security(Port), Qatar Petroleum• IMO Representative• Karl W. Miller, Chairman, NEAH Global Energy Solutions• Thomas Wuchte, Head on Anti-Terrorism Issues, Organization for Securityand Co-operation in Europe• Iliyasu Bagna, Manager Deep Water Security, Total E & P Nigeria• Jean-Philippe Berillon, Senior Vice President Security & Safety, GDF Suez• Mustapha Harkouk, Security Manager, GDF Suez Algerie• Jennifer Giroux, Senior Researcher, Centre for Security Studies• Scott Chapel, Vice President-Corporate Security, Abu Dhabi NationalEnergy Company (TAQA)• John Steed, Chief of Maritime Security and Counter Piracy , United NationsPolitical Office for Somalia• Jon Marks, Associate Fellow, Middle East and North Africa Programme,Chatham House• Faisal Lassoued , Security and Marine Assurance Manager, BG Tunisia• C. Derek Campbell, CEO, TransGen Energy• GB HAWK/FAF Development/GNI (Socio-Cultural Analysis Division)• Charles Burbridge, International Account Director/ Brian Christie, Head ofOil and Gas Security, G4S plc• Tim Roberts, Vice President Homeland Security, Restrata• Herman van Niekerk, Director Operations, Maritime Risk Solutions• Bernhard Saß-Moebus, Head of Human Resources and Operations, i.b.s.• James Cartmell, Commercial Executive/ Marius Gilmore, Director, Track24Media Partners
  • 4. YOUR BUSINESS CASE TO ATTENDExpenditure on security for oil and gas operations is sharply rising and according to a number of recent businessanalysis reports, is set to double in the next decade . The 2ndAnnual Oil and Gas Security 2013 Summit isstructured to carefully analyse best practices in the industry so that you can effectively benchmark your strategiesand discover new methods and technologies to prevent threat of theft, sabotage, terrorism, piracy and hostility.You’ll learn of the latest developments in emergency responses and evacuation planning to help you restructureor enhance your security plans in light of new threats and also gain extensive knowledge on how to develop atailored security strategy that aligns to your business needs.What will you get out of it?• Learn about the industry best practices to prevent and mitigate terrorist attacks based on recentincidents and hostage crises• Explore new methods to identify risk of threats when you are working in high risk countries• Develop strategies that will enable you to execute your evacuation plan most effectively• Get insights on the latest technology to enhance preventions techniques• Understand how you can minimise risks to avoid sabotage and theft• Discover how other oil companies are managing evacuation plans, from strategy to execution so youcan implement new techniques within your own plans• Find out how to leverage technology to enhance security operations by analysing your costs, ROI andresults. You‘ll learn how to combine your team knowledge with technology to make the most of yourresources.• Understand how you can develop effective incident investigation procedures to identify immediatesolutions• Learn how you can implement more cost-effective strategies in your security plan• Understand how to minimize the risk associated with employing private security companies• Evaluate how best to prevent and mitagate piracy attacks based on recent crises and current threats• Learn how to minimise the negative impact of attack, theft or sabotage on the efficieny of your teamsand operations• Benefit from the unique opportunity to benchmark your security strategies with over 100 of yourpeers• Examine new and existing methods to prevent terrorism by learning more about the mind-set ofattackers. You’ll discover more about biometrics, access control and visitor management to aidgreater prevention• Increase your awareness of emerging global threats to the oil and gas industry to pre-emptivelystructure your security strategiesWhy Oil & Gas Security 2012Summit is a ‘must attend’ event for you andyour team:• Each of the sessions in the summit is designed to bring you practical examples to improve every area ofyour corporate security plan• You will hear a detailed analysis of the recent Algerian hostage crisis and develop a betterunderstanding of any weaknesses in the plant’s security strategy• You will benefit from several case studies on the particular security threats from several keyhydrocarbon producing regions• Benefit from the opportunity to benchmark your security strategy with senior level internationalexecutives from the major oil companies like Shell, BG group, BP and many others• It’s your chance to enhance your knowledge about the emerging technology to reinforce security inyour business
  • 5. “I would like to thank you for the opportunity provided to participatein the Cypriot-Greek Oil & Gas summit. The International ResearchNetworks conference was outstandingly organized and provided anopportunity for Networking among professionals who are working atthe forefront of developments in the Oil and Gas sector. The variouspresentations and sessions were extremely useful, inspirational andaffirming. Congratulations on such a magnificent conference!”- Costas Ioannou, DEFA Cyprus“I look forward to participating in one of your conferences again inthe future”.-John Z. Tomich, Noble Energy“Very nice environment, good organization, very good speakers,wonderful business contacts, fun”-Vassilios Kelessidis, Technical University of Crete, GreeceWhat our past attendees and sponsorshave to say about our events:• Group Head of Security• Group Security Director• Head of Global Security• Principal Security Advisor• Chief Safety Adviser• Global Security Manager• Global Threat Analyst• Head of Security• Crisis and SecurityManagement• Director of Energy Security• Chief Security Officers• VPs Security• Head of Crisis Management• Chief Security Officers• Chief Security Manager• Security Analyst• Head of Cyber Security• VP - Group Safety &Operational Risk• Director, Safety andOperational Risk• Chief Security Officers• Managing Directors• CEOs• COOs• Senior Security Researchers• Managers and Heads:Corporate Security• Physical Security• Industrial Security Operations• Offshore and Onshore Security• Managers and Heads HSSE• Managers and Heads Safety &Security• Emergency Response PlanningManager• Emergency Response Manager• Head of Crisis Management• Head of Risk Management• Asset Protection Manager• Fire & Security Manager• Operations & Strategy• Risk & Crisis Management• Business Continuity• Contingency Planning• Risk Assessment• Loss & Preventions and ProjectManagers• Security Specialists• Safety & Security Co-ordinators• Security Training Officers• Policy Advisors• Security Consultants• Principal Security Advisor• Head of Safety and DesignEngineering• Security Software ProvidersYOUR EXPERIENCEWHO SHOULD ATTENDIRN enjoys a strong reputation in the oil and gas industry forgathering senior level thought leaders from internationalcompanies to discuss high priority issues or regions in exclusiveforum settings. Building on the success of the Libya Oil & Gas2012 Summit in Rome, where we brought over 300 senior levelexecutives together as well as on the first edition of the Cypriot-Greek Oil & Gas 2012 Summit, and Balkans Oil & Gas 2012Summit in Athens.Our industry connections and reputation within the oil and gassecurity sector has grown immensly over the last two years andthus this edition of the summit is set to be bigger, with more‘‘of-the-minute’’casestudies,highlytopicalround-tablediscussionsand an exceptionally strong panel of senior level speakers alreadyconfirmed.
  • 6. 08.30 Registration and coffee09.00 Welcome from Pooja Samani, Director, IRN09.05 Opening comments from the Chair Jennifer Giroux, Senior Researcher, Centre for Security Studies09.15 Keynote address: Overview of current security challenges to the oil and gas sector• Addressing recent global incidents: How can your security program reflect the lessons learnt and industry best practices?• Overview of the key threats onshore and offshore, with emphasis on high risk oil producing nations across MENA, LatinAmerica and South East Asia.• Being forewarned to be forearmed: Projections on future challenges to the industry’s operations and methods forpreparing for their eventuality• How can you leverage emerging technologies to aid your security efforts?• Analysing how your business strategy is affecting your operationsSecurity in high-risk RegionsWith an estimated 90% of the world’s oil and gas predicted to originate in developing countries by 2030 and with a significant number ofthese countries being classified as high risk, security in these regions is a pivotal issue to the oil and gas industry as a whole. This is furthercompounded by the growing global trend in terrorist activity focused on the oil and gas assets, employees and infrastructure.The opening morning of the Summit will focus on the specific issues arising from projects in high risk regions, with an emphasis on terroristprevention practices. Other issues discussed include dealing with theft in regions with weak law enforcement bodies, preventing andmitigating oil pipeline sabotage, deterring oil bunkering, minimizing risk with privately contracted security personal, dealing effectively withbribery demands and best practices for preventing hostile reaction from local communities. Over the next 20 years, it’s expected that 90 percent of production will come from developing countries. This section will also feature a spotlight study on security in Colombia.09.55 Presentation:The present security situation in Algeria and the regulations impacting upon the oil and gas industry• Terrorism in Algeria- the real situation in the North of the country and the consequences of the recent war in Mali onsecurity in the south of the country• Overview of measures of protection in the oil and gas sector• New measures since the bombing of Tinguentourine.• The weak points in protection strategies in the oil and gas sectorMustapha Harkouk, Security Manager, GDF Suez Algerie10.20 Presentation: Reducing the Insider threat• The insider threat to your business• Intellectual property protection• Some key activities to reduce your vulnerabilities• Building a security culture in your organisationChris Phillips, Former Head of National Counter Terrorism Security Office at CPNI (MI 5)11.00 Morning break11.30 Panel Discussion: Assessing best terrorism prevention practices and approaches to ensure the maximum level of asset andemployee security• Overcoming terrorist threats; how to critically analyze the trends in a region, proportional to the evolving nature andfrequency of the threat• How to conduct security risk assessments to international standards• Examining new and existing mechanisms to prevent and mitigate terrorist attack: What advancements have been made inrecent years?• How to develop a robust anti-terrorism strategy in line with geopolitical tensions in a regionPanel to be confirmed:John Hamilton, Senior analyst, Cross Border InformationJennifer Giroux, Senior Researcher, Centre for Security StudiesJon Marks, Associate Fellow, Middle East and North Africa Programme, Chatham House12.15 Presentation: Pipelines, Personnel & Pylons: Energy InfrastructureTargeting in Colombia• Highlight data drawn from the Energy Infrastructure Attack Database (EIAD)• Examine the clustering effect of energy targeting in Colombia• Identify ongoing security gaps and efforts needed to mitigate risksJennifer Giroux, Senior Researcher, Centre for Security Studies12.45 Lunch break - Sponsored by14.00 Presentation: Security Assessment & Planning for Green and Brown Field Projects• Corporate Security involvement in request for proposal (RFP) development• Coordinating/implementing security requirements with the Engineering, Procurement and Construction (EPC) contractor• Security auditing during constructionScott Chapel, Vice President-Corporate Security, Abu Dhabi National Energy Company (TAQA)14.40 Presentation: Optimising risk assessment strategies and security activities in the era of“identity conflict”• Optimizing risk assessment strategies for“Identity Conflict”• Why existing security methods and CSR initiatives struggle in this environment• Updating the overall concept of modern security• Activities and initiatives necessary to mitigate the impact of identity conflict on operationsGB HAWK/FAF Development/GNI (Socio-Cultural Analysis Division)15.10 Presentation: Providing security guidance for non-security personnel• The initial management of security related incidents in remote locations with particular relevance to Offshore locations• Initial advice re incident management, scene preservation, basic evidential requirements etc• Ensuring all activity is consistent with needs of other Authorities, Police etc..Grahame Bullock, Security and Resilience Manager, Nexen PetroleumDay 1: wednesday 12thjune 2013
  • 7. Day 1: wednesday 12thjune 2013Continued15.40 Afternoon break16.10 Case Study: Forming your security strategy for re-entering a high risk zone; OMV’s experience inYemen• The role of information-led security,• Threat identification and mitigation measures,• Delivery of an integrated HSSE strategy to deliver the plan and maximize the opportunitya review of developed triggers, warnings and indicatorsPatrick Black, Senior Expert Protective Security, OMVOn-land security for Infrastructure, team and assetsStrategies for most effective protection of oil and gas infrastructure and assets are evolving and adapting to correspond with the everchanging threat and risk environment. The afternoon of the Summit will focus on effective risk management for permanent onshore oil andgas complexes and assets as well as security for mobile operations and security when in transit.16.40 Presentation: Security challenges in a changing environment• Current trends and future requirements for security outsourcing• Development of the outsourced servicesCharles Burbridge, International Account Director/ Brian Christie, Head of Oil and Gas Security, G4S plc17.10 Presentation: Security of staff• The“Duty of care”for mobile staff during operations• Security for expatriates and local teams• Provides training on security and human rights to the security staff and policeJean-Philippe Berillon, Senior Vice President Security & Safety, GDF Suez17.45 Closing comments from the Chairman17.50 Networking Reception18.40 Gala Dinner sponsored byIntegration of financial risk management and physical securityKarl W. Miller, Chairman, NEAH Global Energy Solutions
  • 8. Day 2: thursday 13thjune 201308.30 Registration and coffee09.00 Opening comments from the Chair Jennifer Giroux, Senior Researcher, Centre for Security StudiesOffshore infrastructure, assets and team securityThis part of the Summit will address the ever broadening portfolio of challenges thatface those concerned with security and safety in the maritime and subsea environment. As an important source of extractive energyproduction, operations focused on the seabed come with potential of conflict between national interests as well as the threat of terrorism.Topics include counter piracy, crisis management for offshore operations, underwater explosive and terrorist threats, port and supply chainsecurity, underwater pipeline security, and well as regulatory updates from the European Commission09.10 Keynote Presentation: Offshore Security• Illegal migration in the Mediterranean sea• Illegal migration trafficking post Arab spring• Statistics, routes and transit sea areas• Illegal fishing activities post Arab spring• Offshore platforms exposure• International security rules• Example of Incidents in offshore fieldsFaisal Lassoued, Security and Marine Assurance Manager, BG Tunisia09.50 Presentation: Anti-Piracy - Big and Small‘P’Politics• Big‘P’Poltics and Marine Security• Small‘p’Politics and the Marine Security Sector• The Irreplaceable Role of the Private SectorGeneral Outline: I will discuss out how the UK government is managing marine security risk; how African governments areapproaching security risk; and how business politics within the marine security sector affect operational models.MP Eric Joyce, Member of Parliament for Falkirk, House of Commons10.20 Presentation:The MaritimeThreat East andWest Africa• East Africa (including Red Sea & Indian Ocean) present threat and development of threat• West African present threat and development of threat• Maritime insurance influenceHerman van Niekerk, Director Operations, Maritime Risk Solutions10.50 Morning Break11.20 Presentation: Security in the Horn of Africa• Political situation in Somalia• Piracy update - hostages• Prospects for land based solutions• Risks and opportunities for the industryJohn Steed, Chief of Maritime Security and Counter Piracy , United Nations Political Office for Somalia11.45 European Commission Update: Maritime Security Regulations• Annual update on recent and/or proposed Maritime Security regulations• Maritime security perspective within the EU• Overview on maritime and port facility security regulation• Technical aspects of port securityRobert Missen, Head of Unit, Maritime & Land Transport Security, European Commission12.15 Presentation: Using location data to optimize your security strategy• Case study: The role of satellite tracking in managing risk for complex operations in rapidly changing environments –learning from Iraq and Afghanistan• How mobile phone technology and location data can extend security oversight to your entire workforce• From reaction to prevention: Using digital mapping and location data to build intelligence for optimal security planningJames Cartmell, Commercial Executive/ Marius Gilmore, Director, Track2412.45 Lunch breakEnhancing security strategiesThe closing afternoon of the Summit will provide attendees with the opportunity to combine the lessons learnt over the previous two days ofpresentations and discussions to consider forming, upgrading and effectively implementing innovative and proven security practices in orderto best avoid sabotage, improve crisis management strategies and develop the most comprehensive evacuation plans. Cyber security willalso be addressed in the context of considering the high level of security that can be achieved when cyber is effectively merged with hands-onsecurity across operations14.00 Presentation: Protecting Critical Infrastructure - A Regional Approach --The Organization for Security and Co-operation inEurope (OSCE)• Outline the OSCE’s collaboration with the UN in supporting the implementation of the UN’S Global Counter-TerrorismStrategy• Overview of the Council Decision on Protecting Critical Energy Infrastructure from Terrorist Attack• Explaining The Non-Nuclear Critical Energy Infrastructure Protection project, the importance implementing this decisionthrough the publication of a good practices guide on protection of non-nuclear critical energy infrastructure from terroristattacks, particularly on cyber-related infrastructureThomas Wuchte, Head on Anti-Terrorism Issues, Organization for Security and Co-operation in Europe14.30 Presentation:The Strategic Endstate of Energy Security - Achieving Energy Resiliency• The correlation between Energy Security, Energy Assurance, and the ultimate goal - Energy Resiliency• The benefits of third party validation of current risk and resiliency - avoiding the trap of contentment.• Beyond trends - the benefit of proactivity.• The next 25 years: Strategy development in critical energy infrastructure protection - aiming for asset resiliencyC. Derek Campbell, CEO, TransGen Energy
  • 9. Day 2: thursday 13thjune 2013Continued14.45 Presentation: Human rights and the security of oil and gas installations - application of the voluntary principlesIliyasu Bagna, Manager Deep Water Security, Total E & P Nigeria15.20 Afternoon break15.50 Presentation: Asset Protection - Skilled manpower versus technical based protection systemsThe integration of advance technical based solutions for protecting vulnerable assets is not without risk. Focussing theprotection on technical solutions may create new weak spots, which only can be encountered by skilled manpower - therecognition of the human factor is a key to a sustainable protection for vulnerable infrastructure.Bernhard Saß-Moebus, Head of Human Resources and Operations, i.b.s.16.20 Panel Discussion: Developing an effective evacuation plan to optimise the security of your assets and people in the event of anattack• Overview of the different strategies to manage evacuation• Evaluating which evactuation plan is most appropriate for your specific operations• Constructing your plan: What are the essentials of a strong plan?• How to execute your evacuation strategy effectively• Assessing the ROI and effectiveness RFID technology in an evacuation situationKarl W. Miller, Chairman, NEAH Global Energy SolutionsJean-Philippe Berillon, Senior Vice President Security & Safety, GDF SuezThomas Wuchte, Head on Anti-Terrorism Issues, Organization for Security and Co-operation in EuropeMustapha Harkouk, Security Manager, GDF Suez Algerie17.10 Closing comments from the Chairman17.20 Thank you from IRN | End of Summit
  • 10. Sales ContractPlease complete this form and return to:Fax +44 (0) 20 7183 7945Email: registrations@irn-international.comRegistration DetailsName _________________________________________Job Title _______________________________________Email _________________________________________Name _________________________________________Job Title _______________________________________Email _________________________________________Name _________________________________________Job Title _______________________________________Email _________________________________________Name _________________________________________Job Title _______________________________________Email _________________________________________Company DetailsOrganisation ____________________________________Address ______________________________________________________________ Postcode _________________Tel ____________________________________________VAT Number_____________________________________Payment MethodhVia Debit/Credit Card h Via Bank TransferPlease charge my h AMEX h VISA h MASTERCARDCard Billing Address _______________________________________________________________________________________________________________________________City ____________________ Post/ZIP Code ____________Card Holder’s Name _______________________________Signature ________________________________________Card Number _____________________________________Security Code (Last 3 digits on back of card) ____________Valid From _______________ Expiry date ______________I agree to International Research Network’s Terms andConditions and agree to International Research Networksdebiting my card.AuthorisationName _____________________________________Date ______________________________________Signature ___________________________________FeesDelegate fee per person (includes documentation)£1645 h (+ VAT)Documentation only £300 h (+ VAT)(Includes entry to all conference sessions, documentation, lunches,refreshments, admission to networking social events. Payment isrequired within 5 working days)Terms and Conditions1. The conference fee is inclusive of Conference documentation, entry to all conference sessions, lunches, refreshments and admission to all social networking events.2. International Research Networks Ltd. (IRN) requires full payment within 5 days of making a booking3. Substitutions can be made at no extra charge up to 2 days before the event. Cancellations received in writing more than 7 days before the event will receive a full credit voucher. Creditvouchers can not be issued for cancellations made less than 7 days before the event. Credit vouchers may be used for payment towards any future IRN event within the next 18 months.4. IRN will make every reasonable effort to adhere to the conference package, but reserves the right to change date, location, content, speakers or topics if necessary. Any communicationconcerning the event shall not form part of the contract. If the event is cancelled for any reason the client shall receive a full credit voucher.5. The customer is wholly responsible for booking and paying for all travel, accommodation and other services associated with attendance at an event. Under no circums tances shall IRNbe liable for any expenses occurred by the customer, even if the event is cancelled, postponed or modified in any way. It is agreed that the customer will only book such services wherethe customer has the right and ability to cancel these without cost or penalty and retains and accepts full responsibility to do so.6. IRN shall have no liability whatsoever for any indirect costs or expenses or any consequential losses howsoever incurred by the customer in any circumstances including for example, lossof profits, lost revenues, lost business opportunity, lost goodwill.7. IRN acts as an organiser and co-ordinator of the event and will sub-contract all presentation duties and all course materials and accepts no liability for the acts or comissions of itssub-contractors or for any aspect of the information, views or data presented at any event.8. Events will be located within suitable conference venues in hotels, conference halls etc. IRN will use its reasonable endeavours to ensure that such premises are suitable and appropriatefor such events but shall have no liability for accidents, inconvenience, theft, loss, damage, non-availability of facilities, or any other difficulty or loss at such event where this is beyondthe reasonable control of IRN.9. Data Protection. The customer agrees that some data concerning the customer will be included within the delegate list. This list will be made available to selected third parties involvedin the conference. Please advise IRN if you do not wish for your data to be included in that list.10. Force majeure. Under no circumstances shall IRN have any liability for any act, loss, damage, expense, mistake, omission or event which is outside its reasonable control.11. Severability. If any term is held to be invalid or unenforceable then that shall not prevent the remainder of this agreement from remaining valid.12. Governing law. This agreement shall be governed by the courts of England.12th-13thJune|London2ndAnnual Oil & Gas Security2013 Summit

×