Global Asset Security Oil And Gas


Published on

Global Asset Security: Oil and Gas gives you the opportunity to hear from security experts with specific expertise in security threats around the world and across the US. You will have the chance to share knowledge and experience on common or industry challenges such as ensuring the safety of your personnel, and maximizing the robustness of your product supply chain in order to reduce your financial and physical vulnerability.
Attendance at Global Asset Security: Oil and Gas 2010 is essential for anyone involved with developing security strategy or running the security program either in the US or abroad

At a strategic level, The event will address the increasing need for security to be more effectively and efficiently integrated into overall business strategy, and how you can effect such integration in your business. How can you minimize the effect of budget constraints on your security programs? To what extent is your intellectual property safe and how can you improve your defense against financially damaging security breaches?

Key benefits of attending Global Asset Security: Oil and Gas 2010

Understand the business models and security trends that are driving the industry
Discover how TWIC and CFATS regulations can be efficiently assimilated into your business plan in order to ensure compliance and maximize effectiveness
Evaluate the changes in criminal strategy and uncover the true costs (and benefits) of implementing solutions
Reduce your loses and improve your safety record by creating the best possible offshore security program
Get the competitive edge- learn to maximize ROI from your security investments
Get critical insights into the real changes in global security in the regions where you have an interest

Published in: Business, Economy & Finance
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Global Asset Security Oil And Gas

  1. 1. GLOBAL ASSET SECURITY: OIL AND GAS CONFERENCE Monday 22, Tuesday 23 and Wednesday 24 February 2010, Houston, Texas, USA Maximizing the defense of infrastructure, personnel and INTE LEADING intellectual property in a landscape of evolving threat R AND NATIONA GA LO EXPE S SECUR IL R I PRAC TS SHAR TY STUD TIC A E L C AS KEY INDUSTRY SPEAKERS INCLUDE: IE E LEVE S AND TO L AN P Russ Cancilla, Sue Armstrong, ALYS IS Vice President & CSO, Deputy Assistant HSE & Security, Secretary, BAKER HUGHES DEPARTMENT OF MAIN HIGHLIGHTS INCLUDE: HOMELAND SECURITY Mark Niblett, • Benchmark your security program with other Global Director, Adrian Kendry, leading oil and gas companies and hear Corporate Security, Senior Defense Economist, industry leaders explore critical business HALIBURTON NATO changes to help you maximize ROI Roger Hawkes, Grahame Bullock, • Advance your understanding on the latest Director, Corporate Security, Head of Security, evolutions of international threat and get GLOBAL INDUSTRIES NExEN PETROLEUM INC your questions answered at our roundtable sessions, led by key members of the global Peter Lofgren, Waleid Shater, oil and gas community Regional Security Manager, Director, Western Hemisphere, Security for North Africa • Optimize you crisis management strategy: HALIBURTON and the Middle East, developing a crisis plan that is equipped to CONOCOPHILLIPS reduce your vulnerability and financial loss in Pottengal Mukundan, the case of an attack or disaster Director, INTERNATIONAL Brian Hogan, MARITIME BUREAU Director, Security Programs & Strategic POST-CONFERENCE WORKSHOP: Alex De Alvarez, Analysis Enterprise Vice President, Security & Crisis HOMELAND SECURITY Corporate Security, Management, The workshop will examine the ongoing demands of CFATS, APACHE CORP BAKER HUGHES MTSA and TWIC and how you can maximize the benefits to your business as well as comply with the regulations. t Asse Global and Gas A chance to analyze the long term implications of the il to share ty: O ecuri pportunity rtise with new requirements and how future changes might affect S ro xpe , your business is you ge and e lleagues ns ed o o kn owl rs and c try soluti you r pee p indus elo o dev and t ommon Gold sponsor Organised by: to c nges e chall Register online now at:
  2. 2. Program Day One Monday 22 February 2010 08:30 Registration and refreshments ● Identifying and overcoming key challenges in current regulations ● Analysis of the TWIC challenges to date and examination of how 08:55 Opening remarks from the Chair these challenges might be avoided going forward ● The next stage of DHS regulation, final tiering for CFATs and Analyzing business critical strategy developments ● what it means for your facilities Implementing effective information-sharing procedures to 09:00 Keynote presentation: positioning security as part of enhance detection and threat aversion strategy the business plan in order to effectively prepare for the Speaker TBC future global risk 12:30 Panel discussion: evaluating the evolution of the ● Developing a security program that is coherent with your business objectives in order to maximize the potential operational and global threat landscape to plan an effective response financial benefits ● Gauging the effect of recent evolutions in the political and economic ● Ensuring that security personnel have a business outlook in order to landscapes for oil and gas security build the business plan into every layer of the security operation ● Evaluating the changing environment for onshore rigs as their ● The need for security projects to demonstrate value: communicating locations move from traditional area of exploration to new and the impact of risk in the language of business in order to better remote areas: uncovering new threats and how you can avoid them understand ROI ● Developing your understanding of the effect of increasingly complex ● Instigating an effective program to calculate the ROI of security technology and hostile locations on the risks faced by offshore rigs investments thus ensuring an informed and efficient decision ● Analyzing developments in global piracy in order to gauge the making process implications for your shipping routes and prepare evasive strategy Russ Cancilla, Vice President & CSO, HSE & Security, BAKER HUGHES ● Defending your pipelines: developing a strategy to protect your lines and defend your profits 9:40 Case Study: ● Assessing the financial and logistical implications of federal regulations and guidelines at field sites in the US: how can building a performance-based security program compliance, cost effectiveness and efficient implementation be ● Maximizing the effectiveness of your security program: using achieved? performance standards not compliance standards Mark Niblett, Global Director, HALLIBURTON (PROVISIONAL) ● How to build performance standards into a security program and substantially improve security Russ Cancilla, Vice President & CSO, HSE & Security, ● Developing your use of intelligence and local knowledge to improve BAKER HUGHES security performance Peter Lofgren, Western Hemisphere Regional Security Manager, ● Integrating security into the business: improving your efficiency by HALIBURTON developing ownership of the security program at management level ● Performance-based standards and making the business case: William Wilkins, Projects Manager, Corporate Security, surviving the worst-case scenario VALERO ENERGY CORPORATION Alex de Alvarez, Vice President Corporate Security, APACHE CORP. Alex de Alvarez, Vice President, Corporate Security, APACHE CORP. 10:20 Identifying the potential advances in the robustness and sophistication of security programs by converging 1:00 Lunch and networking physical and logical security Uncovering the potential costs and benefits of a more coordinated ● approach in order to establish the business case Offshore threats: ● Using more effective convergence between security disciplines to detection, response and prevention create efficiencies and reduce costs ● Analyzing ways in which a dynamic relationship between IT and 2:30 The changing face of piracy: creating a robust security might improve the effectiveness of your onshore and security portfolio offshore security ● Assessing the true cost of piracy to identify primary financial ● Establishing the role of computer forensics in physical and threats and learn how loses in these areas might be mitigated intellectual property security ● Analysis of the threat posed to shipping in the Gulf of Aiden ● Implementing effective convergence strategy: understanding the and establishing key measures to reduce your exposure to logistical implications attack in the region William Wilkins, Projects Manager ,Corporate Security, ● Prospects for a further reduction in piracy on the Malacca StreaM a: 2:30 – 5:30 VALERO ENERGY CORPORATION Straight and analysis of optimal defense strategies ● Uncovering areas where risk is increasing or evolving: forewarned is forearmed 10:50 Morning refreshments and networking ● Understanding developments in the aggressors’ approach and equipment in order to ensure your response is 11:20 Overcoming terrorist threat – analyzing the trends, proportional to the changing threat identifying successful tactics and mitigating threats Pottengal Mukundan, Head, ● Outlining trends in terrorist attacks on the region’s energy INTERNATIONAL MARITIME BUREAU infrastructure – How real is the threat? ● What can be determined from previous attempts and the realities 3:00 Optimizing your defenses against sea-borne of existing operations assailants: hardening the target ● Revealing tactics that should be implemented to enhance security ● Surveillance and identification: benchmarking against in the face of growing threats the best possible scenario Walied Shater, Director, Security, Middle East and North Africa, ● Establishing key trip-wires to deploy a response that is CONOCOPHILLIPS proportionate to the threat ● Improving your response times in remote locations in 11:50 Evaluating the effectiveness of mandated security order to maximize the effectiveness of your reaction programs and their impact on your business and ● Training and preparation: identifying the skills and personnel that will reduce your vulnerability security strategy ● Assessing the viability of using alternative routes: the ● Prioritizing critical facilities and allocating resources to ensure that financial costs and benefits of taking the long way round they are adequately protected Roger Hawkes, Director, Corporate Security, ● Creating an effective public-private partnership to create an optimal GLOBAL INDUSTRIES security strategy
  3. 3. 3:30 Clarifying your legal rights and responsibilities 3:00 Pipeline security – preventing and responding in defense against pirates and kidnappers to security breach in order to defend your ● The rule of law: establishing what protection you have in product flow international waters to discover how to best deter and ● Key risk assessment procedure to ensure that your retaliate against attackers security provision is optimal ● Determining the factors affecting your legal powers following ● Discovering key regional threats and understanding how an attack or theft your security program can best respond to specific risks ● National laws and their implications for the level of security ● Analyzing critical technology and equipment that can you can legally employ to protect vessels and rigs help you prevent pipeline security breaches and protect ● An overview of new laws against kidnap insurance, what your supply line it means for your response and analysis of the long term ● Surveillance and detection at remote and unmanned implications for K+R crisis planning sites: overcoming the challenges in order to enable a ● Analyzing potential future developments in global law swift response relating to security in order to establish an effective forward ● The evolving risks in pipeline security: what threats looking crime-response strategy should you be preparing for and what is your best H. Allan Black, Partner, WINSTON AND STRAWN LLP defense against the associated costs? Duane Jones, Corporate Security Manager, KINDER MORGAN 4:00 Afternoon refreshments and networking 3:30 Establishing key community relationships to 4:30 Advisory session-hardening the target: improve security in global locations revealing next generation technology that will ● Analyzing the requirements of your location: creating an StreaM a: 2:30 – 5:30 accurate understanding of key relationships and potential maximize your offshore defenses fracture points ● Identifying new products, the efficiencies they propose ● Facilitating the development of sustainable community and the security threat that they reduce interaction that allows your facilities to operate without ● Critical insight into their functionality, how they operate, incident and their subsequent vulnerabilities in order to access ● Allocating sufficient time and resources to develop a their relevance for your business model beneficial relationship ● Case studies of new technology in practice: deepening ● Damage limitation and repairing your relationship in the your understanding of their objectives and successes StreaM b: 2:30 – 5:30 event of an incident ● The product pipeline: analyzing the technological ● Establishing key areas for change and improvement going advances that might contribute to your security and profit forward margin in the medium to long-term SPEAKER TBC Adrian Kendry, Senior Defense Economist, NATO 5:00 Securing offshore rigs against attack and 4:00 Afternoon refreshments and networking intrusion in order to reduce erosion of profits 4:30 Advisory session- securing your onshore and improve safety facilities and other assets: revealing next ● Ensuring that your security program and crisis management plan is optimal by understanding the generation technology to create a more changing threat from seaborne raiders resilient infrastructure ● Robot operated platforms: assessing their vulnerability to ● Identifying new products, the efficiencies they propose attack as opposed to more traditional formats and the security threat that they reduce ● Identifying and locating potential hostile parties ● Critical analysis into their functionality, how they operate ● Communicating with the central control centre in order to and their subsequent vulnerabilities in order to access enable a rapid response and increased success rate their relevance for your business model ● Establish an effective procedure for dealing with ships ● Case studies of new technology in practice: deepening perceived to be a threat: developing more effective your understanding of their objectives and successes practices ● The product pipeline: analyzing the technological ● Deep waters and remote locations: predicting the future advances that might contribute to your security and profit of rig security threats margin in the medium to long-term Grahame Bullock, Head of Security, NExEN INC SPEAKER TBC 5:00 Remote location security: improving detection, warning and response in order to effectively prevent loss of assets Onshore security: international challenges ● Improving communications between remote and central sites in order to facilitate a workable security procedure 2:30 Securing the personnel supply chain: preventing ● Establishing best practice in intrusion response: and responding to Kidnap and Ransom (K + R) overcoming the problems created by slow law StreaM b: 2:30 – 5:30 ● Developing your journey planning facility in order to reduce enforcement response times your exposure to violent crime ● Training and preparation for security breach: mitigating ● Deepening your knowledge of geographical locations most the potential loses subject to K+R in order to tailor your response and instigate the ● Crisis management in remote locations: ensuring that most relevant possible security program law enforcement and emergency services are sufficiently ● Responding to a hostage situation: adhering to national briefed and equipped law and safeguarding personnel whilst protecting the Kent Chrisman, Director of Global Security, business interest DEVON ENERGY CORPORATION ● Developing an effective contingency program to reduce the impact of stoppages ● Ensuring that your workforce can operate safely and efficiently in high-risk areas Paul Barker, Regional Security Advisor, EMEA, CHEVRON 5:30 Chairman’s summary and close of day 1
  4. 4. Program Day two Tuesday 23 February 2010 08:45 Registration and refreshments Crisis planning and management: assessing the 09:15 Opening remarks from the Chair risk and developing a strategy to reduce exposure in the event of an attack or disaster 09:30 Roundtable summit on regionally specific threats to 2:30 Keynote presentation: revealing cutting edge safety, assets, and continuity of supply within your research on global threats Ground breaking risk analysis based on an up to the minute global operations data set. The opportunity to benchmark your operations against Interactive roundtable sessions offer a unique opportunity the security risk profiles of companies world-wide. An in depth to come together with your peers to share best practice and overview of the global security situation and how they will affect develop solutions to critical challenges facing the industry as your operations now and in the future. a whole. Hosted by industry experts and each focused on a Speaker TBC specific set of issues, roundtables are an exciting, interactive way to build your personal network and learn from the experience and expertise of others. 3:00 Implementing an effective disaster management plan to maximize preparedness Delegates can attend up 3 roundtables and may select from: ● Analyzing the program formats on offer to develop a deeper understanding of what they offer Roundtable 1: West Africa ● Matching your program to your business plan: selecting the Optimizing your response to the threat of targeted violence against appropriate cost and time commitment. oil and gas assets ● What can a carefully considered and well executed plan offer you? Grahame Bullock, Head of Security, NExEN INC Analyzing ROI and safety benefits ● Establishing best practice for training and exercises in order to Roundtable 2: Venezuela ensure that the plan is executed effectively Securing operations in areas of socio-political instability ● Contingency planning: reducing your financial and safety exposure Brian Hogan, Director, Security Programs & Strategic Analysis if the business is compromised Enterprise Security & Crisis Management, BAKER HUGHES Speaker TBC Roundtable 3: Mexico 3:30 Afternoon refreshments and networking Broader corruption, trafficking and extortion threats Peter Lofgren, Regional Security Manager, Western Hemisphere, HALIBURTON 4:00 Highlighting the latest developments in emergency technology Roundtable 4: Iraq ● Analyzing the successes and failings of the emergency technology Running a successful enterprise in a post-conflict region already in place in order to identify areas where new investment Speaker TBC could make an important contribution ● RFID technology in an evacuation situation: could it improve Roundtable 5: North Africa safety and do you need it in your business? Defending effectively against terrorist and other organized attacks ● Advances in card reader systems, ascertaining whether the Paul Barker, Regional Security Advisor, EMEA, CHEVRON technology can ensure that your personnel are accounted for and identifying additional functionality that can add value to your business Roundtable 6: The South Pacific ● Uncovering the latest advances in emergency response Establishing key links with the local community technology and what it can and cannot offer. Speaker TBC ● What is needed now? Discussing the requirements of the industry and what next generation exploration and production requires in terms of security technology that contributes towards the 11:30 Morning refreshments and networking business plan Speaker TBC 12:00 Panel session: managing regional risk in international operations 4:30 Chairman’s summary and closing keynote The panel will give you the chance to discover the findings of the roundtables and to engage in further discussion and debate on 5:00 Close of conference current critical issues in international security: ● Developing effective due diligence and investigation procedures in high risk areas in order to limit exposure and reduce expenditure Do you wish to exhibit your products and services ● Strategic planning and implementation of country specific at this exclusive event? crisis plans ● Intellectual property protection in hostile environments: identifying We have a number of promotional packages available from high risk scenarios in order to safeguard your interests exclusive sponsorship through to exhibition stands and inserts in ● Relationships with the host nation: how can you reduce your risk by the documentation, with competitive prices to suit all budgets. creating strong relationships? ● Forecasting the future areas of concern: evaluating the risks and If you wish to be part of this high-level event, please contact: benefits of new locations Hassan Gani on or by Peter Lofgren, Regional Security Manager, calling + 44 (0) 20 7915 9615 Western Hemisphere, HALLIBURTON Paul Barker, Regional Security Advisor, EMEA, CHEVRON Grahame Bullock, Head of Security, NExEN INC reGISter ONLINe NOW! Brian Hogan, Director, Security Programs & Strategic Analysis Enterprise Security & Crisis Management, BAKER HUGHES 1:00 Lunch and networking gassec
  5. 5. Post-conference workshop Sponsor and Media partners Gold sponsor Homeland security – critical G4S Risk Management is the specialist protective concerns for energy assets security and consulting arm of G4S – one of the largest global networks of security operations worldwide. We have a long heritage of operating in Wednesday 24 February 2010 the Oil & Gas sector providing a range of services, from mine clearance to life support, to enable Oil & Gas companies and their suppliers to operate safely and securely in high risk environments. With secure facilities and an unrivalled depth of knowledge in Iraq and About the workshop: Afghanistan, and experience managing facilities and pipelines from Latin This essential half-day workshop offers in-depth analysis into America to Russia, G4S Risk Management is the leading provider of secure the latest homeland security programs and regulations and how support services worldwide. businesses can optimize their compliance and maximize safety Media Partners Workshop agenda: is the leading website covering the needs of over 09:00 Registration and refreshments 118,000 offshore oil and gas professionals every month. Featuring a mixture of 09:30 Isolating the regulations that apply to physical articles including the latest news, views, industry project updates and security and the actions necessary to comply trends, provides senior engineers, managers A thorough overview of the current CFATS program and and other leading technology decision makers with all that is required to clarification of the debate surrounding the future of the stay on top of this fast-paced industry. regulation. Discover what this will mean for your business and how you can ensure that you are compliant and able to benefit from the necessary investment. World Expro provides a clear overview Sue Armstrong, Acting Deputy Assistant Secretary, of the latest industry thinking DEPARTMENT OF HOMELAND SECURITY regarding the key stages of exploration and production. The publication boasts incisive commentary and 10:10 Round table discussion session: analysis from the world's most powerful business leaders alongside An opportunity to debate the issues with Sue Armstrong and investigative and provocative articles from leading journalists. your industry peers and to identify potential challenges and their solutions. Questions to be set by Sue Armstrong based on key CFATS, and wider DHS-related challenges Energy Business Review (EBR) is the fastest growing website within the energy industry. EBR 10:40 Update from the Coast Guard, uncovering provides a high level audience with a ‘one-stop- key developments shop’, where the latest opinion and forecasts of This session will look closely at the issue of seafarer access Datamonitor analysts are provided alongside the latest industry news. as well as the MTSA regulations and how they affect you and your operations. With close analysis of harmonization between MTSA and CFATS, enabling you to maximize the Growth Markets: Oil & Gas Agenda will provide positive impact of these guidelines. key decision makers in emerging growth Jim Bull, Chief of the Facility Branch of the OFFICE OF markets with unique analysis and data for VESSEL and Facility Security of the COAST GUARD'S Port the first time, with contributions from leading Security Directorate industry analysts, practitioners and thought leaders 11:20 To what extent is TWIC affecting the way you operate and what can be done better? is a platform An exclusive chance to discover how TWIC implementation is entirely dedicated for the defense and security progressing and what it means for you. Interactive discussion will enable you to share knowledge and experience with your manufacturers, suppliers, associations, peers and at the same time develop a deeper understanding publishers, dealers, solution & service providers, of the challenges and their potential solutions. event organizers among many others. It helps LT Devon Brennan, Cargo and Facilities Division, suppliers and manufacturers reach out globally to buyers and also in US COAST GUARD updating the defense community on various security events. 12:00 Round table discussion session: This session will offer clarification to the issues you need Worldoils Worldoils combines the power of answers to. The topics to be covered will be set by LT Devon Brennan and Jim Bull on key challenges pertaining the marketing as well as the in-house expertise for the Coast Guard. Oil, Gas, Offshore and the Maritime industries. Worldoils' web portal is a central platform for visitors who need 12:30 Refreshments and Networking information regarding oil and gas products and services, research, training, conferences, news and events as well as a popular 1:00 Keynote presentation: ascertaining key areas advertising base for providers of Oil, Gas, Marine and Offshore for investment and their role in the business services. ● Optimizing access control of physical and logical security in order to meet regulations and protect your business critical assets ● Managing intrusion: establishing policy and procedure ● Maximizing the effectiveness of your inventories and contents recording processes to ensure a comprehensive protection plan ● Establishing shipping and receiving procedure to comply with regulations We would be happy to organise a media partnership with you. Duane Jones, Corporate Security Manager, KINDER MORGAN For more details of how we can help please contact 1:30 Close of workshop Adrian Gray on +44 (0) 207 936 6678 or by email at
  6. 6. BOOKING FORM Global Asset Security: Oil and Gas Monday 22, Tuesday 23 and Wednesday 24 February 2010, Houston, Texas, USA Prices & Payment Information (please tick option) Four Easy Ways To Book: Yes, I would like to register for the event: book before book before book before book after ■ Register online at 30 November 28 December 25 January 25 January Oil and Gas Companies, Plant Operators, Oil and Gas Service Companies gassec I would like the VIP package to include the two day $2583 (VAT $2683 (VAT $2833 (VAT $3083 (VAT conference, workshop and CD-ROM (Saving $165) where applicable) where applicable) where applicable) where applicable) ■ Email us at I would to attend the two day conference and receive $2084 (VAT $2184 (VAT $2334 (VAT $2584 (VAT CD-ROM (Saving $65) where applicable) where applicable) where applicable) where applicable) ■ Tel +44 (0)20 7753 4268 I would to attend the two day conference and workshop $1998 $2098 $2248 $2498 (Saving $100) ■ Fax +44 (0)20 7915 9773 I would like to attend the two day conference $1499 $1599 $1749 $1999 Venue Details I would like to attend the conference workshop $599 $699 $849 $1099 The two day conference and one day workshop will take place on the 22-24 Security Solution Providers and Vendors January 2010. The venue for the three days will be a centrally located hotel in Houston, I would like to attend the two day conference $2499 $2599 $2749 $2999 Texas, USA. For further information contact our Operations department on I am interested in this event and would like to be contacted +44 (o) 207 753 4201. regarding how my firm can be involved with this conference Are you registered? all attendees You will always receive an acknowledgement of your booking. If you do not receive anything, I cannot attend the conference but would like to receive the $650 (VAT $650 (VAT $650 (VAT $850 (VAT please call us on +44 (0) 20 7753 4268 to make CD-ROM where applicable) where applicable) where applicable) where applicable) sure we have received your booking. Discount code if applicable _________________________________ All total fees are subject to a 2.5% Total service charge Discounts are at the discretion of Arena International and are not cumulative Arena International Conference Delegate terms and conditions 5 General: You, your executive/s or your agents may not transfer or assign any of the rights or obligations of this 1 Scope of Agreement: These are the conditions of the contract between you, the Client (“You” and “your”) and Agreement (in whole or part) without our prior consent. Any attempt to resell, assign or transfer rights without our Arena International Events Group (“Arena International Events Group”, “we”, “us” and “our”) governing your use of our consent will entitle us to cancel the contract without liability to you. services, including the conference registration as set out in your booking form. This agreement constitutes the entire • This agreement is governed by and will be construed in accordance with English law and each party irrevocably agreement between Arena International Events Group and you. All prior agreements understandings and negotiations agrees that the courts of England will have the non-exclusive jurisdiction to deal with any disputes arising out of or in and representations (save for fraudulent misrepresentation) whether oral or in writing are cancelled in their entirety. The connection with this agreement. terms of any other electronic communications will not form part of this agreement. • Grant of Licence: If your booking includes the CD-ROM, you warrant that you will only use the CD-ROM for 2 Our commitment to you: Should the Event be cancelled or the location be changed for reasons or circumstances your business purposes and shall not, without our prior written consent, make available, copy, reproduce, transmit, beyond our control, we reserve the right to reschedule the Event, including changing the location, upon written disseminate, sell, licence, distribute, publish, broadcast or otherwise circulate the CD-ROM (or any part of it) to any notice to you. Should the event fail to be rescheduled for any reason your refund shall not exceed the total charge other person other than in accordance with these terms and conditions. received by us from you. • Arena International Events Group is subject to the UK Data Protection Act 1998 and is registered in the UK with the 3 Payment Terms: The Total Fees specified on the booking form are subject to an additional service charge of 2.5% Information Commissioner to process your personal information. Our primary goal in collecting personal information (“Service Charge”) applied to cover administration costs, and are exclusive of VAT and any other applicable sales tax from you is to give you an enjoyable customised experience whilst allowing us to provide services and features that which shall be payable in addition. most likely meet your needs. We collect certain personal information from you, which you give to us when using our • Following completion and return of the booking form, full payment including Service Charge is required within Sites and/or registering or subscribing for our products and services. We also collect certain personal data from other five days from the invoice date or prior to the event if this is sooner. All registrants must provide a credit card number group companies to whom you have given information through their websites. If you do not want us to continue using as a guarantee at the time of booking. We reserve the right to charge your card in full if payment is not received in this information please notify us at Any personal information supplied to SPG accordance with these payment terms. We reserve the right to refuse admission if full payment is not received in Media Ltd as part of this registration process and/or any other interaction with SPG Media Ltd will be collected, stored accordance with these terms. and used by SPG Media Ltd its subsidiaries, related companies or affiliates in accordance with the SPG Media Ltd 4 Cancellations: In the event of cancellation, 100% of the event fee is payable and non-refundable. All cancellation Privacy Policy. Please email for a copy of the SPG Media Ltd Privacy Policy. requests must be submitted to us in writing. If we agree to your cancellation then all cancellation fees are payable • The working language of the Event is English. Executives requiring an interpretation service must make their own immediately after the acceptance of your cancellation in writing by us. arrangements at their own expense. Arena International Events Group, a trading division of SPG Media Ltd. Registered Office: John Carpenter House, John Carpenter Street, London, EC4Y 0AN, UK . Registered in England No. 01155599. Delegate Details please photocopy form for multiple bookings Mr/Mrs/Ms/Dr: First Name: Surname: Email: Tel: Job Title: Fax: Department: Company Details Company: Address: Town: Postcode: Country: VAT Number: Nature of Business: Payment Details Purchase Order No. ■ I enclose a cheque drawn on a UK bank (please make cheque payable to SPG Media Ltd and write reference WEAS0310 on the reverse) ■ I will transfer payment to your Lloyds TSB account City Branch, London, UK: 01492549, sort code 30-00-02 (using reference WEAS0310) ■ I would like to pay with my credit card ■ Visa ■ Mastercard ■ AMEX ■ Maestro ■ Solo Card Number: Expiry Date: Issue Date: CSV*: Cardholder's Name: Cardholder's Address: *The CSV number is the last 3 digit number on the reverse of the card ■ Yes, I have read and understood the terms and cancellations conditions and am happy to proceed with my registration MKAG Signature Date