IDC Cloud Security and Managed Services Conference Riyadh KSA
m2m for the Security Industry
1. M2M for
the Security
Industry
8th May to 9th May 2013,
London, United Kingdom
The Copthorne Tara Hotel,
London Kensington
KEY SPEAKERS INCLUDE:
• Vodafone M2M, Global Business Development • Arkessa Limited, CTO, Paul Green
Manager M2M, Peter Manolescue • Tew Plus, Director at CCTV Services UK,
• Concirrus Limited, CEO, Craig Hollingworth and Les Beverley
Founder and CEO, Andrew Yeoman • Jabbakam, Owner Director, James Walker
• Analysys Mason, Lead Analysys, Steve Hilton
• Stream Communications, Director,
• Cooper Security, Managing Director, Matthew
Nigel Chadwick
Phelps
• Transatel, CEO, Jacques Bonifay
• Skywave Mobile Communications, Director of
• Deutsche Telekom, Head of M2M Competence
Corporate Marketing, Jenn Markey
Center, Juergen Hase
• Sony Europe GmbH, General Manager Head of
Video Security Europe, Bruno Winnen • Telenor Connexion AB, CTO, Stephen Bryant
• ADT Fire and Security, Security Product • Three, Wholesale Sales Manager, Tom Gardner
Manager, Peter Stanton • Wireless Logic, Business Development Director
• Telenor Connexion AB, CTO, Stephen Bryant M2M & Enterprise Solutions, Jon Paul Clarke
POST CONFERENCE WORKSHOP 7TH MAY 2013
M2M and its impact on the Security Industry
In Association with Concirrus
8.30am - 5.00pm
SPONSORED BY
www.m2mforsecurity.com
Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
Book by 7th December and save £300 • Book by 18th January and save £200
2. DAY ONE 8th May 2013 www.m2mforsecurity.com
8.30 REGISTRATION & COFFEE 1.50 Satellite's Role in Critical Infrastructure Protection
• Monitor assets securely; anytime, anywhere
9.00 CHAIRMAN'S OPENING REMARKS • Efficient utilization and protection of high value assets
in sectors such as oil & gas and utilities
9.10 M2M for security: A key growth area on the verge of a • Security risks associated with unreliable (or no)
monumental shift monitoring of SCADA equipment
• Will the residential alarm industry survive the Smart • Case Study: Sample application of satellite M2M
Home onslaught? where security is paramount.
CASE STUDY
• Can national and local alarm receiving centres find Jenn Markey, Director of Corporate Marketing,
new business models in a globally connected always- Skywave Mobile Communications
on world?
• If DIY alarms get any simpler how can installers make 2.30 To realise pervasive video security with M2M
a living? technology, now and future
• Do cloud services offer a real opportunity or is it a • Latest technologies and customers’ pain
passing fad? • Center to Edge to store data, Analyse video
• Will 4G/LTE offer real advantages? Who will be the • Current use cases
winners and losers? • Sony’s solution
• Is Big Data a big opportunity for security? Bruno Winnen, General Manager Head of Video
Peter Manolescue, Global Business Development Security Europe, Sony Europe GmbH
Manager M2M, Vodafone M2M
3.10 AFTERNOON TEA
9.50 M2M and its impact on the Security Industry
• M2M is changing the landscape of Security solutions 3.40 Automated M2M connectivity
• Access and mobility control/Alarm management/Asset • IP CCTV and remote monitoring
Security/Vehicle Security /Surveillance /Safety and • Wireless communication systems (wireless alarm
Security of Employees signalling)
• Integrating M2M into enterprise Security systems • Resilience in alarm monitoring
• Micro and Macro disruption • M2M business benefits
• New tariffs and service structures Peter Stanton, Security Product Manager, ADT Fire
• Case Studies and Security
Craig Hollingworth, CEO, Concirrus Ltd
Andrew Yeoman, Founder and CEO, Concirrus Ltd 4.20 Turning security into a solution
• Turning Security into a solution (Case Study)
10.30 MORNING COFFEE • Reduce costs
• Additional revenue channels
11.00 The Future of M2M Security • More flexibility in their overall connectivity strategy
• What is the status and size of the market today? • Security challenges in mobile M2M implementations
• What are top areas of growth and potential for this Stephen Bryant, CTO, Telenor Connexion AB
industry segment?
• What are some examples of successful 3.40 Panel Discussion: The Battle for Smart Homes
implementations of security-related solutions • Alarm systems, video monitoring, and other features
worldwide? — can now be manipulated from a touchpad, mobile
• What barriers could prevent continued growth? device or computer
Steve Hilton, Lead Analysys, Analysys Mason • Who is best placed to facilitate a fully connected
home with video cameras and remote Web access?
11.40 M2M, meeting the demands of the Security industry Telco’s or Security firms?
• Intruder M2M: Open interfacing without proprietary • Are partnerships developing between security and
logical or physical connectors telco for Smart Homes? If they do partner, how will
• Can/should M2M interfacing be a plug and play this change the security response control centers?
capability? • What is the future of control centers? Will they
• M2M and the value intruder detection can bring to the becomem pure m2m rapid response?
wider Security industry • Can Security and Alarm industries survive? What do
Matthew Phelps, Managing Director, Cooper Security Ltd these new business models look like?
12.20 NETWORKING LUNCH 5.40 Chairman's Closing Remarks and Close of Day One
Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
3. DAY TWO 9th May 2013 www.m2mforsecurity.com
8.30 REGISTRATION & COFFEE 1.20 Telecom innovations for security service providers
• Enhance connectivity with High Coverage SIMs able to
9.00 CHAIRMAN'S OPENING REMARKS connect to any network available in one country
• Impact of High Coverage SIMs for lone workers,
emergency situations and operational deployment
9.10 "Security with Freedom"
• Aggregated MVNO models for Security Service
Making security systems work anywhere Providers in Europe : integrating operator margin while
• Wire-free communications optimised for the security delivering a full service (connection + device +
CASE STUDY
industry application)
• Rapid deployment and ease of use – painless CCTV • Enrich you M2M application with connectivity services :
• Multiple user access diagnostics, location-based services
• Multi-channel secure wireless communications using Jacques Bonifay CEO, T
, ransatel
multiple carriers for ultimate security
2.00 Fixed, Private & Public IP — Developing a viable
• Integrated monitoring and access control in remote
security solution
locations • Balancing the high costs of remote security
• Practical applications and delegate quiz • Handling large amount of data in small volumes
Paul Green, CTO, Arkessa Limited (wireless security applications)
• Solving problems working with partnerships
9.50 Design and delivery of rapid deployment M2M security • Communication links mobile phone based Data
systems networks
• Joining forces to create market leading solutions
• Understanding the importance of telecoms design
- Providing resilience, network connectivity issues when
• Integrating M2M Solutions from design phase
managing mission critical data
• Perimeter and asset protection - Considerations of Security when transmitting CCTV
• Designing and installation of critical communications, data
perimeter and asset protection - Management & support of remote connected devices
- challenges of protecting sterile zones, remote locations - Addressing the requirement of static IP in CCTV
and high security areas. Jon Paul Clarke, Business Development Director M2M &
- Behaviour monitoring and asset tracking Enterprise Solutions, Wireless Logic
• Case Studies
2.40 M2M-Enable Security Solutions
Les Beverley Director at CCTV Services UK, Tew Plus
,
• Deutsche Telekom's business opportunities beyond
connectivity
10.30 MORNING COFFEE • Security applications through integrated machine-to-
machine solutions
11.00 M2M Cloud for Security • M2M for Security: From connectivity and hardware to
Benefits of Cloud and emerging technologies solutions and services
• Your organisation’s assets; Protecting each and every • Developer community and reliable partner network to
create and support security solutions
one of those elements is a vital challenge
• Importance of reliable international network quality
• Property and equipment
Juergen Hase, Head of Deutsche Telekom's M2M
• Staff Competence Center, Deutsche Telekom
• Your brand itself
Benefits of Cloud and emerging technologies 3.20 Afternoon Tea
• Storage power of cloud computing
• User-friendly customer interface 3.50 Industry snap shot case study: Tackling metal theft
• Create, access and manage your own unique networks through prevention and deterrent
• The size and scale of the problem
of IP camera's
• How does industry and Government approach it
Ease of task for end users
together?
• Define what you want to see, when you want to see it, • Dealing a lasting blow to criminals
who can see it and what actions they should take • Industry and enforcement efforts so far
James Walker Owner Director, Jabbakam
, Tim Field, Head of Press and Public Affairs, Energy
Networks Association
11.40 Deploying Devices in the Security Sector
• Ensuring optimal network management and 4.30 Turning Security into a Solution
• Reduce costs
connectivity
• Additional revenue channels
• Network services deployed in the CCTV cameras at
• More flexibility in their overall connectivity strategy
Glastonbury • Security challenges in mobile M2M implementations
• 3G network services for image transmission and 3G Stephen Bryant, CTO, Telenor Connexion AB
CCTV
• UK in cash-in-transit and other security situations – 5.10 Managing the data hungry VAS needs of M2M Security
,
case study • Partnership models for successful service delivery
• Asset Management, remote monitoring – case study • Supporting mission critical, heavy data M2M
applications
• Tech Lab – advanced test facility for M2M devices-
• Ultrafast mobile networks and the opportunity for
latest research
M2M security
Nigel Chadwick, Director, Stream Communications Tom Gardner Wholesale Sales Manager, Hutchinson 3G
,
12.20 NETWORKING LUNCH 5.40 Chairman's Closing Remarks and Close of Day Two
44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
4. POST CONFERENCE WORKSHOP 7th May 2013, Copthorne Tara Hotel, London, United Kingdom
In Association with
M2M and its impact on the
Security Industry
8.30am – 5.00pm
Overview of workshop Programme
The security industry is being transformed by many factors 8.30 Registration & Coffee
– societal and economic changes mean that more and more 9.00 Chairman's Opening Remarks
security is required for traditional markets of property, cars,
9.10 The future landscape for security
and other assets but increasingly for non-traditional areas
Social, environmental, and economic changes – what will the
such as energy, food and general industry supply chain.
World look like in 2020?
Additionally the prevalence of new monitoring technology
means that it is easier than ever for customers to deploy 10.10 Where we are now and how the 'cloud' and M2M matters to
their own CCTV and other monitoring technologies creating Security Companies
a myriad of data. Finally combined with cloud-based 11.10 Morning Coffee
solutions this now means that small and large security
11.40 Micro- and Macro- disruptive technologies
providers have access to the same technology
• Access control
infrastructure. With this much change it is inevitable that
• Alarm management
there will be new winners and losers and attending this
• Asset Security
workshop will ensure that you are a winner.
• Energy & Food security
• Employee security
Why you should attend:
This workshop aims to explore what the future environment 12.40 Networking Lunch
looks like, you will learn how to identify and exploit new 1.40 Q&A on morning topics
opportunities in the market.
2.10 What do the new business models look like?
The participants will learn about new technologies entering • Industry case studies
the market, understand how to design and deploy an M2M • Data security
solution and how to assess the impact to the people • Managing continuity
working in their own business and that of their customers. • Managing the H2M (Human to Machine) impact
They will see first hand some of the latest technologies and 3.10 Afternoon Tea
learn from expert opinion how to avoid some of the common
3.40 Technology case studies
mistakes companies make using M2M
• NFC / IP-CCTV
4.40 Q&A and wrap up
5.00 Chairman's Closing Remarks and Close of Workshop
About the workshop hosts Charlie Curson is a principle at Mandarin LLP where he
Andrew Yeoman is the CEO of Concirrus Ltd. in specialises in helping companies design, develop and
London. He is responsible for the strategic direction of implement strong growth strategies. Charlie's
the business and oversees the day-to-day operations. background includes Accenture, Innocent and Audi
With more than 30-years experience in the technology where his keen insight and meticulous planning and
industry he has specialised for the last 15-years in attention to detail have been behind some of the most
understanding how to use technology to create, impressive brand success stories in recent years.
improve and disrupt business models. In addition to his
role at Concirrus, Andy is non-executive director for a number of Concirrus was formed with the belief that by connecting assets
companies in the technology and security industry. to the internet and making that information ubiquitously available
in the decision making process, customers can improve, create
Craig Hollingworth is the COO of Concirrus Ltd. He is and disrupt business models. This market is known as machine to
responsible for the market and business development machine (M2M) and it is estimated that by 2020 more than 100
of Concirrus. With an impressive track record in the billion devices will be connected to the 'internet of things'.
mobile and telematics industry, Craig has held senior Concirrus designs, builds and operates M2M solution for its
management and board positions for a number of customers as a one-stop-shop and is 'making M2M easy' for
companies including O2, Orange and Masternaut prior companies Worldwide. For more information please call 0207 969
to starting his own company. 2979 or check www.concirrus.com
New for 2013. SMi’s Event Communities
SMi Group is a global events business specialising in business to business conferences, workshops and
masterclasses. We successfully create and run 250 events every year across 6 sectors including
Defence and Security, Energy and Utilities, Finance and Pharmaceutical. We believe in bringing together
the most knowledgeable experts from across the globe in each sector to learn, engage, share and
network be it in London, Paris or Singapore.
To further enhance the SMi experience, we have launched our very own SMi Event Communities. These
will be exclusive, private and secure communities in which our clients will learn, share, engage and
network.
The SMi Event Communities will build and expand your experience beyond the conference, workshop or
Masterclass you attend. Not just another "social network”, SMi’s Event Communities have been
specifically designed around the needs of our delegates, speakers and sponsors, allowing all of our clients
to foster longer term relationships with all of the other attendees beyond the two day event for year
round engagement.
To take part all you need to do is register for this event. SMi Group Communities
Learn Engage Share Network
5. Sponsored by
Vodafone Increasing or updating the security of buildings and assets can often
be thought of as an increased cost and, for many businesses this is not an area
where it's easy to justify installing intricate and sometimes expensive alarm
systems. Using wireless technology, M2M enabled devices, cameras and alarms
can be constantly connected to the emergency services or private monitoring
stations. Vodafone Global M2M is a global supplier of M2M products and
connectivity with more than 20 years' experience. We have the largest mobile
telecommunications network in the world can provide a global SIM, with one
tariff, supported by a bespoke M2M Service level agreement build to suit your
business needs. http://m2m.vodafone.com/home/
SkyWave Mobile Communications is a global provider of wireless data
communications for the Machine-to-Machine (M2M) market. SkyWave's
products provide dependable communication, tracking, monitoring and remote
management of fixed and mobile assets. Over the past 15 years, SkyWave has
designed, manufactured and shipped more than 550,000 Inmarsat-based
satellite terminals to customers globally in the transportation, maritime, oil and
gas, utilities and government sectors. For more information, please visit
www.SkyWave.com
Supported by
For Sponsorship or Speaking
Opportunities please contact
Jamison Nesbitt
Business Development Director
P: +44 (0) 20 7827 6164
M: +44 (0) 7710 780 576
Email: jnesbitt@smi-online.co.uk
Don’t miss out on social
media networking!
Follow us on Twitter @UtilitiesSMi
and join us on Linkedin
http://uk.linkedin.com/in/smigroup
www.m2mforsecurity.com
6. M2M FOR SECURITY
Conference: 8th - 9th May 2013, Copthorne Tara Hotel, London Workshop: 7th May 2013
4 WAYS TO REGISTER
ONLINE at www.m2mforsecurity.com
FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor
PHONE on +44 (0) 870 9090 711 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS
□ Register by 7th December 2012 and receive £300
EARLY BIRD off the conference price
DISCOUNT □ Register by 18th January 2013 and receive £200
off the conference price
CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE
I would like to attend: (Please tick as appropriate) Fee Total
PUBLIC SECTOR, ACADEMICS & UTILITIES
Unique Reference Number □ Conference & Workshop £1498.00 + VAT £1797.60
□ Conference only £899.00 +VAT £1078.80
Our Reference LV U-015
□ Workshop only £599.00 + VAT £718.80
DELEGATE DETAILS COMMERCIAL ORGANISATIONS
Please complete fully and clearly in capital letters. Please photocopy for additional
□ Conference & Workshop £2198.00 +VAT £2637.60
delegates. □ Conference only £1599.00 +VAT £1918.80
Title: Forename: □ Workshop only £599.00 +VAT £718.80
Surname:
PROMOTIONAL LITERATURE DISTRIBUTION
Job Title: □ Distribution of your company’s promotional
literature to all conference attendees £999.00 + VAT £1198.80
Department/Division:
Company/Organisation: The conference fee includes refreshments, lunch, conference papers and access
to the Document Portal containing all of the presentations.
Email:
Address:
VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.
□ Please contact me to book my hotel
Town/City:
Alternatively call us on +44 (0) 870 9090 711,
Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
Direct Tel: Direct Fax:
Mobile: DOCUMENTATION (Shipped 10-14 days after the event)
Switchboard: I cannot attend but would like to purchase access to the following Document Portal/paper
copy documentation: Price Total
Signature: Date: □ Access to the conference documentation
I agree to be bound by SMi's Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80
ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00
(or only £300 if ordered with the Document Portal)
Title: Forename:
Surname: PAYMENT
Email: Payment must be made to SMi Group Ltd, and received before the event, by one of
the following methods quoting reference U-015 and the delegate’s name. Bookings
Address (if different from above):
made within 7 days of the event require payment on booking, methods of payment are
below. Please indicate method of payment:
Town/City: □ UK BACS Sort Code 300009, Account 00936418
□ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Post/Zip Code: Country: Swift (BIC): LOYDGB21013, Account 00936418
Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18
□ Cheque We can only accept Sterling cheques drawn on a UK bank.
□ Credit Card □ Visa □ MasterCard □ American Express
Terms and Conditions of Booking All credit card payments will be subject to standard credit card charges.
Payment: If payment is not made at the time of booking, then an invoice will be issued and
must be paid immediately and prior to the start of the event. If payment has not been received
Card No: □□□□ □□□□ □□□□ □□□□
then credit card details will be requested and payment taken before entry to the event.
Bookings within 7 days of event require payment on booking. Access to the Document Portal
will not be given until payment has been received.
Valid From □□/□□ Expiry Date □□/□□
Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates
CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card
may not ‘share’ a place at an event. Please make separate bookings for each delegate.
Cardholder’s Name:
Cancellation: If you wish to cancel your attendance at an event and you are unable to send
a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,
providing that cancellation is made in writing and received at least 28 days prior to the start Signature: Date:
of the event. Regretfully cancellation after this time cannot be accepted. We will however
provide the conferences documentation via the Document Portal to any delegate who has I agree to be bound by SMi's Terms and Conditions of Booking.
paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we
are not normally able to provide documentation in these circumstances. We cannot accept
Card Billing Address (If different from above):
cancellations of orders placed for Documentation or the Document Portal as these are
reproduced specifically to order If we have to cancel the event for any reason, then we will
.
make a full refund immediately but disclaim any further liability
, .
Alterations: It may become necessary for us to make alterations to the content, speakers,
timing, venue or date of the event compared to the advertised programme. VAT
Data Protection: The SMi Group gathers personal data in accordance with the UK Data
Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on
tell you about other products and services. Unless you tick here □ we may also share your
data with third parties offering complementary products or services. If you have any queries Document Portal and Literature Distribution for all UK customers and for those EU
or want to update any of the data that we hold then please contact our Database Manager customers not supplying a registration number for their own country here:
databasemanager@smi-online.co.uk or visit our website www .smi-online.co.uk/updates quoting
the URN as detailed above your address on the attached letter .
________________________________________________________________________________________________
If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk