SlideShare a Scribd company logo
1 of 6
Download to read offline
M2M for
                                                        the Security
                                                            Industry
                                                                       8th May to 9th May 2013,
                                                                        London, United Kingdom
                                                                       The Copthorne Tara Hotel,
                                                                             London Kensington



      KEY SPEAKERS INCLUDE:
     • Vodafone M2M, Global Business Development        • Arkessa Limited, CTO, Paul Green
       Manager M2M, Peter Manolescue                    • Tew Plus, Director at CCTV Services UK,
     • Concirrus Limited, CEO, Craig Hollingworth and    Les Beverley
       Founder and CEO, Andrew Yeoman                   • Jabbakam, Owner Director, James Walker
     • Analysys Mason, Lead Analysys, Steve Hilton
                                                        • Stream Communications, Director,
     • Cooper Security, Managing Director, Matthew
                                                         Nigel Chadwick
       Phelps
                                                        • Transatel, CEO, Jacques Bonifay
     • Skywave Mobile Communications, Director of
                                                        • Deutsche Telekom, Head of M2M Competence
       Corporate Marketing, Jenn Markey
                                                         Center, Juergen Hase
     • Sony Europe GmbH, General Manager Head of
       Video Security Europe, Bruno Winnen              • Telenor Connexion AB, CTO, Stephen Bryant

     • ADT Fire and Security, Security Product          • Three, Wholesale Sales Manager, Tom Gardner

       Manager, Peter Stanton                           • Wireless Logic, Business Development Director
     • Telenor Connexion AB, CTO, Stephen Bryant         M2M & Enterprise Solutions, Jon Paul Clarke




                       POST CONFERENCE WORKSHOP 7TH MAY 2013

                  M2M and its impact on the Security Industry
                                       In Association with Concirrus
                                             8.30am - 5.00pm


                                                 SPONSORED BY




                       www.m2mforsecurity.com
        Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711

    Book by 7th December and save £300 • Book by 18th January and save £200
DAY ONE 8th May 2013                                                                         www.m2mforsecurity.com


8.30          REGISTRATION & COFFEE                                     1.50   Satellite's Role in Critical Infrastructure Protection
                                                                               • Monitor assets securely; anytime, anywhere
9.00          CHAIRMAN'S OPENING REMARKS                                       • Efficient utilization and protection of high value assets
                                                                                 in sectors such as oil & gas and utilities
9.10          M2M for security: A key growth area on the verge of a            • Security risks associated with unreliable (or no)
              monumental shift                                                   monitoring of SCADA equipment
              • Will the residential alarm industry survive the Smart          • Case Study: Sample application of satellite M2M
               Home onslaught?                                                   where security is paramount.
 CASE STUDY




              • Can national and local alarm receiving centres find            Jenn Markey, Director of Corporate Marketing,
               new business models in a globally connected always-             Skywave Mobile Communications
               on world?
              • If DIY alarms get any simpler how can installers make   2.30   To realise pervasive video security with M2M
               a living?                                                       technology, now and future
              • Do cloud services offer a real opportunity or is it a          • Latest technologies and customers’ pain
               passing fad?                                                    • Center to Edge to store data, Analyse video
              • Will 4G/LTE offer real advantages? Who will be the             • Current use cases
               winners and losers?                                             • Sony’s solution
              • Is Big Data a big opportunity for security?                    Bruno Winnen, General Manager Head of Video
              Peter Manolescue, Global Business Development                    Security Europe, Sony Europe GmbH
              Manager M2M, Vodafone M2M
                                                                        3.10   AFTERNOON TEA
9.50          M2M and its impact on the Security Industry
              • M2M is changing the landscape of Security solutions     3.40   Automated M2M connectivity
              • Access and mobility control/Alarm management/Asset             • IP CCTV and remote monitoring
               Security/Vehicle Security /Surveillance /Safety and             • Wireless communication systems (wireless alarm
               Security of Employees                                           signalling)
              • Integrating M2M into enterprise Security systems               • Resilience in alarm monitoring
              • Micro and Macro disruption                                     • M2M business benefits
              • New tariffs and service structures                             Peter Stanton, Security Product Manager, ADT Fire
              • Case Studies                                                   and Security
              Craig Hollingworth, CEO, Concirrus Ltd
              Andrew Yeoman, Founder and CEO, Concirrus Ltd             4.20   Turning security into a solution
                                                                               • Turning Security into a solution (Case Study)
10.30 MORNING COFFEE                                                           • Reduce costs
                                                                               • Additional revenue channels
11.00 The Future of M2M Security                                               • More flexibility in their overall connectivity strategy
              • What is the status and size of the market today?               • Security challenges in mobile M2M implementations
              • What are top areas of growth and potential for this            Stephen Bryant, CTO, Telenor Connexion AB
               industry segment?
              • What are some examples of successful                    3.40   Panel Discussion: The Battle for Smart Homes
               implementations of security-related solutions                   • Alarm systems, video monitoring, and other features
               worldwide?                                                        — can now be manipulated from a touchpad, mobile
              • What barriers could prevent continued growth?                    device or computer
              Steve Hilton, Lead Analysys, Analysys Mason                      • Who is best placed to facilitate a fully connected
                                                                                 home with video cameras and remote Web access?
11.40 M2M, meeting the demands of the Security industry                          Telco’s or Security firms?
              • Intruder M2M: Open interfacing without proprietary             • Are partnerships developing between security and
               logical or physical connectors                                    telco for Smart Homes? If they do partner, how will
              • Can/should M2M interfacing be a plug and play                    this change the security response control centers?
               capability?                                                     • What is the future of control centers? Will they
              • M2M and the value intruder detection can bring to the            becomem pure m2m rapid response?
               wider Security industry                                         • Can Security and Alarm industries survive? What do
              Matthew Phelps, Managing Director, Cooper Security Ltd             these new business models look like?


12.20 NETWORKING LUNCH                                                  5.40   Chairman's Closing Remarks and Close of Day One



                  Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
DAY TWO 9th May 2013                                                                        www.m2mforsecurity.com


     8.30         REGISTRATION & COFFEE                                        1.20   Telecom innovations for security service providers
                                                                                      • Enhance connectivity with High Coverage SIMs able to
     9.00         CHAIRMAN'S OPENING REMARKS                                            connect to any network available in one country
                                                                                      • Impact of High Coverage SIMs for lone workers,
                                                                                        emergency situations and operational deployment
     9.10         "Security with Freedom"
                                                                                      • Aggregated MVNO models for Security Service
                  Making security systems work anywhere                                 Providers in Europe : integrating operator margin while
                  • Wire-free communications optimised for the security                 delivering a full service (connection + device +
     CASE STUDY




                    industry                                                            application)
                  • Rapid deployment and ease of use – painless CCTV                  • Enrich you M2M application with connectivity services :
                  • Multiple user access                                                diagnostics, location-based services
                  • Multi-channel secure wireless communications using                Jacques Bonifay CEO, T
                                                                                                         ,        ransatel
                    multiple carriers for ultimate security
                                                                               2.00   Fixed, Private & Public IP — Developing a viable
                  • Integrated monitoring and access control in remote
                                                                                      security solution
                    locations                                                         • Balancing the high costs of remote security
                  • Practical applications and delegate quiz                          • Handling large amount of data in small volumes
                  Paul Green, CTO, Arkessa Limited                                      (wireless security applications)
                                                                                      • Solving problems working with partnerships
     9.50         Design and delivery of rapid deployment M2M security                • Communication links mobile phone based Data
                  systems                                                               networks
                                                                                      • Joining forces to create market leading solutions
                  • Understanding the importance of telecoms design
                                                                                        - Providing resilience, network connectivity issues when
                  • Integrating M2M Solutions from design phase
                                                                                          managing mission critical data
                  • Perimeter and asset protection                                      - Considerations of Security when transmitting CCTV
                  • Designing and installation of critical communications,                data
                    perimeter and asset protection                                      - Management & support of remote connected devices
                  - challenges of protecting sterile zones, remote locations            - Addressing the requirement of static IP in CCTV
                    and high security areas.                                          Jon Paul Clarke, Business Development Director M2M &
                  - Behaviour monitoring and asset tracking                           Enterprise Solutions, Wireless Logic
                  • Case Studies
                                                                               2.40   M2M-Enable Security Solutions
                  Les Beverley Director at CCTV Services UK, Tew Plus
                                ,
                                                                                      • Deutsche Telekom's business opportunities beyond
                                                                                        connectivity
     10.30 MORNING COFFEE                                                             • Security applications through integrated machine-to-
                                                                                        machine solutions
     11.00 M2M Cloud for Security                                                     • M2M for Security: From connectivity and hardware to
           Benefits of Cloud and emerging technologies                                  solutions and services
           • Your organisation’s assets; Protecting each and every                    • Developer community and reliable partner network to
                                                                                        create and support security solutions
             one of those elements is a vital challenge
                                                                                      • Importance of reliable international network quality
           • Property and equipment
                                                                                      Juergen Hase, Head of Deutsche Telekom's M2M
           • Staff                                                                    Competence Center, Deutsche Telekom
           • Your brand itself
           Benefits of Cloud and emerging technologies                         3.20   Afternoon Tea
           • Storage power of cloud computing
           • User-friendly customer interface                                  3.50   Industry snap shot case study: Tackling metal theft
           • Create, access and manage your own unique networks                       through prevention and deterrent
                                                                                      • The size and scale of the problem
             of IP camera's
                                                                                      • How does industry and Government approach it
           Ease of task for end users
                                                                                        together?
           • Define what you want to see, when you want to see it,                    • Dealing a lasting blow to criminals
             who can see it and what actions they should take                         • Industry and enforcement efforts so far
           James Walker Owner Director, Jabbakam
                         ,                                                            Tim Field, Head of Press and Public Affairs, Energy
                                                                                      Networks Association
     11.40 Deploying Devices in the Security Sector
           • Ensuring optimal network management and                           4.30   Turning Security into a Solution
                                                                                      • Reduce costs
             connectivity
                                                                                      • Additional revenue channels
           • Network services deployed in the CCTV cameras at
                                                                                      • More flexibility in their overall connectivity strategy
             Glastonbury                                                              • Security challenges in mobile M2M implementations
           • 3G network services for image transmission and 3G                        Stephen Bryant, CTO, Telenor Connexion AB
             CCTV
           • UK in cash-in-transit and other security situations –             5.10   Managing the data hungry VAS needs of M2M Security
                                                                                                                 ,
             case study                                                               • Partnership models for successful service delivery
           • Asset Management, remote monitoring – case study                         • Supporting mission critical, heavy data M2M
                                                                                        applications
           • Tech Lab – advanced test facility for M2M devices-
                                                                                      • Ultrafast mobile networks and the opportunity for
             latest research
                                                                                        M2M security
           Nigel Chadwick, Director, Stream Communications                            Tom Gardner Wholesale Sales Manager, Hutchinson 3G
                                                                                                   ,

     12.20 NETWORKING LUNCH                                                    5.40   Chairman's Closing Remarks and Close of Day Two



44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
POST CONFERENCE WORKSHOP                          7th May 2013, Copthorne Tara Hotel, London, United Kingdom


                                                                                                          In Association with

M2M and its impact on the
Security Industry
8.30am – 5.00pm

Overview of workshop                                                 Programme

The security industry is being transformed by many factors           8.30   Registration & Coffee
– societal and economic changes mean that more and more              9.00   Chairman's Opening Remarks
security is required for traditional markets of property, cars,
                                                                     9.10   The future landscape for security
and other assets but increasingly for non-traditional areas
                                                                            Social, environmental, and economic changes – what will the
such as energy, food and general industry supply chain.
                                                                            World look like in 2020?
Additionally the prevalence of new monitoring technology
means that it is easier than ever for customers to deploy            10.10 Where we are now and how the 'cloud' and M2M matters to
their own CCTV and other monitoring technologies creating                  Security Companies
a myriad of data. Finally combined with cloud-based                  11.10 Morning Coffee
solutions this now means that small and large security
                                                                     11.40 Micro- and Macro- disruptive technologies
providers have access to the same technology
                                                                           • Access control
infrastructure. With this much change it is inevitable that
                                                                           • Alarm management
there will be new winners and losers and attending this
                                                                           • Asset Security
workshop will ensure that you are a winner.
                                                                           • Energy & Food security
                                                                           • Employee security
Why you should attend:
This workshop aims to explore what the future environment            12.40 Networking Lunch
looks like, you will learn how to identify and exploit new           1.40   Q&A on morning topics
opportunities in the market.
                                                                     2.10   What do the new business models look like?
The participants will learn about new technologies entering                 • Industry case studies
the market, understand how to design and deploy an M2M                      • Data security
solution and how to assess the impact to the people                         • Managing continuity
working in their own business and that of their customers.                  • Managing the H2M (Human to Machine) impact
They will see first hand some of the latest technologies and         3.10   Afternoon Tea
learn from expert opinion how to avoid some of the common
                                                                     3.40   Technology case studies
mistakes companies make using M2M
                                                                            • NFC / IP-CCTV
                                                                     4.40   Q&A and wrap up
                                                                     5.00   Chairman's Closing Remarks and Close of Workshop


About the workshop hosts                                                       Charlie Curson is a principle at Mandarin LLP where he
          Andrew Yeoman is the CEO of Concirrus Ltd. in                        specialises in helping companies design, develop and
          London. He is responsible for the strategic direction of             implement     strong    growth    strategies.  Charlie's
          the business and oversees the day-to-day operations.                 background includes Accenture, Innocent and Audi
          With more than 30-years experience in the technology                 where his keen insight and meticulous planning and
          industry he has specialised for the last 15-years in                 attention to detail have been behind some of the most
          understanding how to use technology to create,                       impressive brand success stories in recent years.
          improve and disrupt business models. In addition to his
role at Concirrus, Andy is non-executive director for a number of      Concirrus was formed with the belief that by connecting assets
companies in the technology and security industry.                     to the internet and making that information ubiquitously available
                                                                       in the decision making process, customers can improve, create
          Craig Hollingworth is the COO of Concirrus Ltd. He is        and disrupt business models. This market is known as machine to
          responsible for the market and business development          machine (M2M) and it is estimated that by 2020 more than 100
          of Concirrus. With an impressive track record in the         billion devices will be connected to the 'internet of things'.
          mobile and telematics industry, Craig has held senior        Concirrus designs, builds and operates M2M solution for its
          management and board positions for a number of               customers as a one-stop-shop and is 'making M2M easy' for
          companies including O2, Orange and Masternaut prior          companies Worldwide. For more information please call 0207 969
          to starting his own company.                                 2979 or check www.concirrus.com




       New for 2013. SMi’s Event Communities
                        SMi Group is a global events business specialising in business to business conferences, workshops and
                        masterclasses. We successfully create and run 250 events every year across 6 sectors including
                        Defence and Security, Energy and Utilities, Finance and Pharmaceutical. We believe in bringing together
                        the most knowledgeable experts from across the globe in each sector to learn, engage, share and
                        network be it in London, Paris or Singapore.

                        To further enhance the SMi experience, we have launched our very own SMi Event Communities. These
                        will be exclusive, private and secure communities in which our clients will learn, share, engage and
                        network.

                        The SMi Event Communities will build and expand your experience beyond the conference, workshop or
                        Masterclass you attend. Not just another "social network”, SMi’s Event Communities have been
                        specifically designed around the needs of our delegates, speakers and sponsors, allowing all of our clients
                        to foster longer term relationships with all of the other attendees beyond the two day event for year
                        round engagement.

                        To take part all you need to do is register for this event. SMi Group Communities
                        Learn Engage Share Network
Sponsored by

      Vodafone Increasing or updating the security of buildings and assets can often
      be thought of as an increased cost and, for many businesses this is not an area
      where it's easy to justify installing intricate and sometimes expensive alarm
      systems. Using wireless technology, M2M enabled devices, cameras and alarms
      can be constantly connected to the emergency services or private monitoring
      stations. Vodafone Global M2M is a global supplier of M2M products and
      connectivity with more than 20 years' experience. We have the largest mobile
      telecommunications network in the world can provide a global SIM, with one
      tariff, supported by a bespoke M2M Service level agreement build to suit your
      business needs. http://m2m.vodafone.com/home/

      SkyWave Mobile Communications is a global provider of wireless data
      communications for the Machine-to-Machine (M2M) market. SkyWave's
      products provide dependable communication, tracking, monitoring and remote
      management of fixed and mobile assets. Over the past 15 years, SkyWave has
      designed, manufactured and shipped more than 550,000 Inmarsat-based
      satellite terminals to customers globally in the transportation, maritime, oil and
      gas, utilities and government sectors. For more information, please visit
      www.SkyWave.com




Supported by



                                                   For Sponsorship or Speaking
                                                   Opportunities please contact
                                                   Jamison Nesbitt
                                                   Business Development Director
                                                   P: +44 (0) 20 7827 6164
                                                   M: +44 (0) 7710 780 576
                                                   Email: jnesbitt@smi-online.co.uk




                                                   Don’t miss out on social
                                                   media networking!
                                                   Follow us on Twitter @UtilitiesSMi
                                                   and join us on Linkedin
                                                   http://uk.linkedin.com/in/smigroup




www.m2mforsecurity.com
M2M FOR SECURITY
                           Conference: 8th - 9th May 2013, Copthorne Tara Hotel, London                                                        Workshop: 7th May 2013
                                                                              4 WAYS TO REGISTER
                                  ONLINE at www.m2mforsecurity.com
FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor
PHONE on +44 (0) 870 9090 711                 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS


                                                                                                                       □      Register by 7th December 2012 and receive £300
                                                                                                  EARLY BIRD                  off the conference price
                                                                                                   DISCOUNT            □      Register by 18th January 2013 and receive £200
                                                                                                                              off the conference price


                                                                                                   CONFERENCE PRICES                                                  GROUP DISCOUNTS AVAILABLE

                                                                                                  I would like to attend: (Please tick as appropriate)                      Fee                       Total

                                                                                                  PUBLIC SECTOR, ACADEMICS & UTILITIES
Unique Reference Number                                                                           □ Conference & Workshop                                                   £1498.00       + VAT      £1797.60
                                                                                                  □     Conference only                                                     £899.00        +VAT       £1078.80
Our Reference                               LV U-015
                                                                                                  □     Workshop only                                                       £599.00        + VAT      £718.80

DELEGATE DETAILS                                                                                  COMMERCIAL ORGANISATIONS
Please complete fully and clearly in capital letters. Please photocopy for additional
                                                                                                  □ Conference & Workshop                                                   £2198.00       +VAT       £2637.60
delegates.                                                                                        □     Conference only                                                     £1599.00       +VAT       £1918.80
Title:                  Forename:                                                                 □     Workshop only                                                       £599.00        +VAT       £718.80

Surname:
                                                                                                  PROMOTIONAL LITERATURE DISTRIBUTION
Job Title:                                                                                        □ Distribution of your company’s promotional
                                                                                                    literature to all conference attendees                                  £999.00        + VAT      £1198.80
Department/Division:
Company/Organisation:                                                                             The conference fee includes refreshments, lunch, conference papers and access
                                                                                                  to the Document Portal containing all of the presentations.
Email:
Address:
                                                                                                   VENUE              Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.

                                                                                                  □ Please contact me to book my hotel
Town/City:
                                                                                                  Alternatively call us on +44 (0) 870 9090 711,
Post/Zip Code:                                  Country:                                          email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
Direct Tel:                                     Direct Fax:
Mobile:                                                                                            DOCUMENTATION                                                  (Shipped 10-14 days after the event)

Switchboard:                                                                                      I cannot attend but would like to purchase access to the following Document Portal/paper
                                                                                                  copy documentation:                                     Price               Total
Signature:                                                       Date:                            □ Access to the conference documentation
I agree to be bound by SMi's Terms and Conditions of Booking.                                         on the Document Portal                              £499.00     + VAT   £598.80

ACCOUNTS DEPT                                                                                     □ The Conference Presentations - paper copy                               £499.00        -          £499.00
                                                                                                        (or only £300 if ordered with the Document Portal)
Title:                  Forename:
Surname:                                                                                           PAYMENT
Email:                                                                                            Payment must be made to SMi Group Ltd, and received before the event, by one of
                                                                                                  the following methods quoting reference U-015 and the delegate’s name. Bookings
Address (if different from above):
                                                                                                  made within 7 days of the event require payment on booking, methods of payment are
                                                                                                  below. Please indicate method of payment:

Town/City:                                                                                        □ UK BACS                    Sort Code 300009, Account 00936418
                                                                                                  □ Wire Transfer              Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Post/Zip Code:                                  Country:                                                                       Swift (BIC): LOYDGB21013, Account 00936418
Direct Tel:                                     Direct Fax:                                                                    IBAN GB48 LOYD 3000 0900 9364 18
                                                                                                  □ Cheque                     We can only accept Sterling cheques drawn on a UK bank.
                                                                                                  □ Credit Card                □ Visa      □ MasterCard           □ American Express
Terms and Conditions of Booking                                                                        All credit card payments will be subject to standard credit card charges.

Payment: If payment is not made at the time of booking, then an invoice will be issued and
must be paid immediately and prior to the start of the event. If payment has not been received
                                                                                                  Card No:  □□□□ □□□□ □□□□ □□□□
then credit card details will be requested and payment taken before entry to the event.
Bookings within 7 days of event require payment on booking. Access to the Document Portal
will not be given until payment has been received.
                                                                                                  Valid From □□/□□ Expiry Date □□/□□

Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates
                                                                                                  CVV Number □□□□                             3 digit security on reverse of card, 4 digits for AMEX card
may not ‘share’ a place at an event. Please make separate bookings for each delegate.
                                                                                                  Cardholder’s Name:
Cancellation: If you wish to cancel your attendance at an event and you are unable to send
a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,
providing that cancellation is made in writing and received at least 28 days prior to the start   Signature:                                                              Date:
of the event. Regretfully cancellation after this time cannot be accepted. We will however
provide the conferences documentation via the Document Portal to any delegate who has             I agree to be bound by SMi's Terms and Conditions of Booking.
paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we
are not normally able to provide documentation in these circumstances. We cannot accept
                                                                                                  Card Billing Address (If different from above):
cancellations of orders placed for Documentation or the Document Portal as these are
reproduced specifically to order If we have to cancel the event for any reason, then we will
                                  .
make a full refund immediately but disclaim any further liability
                                ,                                .

Alterations: It may become necessary for us to make alterations to the content, speakers,
timing, venue or date of the event compared to the advertised programme.                           VAT
Data Protection: The SMi Group gathers personal data in accordance with the UK Data
Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to        VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on
tell you about other products and services. Unless you tick here □ we may also share your
data with third parties offering complementary products or services. If you have any queries      Document Portal and Literature Distribution for all UK customers and for those EU
or want to update any of the data that we hold then please contact our Database Manager           customers not supplying a registration number for their own country here:
databasemanager@smi-online.co.uk or visit our website www  .smi-online.co.uk/updates quoting
the URN as detailed above your address on the attached letter  .
                                                                                                  ________________________________________________________________________________________________


 If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk

More Related Content

Similar to m2m for the Security Industry

SMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas IndustrySMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas IndustryDale Butler
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...Dale Butler
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada securityYulia Rotar
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructureStuart Bennett
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...Stuart Bennett
 
Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)Telefónica IoT
 
Oil & gas telecommunications
Oil & gas telecommunicationsOil & gas telecommunications
Oil & gas telecommunicationsDale Butler
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Dale Butler
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)3G4G
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceDale Butler
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Dale Butler
 
M2M World 2011 Brochure
M2M World 2011 BrochureM2M World 2011 Brochure
M2M World 2011 BrochureRebecca Mantle
 
[M2M For Real] Hans Dahlberg - TeliaSonera
[M2M For Real] Hans Dahlberg - TeliaSonera[M2M For Real] Hans Dahlberg - TeliaSonera
[M2M For Real] Hans Dahlberg - TeliaSoneraMobilbusiness
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 

Similar to m2m for the Security Industry (20)

SMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas IndustrySMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas Industry
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
 
Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)
 
Oil & gas telecommunications
Oil & gas telecommunicationsOil & gas telecommunications
Oil & gas telecommunications
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013
 
M2M World 2011 Brochure
M2M World 2011 BrochureM2M World 2011 Brochure
M2M World 2011 Brochure
 
[M2M For Real] Hans Dahlberg - TeliaSonera
[M2M For Real] Hans Dahlberg - TeliaSonera[M2M For Real] Hans Dahlberg - TeliaSonera
[M2M For Real] Hans Dahlberg - TeliaSonera
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 

m2m for the Security Industry

  • 1. M2M for the Security Industry 8th May to 9th May 2013, London, United Kingdom The Copthorne Tara Hotel, London Kensington KEY SPEAKERS INCLUDE: • Vodafone M2M, Global Business Development • Arkessa Limited, CTO, Paul Green Manager M2M, Peter Manolescue • Tew Plus, Director at CCTV Services UK, • Concirrus Limited, CEO, Craig Hollingworth and Les Beverley Founder and CEO, Andrew Yeoman • Jabbakam, Owner Director, James Walker • Analysys Mason, Lead Analysys, Steve Hilton • Stream Communications, Director, • Cooper Security, Managing Director, Matthew Nigel Chadwick Phelps • Transatel, CEO, Jacques Bonifay • Skywave Mobile Communications, Director of • Deutsche Telekom, Head of M2M Competence Corporate Marketing, Jenn Markey Center, Juergen Hase • Sony Europe GmbH, General Manager Head of Video Security Europe, Bruno Winnen • Telenor Connexion AB, CTO, Stephen Bryant • ADT Fire and Security, Security Product • Three, Wholesale Sales Manager, Tom Gardner Manager, Peter Stanton • Wireless Logic, Business Development Director • Telenor Connexion AB, CTO, Stephen Bryant M2M & Enterprise Solutions, Jon Paul Clarke POST CONFERENCE WORKSHOP 7TH MAY 2013 M2M and its impact on the Security Industry In Association with Concirrus 8.30am - 5.00pm SPONSORED BY www.m2mforsecurity.com Register online and receive full information on all of SMi’s conferences Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 Book by 7th December and save £300 • Book by 18th January and save £200
  • 2. DAY ONE 8th May 2013 www.m2mforsecurity.com 8.30 REGISTRATION & COFFEE 1.50 Satellite's Role in Critical Infrastructure Protection • Monitor assets securely; anytime, anywhere 9.00 CHAIRMAN'S OPENING REMARKS • Efficient utilization and protection of high value assets in sectors such as oil & gas and utilities 9.10 M2M for security: A key growth area on the verge of a • Security risks associated with unreliable (or no) monumental shift monitoring of SCADA equipment • Will the residential alarm industry survive the Smart • Case Study: Sample application of satellite M2M Home onslaught? where security is paramount. CASE STUDY • Can national and local alarm receiving centres find Jenn Markey, Director of Corporate Marketing, new business models in a globally connected always- Skywave Mobile Communications on world? • If DIY alarms get any simpler how can installers make 2.30 To realise pervasive video security with M2M a living? technology, now and future • Do cloud services offer a real opportunity or is it a • Latest technologies and customers’ pain passing fad? • Center to Edge to store data, Analyse video • Will 4G/LTE offer real advantages? Who will be the • Current use cases winners and losers? • Sony’s solution • Is Big Data a big opportunity for security? Bruno Winnen, General Manager Head of Video Peter Manolescue, Global Business Development Security Europe, Sony Europe GmbH Manager M2M, Vodafone M2M 3.10 AFTERNOON TEA 9.50 M2M and its impact on the Security Industry • M2M is changing the landscape of Security solutions 3.40 Automated M2M connectivity • Access and mobility control/Alarm management/Asset • IP CCTV and remote monitoring Security/Vehicle Security /Surveillance /Safety and • Wireless communication systems (wireless alarm Security of Employees signalling) • Integrating M2M into enterprise Security systems • Resilience in alarm monitoring • Micro and Macro disruption • M2M business benefits • New tariffs and service structures Peter Stanton, Security Product Manager, ADT Fire • Case Studies and Security Craig Hollingworth, CEO, Concirrus Ltd Andrew Yeoman, Founder and CEO, Concirrus Ltd 4.20 Turning security into a solution • Turning Security into a solution (Case Study) 10.30 MORNING COFFEE • Reduce costs • Additional revenue channels 11.00 The Future of M2M Security • More flexibility in their overall connectivity strategy • What is the status and size of the market today? • Security challenges in mobile M2M implementations • What are top areas of growth and potential for this Stephen Bryant, CTO, Telenor Connexion AB industry segment? • What are some examples of successful 3.40 Panel Discussion: The Battle for Smart Homes implementations of security-related solutions • Alarm systems, video monitoring, and other features worldwide? — can now be manipulated from a touchpad, mobile • What barriers could prevent continued growth? device or computer Steve Hilton, Lead Analysys, Analysys Mason • Who is best placed to facilitate a fully connected home with video cameras and remote Web access? 11.40 M2M, meeting the demands of the Security industry Telco’s or Security firms? • Intruder M2M: Open interfacing without proprietary • Are partnerships developing between security and logical or physical connectors telco for Smart Homes? If they do partner, how will • Can/should M2M interfacing be a plug and play this change the security response control centers? capability? • What is the future of control centers? Will they • M2M and the value intruder detection can bring to the becomem pure m2m rapid response? wider Security industry • Can Security and Alarm industries survive? What do Matthew Phelps, Managing Director, Cooper Security Ltd these new business models look like? 12.20 NETWORKING LUNCH 5.40 Chairman's Closing Remarks and Close of Day One Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
  • 3. DAY TWO 9th May 2013 www.m2mforsecurity.com 8.30 REGISTRATION & COFFEE 1.20 Telecom innovations for security service providers • Enhance connectivity with High Coverage SIMs able to 9.00 CHAIRMAN'S OPENING REMARKS connect to any network available in one country • Impact of High Coverage SIMs for lone workers, emergency situations and operational deployment 9.10 "Security with Freedom" • Aggregated MVNO models for Security Service Making security systems work anywhere Providers in Europe : integrating operator margin while • Wire-free communications optimised for the security delivering a full service (connection + device + CASE STUDY industry application) • Rapid deployment and ease of use – painless CCTV • Enrich you M2M application with connectivity services : • Multiple user access diagnostics, location-based services • Multi-channel secure wireless communications using Jacques Bonifay CEO, T , ransatel multiple carriers for ultimate security 2.00 Fixed, Private & Public IP — Developing a viable • Integrated monitoring and access control in remote security solution locations • Balancing the high costs of remote security • Practical applications and delegate quiz • Handling large amount of data in small volumes Paul Green, CTO, Arkessa Limited (wireless security applications) • Solving problems working with partnerships 9.50 Design and delivery of rapid deployment M2M security • Communication links mobile phone based Data systems networks • Joining forces to create market leading solutions • Understanding the importance of telecoms design - Providing resilience, network connectivity issues when • Integrating M2M Solutions from design phase managing mission critical data • Perimeter and asset protection - Considerations of Security when transmitting CCTV • Designing and installation of critical communications, data perimeter and asset protection - Management & support of remote connected devices - challenges of protecting sterile zones, remote locations - Addressing the requirement of static IP in CCTV and high security areas. Jon Paul Clarke, Business Development Director M2M & - Behaviour monitoring and asset tracking Enterprise Solutions, Wireless Logic • Case Studies 2.40 M2M-Enable Security Solutions Les Beverley Director at CCTV Services UK, Tew Plus , • Deutsche Telekom's business opportunities beyond connectivity 10.30 MORNING COFFEE • Security applications through integrated machine-to- machine solutions 11.00 M2M Cloud for Security • M2M for Security: From connectivity and hardware to Benefits of Cloud and emerging technologies solutions and services • Your organisation’s assets; Protecting each and every • Developer community and reliable partner network to create and support security solutions one of those elements is a vital challenge • Importance of reliable international network quality • Property and equipment Juergen Hase, Head of Deutsche Telekom's M2M • Staff Competence Center, Deutsche Telekom • Your brand itself Benefits of Cloud and emerging technologies 3.20 Afternoon Tea • Storage power of cloud computing • User-friendly customer interface 3.50 Industry snap shot case study: Tackling metal theft • Create, access and manage your own unique networks through prevention and deterrent • The size and scale of the problem of IP camera's • How does industry and Government approach it Ease of task for end users together? • Define what you want to see, when you want to see it, • Dealing a lasting blow to criminals who can see it and what actions they should take • Industry and enforcement efforts so far James Walker Owner Director, Jabbakam , Tim Field, Head of Press and Public Affairs, Energy Networks Association 11.40 Deploying Devices in the Security Sector • Ensuring optimal network management and 4.30 Turning Security into a Solution • Reduce costs connectivity • Additional revenue channels • Network services deployed in the CCTV cameras at • More flexibility in their overall connectivity strategy Glastonbury • Security challenges in mobile M2M implementations • 3G network services for image transmission and 3G Stephen Bryant, CTO, Telenor Connexion AB CCTV • UK in cash-in-transit and other security situations – 5.10 Managing the data hungry VAS needs of M2M Security , case study • Partnership models for successful service delivery • Asset Management, remote monitoring – case study • Supporting mission critical, heavy data M2M applications • Tech Lab – advanced test facility for M2M devices- • Ultrafast mobile networks and the opportunity for latest research M2M security Nigel Chadwick, Director, Stream Communications Tom Gardner Wholesale Sales Manager, Hutchinson 3G , 12.20 NETWORKING LUNCH 5.40 Chairman's Closing Remarks and Close of Day Two 44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
  • 4. POST CONFERENCE WORKSHOP 7th May 2013, Copthorne Tara Hotel, London, United Kingdom In Association with M2M and its impact on the Security Industry 8.30am – 5.00pm Overview of workshop Programme The security industry is being transformed by many factors 8.30 Registration & Coffee – societal and economic changes mean that more and more 9.00 Chairman's Opening Remarks security is required for traditional markets of property, cars, 9.10 The future landscape for security and other assets but increasingly for non-traditional areas Social, environmental, and economic changes – what will the such as energy, food and general industry supply chain. World look like in 2020? Additionally the prevalence of new monitoring technology means that it is easier than ever for customers to deploy 10.10 Where we are now and how the 'cloud' and M2M matters to their own CCTV and other monitoring technologies creating Security Companies a myriad of data. Finally combined with cloud-based 11.10 Morning Coffee solutions this now means that small and large security 11.40 Micro- and Macro- disruptive technologies providers have access to the same technology • Access control infrastructure. With this much change it is inevitable that • Alarm management there will be new winners and losers and attending this • Asset Security workshop will ensure that you are a winner. • Energy & Food security • Employee security Why you should attend: This workshop aims to explore what the future environment 12.40 Networking Lunch looks like, you will learn how to identify and exploit new 1.40 Q&A on morning topics opportunities in the market. 2.10 What do the new business models look like? The participants will learn about new technologies entering • Industry case studies the market, understand how to design and deploy an M2M • Data security solution and how to assess the impact to the people • Managing continuity working in their own business and that of their customers. • Managing the H2M (Human to Machine) impact They will see first hand some of the latest technologies and 3.10 Afternoon Tea learn from expert opinion how to avoid some of the common 3.40 Technology case studies mistakes companies make using M2M • NFC / IP-CCTV 4.40 Q&A and wrap up 5.00 Chairman's Closing Remarks and Close of Workshop About the workshop hosts Charlie Curson is a principle at Mandarin LLP where he Andrew Yeoman is the CEO of Concirrus Ltd. in specialises in helping companies design, develop and London. He is responsible for the strategic direction of implement strong growth strategies. Charlie's the business and oversees the day-to-day operations. background includes Accenture, Innocent and Audi With more than 30-years experience in the technology where his keen insight and meticulous planning and industry he has specialised for the last 15-years in attention to detail have been behind some of the most understanding how to use technology to create, impressive brand success stories in recent years. improve and disrupt business models. In addition to his role at Concirrus, Andy is non-executive director for a number of Concirrus was formed with the belief that by connecting assets companies in the technology and security industry. to the internet and making that information ubiquitously available in the decision making process, customers can improve, create Craig Hollingworth is the COO of Concirrus Ltd. He is and disrupt business models. This market is known as machine to responsible for the market and business development machine (M2M) and it is estimated that by 2020 more than 100 of Concirrus. With an impressive track record in the billion devices will be connected to the 'internet of things'. mobile and telematics industry, Craig has held senior Concirrus designs, builds and operates M2M solution for its management and board positions for a number of customers as a one-stop-shop and is 'making M2M easy' for companies including O2, Orange and Masternaut prior companies Worldwide. For more information please call 0207 969 to starting his own company. 2979 or check www.concirrus.com New for 2013. SMi’s Event Communities SMi Group is a global events business specialising in business to business conferences, workshops and masterclasses. We successfully create and run 250 events every year across 6 sectors including Defence and Security, Energy and Utilities, Finance and Pharmaceutical. We believe in bringing together the most knowledgeable experts from across the globe in each sector to learn, engage, share and network be it in London, Paris or Singapore. To further enhance the SMi experience, we have launched our very own SMi Event Communities. These will be exclusive, private and secure communities in which our clients will learn, share, engage and network. The SMi Event Communities will build and expand your experience beyond the conference, workshop or Masterclass you attend. Not just another "social network”, SMi’s Event Communities have been specifically designed around the needs of our delegates, speakers and sponsors, allowing all of our clients to foster longer term relationships with all of the other attendees beyond the two day event for year round engagement. To take part all you need to do is register for this event. SMi Group Communities Learn Engage Share Network
  • 5. Sponsored by Vodafone Increasing or updating the security of buildings and assets can often be thought of as an increased cost and, for many businesses this is not an area where it's easy to justify installing intricate and sometimes expensive alarm systems. Using wireless technology, M2M enabled devices, cameras and alarms can be constantly connected to the emergency services or private monitoring stations. Vodafone Global M2M is a global supplier of M2M products and connectivity with more than 20 years' experience. We have the largest mobile telecommunications network in the world can provide a global SIM, with one tariff, supported by a bespoke M2M Service level agreement build to suit your business needs. http://m2m.vodafone.com/home/ SkyWave Mobile Communications is a global provider of wireless data communications for the Machine-to-Machine (M2M) market. SkyWave's products provide dependable communication, tracking, monitoring and remote management of fixed and mobile assets. Over the past 15 years, SkyWave has designed, manufactured and shipped more than 550,000 Inmarsat-based satellite terminals to customers globally in the transportation, maritime, oil and gas, utilities and government sectors. For more information, please visit www.SkyWave.com Supported by For Sponsorship or Speaking Opportunities please contact Jamison Nesbitt Business Development Director P: +44 (0) 20 7827 6164 M: +44 (0) 7710 780 576 Email: jnesbitt@smi-online.co.uk Don’t miss out on social media networking! Follow us on Twitter @UtilitiesSMi and join us on Linkedin http://uk.linkedin.com/in/smigroup www.m2mforsecurity.com
  • 6. M2M FOR SECURITY Conference: 8th - 9th May 2013, Copthorne Tara Hotel, London Workshop: 7th May 2013 4 WAYS TO REGISTER ONLINE at www.m2mforsecurity.com FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor PHONE on +44 (0) 870 9090 711 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS □ Register by 7th December 2012 and receive £300 EARLY BIRD off the conference price DISCOUNT □ Register by 18th January 2013 and receive £200 off the conference price CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE I would like to attend: (Please tick as appropriate) Fee Total PUBLIC SECTOR, ACADEMICS & UTILITIES Unique Reference Number □ Conference & Workshop £1498.00 + VAT £1797.60 □ Conference only £899.00 +VAT £1078.80 Our Reference LV U-015 □ Workshop only £599.00 + VAT £718.80 DELEGATE DETAILS COMMERCIAL ORGANISATIONS Please complete fully and clearly in capital letters. Please photocopy for additional □ Conference & Workshop £2198.00 +VAT £2637.60 delegates. □ Conference only £1599.00 +VAT £1918.80 Title: Forename: □ Workshop only £599.00 +VAT £718.80 Surname: PROMOTIONAL LITERATURE DISTRIBUTION Job Title: □ Distribution of your company’s promotional literature to all conference attendees £999.00 + VAT £1198.80 Department/Division: Company/Organisation: The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations. Email: Address: VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR. □ Please contact me to book my hotel Town/City: Alternatively call us on +44 (0) 870 9090 711, Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712 Direct Tel: Direct Fax: Mobile: DOCUMENTATION (Shipped 10-14 days after the event) Switchboard: I cannot attend but would like to purchase access to the following Document Portal/paper copy documentation: Price Total Signature: Date: □ Access to the conference documentation I agree to be bound by SMi's Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80 ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00 (or only £300 if ordered with the Document Portal) Title: Forename: Surname: PAYMENT Email: Payment must be made to SMi Group Ltd, and received before the event, by one of the following methods quoting reference U-015 and the delegate’s name. Bookings Address (if different from above): made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment: Town/City: □ UK BACS Sort Code 300009, Account 00936418 □ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU Post/Zip Code: Country: Swift (BIC): LOYDGB21013, Account 00936418 Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18 □ Cheque We can only accept Sterling cheques drawn on a UK bank. □ Credit Card □ Visa □ MasterCard □ American Express Terms and Conditions of Booking All credit card payments will be subject to standard credit card charges. Payment: If payment is not made at the time of booking, then an invoice will be issued and must be paid immediately and prior to the start of the event. If payment has not been received Card No: □□□□ □□□□ □□□□ □□□□ then credit card details will be requested and payment taken before entry to the event. Bookings within 7 days of event require payment on booking. Access to the Document Portal will not be given until payment has been received. Valid From □□/□□ Expiry Date □□/□□ Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card may not ‘share’ a place at an event. Please make separate bookings for each delegate. Cardholder’s Name: Cancellation: If you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start Signature: Date: of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has I agree to be bound by SMi's Terms and Conditions of Booking. paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept Card Billing Address (If different from above): cancellations of orders placed for Documentation or the Document Portal as these are reproduced specifically to order If we have to cancel the event for any reason, then we will . make a full refund immediately but disclaim any further liability , . Alterations: It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme. VAT Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on tell you about other products and services. Unless you tick here □ we may also share your data with third parties offering complementary products or services. If you have any queries Document Portal and Literature Distribution for all UK customers and for those EU or want to update any of the data that we hold then please contact our Database Manager customers not supplying a registration number for their own country here: databasemanager@smi-online.co.uk or visit our website www .smi-online.co.uk/updates quoting the URN as detailed above your address on the attached letter . ________________________________________________________________________________________________ If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk