M2M for Security


Published on

  • Be the first to comment

  • Be the first to like this

M2M for Security

  1. 1. M2M for the Security Industry 8th to 9th May 2013, Copthorne Tara Hotel, London, United Kingdom KEY SPEAKERS INCLUDE: • Vodafone M2M, Global Business Development • Telenor Connexion AB, CTO, Stephen Bryant Manager M2M, Peter Manolescue • Arkessa Limited, CTO, Paul Green • Concirrus Limited, Founder and COO, • Tew Plus, Director at CCTV Services UK, Craig Hollingworth and Founder and CEO, Les Beverley Andrew Yeoman • Jabbakam, Owner Director, James Walker • Analysys Mason, Lead Analyst, Steve Hilton • Stream Communications, Director, • Cooper Security, Managing Director, Matthew Nigel Chadwick Phelps • Transatel, CEO, Jacques Bonifay • Skywave Mobile Communications, Director of • Deutsche Telekom, Head of M2M Competence Corporate Marketing, Jenn Markey • Sony Europe GmbH, General Manager Head of Center, Juergen Hase Video Security Europe, Bruno Winnen • Three, Wholesale Sales Manager, Tom Gardner • ADT Fire and Security, Security Product • Barco, VP Global Strategic Marketing, Fredrik Manager, Peter Stanton Sjostedt PRE CONFERENCE WORKSHOP 7TH MAY 2013 M2M and its impact on the Security Industry In association with Concirrus 8.30am - 5.00pm SPONSORED BY www.m2mforsecurity.com Register online and receive full information on all of SMi’s conferencesAlternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 Book by February 28th and save £300 • Book by March 28th and save £100
  2. 2. DAY ONE 8th May 2013 www.m2mforsecurity.com8.30 REGISTRATION & COFFEE 1.50 Satellites Role in Critical Infrastructure Protection • Monitor assets securely; anytime, anywhere9.00 CHAIRMANS OPENING REMARKS • Efficient utilization and protection of high value assets Steve Hilton, Principal Analyst, Analysys Mason in sectors such as oil & gas and utilities • Security risks associated with unreliable (or no)9.10 M2M for security: A key growth area on the verge of a monitoring of SCADA equipment monumental shift • Case Study: Sample application of satellite M2M The security industry is on a verge of a monumental where security is paramount. shift in the wake of the technological advancements Jenn Markey, Director of Corporate Marketing, now being made in this fast growing sector. Vodafone Skywave Mobile Communications are heavily involved in all aspects of machine to machine solutions for the security industry and see this 2.30 To realise pervasive video security with M2M as a key focus and growth area for their M2M division. technology, now and future CASE STUDY Key areas of focus; • Latest technologies and customers’ pain • Will the residential alarm industry survive the Smart • Center to Edge to store data, Analyse video Home onslaught? • Current use cases • Can national and local alarm receiving centres find • Sony’s solution new business models in a globally connected always- Bruno Winnen, General Manager Head of Video on world? Security Europe, Sony Europe GmbH • If DIY alarms get any simpler how can installers make a living? 3.10 AFTERNOON TEA • Do cloud services offer a real opportunity or is it a passing fad? 3.40 APPLICATIONS PANEL 40 Minute Snapshot: • Will 4G/LTE offer real advantages? Who will be the The Battle for Smart Homes winners and losers? • Alarm systems, video monitoring, and other features • Is Big Data a big opportunity for security? — can now be manipulated from a touchpad, mobile Peter Manolescue, Global Business Development device or computer Manager M2M, Vodafone M2M • Who is best placed to facilitate a fully connected home with video cameras and remote Web access?9.50 M2M and its impact on the Security Industry Telcos or Security firms? • M2M is changing the landscape of Security solutions • Are partnerships developing between security and • Access and mobility control/Alarm management/Asset CASE STUDY telco for Smart Homes? If they do partner, how will Security/Vehicle Security /Surveillance /Safety and this change the security response control centers? Security of Employees • What is the future of control centers? Will they • Integrating M2M into enterprise Security systems becomem pure m2m rapid response? • Micro and Macro disruption • Can Security and Alarm industries survive? What do • New tariffs and service structures these new business models look like? • Case Studies Peter Manolescue, Global Business Development Craig Hollingworth, Founder and COO, Concirrus Ltd Manager M2M, Vodafone M2M Andrew Yeoman, Founder and CEO, Concirrus Ltd Juergen Hase, Head of Deutsche Telekoms M2M Competence Center, Deutsche Telekom10.30 MORNING COFFEE Steve Hilton, Lead Analyst, Analysys Mason11.00 The Future of M2M Security • What is the status and size of the market today? 4.20 Automated M2M connectivity • What are top areas of growth and potential for this • IP CCTV and remote monitoring industry segment? • Wireless communication systems (wireless alarm • What are some examples of successful signalling) implementations of security-related solutions • Resilience in alarm monitoring worldwide? • M2M business benefits • What barriers could prevent continued growth? Peter Stanton, Security Product Manager, ADT Fire Steve Hilton, Principal Analyst, Analysys Mason and Security11.40 M2M, meeting the demands of the Security industry 5.00 Turning security into a solution • Intruder M2M: Open interfacing without proprietary • Turning Security into a solution (Case Study) logical or physical connectors • Reduce costs • Can/should M2M interfacing be a plug and play • Additional revenue channels capability? • More flexibility in their overall connectivity strategy • M2M and the value intruder detection can bring to the • Security challenges in mobile M2M implementations wider Security industry Stephen Bryant, CTO, Telenor Connexion AB Matthew Phelps, Managing Director, Cooper Security Ltd 5.40 CHAIRMANS CLOSING REMARKS AND12.20 NETWORKING LUNCH CLOSE OF DAY ONE Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
  3. 3. DAY TWO 9th May 2013 www.m2mforsecurity.com 8.30 REGISTRATION & COFFEE 2.00 Telecom innovations for security service providers • Enhance connectivity with High Coverage SIMs able to 9.00 CHAIRMANS OPENING REMARKS Andrew Yeoman, Founder and CEO, Concirrus Limited connect to any network available in one country • Impact of High Coverage SIMs for lone workers, 9.10 "Security with Freedom" Making security systems work anywhere emergency situations and operational deployment • Wire-free communications optimised for the security • Aggregated MVNO models for Security Service CASE STUDY industry Providers in Europe : integrating operator margin while • Rapid deployment and ease of use – painless CCTV • Multiple user access delivering a full service (connection + device + • Multi-channel secure wireless communications using application) multiple carriers for ultimate security • Integrated monitoring and access control in remote • Enrich you M2M application with connectivity services : locations diagnostics, location-based services • Practical applications and delegate quiz Jacques Bonifay CEO, T , ransatel Paul Green, CTO, Arkessa Limited 9.50 Enhancing Shared Situation Awareness in 2.40 M2M Cloud for Security Crisis Operations • Network-centric visualization for Common-Operational- Benefits of Cloud and emerging technologies Picture • Your organisation’s assets; Protecting each and every • Dynamic multi-sensor display capablities and scenario one of those elements is a vital challenge management functions • Increased speed & quality throughout the decision- • Property and equipment making chain • Staff • Distributed display solutions scalable to tactical, operational, joint applications • Your brand itself Fredrik Sjostedt, VP Global Strategic Marketing, Barco Benefits of Cloud and emerging technologies 10.30 MORNING COFFEE • Storage power of cloud computing • User-friendly customer interface 11.00 Design and delivery of rapid deployment M2M security • Create, access and manage your own unique networks systems • Understanding the importance of telecoms design of IP cameras • Integrating M2M Solutions from design phase Ease of task for end users • Perimeter and asset protection • Designing and installation of critical communications, • Define what you want to see, when you want to see it, perimeter and asset protection who can see it and what actions they should take - challenges of protecting sterile zones, remote James Wickes, Owner Director, Jabbakam locations and high security areas. - Behaviour monitoring and asset tracking • Case Studies 3.20 AFTERNOON TEA Les Beverley Director at CCTV Services UK, Tew Plus , 11.40 Deploying Devices in the Security Sector 3.50 Industry snap shot case study: Tackling metal theft • Ensuring optimal network management and through prevention and deterrent connectivity CASE STUDY • Network services deployed in the CCTV cameras at • The size and scale of the problem Glastonbury • How does industry and Government approach it • 3G network services for image transmission and 3G CCTV together? • UK in cash-in-transit and other security situations – • Dealing a lasting blow to criminals case study • Asset Management, remote monitoring – case study • Industry and enforcement efforts so far • Tech Lab – advanced test facility for M2M devices- Tim Field, Head of Press and Public Affairs, Energy latest research Networks Association Nigel Chadwick, Director, Stream Communications 12.20 NETWORKING LUNCH 4.30 Managing the data hungry VAS needs of M2M Security , 1.20 M2M-Enable Security Solutions • Partnership models for successful service delivery • Deutsche Telekoms business opportunities beyond • Supporting mission critical, heavy data M2M connectivity applications • Security applications through integrated machine-to- machine solutions • Ultrafast mobile networks and the opportunity for • M2M for Security: From connectivity and hardware to M2M security solutions and services • Developer community and reliable partner network to Tom Gardner Wholesale Sales Manager, Hutchinson 3G , create and support security solutions • Importance of reliable international network quality 5.10 CHAIRMANS CLOSING REMARKS AND Juergen Hase, Head of Deutsche Telekoms M2M Competence Center, Deutsche Telekom CLOSE OF DAY TWO44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
  4. 4. PRE CONFERENCE WORKSHOP 7th May 2013, Copthorne Tara Hotel, London, United Kingdom In association withM2M and its impact on theSecurity Industry8.30am – 5.00pmOverview of workshop ProgrammeThe security industry is being transformed by many 8.30 Registration & Coffeefactors – societal and economic changes mean that 9.00 Chairmans Opening Remarksmore and more security is required for traditionalmarkets of property, cars, and other assets but 9.10 The future landscape for securityincreasingly for non-traditional areas such as energy, Social, environmental, and economic changes –food and general industry supply chain. what will the world look like in 2020?Additionally the prevalence of new monitoring 10.10 Where we are now and how the cloud and M2Mtechnology means that it is easier than ever for matters to Security Companiescustomers to deploy their own CCTV and other 11.10 Morning Coffeemonitoring technologies creating a myriad of data.Finally combined with cloud-based solutions this now 11.40 Micro- and Macro- disruptive technologiesmeans that small and large security providers have • Access controlaccess to the same technology infrastructure. With • Alarm managementthis much change it is inevitable that there will be • Asset Securitynew winners and losers and attending this workshop • Energy & Food securitywill ensure that you are a winner. • Employee security 12.40 Networking LunchWhy you should attend:This workshop aims to explore what the future 1.40 Q&A on morning topicsenvironment looks like, you will learn how to identify 2.10 What do the new business models look like?and exploit new opportunities in the market. • Industry case studies • Data securityThe participants will learn about new technologies • Managing continuityentering the market, understand how to design and • Managing the H2M (Human to Machine) impactdeploy an M2M solution and how to assess theimpact to the people working in their own business 3.10 Afternoon Teaand that of their customers. They will see first hand 3.40 Technology case studiessome of the latest technologies and learn from • NFC / IP-CCTVexpert opinion how to avoid some of the common 4.40 Q&A and wrap upmistakes companies make using M2M. 5.00 Chairmans Closing Remarks and Close of Workshop About the workshop hosts Andrew Yeoman is the CEO of Concirrus Ltd. in London. He is responsible for the strategic direction of the business and oversees the day-to-day operations. With more than 30-years experience in the technology industry he has specialised for the last 15-years in understanding how to use technology to create, improve and disrupt business models. In addition to his role at Concirrus, Andy is non-executive director for a number of companies in the technology and security industry. Craig Hollingworth is the COO of Concirrus Ltd. He is responsible for the market and business development of Concirrus. With an impressive track record in the mobile and telematics industry, Craig has held senior management and board positions for a number of companies including O2, Orange and Masternaut prior to starting his own company . Charlie Curson is a principle at Mandarin LLP where he specialises in helping companies design, develop and implement strong growth strategies. Charlies background includes Accenture, Innocent and Audi where his keen insight and meticulous planning and attention to detail have been behind some of the most impressive brand success stories in recent years. Concirrus was formed with the belief that by connecting assets to the internet and making that information ubiquitously available in the decision making process, customers can improve, create and disrupt business models. This market is known as machine to machine (M2M) and it is estimated that by 2020 more than 100 billion devices will be connected to the internet of things. Concirrus designs, builds and operates M2M solution for its customers as a one-stop-shop and is making M2M easy for companies Worldwide. For more information please call 0207 969 2979 or check www.concirrus.com Register online at: www.m2mforsecurity.com •
  5. 5. Sponsored by Vodafone Increasing or updating the security of buildings and assets can often be thought of as an increased cost and, for many businesses this is not an area where its easy to justify installing intricate and sometimes expensive alarm systems. Using wireless technology, M2M enabled devices, cameras and alarms can be constantly connected to the emergency services or private monitoring stations. Vodafone Global M2M is a global supplier of M2M products and connectivity with more than 20 years experience. We have the largest mobile telecommunications network in the world can provide a global SIM, with one tariff, supported by a bespoke M2M Service level agreement build to suit your business needs. http://m2m.vodafone.com/home/ SkyWave Mobile Communications is a global provider of wireless data communications for the Machine-to-Machine (M2M) market. SkyWaves products provide dependable communication, tracking, monitoring and remote management of fixed and mobile assets. Over the past 15 years, SkyWave has designed, manufactured and shipped more than 550,000 Inmarsat-based satellite terminals to customers globally in the transportation, maritime, oil and gas, utilities and government sectors. For more information, please visit www.SkyWave.comSupported by For Sponsorship or Speaking Opportunities please contact Jamison Nesbitt Business Development Director P: +44 (0) 20 7827 6164 M: +44 (0) 7710 780 576 Email: jnesbitt@smi-online.co.uk Don’t miss out on social media networking! Follow us on Twitter @UtilitiesSMi and join us on Linkedin http://uk.linkedin.com/in/smigroupwww.m2mforsecurity.com
  6. 6. M2M FOR SECURITY Conference: 8th - 9th May 2013, Copthorne Tara Hotel, London, United Kingdom Workshop: 7th May 2013 4 WAYS TO REGISTER ONLINE at www.m2mforsecurity.comFAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd FloorPHONE on +44 (0) 870 9090 711 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS □ Register by February 28th and receive £300 EARLY BIRD off the conference price DISCOUNT □ Register by March 28th and receive £100 off the conference price CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE I would like to attend: (Please tick as appropriate) Fee Total PUBLIC SECTOR AND ACADEMICSUnique Reference Number □ Conference & Workshop £1498.00 + VAT £1797.60 □ Conference only £899.00 +VAT £1078.80Our Reference LV U-015 □ Workshop only £599.00 + VAT £718.80DELEGATE DETAILS COMMERCIAL ORGANISATIONSPlease complete fully and clearly in capital letters. Please photocopy for additional □ Conference & Workshop £2198.00 +VAT £2637.60delegates. □ Conference only £1599.00 +VAT £1918.80Title: Forename: □ Workshop only £599.00 +VAT £718.80Surname: PROMOTIONAL LITERATURE DISTRIBUTIONJob Title: □ Distribution of your company’s promotional literature to all conference attendees £999.00 + VAT £1198.80Department/Division:Company/Organisation: The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations.Email:Address: VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR. □ Please contact me to book my hotelTown/City: Alternatively call us on +44 (0) 870 9090 711,Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712Direct Tel: Direct Fax:Mobile: DOCUMENTATION (Shipped 10-14 days after the event)Switchboard: I cannot attend but would like to purchase access to the following Document Portal/ paper copy documentation: Price TotalSignature: Date: □ Access to the conference documentationI agree to be bound by SMis Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00 (or only £300 if ordered with the Document Portal)Title: Forename:Surname: PAYMENTEmail: Payment must be made to SMi Group Ltd, and received before the event, by one of the following methods quoting reference U-015 and the delegate’s name. BookingsAddress (if different from above): made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment:Town/City: □ UK BACS Sort Code 300009, Account 00936418 □ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AUPost/Zip Code: Country: Swift (BIC): LOYDGB21013, Account 00936418Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18 □ Cheque We can only accept Sterling cheques drawn on a UK bank. □ Credit Card □ Visa □ MasterCard □ American ExpressTerms and Conditions of Booking All credit card payments will be subject to standard credit card charges.Payment: If payment is not made at the time of booking, then an invoice will be issued andmust be paid immediately and prior to the start of the event. If payment has not been received Card No: □□□□ □□□□ □□□□ □□□□then credit card details will be requested and payment taken before entry to the event.Bookings within 7 days of event require payment on booking. Access to the Document Portalwill not be given until payment has been received. Valid From □□/□□ Expiry Date □□/□□Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, anotherdelegate to take your place at any time prior to the start of the event. Two or more delegates CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX cardmay not ‘share’ a place at an event. Please make separate bookings for each delegate. Cardholder’s Name:Cancellation: If you wish to cancel your attendance at an event and you are unable to senda substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,providing that cancellation is made in writing and received at least 28 days prior to the start Signature: Date:of the event. Regretfully cancellation after this time cannot be accepted. We will howeverprovide the conferences documentation via the Document Portal to any delegate who has I agree to be bound by SMis Terms and Conditions of Booking.paid but is unable to attend for any reason. Due to the interactive nature of the Briefings weare not normally able to provide documentation in these circumstances. We cannot accept Card Billing Address (If different from above):cancellations of orders placed for Documentation or the Document Portal as these arereproduced specifically to order If we have to cancel the event for any reason, then we will .make a full refund immediately but disclaim any further liability , .Alterations: It may become necessary for us to make alterations to the content, speakers,timing, venue or date of the event compared to the advertised programme. VATData Protection: The SMi Group gathers personal data in accordance with the UK DataProtection Act 1998 and we may use this to contact you by telephone, fax, post or email to VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged ontell you about other products and services. Unless you tick here □ we may also share yourdata with third parties offering complementary products or services. If you have any queries Document Portal and Literature Distribution for all UK customers and for those EUor want to update any of the data that we hold then please contact our Database Manager customers not supplying a registration number for their own country here:databasemanager@smi-online.co.uk or visit our website www .smi-online.co.uk/updates quotingthe URN as detailed above your address on the attached letter . ________________________________________________________________________________________________ If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk