SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
SMi proudly present their 3rd Annual Conference

    European
    Smart Grid Cyber
    and SCADA Security
    Behavior Detection,
            ,
    Applications and Devices

    11th - 12th March 2013
    Copthorne Tara Hotel, London,
    United Kingdom


        KEY SPEAKERS INCLUDE:
        • European Network and Information Security     • Swissgrid, Senior Advisor Operations, TSC SC
          Agency, Head of Resilience and CIIP Unit,       Chairman, Rudolf Baumann
          Dr Vangelis Ouzounis
            .                                           • CRISALIS, FP7 Project Co-ordinator,
        • European SCADA and Control Systems              Corrado Leita
          Information Exchange, Chair
                                                        • DNV KEMA Energy & Sustainability, Business
          European Reference Network of Critical
                                                          Director Management and Operations
          Infrastructure Protection, Coordinator
          Annemarie Zielstra                              Consulting, Maurice Adriaensen
        • Iberdrola, IT Manager SIMOD,                  • FOX IT Sales Director Europe CNI,
                                                                 ,
          Miguel Escamilla Chavero                        Henk Pieper
        • E.ON, Information Security Manager,           • Infrastructure Security Labs, President,
          Gitte Bergknut                                  John McNabb
        • Enel Distribuzione SpA, IT and Security       • Cylance, Senior Researcher, Justin Clarke
          Systems, Daniela Pestonesi
                                                        • Zigbee Alliance, Principal Consultant,
        • Con Edison of New York, Smart Grid Project
                                                          Robert Cragie
          Manager, Patricia Robison
        • Vattenfall, Senior Research and Development   • Security Matters, COO, Damiano Bolzoni
          Engineer, Daniel Zajd                         • CNA Insurance, European Underwriting
        • Alliander Alliance Manager Privacy &
                   ,                                      Director, Technology & Cyber Risks,
          Security, Johan Rambi                           Jacob Ingerslev


           POST CONFERENCE WORKSHOP 13th MARCH 2013                                8.30AM-1.00PM

           Approaches to Network Monitoring and Situational
                 Awareness in Critical Infrastructure
                         Presented by Dr Damiano Bolzoni, University of Twente

                                                SPONSORED BY




                www.smartgridcybersecurity.co.uk
        Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711

         Book by the xxth December and save £300 off the conference price
DAY ONE 11th March 2013                                                             www.smartgridcybersecurity.co.uk


8.30             REGISTRATION & COFFEE                                                      DETECTION, AWARENESS, CHALLENGES

9.00             CHAIRMAN'S OPENING REMARKS                            1.50               FP7 EARL WARNING DETECTION PRESENTED BY
                                                                                                  Y
                 Mark Ossel, ESNA Board Member and VP Echelon
                                                     ,
                                                                                          CRISALIS
                 Energy and Utility
                                                                                          FP7 project funded by DG Enterprise called CRISALIS,
                       EUROPEAN RECOMMENDATIONS                                           Critical Infrastructure Security AnaLysIS
                                                                                          • Project focuses: Creation of practical, short-term
9.10             ENHANCING THE SECURITY OF SMART GRIDS                                     solutions for the protection of critical infrastructure




                                                                         New for 2013
                 — ENISA'S CONTRIBUTION                                                    environment from targeted attacks- primarily power
                 • Recommendations on Smart Grids Security
                                                                                           grid
                 • Minimum Security Measures
                                                                                          • Consortium members- Enel, Symantec, Security
                 • Risks Assessment and Management of
                   Smart Grids                                                             Matters and Alliander
                 • Certification of Smart Grids products                                  • First deliverables of the project: Requirement study, in
                 • EU US co-operation on Smart Grids                                       which we will study in depth the characteristics of the
                 Evangelos Ouzounis, Senior Expert, Network Security                       power generation and smart metering environments
                 Policy, ENISA - European Network and Information
                                                                                          • Identify risks and possible threat scenarios
                 Security Agency
                                                                                          • Feedback on our activity

9.50             DEPLOYING WORLDWIDE CYBERSECURITY                                        Corrado Leita, Project Coordinator, CRISALIS
                 ON THERMAL POWER GENERATION
 New for 2013




                 CONTROL SYSTEMS                                       2.30               ICS CYBER SECURITY IN POWER GENERATION
                 • Iberdrola overview                                                     AND FUTURE SCENARIO
                 • Iberdrola & Thermal Stations Strategy
                                                                                          • Electric grid and power generation scenario in Italy
                                                                         New for 2013
                 • Cyber Security’s Goal and Vision
                                                                                          • Power Generation: Architecture and Frameworks
                 • AURA Project (Cybersecurity projects
                   examples)                                                              • Risk Analysis: Threats and impacts
                 • Conclusions                                                            • CI owner requirements for ICS protection
                 Miguel Chavero, IT Manager SIMOD, Iberdrola                              • Enel Cyber Security ICS Laboratory
                                                                                          • CRISALIS project participation
10.30 MORNING COFFEE                                                                      Daniela Pestonesi, Project Leader Research Technical
                                                                                          Area, Automation & Diagnostics, Enel Engineering and
                      RISK MANAGEMENT ASSESSMENT
                                                                                          Research Spa
11.00 RISK MANAGEMENT FOR CRITICAL
      INFRASTRUCTURE                                                   3.10               AFTERNOON TEA
      • Making security a priority
      • Lack of standards and the effect on investment                 3.40               CHALLENGES IN POWER-NETWORK SECURITY
      • Cyber Security and Electricity pricing-
                                                                                          AND IT
        cause and effect
                                                                                          • Updates and improvements in power-network and IT
      • Fostering a culture of awareness
      • Measuring resiliency                                                              • Common processes, systems and collaboration
      • Incident response and countermeasures                                              procedures
      • Technical, cultural, and political cooperation for                                • Integration of system planning, operations and IT
      success                                                                             • Future developments and sharing knowledge
      Maurice Adriaensen, Business Regional Director
                                                                                          Rudolf Baumann, Chairman of the Transmission
      Management and Operations Consulting,
                                                                                          Security Cooperation, Senior Advisor Operations,
      DNV KEMA Energy & Sustainability
                                                                                          swissgrid AG
11.40 LESSONS LEARNED FROM THE NEW SMART
      METER/GRID RISK ASSESSMENT                                       4.20               ENHANCING NETWORK MONITORING AND
      METHODOLOGY IN THE NETHERLANDS                                                      SITUATIONAL AWARENESS IN CRITICAL
                                                                       WORKSHOP ON THIS
                                                                       TOPIC MARCH 13TH




      • Introduction
                                                                                          INFRASTRUCTURE
      • Explanation IS1 Risk Assessment methodology on
                                                                                          • Current approaches to network monitoring and
        Smart Meter/Grid in NL
      • Practice on case “sector Privacy & Security AMI                                    situational awareness
        requirements v2.0”                                                                • Strengths and shortcomings of current approaches
      • Lessons learned                                                                   • Non-signature based approaches for improved
      • Status European standard on Smart Grid Cyber                                       monitoring and situational awareness
        Security
                                                                                          • Discussion of 2 use cases
      • Next steps
                                                                                          Damiano Bolzoni, COO, Security Matters
      Johan Rambi, Alliance Manager Privacy & Security,
      Alliander
                                                                       5.00               CHAIRMAN'S CLOSING REMARKS AND
12.20 NETWORKING LUNCH                                                                    CLOSE OF DAY ONE



                Register online at: www.smartgridcybersecurity.co.uk • Alternatively fax your registration
DAY TWO 12th of March 2013                                                                  www.smartgridcybersecurity.co.uk


    8.30            REGISTRATION & COFFEE                                       12.20 NETWORKING LUNCH

    9.00            CHAIRMAN'S OPENING REMARKS                                  1.50             SECURING DEVICES FOR HOME AND CONTROL
                    Annemarie Zielstra, Director CPNINL, Centre for the                          NETWORKS
                    Protection of National Infrastructure (CPNI)                                 • Home and Control Networks
                                                                                                 • What is a Home network (HAN)?
    9.10            HOW THE BOARD SHOULD TAKE CARE OF CYBER                                      • What is a Control Network?
                    RESILIENCE                                                                   • Topologies
                    • Cyber incidents on the increase, now a risk for any
                                                                                                 • Devices
                      business
                                                                                                   - Types of devices on home and control networks
                    • This leads to serious concerns on business process
                                                                                                   - Distinguishing characteristics
                      continuity, privacy of consumers, identity theft or the
                      protection of intellectual property                                          - Security challenges
                    • Cyber resilience needs to be part of strategic (both                         - Information Security Pillars
                      risk and reputation) management and leadership is                            - Cryptography
                      required                                                                     - Public key cryptography
                    • Creating concrete, visible boardroom recognition of                          - Symmetric key cryptography
                      cyber resilience, as an enabler for cyber benefits                           - Hybrid cryptography
                    • Translating boardroom recognition into risk                                  - Protocol stack security
                      management, communications, legal and operations                             - Building blocks
                    Annemarie Zielstra, Chair of the European SCADA and                            - Frame security
                    Control Systems Information Exchange (EuroSCSIE)                               - Authentication and key establishment
                    Coordinator of European Reference Network of                                   - Credentials
                    Critical Infrastructure Protection (ERNCIP) Thematic                           - ZigBee SEP 1.0 stack security description
                    Group on ICS and Smart Grids                                                   - ZigBee SEP 2.0 stack security description
                                                                                                 Robert Cragie, Chair, Security Task Group,
    9.50            SCADA AND ICS SECURITY EXPERIENCES
                                                                                                 Zigbee Alliance
                    • Experiences of how to run a Cyber Security program
                    • Business Awareness and Societal Responsibility
     New for 2013




                                                                                2.30             SECURITY ISSUES OF CONTROL SYSTEMS &
                      - Compliance & Review
                                                                                                 WIRELESS METERS AT DRINKING WATER UTILITIES
                      - Training
                                                                                 New for 2013


                    • Use of technical mitigations such as IDS in                                • How do they differ from Smart energy meters?
                      - Cogeneration                                                             • Communications infrastructure vulnerabilities of fixed
                      - Hydro                                                                      and wireless
                      - Heating                                                                  • Lack of encryption
                    • Results and lessons learned                                                • Theft
                    Gitte Bergknut, MU Nordic Information Security                               • Data collection privacy
                    Manager, EON Sverige AB                                                      • Billing
                                                                                                 John McNabb, Principal, Infrastructure Security Labs
                        SYSTEMS, DEVICES, APPLICATIONS
                                                                                3.10             AFTERNOON TEA
    10.30 MORNING COFFEE
                                                                                                EXPOSING VULNERABILITIES AND CYBER RISK
    11.00 SMART GRID INTEGRATES LEGACY AND NEW ICS                                                          AND INSURANCE
          (SCADA, DCS, PLC) SYSTEMS, DEVICES, AND
          APPLICATIONS
                                                                                3.40             VULNERABILITIES IN CRITICAL
          • Smart Grid Cyber Security – Integrating legacy and
                                                                                                 INFRASTRUCTURE AND EMBEDDED DEVICES
            new ICS enhances the grid and simultaneously
                                                                                                 • Key roles of embedded devices in our every day lives
            increases complexity and vulnerability
                                                                                                 • Vulnerabilities in embedded system
          • Cyber Security – needs to address ICS at all levels:
            field devices, the device systems, the applications                                  • Findings and impact behind several recent SCADA
                                                                                 New for 2013




            supporting the devices and systems, the                                                vulnerabilities that had worldwide impact
            communications/network interfacing to the devices                                    • Moving towards a resolution of existing vulnerabilities
            and systems, etc.                                                                      and avoidance of future vulnerabilities -Education of
          • ICS Cyber Security Controls: Technical, Physical,                                      manufacturers, end users, academia, government,
            Administrative Risk Management – Smart Grid More                                       and the general public
            challenging with increased complexity and extended                                   • The process that occurs when end users or the
            systems and communications                                                             general public identify vulnerabilities in critical
          • Leverage existing ICS standards and frameworks:                                        infrastructure
            IEC, NIST DOE, ISA, ISO, NERC
                      ,                                                                            - What to expect
          • Smart Grid Architecture and Frameworks with ICS                                        - How to reduce your risk
          • Threats and Vulnerabilities                                                            - How to leverage existing agencies
          • Examples of ICS systems utilized for Smart Grid :                                      - Processes to minimize your required effort
            transformers, switches, inverters, DG                                                Justin Clarke, Security Researcher, Cylance
          Patricia Robison, Smart Grid Project Manager, Con
          Edison of New York
                                                                                4.20             CYBER RISKS & INSURANCE
                                                                                                 • Cyber Crime as an Industry
    11.40 CREATING AN APP CONNECTED TO A BACKEND
                                                                                New for




          SYSTEM                                                                                 • Legal environment
                                                                                 2013




          • Low awareness within the organisation about the                                      • What is Cyber Insurance
            effects of a connected app                                                           • Industry specific exposures
          • The least secure point in a network will be the target                               Jacob Ingerslev, European Underwriting Director,
          • An app will be an extension of the company                                           CNA Europe
          environment
          • Data stored on the mobile device                                    5.00             CHAIRMAN'S CLOSING REMARKS AND
          Daniel Zajd, Senior R and D Engineer, Vattenfall A B                                   CLOSE OF DAY TWO



to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
POST CONFERENCE WORKSHOP Wednesday 13th March 2013, Copthorne Tara Hotel, London, UK




Approaches to Network Monitoring and Situational
Awareness in Critical Infrastructure
8.30am – 1.00pm In Association with University Twente

Overview of workshop                          Programme
This workshop will present solutions
                                              8:30    Registration and Coffee
currently available for monitoring critical
networks and situational awareness. We        9.00    Current solutions for network monitoring and situational
will analyse what are the major strengths             awareness of critical networks
and weaknesses of each approach, when                 - Signature-based
it can be used and what is the output                 - Rule-based
                                                      - Behavior-based
users can expect.
                                                      - Visualization
We will wrap up the session with              10.30     Advantages and disadvantages of each approach
demonstrations of the approaches                      - Where and when use what
presented using real-life examples.                   - Which threats can be detected?
                                                      - Technical skills required to operate

Why you should attend:                        11.30    Coffee Break
• Understand the importance of
                                              12.00    Demonstrations
  situational awareness and behavioural
  monitoring                                  1.00     Question and Answer session
• Gain insight in to the benefits and
  disadvantages of signature based, rule
  based, behavioural and visualisation        About the workshop host
  based solutions                             Dr Damian° Bolzoni (1981) received his PhD in 2009 from the
• Learn what threats can be detected          University of Twente, where he performed research on anomaly-
                                              based intrusion detection. Since 2008 he has been involved in
  and what skills are required to operate
                                              securing computer networks of critical infrastructure. Before joining
• Interact with industry and engage with      the University of Twente, he has been working for the Italian branch
  our workshop leader who is actively         of KPMG, within the Information Risk Management division. Since
  involved in two security projects with      2009 he holds the position of Chief Operations Officer within
  major energy companies at present.          SecurityMatters BV  .




      New for 2013. SMi's Event Communities
      SMi Group is a global events business specialising in business to business conferences, workshops
      and masterclasses. We successfully create and run 250 events every year across 6 sectors
      including Defence and Security, Energy and Utilities, Finance and Pharmaceutical. We believe in
      bringing together the most knowledgeable experts from across the globe in each sector to learn,
      engage, share and network be it in London, Paris or Singapore.

      To further enhance the SMi experience, we have launched our very own SMi Event Communities.
      These will be exclusive, private and secure communities in which our clients will learn, share,
      engage and network.

      The SMi Event Communities will build and expand your experience beyond the conference,
      workshop or Masterclass you attend. Not just another "social network”, SMi’s Event Communities
      have been specifically designed around the needs of our delegates, speakers and sponsors,
      allowing all of our clients to foster longer term relationships with all of the other attendees beyond
      the two day event for year round engagement.

      To take part all you need to do is register for this event. SMi Group Communities
      Learn Engage Share Network
SPONSORS

                   DNV KEMA Energy & Sustainability, with more than 2,300 experts in
                   over 30 countries around the world, is committed to driving the global
                   transition toward a safe, reliable, efficient, and clean energy future. With
                   a heritage of nearly 150 years, we specialize in providing world-class,
                   innovative solutions in the fields of business & technical consultancy,
                   testing, inspections & certification, risk management, and verification.
                   As an objective and impartial knowledge-based company, we advise and
                   support organizations along the energy value chain: producers, suppliers
                   & end-users of energy, equipment manufacturers, as well as government
                   bodies, corporations and non-governmental organizations. DNV KEMA
                   Energy & Sustainability is part of DNV a global provider of services for
                                                             ,
                   managing risk with more than 10,000 employees in over 100 countries.
                   For more information on DNV KEMA Energy & Sustainability, visit
                   www.dnvkema.com

                   Fox-IT prevents, solves and mitigates the most serious cyber threats
                   with innovative solutions for government, defense, law enforcement,
                   critical infrastructure, banking, and commercial enterprise clients
                   worldwide. Our approach combines human intelligence and technology
                   into innovative solutions that ensure a more secure society. We develop
                   custom and packaged solutions that maintain the security of sensitive
                   government systems, protect industrial control networks, defend online
                   banking systems, and secure highly confidential data and networks.
                   www.fox-it.com




           Supported by



                                                              For Sponsorship or Speaking
                                                              Opportunities please contact
                                                              Jamison Nesbitt
                                                              Business Development Director
                                                              P: +44 (0) 20 7827 6164
                                                              M: +44 (0) 7710 780 576
                                                              Email: jnesbitt@smi-online.co.uk




                                                              Don’t miss out on social
                                                              media networking!
                                                              Follow us on Twitter @UtilitiesSMi
                                                              and join us on Linkedin
                                                              http://uk.linkedin.com/in/smigroup




    www.smartgridcybersecurity.co.uk
EUROPEAN SMART GRID CYBER AND SCADA SECURITY
                  Conference: 11th & 12th March 2013, Copthorne Tara Hotel, London                                                              Workshops: 13th March 2013
                                                                        4 WAYS TO REGISTER
                            ONLINE at www.smartgridcybersecurity.co.uk
FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor
PHONE on +44 (0) 870 9090 711                 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS


                                                                                                  EARL BIRD □ Register by December 16th and receive £300
                                                                                                       Y
                                                                                                   DISCOUNT   off the conference price


                                                                                                   CONFERENCE PRICES                                                  GROUP DISCOUNTS AVAILABLE


                                                                                                  I would like to attend: (Please tick as appropriate)                      Fee                       Total

                                                                                                  PUBLIC SECTOR, ACADEMICS & UTILITIES
                                                                                                  □ Conference & Workshop                                                   £1398.00       + VAT      £1677.60
                                                                                                  □     Conference only                                                     £899.00        +VAT       £1078.80
Unique Reference Number
                                                                                                  □     Workshop A only                                                     £599.00        + VAT      £718.80
Our Reference                               LV U-013
                                                                                                  COMMERCIAL ORGANISATIONS

DELEGATE DETAILS                                                                                  □ Conference & Workshop
                                                                                                  □     Conference only
                                                                                                                                                                            £2198.00
                                                                                                                                                                            £1599.00
                                                                                                                                                                                           +VAT
                                                                                                                                                                                           +VAT
                                                                                                                                                                                                      £2747.50
                                                                                                                                                                                                      £1998
Please complete fully and clearly in capital letters. Please photocopy for additional
                                                                                                  □     Workshop only                                                       £599.00        +VAT       £748.75
delegates.

Title:                  Forename:
                                                                                                  PROMOTIONAL LITERATURE DISTRIBUTION
Surname:                                                                                          □ Distribution of your company’s promotional
                                                                                                    literature to all conference attendees                                  £999.00        + VAT      £1198.80
Job Title:
Department/Division:                                                                              The conference fee includes refreshments, lunch, conference papers and access
                                                                                                  to the Document Portal containing all of the presentations.
Company/Organisation:
Email:
Address:
                                                                                                   VENUE              Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.

                                                                                                  □ Please contact me to book my hotel
Town/City:
                                                                                                  Alternatively call us on +44 (0) 870 9090 711,
Post/Zip Code:                                  Country:                                          email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
Direct Tel:                                     Direct Fax:
Mobile:                                                                                            DOCUMENTATION                                                  (Shipped 10-14 days after the event)

Switchboard:                                                                                      I cannot attend but would like to purchase access to the following Document Portal/paper
                                                                                                  copy documentation:                                     Price               Total
Signature:                                                       Date:                            □ Access to the conference documentation
I agree to be bound by SMi's Terms and Conditions of Booking.                                         on the Document Portal                              £499.00     + VAT   £598.80

ACCOUNTS DEPT                                                                                     □ The Conference Presentations - paper copy                               £499.00        -          £499.00
                                                                                                        (or only £300 if ordered with the Document Portal)
Title:                  Forename:
Surname:                                                                                           PAYMENT
Email:                                                                                            Payment must be made to SMi Group Ltd, and received before the event, by one of
                                                                                                  the following methods quoting reference D-018 and the delegate’s name. Bookings
Address (if different from above):
                                                                                                  made within 7 days of the event require payment on booking, methods of payment are
                                                                                                  below. Please indicate method of payment:

Town/City:                                                                                        □ UK BACS                    Sort Code 300009, Account 00936418
                                                                                                  □ Wire Transfer              Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Post/Zip Code:                                  Country:                                                                       Swift (BIC): LOYDGB21013, Account 00936418
Direct Tel:                                     Direct Fax:                                                                    IBAN GB48 LOYD 3000 0900 9364 18
                                                                                                  □ Cheque                     We can only accept Sterling cheques drawn on a UK bank.
                                                                                                  □ Credit Card                □ Visa      □ MasterCard           □ American Express
Terms and Conditions of Booking                                                                        All credit card payments will be subject to standard credit card charges.

Payment: If payment is not made at the time of booking, then an invoice will be issued and
must be paid immediately and prior to the start of the event. If payment has not been received
                                                                                                  Card No:  □□□□ □□□□ □□□□ □□□□
then credit card details will be requested and payment taken before entry to the event.
Bookings within 7 days of event require payment on booking. Access to the Document Portal
will not be given until payment has been received.
                                                                                                  Valid From □□/□□ Expiry Date □□/□□

Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates
                                                                                                  CVV Number □□□□                             3 digit security on reverse of card, 4 digits for AMEX card
may not ‘share’ a place at an event. Please make separate bookings for each delegate.
                                                                                                  Cardholder’s Name:
Cancellation: If you wish to cancel your attendance at an event and you are unable to send
a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,
providing that cancellation is made in writing and received at least 28 days prior to the start   Signature:                                                              Date:
of the event. Regretfully cancellation after this time cannot be accepted. We will however
provide the conferences documentation via the Document Portal to any delegate who has             I agree to be bound by SMi's Terms and Conditions of Booking.
paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we
are not normally able to provide documentation in these circumstances. We cannot accept
                                                                                                  Card Billing Address (If different from above):
cancellations of orders placed for Documentation or the Document Portal as these are
reproduced specifically to order If we have to cancel the event for any reason, then we will
                                  .
make a full refund immediately but disclaim any further liability
                                ,                                .

Alterations: It may become necessary for us to make alterations to the content, speakers,
timing, venue or date of the event compared to the advertised programme.

Data Protection: The SMi Group gathers personal data in accordance with the UK Data
Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to
                                                                                                   VAT
tell you about other products and services. Unless you tick here □ we may also share your
data with third parties offering complementary products or services. If you have any queries      VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on
or want to update any of the data that we hold then please contact our Database Manager           Document Portal and Literature Distribution for all UK customers and for those EU
databasemanager@smi-online.co.uk or visit our website www  .smi-online.co.uk/updates quoting
the URN as detailed above your address on the attached letter  .                                  customers not supplying a registration number for their own country here: ________________


 If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk

Más contenido relacionado

La actualidad más candente

Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria
 
Marco Armoni AIPSI - SMAU Milano 2017
Marco Armoni AIPSI - SMAU Milano 2017Marco Armoni AIPSI - SMAU Milano 2017
Marco Armoni AIPSI - SMAU Milano 2017SMAU
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik HamburgFraunhofer AISEC
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risksGavan Howe
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSecuring Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSalahuddin Khawaja
 
[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego BernalTI Safe
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of thingsnajascj
 
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROPIoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROPOpen Mobile Alliance
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elementsahmed_vr
 
New 12 example investor presentation
New 12 example investor presentationNew 12 example investor presentation
New 12 example investor presentationZiya-B
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...
BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...
BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...Mark W. Bennett
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - splitPhuc (Peter) Huynh
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna securityMt Mostafa
 

La actualidad más candente (20)

Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
 
Marco Armoni AIPSI - SMAU Milano 2017
Marco Armoni AIPSI - SMAU Milano 2017Marco Armoni AIPSI - SMAU Milano 2017
Marco Armoni AIPSI - SMAU Milano 2017
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric ApproachSecuring Mobile - A Business Centric Approach
Securing Mobile - A Business Centric Approach
 
[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROPIoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
 
New 12 example investor presentation
New 12 example investor presentationNew 12 example investor presentation
New 12 example investor presentation
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
IEEE NS2 Projects 2012
IEEE NS2 Projects 2012IEEE NS2 Projects 2012
IEEE NS2 Projects 2012
 
BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...
BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...
BluStor's CyberGate uses biometrics to guard Personal Mobile Cloud _ Biometri...
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - split
 
Itu ics-pii
Itu ics-piiItu ics-pii
Itu ics-pii
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 

Destacado

Connected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & ChallengesConnected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & ChallengesWSO2
 
Border security 2013
Border security 2013Border security 2013
Border security 2013Dale Butler
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceDIGIJAKS
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control systemAlireza Mirzaei
 
Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Mark Goldstein
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Iot(internet of things)
Iot(internet of things)Iot(internet of things)
Iot(internet of things)又瑋 賴
 
Internet of things for agriculture
Internet of things for agricultureInternet of things for agriculture
Internet of things for agricultureKG2
 
IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture sneha daise paulson
 
IoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAVIoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAVStart and Growth
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.Laurie Lamberth
 
Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Nathan Wallace, PhD, PE
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 

Destacado (18)

Connected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & ChallengesConnected Identity: Benefits, Risks & Challenges
Connected Identity: Benefits, Risks & Challenges
 
Border security 2013
Border security 2013Border security 2013
Border security 2013
 
Global Cyber Security on Earth + in Space
Global Cyber Security on Earth + in SpaceGlobal Cyber Security on Earth + in Space
Global Cyber Security on Earth + in Space
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control system
 
Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16Internet of Things Innovations & Megatrends Update 12/14/16
Internet of Things Innovations & Megatrends Update 12/14/16
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
IoT in agri-food
IoT in agri-foodIoT in agri-food
IoT in agri-food
 
Graffiti fur
Graffiti furGraffiti fur
Graffiti fur
 
Smart city and agriculture
Smart city and agricultureSmart city and agriculture
Smart city and agriculture
 
Iot(internet of things)
Iot(internet of things)Iot(internet of things)
Iot(internet of things)
 
Internet of things for agriculture
Internet of things for agricultureInternet of things for agriculture
Internet of things for agriculture
 
IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture IOT based smart security and monitoring devices for agriculture
IOT based smart security and monitoring devices for agriculture
 
IoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAVIoT for Agriculture - Drones / UAV
IoT for Agriculture - Drones / UAV
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
 
Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers Power System Cybersecurity: Threats, Challenges, and Barriers
Power System Cybersecurity: Threats, Challenges, and Barriers
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 

Similar a Smart grid cyber

Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Dale Butler
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...Dale Butler
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada securityYulia Rotar
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
m2m for the Security Industry
m2m for the Security Industrym2m for the Security Industry
m2m for the Security IndustrySMiUtilities
 
Don't Get Hacked! Cybersecurity Boot Camp
Don't Get Hacked! Cybersecurity Boot CampDon't Get Hacked! Cybersecurity Boot Camp
Don't Get Hacked! Cybersecurity Boot CampEnergySec
 
Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...
Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...
Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...MaRS Discovery District
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM Energy & Utilties
 
Data Management within the Smart Grid 2011
Data Management within the Smart Grid 2011Data Management within the Smart Grid 2011
Data Management within the Smart Grid 2011IQPC Australia
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
M2M for Security
M2M for SecurityM2M for Security
M2M for SecurityDale Butler
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Invest Northern Ireland
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 

Similar a Smart grid cyber (20)

Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
m2m for the Security Industry
m2m for the Security Industrym2m for the Security Industry
m2m for the Security Industry
 
Don't Get Hacked! Cybersecurity Boot Camp
Don't Get Hacked! Cybersecurity Boot CampDon't Get Hacked! Cybersecurity Boot Camp
Don't Get Hacked! Cybersecurity Boot Camp
 
Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...
Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...
Ontario Smart Grid Opportunities in the Electrical Utility Sector - MaRS Mark...
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Micro grid
Micro gridMicro grid
Micro grid
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart Grids
 
Data Management within the Smart Grid 2011
Data Management within the Smart Grid 2011Data Management within the Smart Grid 2011
Data Management within the Smart Grid 2011
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
M2M for Security
M2M for SecurityM2M for Security
M2M for Security
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 

Más de Dale Butler

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceDale Butler
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceDale Butler
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceDale Butler
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conferenceDale Butler
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceDale Butler
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceDale Butler
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceDale Butler
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceDale Butler
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020Dale Butler
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 Dale Butler
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020Dale Butler
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 Dale Butler
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 Dale Butler
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceDale Butler
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020Dale Butler
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceDale Butler
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceDale Butler
 

Más de Dale Butler (20)

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conference
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conference
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conference
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conference
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conference
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conference
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conference
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conference
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020
 
Space Week 2020
Space Week 2020Space Week 2020
Space Week 2020
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conference
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conference
 

Smart grid cyber

  • 1. SMi proudly present their 3rd Annual Conference European Smart Grid Cyber and SCADA Security Behavior Detection, , Applications and Devices 11th - 12th March 2013 Copthorne Tara Hotel, London, United Kingdom KEY SPEAKERS INCLUDE: • European Network and Information Security • Swissgrid, Senior Advisor Operations, TSC SC Agency, Head of Resilience and CIIP Unit, Chairman, Rudolf Baumann Dr Vangelis Ouzounis . • CRISALIS, FP7 Project Co-ordinator, • European SCADA and Control Systems Corrado Leita Information Exchange, Chair • DNV KEMA Energy & Sustainability, Business European Reference Network of Critical Director Management and Operations Infrastructure Protection, Coordinator Annemarie Zielstra Consulting, Maurice Adriaensen • Iberdrola, IT Manager SIMOD, • FOX IT Sales Director Europe CNI, , Miguel Escamilla Chavero Henk Pieper • E.ON, Information Security Manager, • Infrastructure Security Labs, President, Gitte Bergknut John McNabb • Enel Distribuzione SpA, IT and Security • Cylance, Senior Researcher, Justin Clarke Systems, Daniela Pestonesi • Zigbee Alliance, Principal Consultant, • Con Edison of New York, Smart Grid Project Robert Cragie Manager, Patricia Robison • Vattenfall, Senior Research and Development • Security Matters, COO, Damiano Bolzoni Engineer, Daniel Zajd • CNA Insurance, European Underwriting • Alliander Alliance Manager Privacy & , Director, Technology & Cyber Risks, Security, Johan Rambi Jacob Ingerslev POST CONFERENCE WORKSHOP 13th MARCH 2013 8.30AM-1.00PM Approaches to Network Monitoring and Situational Awareness in Critical Infrastructure Presented by Dr Damiano Bolzoni, University of Twente SPONSORED BY www.smartgridcybersecurity.co.uk Register online and receive full information on all of SMi’s conferences Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 Book by the xxth December and save £300 off the conference price
  • 2. DAY ONE 11th March 2013 www.smartgridcybersecurity.co.uk 8.30 REGISTRATION & COFFEE DETECTION, AWARENESS, CHALLENGES 9.00 CHAIRMAN'S OPENING REMARKS 1.50 FP7 EARL WARNING DETECTION PRESENTED BY Y Mark Ossel, ESNA Board Member and VP Echelon , CRISALIS Energy and Utility FP7 project funded by DG Enterprise called CRISALIS, EUROPEAN RECOMMENDATIONS Critical Infrastructure Security AnaLysIS • Project focuses: Creation of practical, short-term 9.10 ENHANCING THE SECURITY OF SMART GRIDS solutions for the protection of critical infrastructure New for 2013 — ENISA'S CONTRIBUTION environment from targeted attacks- primarily power • Recommendations on Smart Grids Security grid • Minimum Security Measures • Consortium members- Enel, Symantec, Security • Risks Assessment and Management of Smart Grids Matters and Alliander • Certification of Smart Grids products • First deliverables of the project: Requirement study, in • EU US co-operation on Smart Grids which we will study in depth the characteristics of the Evangelos Ouzounis, Senior Expert, Network Security power generation and smart metering environments Policy, ENISA - European Network and Information • Identify risks and possible threat scenarios Security Agency • Feedback on our activity 9.50 DEPLOYING WORLDWIDE CYBERSECURITY Corrado Leita, Project Coordinator, CRISALIS ON THERMAL POWER GENERATION New for 2013 CONTROL SYSTEMS 2.30 ICS CYBER SECURITY IN POWER GENERATION • Iberdrola overview AND FUTURE SCENARIO • Iberdrola & Thermal Stations Strategy • Electric grid and power generation scenario in Italy New for 2013 • Cyber Security’s Goal and Vision • Power Generation: Architecture and Frameworks • AURA Project (Cybersecurity projects examples) • Risk Analysis: Threats and impacts • Conclusions • CI owner requirements for ICS protection Miguel Chavero, IT Manager SIMOD, Iberdrola • Enel Cyber Security ICS Laboratory • CRISALIS project participation 10.30 MORNING COFFEE Daniela Pestonesi, Project Leader Research Technical Area, Automation & Diagnostics, Enel Engineering and RISK MANAGEMENT ASSESSMENT Research Spa 11.00 RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURE 3.10 AFTERNOON TEA • Making security a priority • Lack of standards and the effect on investment 3.40 CHALLENGES IN POWER-NETWORK SECURITY • Cyber Security and Electricity pricing- AND IT cause and effect • Updates and improvements in power-network and IT • Fostering a culture of awareness • Measuring resiliency • Common processes, systems and collaboration • Incident response and countermeasures procedures • Technical, cultural, and political cooperation for • Integration of system planning, operations and IT success • Future developments and sharing knowledge Maurice Adriaensen, Business Regional Director Rudolf Baumann, Chairman of the Transmission Management and Operations Consulting, Security Cooperation, Senior Advisor Operations, DNV KEMA Energy & Sustainability swissgrid AG 11.40 LESSONS LEARNED FROM THE NEW SMART METER/GRID RISK ASSESSMENT 4.20 ENHANCING NETWORK MONITORING AND METHODOLOGY IN THE NETHERLANDS SITUATIONAL AWARENESS IN CRITICAL WORKSHOP ON THIS TOPIC MARCH 13TH • Introduction INFRASTRUCTURE • Explanation IS1 Risk Assessment methodology on • Current approaches to network monitoring and Smart Meter/Grid in NL • Practice on case “sector Privacy & Security AMI situational awareness requirements v2.0” • Strengths and shortcomings of current approaches • Lessons learned • Non-signature based approaches for improved • Status European standard on Smart Grid Cyber monitoring and situational awareness Security • Discussion of 2 use cases • Next steps Damiano Bolzoni, COO, Security Matters Johan Rambi, Alliance Manager Privacy & Security, Alliander 5.00 CHAIRMAN'S CLOSING REMARKS AND 12.20 NETWORKING LUNCH CLOSE OF DAY ONE Register online at: www.smartgridcybersecurity.co.uk • Alternatively fax your registration
  • 3. DAY TWO 12th of March 2013 www.smartgridcybersecurity.co.uk 8.30 REGISTRATION & COFFEE 12.20 NETWORKING LUNCH 9.00 CHAIRMAN'S OPENING REMARKS 1.50 SECURING DEVICES FOR HOME AND CONTROL Annemarie Zielstra, Director CPNINL, Centre for the NETWORKS Protection of National Infrastructure (CPNI) • Home and Control Networks • What is a Home network (HAN)? 9.10 HOW THE BOARD SHOULD TAKE CARE OF CYBER • What is a Control Network? RESILIENCE • Topologies • Cyber incidents on the increase, now a risk for any • Devices business - Types of devices on home and control networks • This leads to serious concerns on business process - Distinguishing characteristics continuity, privacy of consumers, identity theft or the protection of intellectual property - Security challenges • Cyber resilience needs to be part of strategic (both - Information Security Pillars risk and reputation) management and leadership is - Cryptography required - Public key cryptography • Creating concrete, visible boardroom recognition of - Symmetric key cryptography cyber resilience, as an enabler for cyber benefits - Hybrid cryptography • Translating boardroom recognition into risk - Protocol stack security management, communications, legal and operations - Building blocks Annemarie Zielstra, Chair of the European SCADA and - Frame security Control Systems Information Exchange (EuroSCSIE) - Authentication and key establishment Coordinator of European Reference Network of - Credentials Critical Infrastructure Protection (ERNCIP) Thematic - ZigBee SEP 1.0 stack security description Group on ICS and Smart Grids - ZigBee SEP 2.0 stack security description Robert Cragie, Chair, Security Task Group, 9.50 SCADA AND ICS SECURITY EXPERIENCES Zigbee Alliance • Experiences of how to run a Cyber Security program • Business Awareness and Societal Responsibility New for 2013 2.30 SECURITY ISSUES OF CONTROL SYSTEMS & - Compliance & Review WIRELESS METERS AT DRINKING WATER UTILITIES - Training New for 2013 • Use of technical mitigations such as IDS in • How do they differ from Smart energy meters? - Cogeneration • Communications infrastructure vulnerabilities of fixed - Hydro and wireless - Heating • Lack of encryption • Results and lessons learned • Theft Gitte Bergknut, MU Nordic Information Security • Data collection privacy Manager, EON Sverige AB • Billing John McNabb, Principal, Infrastructure Security Labs SYSTEMS, DEVICES, APPLICATIONS 3.10 AFTERNOON TEA 10.30 MORNING COFFEE EXPOSING VULNERABILITIES AND CYBER RISK 11.00 SMART GRID INTEGRATES LEGACY AND NEW ICS AND INSURANCE (SCADA, DCS, PLC) SYSTEMS, DEVICES, AND APPLICATIONS 3.40 VULNERABILITIES IN CRITICAL • Smart Grid Cyber Security – Integrating legacy and INFRASTRUCTURE AND EMBEDDED DEVICES new ICS enhances the grid and simultaneously • Key roles of embedded devices in our every day lives increases complexity and vulnerability • Vulnerabilities in embedded system • Cyber Security – needs to address ICS at all levels: field devices, the device systems, the applications • Findings and impact behind several recent SCADA New for 2013 supporting the devices and systems, the vulnerabilities that had worldwide impact communications/network interfacing to the devices • Moving towards a resolution of existing vulnerabilities and systems, etc. and avoidance of future vulnerabilities -Education of • ICS Cyber Security Controls: Technical, Physical, manufacturers, end users, academia, government, Administrative Risk Management – Smart Grid More and the general public challenging with increased complexity and extended • The process that occurs when end users or the systems and communications general public identify vulnerabilities in critical • Leverage existing ICS standards and frameworks: infrastructure IEC, NIST DOE, ISA, ISO, NERC , - What to expect • Smart Grid Architecture and Frameworks with ICS - How to reduce your risk • Threats and Vulnerabilities - How to leverage existing agencies • Examples of ICS systems utilized for Smart Grid : - Processes to minimize your required effort transformers, switches, inverters, DG Justin Clarke, Security Researcher, Cylance Patricia Robison, Smart Grid Project Manager, Con Edison of New York 4.20 CYBER RISKS & INSURANCE • Cyber Crime as an Industry 11.40 CREATING AN APP CONNECTED TO A BACKEND New for SYSTEM • Legal environment 2013 • Low awareness within the organisation about the • What is Cyber Insurance effects of a connected app • Industry specific exposures • The least secure point in a network will be the target Jacob Ingerslev, European Underwriting Director, • An app will be an extension of the company CNA Europe environment • Data stored on the mobile device 5.00 CHAIRMAN'S CLOSING REMARKS AND Daniel Zajd, Senior R and D Engineer, Vattenfall A B CLOSE OF DAY TWO to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
  • 4. POST CONFERENCE WORKSHOP Wednesday 13th March 2013, Copthorne Tara Hotel, London, UK Approaches to Network Monitoring and Situational Awareness in Critical Infrastructure 8.30am – 1.00pm In Association with University Twente Overview of workshop Programme This workshop will present solutions 8:30 Registration and Coffee currently available for monitoring critical networks and situational awareness. We 9.00 Current solutions for network monitoring and situational will analyse what are the major strengths awareness of critical networks and weaknesses of each approach, when - Signature-based it can be used and what is the output - Rule-based - Behavior-based users can expect. - Visualization We will wrap up the session with 10.30 Advantages and disadvantages of each approach demonstrations of the approaches - Where and when use what presented using real-life examples. - Which threats can be detected? - Technical skills required to operate Why you should attend: 11.30 Coffee Break • Understand the importance of 12.00 Demonstrations situational awareness and behavioural monitoring 1.00 Question and Answer session • Gain insight in to the benefits and disadvantages of signature based, rule based, behavioural and visualisation About the workshop host based solutions Dr Damian° Bolzoni (1981) received his PhD in 2009 from the • Learn what threats can be detected University of Twente, where he performed research on anomaly- based intrusion detection. Since 2008 he has been involved in and what skills are required to operate securing computer networks of critical infrastructure. Before joining • Interact with industry and engage with the University of Twente, he has been working for the Italian branch our workshop leader who is actively of KPMG, within the Information Risk Management division. Since involved in two security projects with 2009 he holds the position of Chief Operations Officer within major energy companies at present. SecurityMatters BV . New for 2013. SMi's Event Communities SMi Group is a global events business specialising in business to business conferences, workshops and masterclasses. We successfully create and run 250 events every year across 6 sectors including Defence and Security, Energy and Utilities, Finance and Pharmaceutical. We believe in bringing together the most knowledgeable experts from across the globe in each sector to learn, engage, share and network be it in London, Paris or Singapore. To further enhance the SMi experience, we have launched our very own SMi Event Communities. These will be exclusive, private and secure communities in which our clients will learn, share, engage and network. The SMi Event Communities will build and expand your experience beyond the conference, workshop or Masterclass you attend. Not just another "social network”, SMi’s Event Communities have been specifically designed around the needs of our delegates, speakers and sponsors, allowing all of our clients to foster longer term relationships with all of the other attendees beyond the two day event for year round engagement. To take part all you need to do is register for this event. SMi Group Communities Learn Engage Share Network
  • 5. SPONSORS DNV KEMA Energy & Sustainability, with more than 2,300 experts in over 30 countries around the world, is committed to driving the global transition toward a safe, reliable, efficient, and clean energy future. With a heritage of nearly 150 years, we specialize in providing world-class, innovative solutions in the fields of business & technical consultancy, testing, inspections & certification, risk management, and verification. As an objective and impartial knowledge-based company, we advise and support organizations along the energy value chain: producers, suppliers & end-users of energy, equipment manufacturers, as well as government bodies, corporations and non-governmental organizations. DNV KEMA Energy & Sustainability is part of DNV a global provider of services for , managing risk with more than 10,000 employees in over 100 countries. For more information on DNV KEMA Energy & Sustainability, visit www.dnvkema.com Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. www.fox-it.com Supported by For Sponsorship or Speaking Opportunities please contact Jamison Nesbitt Business Development Director P: +44 (0) 20 7827 6164 M: +44 (0) 7710 780 576 Email: jnesbitt@smi-online.co.uk Don’t miss out on social media networking! Follow us on Twitter @UtilitiesSMi and join us on Linkedin http://uk.linkedin.com/in/smigroup www.smartgridcybersecurity.co.uk
  • 6. EUROPEAN SMART GRID CYBER AND SCADA SECURITY Conference: 11th & 12th March 2013, Copthorne Tara Hotel, London Workshops: 13th March 2013 4 WAYS TO REGISTER ONLINE at www.smartgridcybersecurity.co.uk FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor PHONE on +44 (0) 870 9090 711 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS EARL BIRD □ Register by December 16th and receive £300 Y DISCOUNT off the conference price CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE I would like to attend: (Please tick as appropriate) Fee Total PUBLIC SECTOR, ACADEMICS & UTILITIES □ Conference & Workshop £1398.00 + VAT £1677.60 □ Conference only £899.00 +VAT £1078.80 Unique Reference Number □ Workshop A only £599.00 + VAT £718.80 Our Reference LV U-013 COMMERCIAL ORGANISATIONS DELEGATE DETAILS □ Conference & Workshop □ Conference only £2198.00 £1599.00 +VAT +VAT £2747.50 £1998 Please complete fully and clearly in capital letters. Please photocopy for additional □ Workshop only £599.00 +VAT £748.75 delegates. Title: Forename: PROMOTIONAL LITERATURE DISTRIBUTION Surname: □ Distribution of your company’s promotional literature to all conference attendees £999.00 + VAT £1198.80 Job Title: Department/Division: The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations. Company/Organisation: Email: Address: VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR. □ Please contact me to book my hotel Town/City: Alternatively call us on +44 (0) 870 9090 711, Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712 Direct Tel: Direct Fax: Mobile: DOCUMENTATION (Shipped 10-14 days after the event) Switchboard: I cannot attend but would like to purchase access to the following Document Portal/paper copy documentation: Price Total Signature: Date: □ Access to the conference documentation I agree to be bound by SMi's Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80 ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00 (or only £300 if ordered with the Document Portal) Title: Forename: Surname: PAYMENT Email: Payment must be made to SMi Group Ltd, and received before the event, by one of the following methods quoting reference D-018 and the delegate’s name. Bookings Address (if different from above): made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment: Town/City: □ UK BACS Sort Code 300009, Account 00936418 □ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU Post/Zip Code: Country: Swift (BIC): LOYDGB21013, Account 00936418 Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18 □ Cheque We can only accept Sterling cheques drawn on a UK bank. □ Credit Card □ Visa □ MasterCard □ American Express Terms and Conditions of Booking All credit card payments will be subject to standard credit card charges. Payment: If payment is not made at the time of booking, then an invoice will be issued and must be paid immediately and prior to the start of the event. If payment has not been received Card No: □□□□ □□□□ □□□□ □□□□ then credit card details will be requested and payment taken before entry to the event. Bookings within 7 days of event require payment on booking. Access to the Document Portal will not be given until payment has been received. Valid From □□/□□ Expiry Date □□/□□ Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card may not ‘share’ a place at an event. Please make separate bookings for each delegate. Cardholder’s Name: Cancellation: If you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start Signature: Date: of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has I agree to be bound by SMi's Terms and Conditions of Booking. paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept Card Billing Address (If different from above): cancellations of orders placed for Documentation or the Document Portal as these are reproduced specifically to order If we have to cancel the event for any reason, then we will . make a full refund immediately but disclaim any further liability , . Alterations: It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme. Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to VAT tell you about other products and services. Unless you tick here □ we may also share your data with third parties offering complementary products or services. If you have any queries VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on or want to update any of the data that we hold then please contact our Database Manager Document Portal and Literature Distribution for all UK customers and for those EU databasemanager@smi-online.co.uk or visit our website www .smi-online.co.uk/updates quoting the URN as detailed above your address on the attached letter . customers not supplying a registration number for their own country here: ________________ If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk