SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
M2M for the
                                                    Security
                                                    Industry
                                                                           8th to 9th May 2013,
                                                                          Copthorne Tara Hotel,
                                                                        London, United Kingdom



      KEY SPEAKERS INCLUDE:
     • Vodafone M2M, Global Business Development        • Telenor Connexion AB, CTO, Stephen Bryant
       Manager M2M, Peter Manolescue                    • Arkessa Limited, CTO, Paul Green
     • Concirrus Limited, Founder and COO,              • Tew Plus, Director at CCTV Services UK,
       Craig Hollingworth and Founder and CEO,           Les Beverley
       Andrew Yeoman
                                                        • Jabbakam, Owner Director, James Walker
     • Analysys Mason, Lead Analyst, Steve Hilton
                                                        • Stream Communications, Director,
     • Cooper Security, Managing Director, Matthew
                                                         Nigel Chadwick
       Phelps
                                                        • Transatel, CEO, Jacques Bonifay
     • Skywave Mobile Communications, Director of
                                                        • Deutsche Telekom, Head of M2M Competence
       Corporate Marketing, Jenn Markey
     • Sony Europe GmbH, General Manager Head of         Center, Juergen Hase

       Video Security Europe, Bruno Winnen              • Three, Wholesale Sales Manager, Tom Gardner

     • ADT Fire and Security, Security Product          • Barco, VP Global Strategic Marketing, Fredrik
       Manager, Peter Stanton                            Sjostedt




                        PRE CONFERENCE WORKSHOP 7TH MAY 2013

                  M2M and its impact on the Security Industry
                                       In association with Concirrus
                                             8.30am - 5.00pm


                                                 SPONSORED BY




                       www.m2mforsecurity.com
        Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711

     Book by February 28th and save £300 • Book by March 28th and save £100
DAY ONE 8th May 2013                                                                      www.m2mforsecurity.com


8.30          REGISTRATION & COFFEE                                      1.50   Satellite's Role in Critical Infrastructure Protection
                                                                                • Monitor assets securely; anytime, anywhere
9.00          CHAIRMAN'S OPENING REMARKS                                        • Efficient utilization and protection of high value assets
              Steve Hilton, Principal Analyst, Analysys Mason                    in sectors such as oil & gas and utilities
                                                                                • Security risks associated with unreliable (or no)
9.10          M2M for security: A key growth area on the verge of a              monitoring of SCADA equipment
              monumental shift                                                  • Case Study: Sample application of satellite M2M
              The security industry is on a verge of a monumental                where security is paramount.
              shift in the wake of the technological advancements               Jenn Markey, Director of Corporate Marketing,
              now being made in this fast growing sector. Vodafone              Skywave Mobile Communications
              are heavily involved in all aspects of machine to
              machine solutions for the security industry and see this   2.30   To realise pervasive video security with M2M
              as a key focus and growth area for their M2M division.            technology, now and future
 CASE STUDY




              Key areas of focus;                                               • Latest technologies and customers’ pain
              • Will the residential alarm industry survive the Smart           • Center to Edge to store data, Analyse video
               Home onslaught?                                                  • Current use cases
              • Can national and local alarm receiving centres find             • Sony’s solution
               new business models in a globally connected always-              Bruno Winnen, General Manager Head of Video
               on world?                                                        Security Europe, Sony Europe GmbH
              • If DIY alarms get any simpler how can installers make
               a living?                                                 3.10   AFTERNOON TEA
              • Do cloud services offer a real opportunity or is it a
               passing fad?
                                                                         3.40   APPLICATIONS PANEL 40 Minute Snapshot:
              • Will 4G/LTE offer real advantages? Who will be the
                                                                                The Battle for Smart Homes
               winners and losers?
                                                                                • Alarm systems, video monitoring, and other features
              • Is Big Data a big opportunity for security?
                                                                                 — can now be manipulated from a touchpad, mobile
              Peter Manolescue, Global Business Development
                                                                                 device or computer
              Manager M2M, Vodafone M2M
                                                                                • Who is best placed to facilitate a fully connected
                                                                                 home with video cameras and remote Web access?
9.50          M2M and its impact on the Security Industry
                                                                                 Telcos or Security firms?
              • M2M is changing the landscape of Security solutions
                                                                                • Are partnerships developing between security and
              • Access and mobility control/Alarm management/Asset
 CASE STUDY




                                                                                 telco for Smart Homes? If they do partner, how will
               Security/Vehicle Security /Surveillance /Safety and
                                                                                 this change the security response control centers?
               Security of Employees
                                                                                • What is the future of control centers? Will they
              • Integrating M2M into enterprise Security systems
                                                                                 becomem pure m2m rapid response?
              • Micro and Macro disruption
                                                                                • Can Security and Alarm industries survive? What do
              • New tariffs and service structures
                                                                                 these new business models look like?
              • Case Studies
                                                                                Peter Manolescue, Global Business Development
              Craig Hollingworth, Founder and COO, Concirrus Ltd
                                                                                Manager M2M, Vodafone M2M
              Andrew Yeoman, Founder and CEO, Concirrus Ltd
                                                                                Juergen Hase, Head of Deutsche Telekom's M2M
                                                                                Competence Center, Deutsche Telekom
10.30 MORNING COFFEE
                                                                                Steve Hilton, Lead Analyst, Analysys Mason

11.00 The Future of M2M Security
              • What is the status and size of the market today?         4.20   Automated M2M connectivity
              • What are top areas of growth and potential for this             • IP CCTV and remote monitoring
               industry segment?                                                • Wireless communication systems (wireless alarm
              • What are some examples of successful                             signalling)
               implementations of security-related solutions                    • Resilience in alarm monitoring
               worldwide?                                                       • M2M business benefits
              • What barriers could prevent continued growth?                   Peter Stanton, Security Product Manager, ADT Fire
              Steve Hilton, Principal Analyst, Analysys Mason                   and Security


11.40 M2M, meeting the demands of the Security industry                  5.00   Turning security into a solution
              • Intruder M2M: Open interfacing without proprietary              • Turning Security into a solution (Case Study)
               logical or physical connectors                                   • Reduce costs
              • Can/should M2M interfacing be a plug and play                   • Additional revenue channels
               capability?                                                      • More flexibility in their overall connectivity strategy
              • M2M and the value intruder detection can bring to the           • Security challenges in mobile M2M implementations
               wider Security industry                                          Stephen Bryant, CTO, Telenor Connexion AB
              Matthew Phelps, Managing Director, Cooper Security Ltd
                                                                         5.40   CHAIRMAN'S CLOSING REMARKS AND
12.20 NETWORKING LUNCH                                                          CLOSE OF DAY ONE



                  Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
DAY TWO 9th May 2013                                                                            www.m2mforsecurity.com


     8.30         REGISTRATION & COFFEE                                     2.00          Telecom innovations for security service providers
                                                                                          • Enhance connectivity with High Coverage SIMs able to
     9.00         CHAIRMAN'S OPENING REMARKS
                  Andrew Yeoman, Founder and CEO, Concirrus Limited                        connect to any network available in one country
                                                                                          • Impact of High Coverage SIMs for lone workers,
     9.10         "Security with Freedom"
                  Making security systems work anywhere                                    emergency situations and operational deployment
                  • Wire-free communications optimised for the security                   • Aggregated MVNO models for Security Service
     CASE STUDY




                    industry
                                                                                           Providers in Europe : integrating operator margin while
                  • Rapid deployment and ease of use – painless CCTV
                  • Multiple user access                                                   delivering a full service (connection + device +
                  • Multi-channel secure wireless communications using                     application)
                    multiple carriers for ultimate security
                  • Integrated monitoring and access control in remote                    • Enrich you M2M application with connectivity services :
                    locations                                                              diagnostics, location-based services
                  • Practical applications and delegate quiz
                                                                                          Jacques Bonifay CEO, T
                                                                                                         ,      ransatel
                  Paul Green, CTO, Arkessa Limited

     9.50         Enhancing Shared Situation Awareness in                   2.40          M2M Cloud for Security
                  Crisis Operations
                  • Network-centric visualization for Common-Operational-                 Benefits of Cloud and emerging technologies
                    Picture                                                               • Your organisation’s assets; Protecting each and every
                  • Dynamic multi-sensor display capablities and scenario
                                                                                           one of those elements is a vital challenge
                    management functions
                  • Increased speed & quality throughout the decision-                    • Property and equipment
                    making chain
                                                                                          • Staff
                  • Distributed display solutions scalable to tactical,
                    operational, joint applications                                       • Your brand itself
                  Fredrik Sjostedt, VP Global Strategic Marketing, Barco                  Benefits of Cloud and emerging technologies

     10.30 MORNING COFFEE                                                                 • Storage power of cloud computing
                                                                                          • User-friendly customer interface
     11.00 Design and delivery of rapid deployment M2M security
                                                                                          • Create, access and manage your own unique networks
           systems
           • Understanding the importance of telecoms design                               of IP camera's
           • Integrating M2M Solutions from design phase                                  Ease of task for end users
           • Perimeter and asset protection
           • Designing and installation of critical communications,                       • Define what you want to see, when you want to see it,
             perimeter and asset protection                                                who can see it and what actions they should take
             - challenges of protecting sterile zones, remote
                                                                                          James Wickes, Owner Director, Jabbakam
               locations and high security areas.
             - Behaviour monitoring and asset tracking
           • Case Studies                                                   3.20          AFTERNOON TEA
           Les Beverley Director at CCTV Services UK, Tew Plus
                         ,

     11.40 Deploying Devices in the Security Sector                         3.50          Industry snap shot case study: Tackling metal theft
           • Ensuring optimal network management and
                                                                                          through prevention and deterrent
             connectivity
                                                                             CASE STUDY




           • Network services deployed in the CCTV cameras at                             • The size and scale of the problem
             Glastonbury
                                                                                          • How does industry and Government approach it
           • 3G network services for image transmission and 3G
             CCTV                                                                          together?
           • UK in cash-in-transit and other security situations –                        • Dealing a lasting blow to criminals
             case study
           • Asset Management, remote monitoring – case study                             • Industry and enforcement efforts so far
           • Tech Lab – advanced test facility for M2M devices-                           Tim Field, Head of Press and Public Affairs, Energy
             latest research
                                                                                          Networks Association
           Nigel Chadwick, Director, Stream Communications

     12.20 NETWORKING LUNCH                                                 4.30          Managing the data hungry VAS needs of M2M Security
                                                                                                                  ,

     1.20         M2M-Enable Security Solutions                                           • Partnership models for successful service delivery
                  • Deutsche Telekom's business opportunities beyond                      • Supporting mission critical, heavy data M2M
                    connectivity
                                                                                           applications
                  • Security applications through integrated machine-to-
                    machine solutions                                                     • Ultrafast mobile networks and the opportunity for
                  • M2M for Security: From connectivity and hardware to                    M2M security
                    solutions and services
                  • Developer community and reliable partner network to                   Tom Gardner Wholesale Sales Manager, Hutchinson 3G
                                                                                                     ,
                    create and support security solutions
                  • Importance of reliable international network quality
                                                                            5.10          CHAIRMAN'S CLOSING REMARKS AND
                  Juergen Hase, Head of Deutsche Telekom's M2M
                  Competence Center, Deutsche Telekom                                     CLOSE OF DAY TWO



44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
PRE CONFERENCE WORKSHOP                    7th May 2013, Copthorne Tara Hotel, London, United Kingdom


                                                                                                 In association with


M2M and its impact on the
Security Industry
8.30am – 5.00pm


Overview of workshop                                       Programme
The security industry is being transformed by many         8.30    Registration & Coffee
factors – societal and economic changes mean that          9.00    Chairman's Opening Remarks
more and more security is required for traditional
markets of property, cars, and other assets but            9.10    The future landscape for security
increasingly for non-traditional areas such as energy,             Social, environmental, and economic changes –
food and general industry supply chain.                            what will the world look like in 2020?
Additionally the prevalence of new monitoring              10.10       Where we are now and how the 'cloud' and M2M
technology means that it is easier than ever for                       matters to Security Companies
customers to deploy their own CCTV and other
                                                           11.10       Morning Coffee
monitoring technologies creating a myriad of data.
Finally combined with cloud-based solutions this now       11.40       Micro- and Macro- disruptive technologies
means that small and large security providers have                 •   Access control
access to the same technology infrastructure. With                 •   Alarm management
this much change it is inevitable that there will be               •   Asset Security
new winners and losers and attending this workshop                 •   Energy & Food security
will ensure that you are a winner.                                 •   Employee security
                                                           12.40       Networking Lunch
Why you should attend:
This workshop aims to explore what the future              1.40    Q&A on morning topics
environment looks like, you will learn how to identify     2.10    What do the new business models look like?
and exploit new opportunities in the market.                       • Industry case studies
                                                                   • Data security
The participants will learn about new technologies                 • Managing continuity
entering the market, understand how to design and                  • Managing the H2M (Human to Machine) impact
deploy an M2M solution and how to assess the
impact to the people working in their own business         3.10    Afternoon Tea
and that of their customers. They will see first hand      3.40    Technology case studies
some of the latest technologies and learn from                     • NFC / IP-CCTV
expert opinion how to avoid some of the common             4.40    Q&A and wrap up
mistakes companies make using M2M.
                                                           5.00    Chairman's Closing Remarks and Close of Workshop




           About the workshop hosts
           Andrew Yeoman is the CEO of Concirrus Ltd. in London. He is responsible for the strategic direction of the
           business and oversees the day-to-day operations. With more than 30-years experience in the technology
           industry he has specialised for the last 15-years in understanding how to use technology to create, improve
           and disrupt business models. In addition to his role at Concirrus, Andy is non-executive director for a number
           of companies in the technology and security industry.

           Craig Hollingworth is the COO of Concirrus Ltd. He is responsible for the market and business
           development of Concirrus. With an impressive track record in the mobile and telematics industry,
           Craig has held senior management and board positions for a number of companies including O2,
           Orange and Masternaut prior to starting his own company .

           Charlie Curson is a principle at Mandarin LLP where he specialises in helping companies design, develop
           and implement strong growth strategies. Charlie's background includes Accenture, Innocent and Audi where
           his keen insight and meticulous planning and attention to detail have been behind some of the most
           impressive brand success stories in recent years.

           Concirrus was formed with the belief that by connecting assets to the internet and making that information
           ubiquitously available in the decision making process, customers can improve, create and disrupt business
           models. This market is known as machine to machine (M2M) and it is estimated that by 2020 more than 100
           billion devices will be connected to the 'internet of things'. Concirrus designs, builds and operates M2M
           solution for its customers as a one-stop-shop and is 'making M2M easy' for companies Worldwide. For more
           information please call 0207 969 2979 or check www.concirrus.com




                               Register online at: www.m2mforsecurity.com •
Sponsored by

     Vodafone Increasing or updating the security of buildings and
     assets can often be thought of as an increased cost and, for
     many businesses this is not an area where it's easy to justify
     installing intricate and sometimes expensive alarm systems. Using
     wireless technology, M2M enabled devices, cameras and alarms
     can be constantly connected to the emergency services or
     private monitoring stations. Vodafone Global M2M is a global
     supplier of M2M products and connectivity with more than 20
     years' experience. We have the largest mobile telecommunications
     network in the world can provide a global SIM, with one tariff,
     supported by a bespoke M2M Service level agreement build to
     suit your business needs. http://m2m.vodafone.com/home/

     SkyWave Mobile Communications is a global provider of wireless
     data communications for the Machine-to-Machine (M2M) market.
     SkyWave's products provide dependable communication,
     tracking, monitoring and remote management of fixed and mobile
     assets. Over the past 15 years, SkyWave has designed,
     manufactured and shipped more than 550,000 Inmarsat-based
     satellite terminals to customers globally in the transportation,
     maritime, oil and gas, utilities and government sectors. For more
     information, please visit www.SkyWave.com




Supported by



                                         For Sponsorship or Speaking
                                         Opportunities please contact
                                         Jamison Nesbitt
                                         Business Development Director
                                         P: +44 (0) 20 7827 6164
                                         M: +44 (0) 7710 780 576
                                         Email: jnesbitt@smi-online.co.uk




                                         Don’t miss out on social
                                         media networking!
                                         Follow us on Twitter @UtilitiesSMi
                                         and join us on Linkedin
                                         http://uk.linkedin.com/in/smigroup




www.m2mforsecurity.com
M2M FOR SECURITY
             Conference: 8th - 9th May 2013, Copthorne Tara Hotel, London, United Kingdom                                                                         Workshop: 7th May 2013
                                                                              4 WAYS TO REGISTER
                                  ONLINE at www.m2mforsecurity.com
FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor
PHONE on +44 (0) 870 9090 711                 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS


                                                                                                                       □      Register by February 28th and receive £300
                                                                                                  EARLY BIRD                  off the conference price
                                                                                                   DISCOUNT            □      Register by March 28th and receive £100
                                                                                                                              off the conference price


                                                                                                   CONFERENCE PRICES                                                   GROUP DISCOUNTS AVAILABLE

                                                                                                  I would like to attend: (Please tick as appropriate)                      Fee                       Total

                                                                                                  PUBLIC SECTOR AND ACADEMICS
Unique Reference Number                                                                           □ Conference & Workshop                                                   £1498.00       + VAT      £1797.60
                                                                                                  □     Conference only                                                     £899.00        +VAT       £1078.80
Our Reference                               LV U-015
                                                                                                  □     Workshop only                                                       £599.00        + VAT      £718.80

DELEGATE DETAILS                                                                                  COMMERCIAL ORGANISATIONS
Please complete fully and clearly in capital letters. Please photocopy for additional
                                                                                                  □ Conference & Workshop                                                   £2198.00       +VAT       £2637.60
delegates.                                                                                        □     Conference only                                                     £1599.00       +VAT       £1918.80
Title:                  Forename:                                                                 □     Workshop only                                                       £599.00        +VAT       £718.80

Surname:
                                                                                                  PROMOTIONAL LITERATURE DISTRIBUTION
Job Title:                                                                                        □ Distribution of your company’s promotional
                                                                                                    literature to all conference attendees                                  £999.00        + VAT      £1198.80
Department/Division:
Company/Organisation:                                                                             The conference fee includes refreshments, lunch, conference papers and access
                                                                                                  to the Document Portal containing all of the presentations.
Email:
Address:
                                                                                                   VENUE              Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.

                                                                                                  □ Please contact me to book my hotel
Town/City:
                                                                                                  Alternatively call us on +44 (0) 870 9090 711,
Post/Zip Code:                                  Country:                                          email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
Direct Tel:                                     Direct Fax:
Mobile:                                                                                            DOCUMENTATION                                                  (Shipped 10-14 days after the event)

Switchboard:                                                                                      I cannot attend but would like to purchase access to the following Document Portal/
                                                                                                  paper copy documentation:                               Price               Total
Signature:                                                       Date:                            □ Access to the conference documentation
I agree to be bound by SMi's Terms and Conditions of Booking.                                         on the Document Portal                              £499.00     + VAT   £598.80

ACCOUNTS DEPT                                                                                     □ The Conference Presentations - paper copy                               £499.00        -          £499.00
                                                                                                        (or only £300 if ordered with the Document Portal)
Title:                  Forename:
Surname:                                                                                           PAYMENT
Email:                                                                                            Payment must be made to SMi Group Ltd, and received before the event, by one of
                                                                                                  the following methods quoting reference U-015 and the delegate’s name. Bookings
Address (if different from above):
                                                                                                  made within 7 days of the event require payment on booking, methods of payment are
                                                                                                  below. Please indicate method of payment:

Town/City:                                                                                        □ UK BACS                    Sort Code 300009, Account 00936418
                                                                                                  □ Wire Transfer              Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Post/Zip Code:                                  Country:                                                                       Swift (BIC): LOYDGB21013, Account 00936418
Direct Tel:                                     Direct Fax:                                                                    IBAN GB48 LOYD 3000 0900 9364 18
                                                                                                  □ Cheque                     We can only accept Sterling cheques drawn on a UK bank.
                                                                                                  □ Credit Card                □ Visa      □ MasterCard            □ American Express
Terms and Conditions of Booking                                                                        All credit card payments will be subject to standard credit card charges.

Payment: If payment is not made at the time of booking, then an invoice will be issued and
must be paid immediately and prior to the start of the event. If payment has not been received
                                                                                                  Card No:  □□□□ □□□□ □□□□ □□□□
then credit card details will be requested and payment taken before entry to the event.
Bookings within 7 days of event require payment on booking. Access to the Document Portal
will not be given until payment has been received.
                                                                                                  Valid From □□/□□ Expiry Date □□/□□

Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates
                                                                                                  CVV Number □□□□                             3 digit security on reverse of card, 4 digits for AMEX card
may not ‘share’ a place at an event. Please make separate bookings for each delegate.
                                                                                                  Cardholder’s Name:
Cancellation: If you wish to cancel your attendance at an event and you are unable to send
a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,
providing that cancellation is made in writing and received at least 28 days prior to the start   Signature:                                                               Date:
of the event. Regretfully cancellation after this time cannot be accepted. We will however
provide the conferences documentation via the Document Portal to any delegate who has             I agree to be bound by SMi's Terms and Conditions of Booking.
paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we
are not normally able to provide documentation in these circumstances. We cannot accept
                                                                                                  Card Billing Address (If different from above):
cancellations of orders placed for Documentation or the Document Portal as these are
reproduced specifically to order If we have to cancel the event for any reason, then we will
                                  .
make a full refund immediately but disclaim any further liability
                                ,                                .

Alterations: It may become necessary for us to make alterations to the content, speakers,
timing, venue or date of the event compared to the advertised programme.                           VAT
Data Protection: The SMi Group gathers personal data in accordance with the UK Data
Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to        VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on
tell you about other products and services. Unless you tick here □ we may also share your
data with third parties offering complementary products or services. If you have any queries      Document Portal and Literature Distribution for all UK customers and for those EU
or want to update any of the data that we hold then please contact our Database Manager           customers not supplying a registration number for their own country here:
databasemanager@smi-online.co.uk or visit our website www  .smi-online.co.uk/updates quoting
the URN as detailed above your address on the attached letter  .
                                                                                                  ________________________________________________________________________________________________


 If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk

Más contenido relacionado

Destacado

SMi's E&P Information and Data Management
SMi's E&P Information and Data ManagementSMi's E&P Information and Data Management
SMi's E&P Information and Data ManagementDale Butler
 
C Suite responsibilities the changing role of the Chief security officer
C Suite responsibilities the changing role of the Chief security officerC Suite responsibilities the changing role of the Chief security officer
C Suite responsibilities the changing role of the Chief security officerDale Butler
 
Big Data and Data Science in the Intelligence Community
Big Data and Data Science in the Intelligence CommunityBig Data and Data Science in the Intelligence Community
Big Data and Data Science in the Intelligence CommunityDale Butler
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsDale Butler
 
CNS Orphan Diseases
CNS Orphan DiseasesCNS Orphan Diseases
CNS Orphan DiseasesDale Butler
 
SMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas IndustrySMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas IndustryDale Butler
 
SMi's MilSatCom Middle East & Africa
SMi's MilSatCom Middle East & AfricaSMi's MilSatCom Middle East & Africa
SMi's MilSatCom Middle East & AfricaDale Butler
 
Practical Application of E&P information Management Frameworks
Practical Application of E&P information Management FrameworksPractical Application of E&P information Management Frameworks
Practical Application of E&P information Management FrameworksDale Butler
 
SMi's 2nd Annual Smart Water Systems conference
SMi's 2nd Annual Smart Water Systems conferenceSMi's 2nd Annual Smart Water Systems conference
SMi's 2nd Annual Smart Water Systems conferenceDale Butler
 
SMi Group's Immunogenicity conference
SMi Group's Immunogenicity conferenceSMi Group's Immunogenicity conference
SMi Group's Immunogenicity conferenceDale Butler
 
Social media in utilities 2013
Social media in utilities 2013Social media in utilities 2013
Social media in utilities 2013Dale Butler
 
Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Dale Butler
 
Military flight training 2013
Military flight training 2013Military flight training 2013
Military flight training 2013Dale Butler
 
SMi Group's Big Data in Retail Financial Services conference
SMi Group's Big Data in Retail Financial Services conferenceSMi Group's Big Data in Retail Financial Services conference
SMi Group's Big Data in Retail Financial Services conferenceDale Butler
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
Electronic Warfare
Electronic WarfareElectronic Warfare
Electronic WarfareDale Butler
 
The Future of Military-Media Relations
The Future of Military-Media RelationsThe Future of Military-Media Relations
The Future of Military-Media RelationsDale Butler
 

Destacado (17)

SMi's E&P Information and Data Management
SMi's E&P Information and Data ManagementSMi's E&P Information and Data Management
SMi's E&P Information and Data Management
 
C Suite responsibilities the changing role of the Chief security officer
C Suite responsibilities the changing role of the Chief security officerC Suite responsibilities the changing role of the Chief security officer
C Suite responsibilities the changing role of the Chief security officer
 
Big Data and Data Science in the Intelligence Community
Big Data and Data Science in the Intelligence CommunityBig Data and Data Science in the Intelligence Community
Big Data and Data Science in the Intelligence Community
 
Securing Organisations Against Cyber Threats
Securing Organisations Against Cyber ThreatsSecuring Organisations Against Cyber Threats
Securing Organisations Against Cyber Threats
 
CNS Orphan Diseases
CNS Orphan DiseasesCNS Orphan Diseases
CNS Orphan Diseases
 
SMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas IndustrySMi Group's inaugural M2M for the Oil and Gas Industry
SMi Group's inaugural M2M for the Oil and Gas Industry
 
SMi's MilSatCom Middle East & Africa
SMi's MilSatCom Middle East & AfricaSMi's MilSatCom Middle East & Africa
SMi's MilSatCom Middle East & Africa
 
Practical Application of E&P information Management Frameworks
Practical Application of E&P information Management FrameworksPractical Application of E&P information Management Frameworks
Practical Application of E&P information Management Frameworks
 
SMi's 2nd Annual Smart Water Systems conference
SMi's 2nd Annual Smart Water Systems conferenceSMi's 2nd Annual Smart Water Systems conference
SMi's 2nd Annual Smart Water Systems conference
 
SMi Group's Immunogenicity conference
SMi Group's Immunogenicity conferenceSMi Group's Immunogenicity conference
SMi Group's Immunogenicity conference
 
Social media in utilities 2013
Social media in utilities 2013Social media in utilities 2013
Social media in utilities 2013
 
Social Media in Defence & Military 2012
Social Media in Defence & Military 2012Social Media in Defence & Military 2012
Social Media in Defence & Military 2012
 
Military flight training 2013
Military flight training 2013Military flight training 2013
Military flight training 2013
 
SMi Group's Big Data in Retail Financial Services conference
SMi Group's Big Data in Retail Financial Services conferenceSMi Group's Big Data in Retail Financial Services conference
SMi Group's Big Data in Retail Financial Services conference
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Electronic Warfare
Electronic WarfareElectronic Warfare
Electronic Warfare
 
The Future of Military-Media Relations
The Future of Military-Media RelationsThe Future of Military-Media Relations
The Future of Military-Media Relations
 

Similar a M2M for Security

M2M Fleet management
M2M Fleet managementM2M Fleet management
M2M Fleet managementDale Butler
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructureStuart Bennett
 
Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)Telefónica IoT
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...Stuart Bennett
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009findram
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Mythscumulocity
 
M2M World 2011 Brochure
M2M World 2011 BrochureM2M World 2011 Brochure
M2M World 2011 BrochureRebecca Mantle
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
2009 Brochure Csk Finance
2009 Brochure Csk Finance2009 Brochure Csk Finance
2009 Brochure Csk FinanceMarco Marazzini
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisOW2
 
Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)3G4G
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information SecurityVineet Sood
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Dale Butler
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 

Similar a M2M for Security (20)

M2M Fleet management
M2M Fleet managementM2M Fleet management
M2M Fleet management
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)Enabling a Smarter Future (Telefónica m2m)
Enabling a Smarter Future (Telefónica m2m)
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Myths
 
M2M World 2011 Brochure
M2M World 2011 BrochureM2M World 2011 Brochure
M2M World 2011 Brochure
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
2009 Brochure Csk Finance
2009 Brochure Csk Finance2009 Brochure Csk Finance
2009 Brochure Csk Finance
 
The global cyber security market
The global cyber security marketThe global cyber security market
The global cyber security market
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
 
Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)Summary of Network Security Conference (#NetworkSecurity)
Summary of Network Security Conference (#NetworkSecurity)
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012Oil and gas cyber security nov 2012
Oil and gas cyber security nov 2012
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 

Más de Dale Butler

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceDale Butler
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceDale Butler
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceDale Butler
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conferenceDale Butler
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceDale Butler
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceDale Butler
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceDale Butler
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceDale Butler
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceDale Butler
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020Dale Butler
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 Dale Butler
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020Dale Butler
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 Dale Butler
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 Dale Butler
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceDale Butler
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020Dale Butler
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceDale Butler
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceDale Butler
 

Más de Dale Butler (20)

SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conferenceSMi Group's Pharmaceutical Microbiology West Coast 2020 conference
SMi Group's Pharmaceutical Microbiology West Coast 2020 conference
 
SMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conferenceSMi Group's Pre-filled Syringes West Coast 2020 conference
SMi Group's Pre-filled Syringes West Coast 2020 conference
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
 
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conferenceSMi Group's Military Robotics and Autonomous Systems USA 2020 conference
SMi Group's Military Robotics and Autonomous Systems USA 2020 conference
 
SMi Group's Future Soldier Technology USA 2020 conference
SMi Group's  Future Soldier Technology USA 2020 conferenceSMi Group's  Future Soldier Technology USA 2020 conference
SMi Group's Future Soldier Technology USA 2020 conference
 
SMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conferenceSMi Group's Military Space USA 2020 conference
SMi Group's Military Space USA 2020 conference
 
SMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conferenceSMi Group's Helicopter Technology CEE 2020 conference
SMi Group's Helicopter Technology CEE 2020 conference
 
SMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conferenceSMi Group's Future Armoured Vehicles CEE 2020 conference
SMi Group's Future Armoured Vehicles CEE 2020 conference
 
SMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conferenceSMi Group's Unmanned Maritime Systems 2020 conference
SMi Group's Unmanned Maritime Systems 2020 conference
 
SMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conferenceSMi Group's Military PNT 2020 conference
SMi Group's Military PNT 2020 conference
 
SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020SMi Group's Defence Aviation Safety 2020
SMi Group's Defence Aviation Safety 2020
 
SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020 SMi Group's Pre-filled Syringes East Coast 2020
SMi Group's Pre-filled Syringes East Coast 2020
 
SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020SMi Group's Air Mission Planning and Support 2020
SMi Group's Air Mission Planning and Support 2020
 
SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020 SMi Group's Future Armoured Vehicles Situational Awareness 2020
SMi Group's Future Armoured Vehicles Situational Awareness 2020
 
SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020 SMi Group's Military Robotics and Autonomous Systems 2020
SMi Group's Military Robotics and Autonomous Systems 2020
 
SMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conferenceSMi Group's Future Soldier Technology 2020 conference
SMi Group's Future Soldier Technology 2020 conference
 
SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020SMi Group's Defence Logistics CEE 2020
SMi Group's Defence Logistics CEE 2020
 
Space Week 2020
Space Week 2020Space Week 2020
Space Week 2020
 
SMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conferenceSMi Group's Superbugs and Superdrugs 2020 conference
SMi Group's Superbugs and Superdrugs 2020 conference
 
SMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conferenceSMi Group's AI in Drug Discovery 2020 conference
SMi Group's AI in Drug Discovery 2020 conference
 

M2M for Security

  • 1. M2M for the Security Industry 8th to 9th May 2013, Copthorne Tara Hotel, London, United Kingdom KEY SPEAKERS INCLUDE: • Vodafone M2M, Global Business Development • Telenor Connexion AB, CTO, Stephen Bryant Manager M2M, Peter Manolescue • Arkessa Limited, CTO, Paul Green • Concirrus Limited, Founder and COO, • Tew Plus, Director at CCTV Services UK, Craig Hollingworth and Founder and CEO, Les Beverley Andrew Yeoman • Jabbakam, Owner Director, James Walker • Analysys Mason, Lead Analyst, Steve Hilton • Stream Communications, Director, • Cooper Security, Managing Director, Matthew Nigel Chadwick Phelps • Transatel, CEO, Jacques Bonifay • Skywave Mobile Communications, Director of • Deutsche Telekom, Head of M2M Competence Corporate Marketing, Jenn Markey • Sony Europe GmbH, General Manager Head of Center, Juergen Hase Video Security Europe, Bruno Winnen • Three, Wholesale Sales Manager, Tom Gardner • ADT Fire and Security, Security Product • Barco, VP Global Strategic Marketing, Fredrik Manager, Peter Stanton Sjostedt PRE CONFERENCE WORKSHOP 7TH MAY 2013 M2M and its impact on the Security Industry In association with Concirrus 8.30am - 5.00pm SPONSORED BY www.m2mforsecurity.com Register online and receive full information on all of SMi’s conferences Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711 Book by February 28th and save £300 • Book by March 28th and save £100
  • 2. DAY ONE 8th May 2013 www.m2mforsecurity.com 8.30 REGISTRATION & COFFEE 1.50 Satellite's Role in Critical Infrastructure Protection • Monitor assets securely; anytime, anywhere 9.00 CHAIRMAN'S OPENING REMARKS • Efficient utilization and protection of high value assets Steve Hilton, Principal Analyst, Analysys Mason in sectors such as oil & gas and utilities • Security risks associated with unreliable (or no) 9.10 M2M for security: A key growth area on the verge of a monitoring of SCADA equipment monumental shift • Case Study: Sample application of satellite M2M The security industry is on a verge of a monumental where security is paramount. shift in the wake of the technological advancements Jenn Markey, Director of Corporate Marketing, now being made in this fast growing sector. Vodafone Skywave Mobile Communications are heavily involved in all aspects of machine to machine solutions for the security industry and see this 2.30 To realise pervasive video security with M2M as a key focus and growth area for their M2M division. technology, now and future CASE STUDY Key areas of focus; • Latest technologies and customers’ pain • Will the residential alarm industry survive the Smart • Center to Edge to store data, Analyse video Home onslaught? • Current use cases • Can national and local alarm receiving centres find • Sony’s solution new business models in a globally connected always- Bruno Winnen, General Manager Head of Video on world? Security Europe, Sony Europe GmbH • If DIY alarms get any simpler how can installers make a living? 3.10 AFTERNOON TEA • Do cloud services offer a real opportunity or is it a passing fad? 3.40 APPLICATIONS PANEL 40 Minute Snapshot: • Will 4G/LTE offer real advantages? Who will be the The Battle for Smart Homes winners and losers? • Alarm systems, video monitoring, and other features • Is Big Data a big opportunity for security? — can now be manipulated from a touchpad, mobile Peter Manolescue, Global Business Development device or computer Manager M2M, Vodafone M2M • Who is best placed to facilitate a fully connected home with video cameras and remote Web access? 9.50 M2M and its impact on the Security Industry Telcos or Security firms? • M2M is changing the landscape of Security solutions • Are partnerships developing between security and • Access and mobility control/Alarm management/Asset CASE STUDY telco for Smart Homes? If they do partner, how will Security/Vehicle Security /Surveillance /Safety and this change the security response control centers? Security of Employees • What is the future of control centers? Will they • Integrating M2M into enterprise Security systems becomem pure m2m rapid response? • Micro and Macro disruption • Can Security and Alarm industries survive? What do • New tariffs and service structures these new business models look like? • Case Studies Peter Manolescue, Global Business Development Craig Hollingworth, Founder and COO, Concirrus Ltd Manager M2M, Vodafone M2M Andrew Yeoman, Founder and CEO, Concirrus Ltd Juergen Hase, Head of Deutsche Telekom's M2M Competence Center, Deutsche Telekom 10.30 MORNING COFFEE Steve Hilton, Lead Analyst, Analysys Mason 11.00 The Future of M2M Security • What is the status and size of the market today? 4.20 Automated M2M connectivity • What are top areas of growth and potential for this • IP CCTV and remote monitoring industry segment? • Wireless communication systems (wireless alarm • What are some examples of successful signalling) implementations of security-related solutions • Resilience in alarm monitoring worldwide? • M2M business benefits • What barriers could prevent continued growth? Peter Stanton, Security Product Manager, ADT Fire Steve Hilton, Principal Analyst, Analysys Mason and Security 11.40 M2M, meeting the demands of the Security industry 5.00 Turning security into a solution • Intruder M2M: Open interfacing without proprietary • Turning Security into a solution (Case Study) logical or physical connectors • Reduce costs • Can/should M2M interfacing be a plug and play • Additional revenue channels capability? • More flexibility in their overall connectivity strategy • M2M and the value intruder detection can bring to the • Security challenges in mobile M2M implementations wider Security industry Stephen Bryant, CTO, Telenor Connexion AB Matthew Phelps, Managing Director, Cooper Security Ltd 5.40 CHAIRMAN'S CLOSING REMARKS AND 12.20 NETWORKING LUNCH CLOSE OF DAY ONE Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
  • 3. DAY TWO 9th May 2013 www.m2mforsecurity.com 8.30 REGISTRATION & COFFEE 2.00 Telecom innovations for security service providers • Enhance connectivity with High Coverage SIMs able to 9.00 CHAIRMAN'S OPENING REMARKS Andrew Yeoman, Founder and CEO, Concirrus Limited connect to any network available in one country • Impact of High Coverage SIMs for lone workers, 9.10 "Security with Freedom" Making security systems work anywhere emergency situations and operational deployment • Wire-free communications optimised for the security • Aggregated MVNO models for Security Service CASE STUDY industry Providers in Europe : integrating operator margin while • Rapid deployment and ease of use – painless CCTV • Multiple user access delivering a full service (connection + device + • Multi-channel secure wireless communications using application) multiple carriers for ultimate security • Integrated monitoring and access control in remote • Enrich you M2M application with connectivity services : locations diagnostics, location-based services • Practical applications and delegate quiz Jacques Bonifay CEO, T , ransatel Paul Green, CTO, Arkessa Limited 9.50 Enhancing Shared Situation Awareness in 2.40 M2M Cloud for Security Crisis Operations • Network-centric visualization for Common-Operational- Benefits of Cloud and emerging technologies Picture • Your organisation’s assets; Protecting each and every • Dynamic multi-sensor display capablities and scenario one of those elements is a vital challenge management functions • Increased speed & quality throughout the decision- • Property and equipment making chain • Staff • Distributed display solutions scalable to tactical, operational, joint applications • Your brand itself Fredrik Sjostedt, VP Global Strategic Marketing, Barco Benefits of Cloud and emerging technologies 10.30 MORNING COFFEE • Storage power of cloud computing • User-friendly customer interface 11.00 Design and delivery of rapid deployment M2M security • Create, access and manage your own unique networks systems • Understanding the importance of telecoms design of IP camera's • Integrating M2M Solutions from design phase Ease of task for end users • Perimeter and asset protection • Designing and installation of critical communications, • Define what you want to see, when you want to see it, perimeter and asset protection who can see it and what actions they should take - challenges of protecting sterile zones, remote James Wickes, Owner Director, Jabbakam locations and high security areas. - Behaviour monitoring and asset tracking • Case Studies 3.20 AFTERNOON TEA Les Beverley Director at CCTV Services UK, Tew Plus , 11.40 Deploying Devices in the Security Sector 3.50 Industry snap shot case study: Tackling metal theft • Ensuring optimal network management and through prevention and deterrent connectivity CASE STUDY • Network services deployed in the CCTV cameras at • The size and scale of the problem Glastonbury • How does industry and Government approach it • 3G network services for image transmission and 3G CCTV together? • UK in cash-in-transit and other security situations – • Dealing a lasting blow to criminals case study • Asset Management, remote monitoring – case study • Industry and enforcement efforts so far • Tech Lab – advanced test facility for M2M devices- Tim Field, Head of Press and Public Affairs, Energy latest research Networks Association Nigel Chadwick, Director, Stream Communications 12.20 NETWORKING LUNCH 4.30 Managing the data hungry VAS needs of M2M Security , 1.20 M2M-Enable Security Solutions • Partnership models for successful service delivery • Deutsche Telekom's business opportunities beyond • Supporting mission critical, heavy data M2M connectivity applications • Security applications through integrated machine-to- machine solutions • Ultrafast mobile networks and the opportunity for • M2M for Security: From connectivity and hardware to M2M security solutions and services • Developer community and reliable partner network to Tom Gardner Wholesale Sales Manager, Hutchinson 3G , create and support security solutions • Importance of reliable international network quality 5.10 CHAIRMAN'S CLOSING REMARKS AND Juergen Hase, Head of Deutsche Telekom's M2M Competence Center, Deutsche Telekom CLOSE OF DAY TWO 44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
  • 4. PRE CONFERENCE WORKSHOP 7th May 2013, Copthorne Tara Hotel, London, United Kingdom In association with M2M and its impact on the Security Industry 8.30am – 5.00pm Overview of workshop Programme The security industry is being transformed by many 8.30 Registration & Coffee factors – societal and economic changes mean that 9.00 Chairman's Opening Remarks more and more security is required for traditional markets of property, cars, and other assets but 9.10 The future landscape for security increasingly for non-traditional areas such as energy, Social, environmental, and economic changes – food and general industry supply chain. what will the world look like in 2020? Additionally the prevalence of new monitoring 10.10 Where we are now and how the 'cloud' and M2M technology means that it is easier than ever for matters to Security Companies customers to deploy their own CCTV and other 11.10 Morning Coffee monitoring technologies creating a myriad of data. Finally combined with cloud-based solutions this now 11.40 Micro- and Macro- disruptive technologies means that small and large security providers have • Access control access to the same technology infrastructure. With • Alarm management this much change it is inevitable that there will be • Asset Security new winners and losers and attending this workshop • Energy & Food security will ensure that you are a winner. • Employee security 12.40 Networking Lunch Why you should attend: This workshop aims to explore what the future 1.40 Q&A on morning topics environment looks like, you will learn how to identify 2.10 What do the new business models look like? and exploit new opportunities in the market. • Industry case studies • Data security The participants will learn about new technologies • Managing continuity entering the market, understand how to design and • Managing the H2M (Human to Machine) impact deploy an M2M solution and how to assess the impact to the people working in their own business 3.10 Afternoon Tea and that of their customers. They will see first hand 3.40 Technology case studies some of the latest technologies and learn from • NFC / IP-CCTV expert opinion how to avoid some of the common 4.40 Q&A and wrap up mistakes companies make using M2M. 5.00 Chairman's Closing Remarks and Close of Workshop About the workshop hosts Andrew Yeoman is the CEO of Concirrus Ltd. in London. He is responsible for the strategic direction of the business and oversees the day-to-day operations. With more than 30-years experience in the technology industry he has specialised for the last 15-years in understanding how to use technology to create, improve and disrupt business models. In addition to his role at Concirrus, Andy is non-executive director for a number of companies in the technology and security industry. Craig Hollingworth is the COO of Concirrus Ltd. He is responsible for the market and business development of Concirrus. With an impressive track record in the mobile and telematics industry, Craig has held senior management and board positions for a number of companies including O2, Orange and Masternaut prior to starting his own company . Charlie Curson is a principle at Mandarin LLP where he specialises in helping companies design, develop and implement strong growth strategies. Charlie's background includes Accenture, Innocent and Audi where his keen insight and meticulous planning and attention to detail have been behind some of the most impressive brand success stories in recent years. Concirrus was formed with the belief that by connecting assets to the internet and making that information ubiquitously available in the decision making process, customers can improve, create and disrupt business models. This market is known as machine to machine (M2M) and it is estimated that by 2020 more than 100 billion devices will be connected to the 'internet of things'. Concirrus designs, builds and operates M2M solution for its customers as a one-stop-shop and is 'making M2M easy' for companies Worldwide. For more information please call 0207 969 2979 or check www.concirrus.com Register online at: www.m2mforsecurity.com •
  • 5. Sponsored by Vodafone Increasing or updating the security of buildings and assets can often be thought of as an increased cost and, for many businesses this is not an area where it's easy to justify installing intricate and sometimes expensive alarm systems. Using wireless technology, M2M enabled devices, cameras and alarms can be constantly connected to the emergency services or private monitoring stations. Vodafone Global M2M is a global supplier of M2M products and connectivity with more than 20 years' experience. We have the largest mobile telecommunications network in the world can provide a global SIM, with one tariff, supported by a bespoke M2M Service level agreement build to suit your business needs. http://m2m.vodafone.com/home/ SkyWave Mobile Communications is a global provider of wireless data communications for the Machine-to-Machine (M2M) market. SkyWave's products provide dependable communication, tracking, monitoring and remote management of fixed and mobile assets. Over the past 15 years, SkyWave has designed, manufactured and shipped more than 550,000 Inmarsat-based satellite terminals to customers globally in the transportation, maritime, oil and gas, utilities and government sectors. For more information, please visit www.SkyWave.com Supported by For Sponsorship or Speaking Opportunities please contact Jamison Nesbitt Business Development Director P: +44 (0) 20 7827 6164 M: +44 (0) 7710 780 576 Email: jnesbitt@smi-online.co.uk Don’t miss out on social media networking! Follow us on Twitter @UtilitiesSMi and join us on Linkedin http://uk.linkedin.com/in/smigroup www.m2mforsecurity.com
  • 6. M2M FOR SECURITY Conference: 8th - 9th May 2013, Copthorne Tara Hotel, London, United Kingdom Workshop: 7th May 2013 4 WAYS TO REGISTER ONLINE at www.m2mforsecurity.com FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor PHONE on +44 (0) 870 9090 711 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS □ Register by February 28th and receive £300 EARLY BIRD off the conference price DISCOUNT □ Register by March 28th and receive £100 off the conference price CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE I would like to attend: (Please tick as appropriate) Fee Total PUBLIC SECTOR AND ACADEMICS Unique Reference Number □ Conference & Workshop £1498.00 + VAT £1797.60 □ Conference only £899.00 +VAT £1078.80 Our Reference LV U-015 □ Workshop only £599.00 + VAT £718.80 DELEGATE DETAILS COMMERCIAL ORGANISATIONS Please complete fully and clearly in capital letters. Please photocopy for additional □ Conference & Workshop £2198.00 +VAT £2637.60 delegates. □ Conference only £1599.00 +VAT £1918.80 Title: Forename: □ Workshop only £599.00 +VAT £718.80 Surname: PROMOTIONAL LITERATURE DISTRIBUTION Job Title: □ Distribution of your company’s promotional literature to all conference attendees £999.00 + VAT £1198.80 Department/Division: Company/Organisation: The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations. Email: Address: VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR. □ Please contact me to book my hotel Town/City: Alternatively call us on +44 (0) 870 9090 711, Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712 Direct Tel: Direct Fax: Mobile: DOCUMENTATION (Shipped 10-14 days after the event) Switchboard: I cannot attend but would like to purchase access to the following Document Portal/ paper copy documentation: Price Total Signature: Date: □ Access to the conference documentation I agree to be bound by SMi's Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80 ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00 (or only £300 if ordered with the Document Portal) Title: Forename: Surname: PAYMENT Email: Payment must be made to SMi Group Ltd, and received before the event, by one of the following methods quoting reference U-015 and the delegate’s name. Bookings Address (if different from above): made within 7 days of the event require payment on booking, methods of payment are below. Please indicate method of payment: Town/City: □ UK BACS Sort Code 300009, Account 00936418 □ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU Post/Zip Code: Country: Swift (BIC): LOYDGB21013, Account 00936418 Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18 □ Cheque We can only accept Sterling cheques drawn on a UK bank. □ Credit Card □ Visa □ MasterCard □ American Express Terms and Conditions of Booking All credit card payments will be subject to standard credit card charges. Payment: If payment is not made at the time of booking, then an invoice will be issued and must be paid immediately and prior to the start of the event. If payment has not been received Card No: □□□□ □□□□ □□□□ □□□□ then credit card details will be requested and payment taken before entry to the event. Bookings within 7 days of event require payment on booking. Access to the Document Portal will not be given until payment has been received. Valid From □□/□□ Expiry Date □□/□□ Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another delegate to take your place at any time prior to the start of the event. Two or more delegates CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card may not ‘share’ a place at an event. Please make separate bookings for each delegate. Cardholder’s Name: Cancellation: If you wish to cancel your attendance at an event and you are unable to send a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge, providing that cancellation is made in writing and received at least 28 days prior to the start Signature: Date: of the event. Regretfully cancellation after this time cannot be accepted. We will however provide the conferences documentation via the Document Portal to any delegate who has I agree to be bound by SMi's Terms and Conditions of Booking. paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we are not normally able to provide documentation in these circumstances. We cannot accept Card Billing Address (If different from above): cancellations of orders placed for Documentation or the Document Portal as these are reproduced specifically to order If we have to cancel the event for any reason, then we will . make a full refund immediately but disclaim any further liability , . Alterations: It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event compared to the advertised programme. VAT Data Protection: The SMi Group gathers personal data in accordance with the UK Data Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on tell you about other products and services. Unless you tick here □ we may also share your data with third parties offering complementary products or services. If you have any queries Document Portal and Literature Distribution for all UK customers and for those EU or want to update any of the data that we hold then please contact our Database Manager customers not supplying a registration number for their own country here: databasemanager@smi-online.co.uk or visit our website www .smi-online.co.uk/updates quoting the URN as detailed above your address on the attached letter . ________________________________________________________________________________________________ If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk