1. M2M for the
Security
Industry
8th to 9th May 2013,
Copthorne Tara Hotel,
London, United Kingdom
KEY SPEAKERS INCLUDE:
• Vodafone M2M, Global Business Development • Telenor Connexion AB, CTO, Stephen Bryant
Manager M2M, Peter Manolescue • Arkessa Limited, CTO, Paul Green
• Concirrus Limited, Founder and COO, • Tew Plus, Director at CCTV Services UK,
Craig Hollingworth and Founder and CEO, Les Beverley
Andrew Yeoman
• Jabbakam, Owner Director, James Walker
• Analysys Mason, Lead Analyst, Steve Hilton
• Stream Communications, Director,
• Cooper Security, Managing Director, Matthew
Nigel Chadwick
Phelps
• Transatel, CEO, Jacques Bonifay
• Skywave Mobile Communications, Director of
• Deutsche Telekom, Head of M2M Competence
Corporate Marketing, Jenn Markey
• Sony Europe GmbH, General Manager Head of Center, Juergen Hase
Video Security Europe, Bruno Winnen • Three, Wholesale Sales Manager, Tom Gardner
• ADT Fire and Security, Security Product • Barco, VP Global Strategic Marketing, Fredrik
Manager, Peter Stanton Sjostedt
PRE CONFERENCE WORKSHOP 7TH MAY 2013
M2M and its impact on the Security Industry
In association with Concirrus
8.30am - 5.00pm
SPONSORED BY
www.m2mforsecurity.com
Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
Book by February 28th and save £300 • Book by March 28th and save £100
2. DAY ONE 8th May 2013 www.m2mforsecurity.com
8.30 REGISTRATION & COFFEE 1.50 Satellite's Role in Critical Infrastructure Protection
• Monitor assets securely; anytime, anywhere
9.00 CHAIRMAN'S OPENING REMARKS • Efficient utilization and protection of high value assets
Steve Hilton, Principal Analyst, Analysys Mason in sectors such as oil & gas and utilities
• Security risks associated with unreliable (or no)
9.10 M2M for security: A key growth area on the verge of a monitoring of SCADA equipment
monumental shift • Case Study: Sample application of satellite M2M
The security industry is on a verge of a monumental where security is paramount.
shift in the wake of the technological advancements Jenn Markey, Director of Corporate Marketing,
now being made in this fast growing sector. Vodafone Skywave Mobile Communications
are heavily involved in all aspects of machine to
machine solutions for the security industry and see this 2.30 To realise pervasive video security with M2M
as a key focus and growth area for their M2M division. technology, now and future
CASE STUDY
Key areas of focus; • Latest technologies and customers’ pain
• Will the residential alarm industry survive the Smart • Center to Edge to store data, Analyse video
Home onslaught? • Current use cases
• Can national and local alarm receiving centres find • Sony’s solution
new business models in a globally connected always- Bruno Winnen, General Manager Head of Video
on world? Security Europe, Sony Europe GmbH
• If DIY alarms get any simpler how can installers make
a living? 3.10 AFTERNOON TEA
• Do cloud services offer a real opportunity or is it a
passing fad?
3.40 APPLICATIONS PANEL 40 Minute Snapshot:
• Will 4G/LTE offer real advantages? Who will be the
The Battle for Smart Homes
winners and losers?
• Alarm systems, video monitoring, and other features
• Is Big Data a big opportunity for security?
— can now be manipulated from a touchpad, mobile
Peter Manolescue, Global Business Development
device or computer
Manager M2M, Vodafone M2M
• Who is best placed to facilitate a fully connected
home with video cameras and remote Web access?
9.50 M2M and its impact on the Security Industry
Telcos or Security firms?
• M2M is changing the landscape of Security solutions
• Are partnerships developing between security and
• Access and mobility control/Alarm management/Asset
CASE STUDY
telco for Smart Homes? If they do partner, how will
Security/Vehicle Security /Surveillance /Safety and
this change the security response control centers?
Security of Employees
• What is the future of control centers? Will they
• Integrating M2M into enterprise Security systems
becomem pure m2m rapid response?
• Micro and Macro disruption
• Can Security and Alarm industries survive? What do
• New tariffs and service structures
these new business models look like?
• Case Studies
Peter Manolescue, Global Business Development
Craig Hollingworth, Founder and COO, Concirrus Ltd
Manager M2M, Vodafone M2M
Andrew Yeoman, Founder and CEO, Concirrus Ltd
Juergen Hase, Head of Deutsche Telekom's M2M
Competence Center, Deutsche Telekom
10.30 MORNING COFFEE
Steve Hilton, Lead Analyst, Analysys Mason
11.00 The Future of M2M Security
• What is the status and size of the market today? 4.20 Automated M2M connectivity
• What are top areas of growth and potential for this • IP CCTV and remote monitoring
industry segment? • Wireless communication systems (wireless alarm
• What are some examples of successful signalling)
implementations of security-related solutions • Resilience in alarm monitoring
worldwide? • M2M business benefits
• What barriers could prevent continued growth? Peter Stanton, Security Product Manager, ADT Fire
Steve Hilton, Principal Analyst, Analysys Mason and Security
11.40 M2M, meeting the demands of the Security industry 5.00 Turning security into a solution
• Intruder M2M: Open interfacing without proprietary • Turning Security into a solution (Case Study)
logical or physical connectors • Reduce costs
• Can/should M2M interfacing be a plug and play • Additional revenue channels
capability? • More flexibility in their overall connectivity strategy
• M2M and the value intruder detection can bring to the • Security challenges in mobile M2M implementations
wider Security industry Stephen Bryant, CTO, Telenor Connexion AB
Matthew Phelps, Managing Director, Cooper Security Ltd
5.40 CHAIRMAN'S CLOSING REMARKS AND
12.20 NETWORKING LUNCH CLOSE OF DAY ONE
Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
3. DAY TWO 9th May 2013 www.m2mforsecurity.com
8.30 REGISTRATION & COFFEE 2.00 Telecom innovations for security service providers
• Enhance connectivity with High Coverage SIMs able to
9.00 CHAIRMAN'S OPENING REMARKS
Andrew Yeoman, Founder and CEO, Concirrus Limited connect to any network available in one country
• Impact of High Coverage SIMs for lone workers,
9.10 "Security with Freedom"
Making security systems work anywhere emergency situations and operational deployment
• Wire-free communications optimised for the security • Aggregated MVNO models for Security Service
CASE STUDY
industry
Providers in Europe : integrating operator margin while
• Rapid deployment and ease of use – painless CCTV
• Multiple user access delivering a full service (connection + device +
• Multi-channel secure wireless communications using application)
multiple carriers for ultimate security
• Integrated monitoring and access control in remote • Enrich you M2M application with connectivity services :
locations diagnostics, location-based services
• Practical applications and delegate quiz
Jacques Bonifay CEO, T
, ransatel
Paul Green, CTO, Arkessa Limited
9.50 Enhancing Shared Situation Awareness in 2.40 M2M Cloud for Security
Crisis Operations
• Network-centric visualization for Common-Operational- Benefits of Cloud and emerging technologies
Picture • Your organisation’s assets; Protecting each and every
• Dynamic multi-sensor display capablities and scenario
one of those elements is a vital challenge
management functions
• Increased speed & quality throughout the decision- • Property and equipment
making chain
• Staff
• Distributed display solutions scalable to tactical,
operational, joint applications • Your brand itself
Fredrik Sjostedt, VP Global Strategic Marketing, Barco Benefits of Cloud and emerging technologies
10.30 MORNING COFFEE • Storage power of cloud computing
• User-friendly customer interface
11.00 Design and delivery of rapid deployment M2M security
• Create, access and manage your own unique networks
systems
• Understanding the importance of telecoms design of IP camera's
• Integrating M2M Solutions from design phase Ease of task for end users
• Perimeter and asset protection
• Designing and installation of critical communications, • Define what you want to see, when you want to see it,
perimeter and asset protection who can see it and what actions they should take
- challenges of protecting sterile zones, remote
James Wickes, Owner Director, Jabbakam
locations and high security areas.
- Behaviour monitoring and asset tracking
• Case Studies 3.20 AFTERNOON TEA
Les Beverley Director at CCTV Services UK, Tew Plus
,
11.40 Deploying Devices in the Security Sector 3.50 Industry snap shot case study: Tackling metal theft
• Ensuring optimal network management and
through prevention and deterrent
connectivity
CASE STUDY
• Network services deployed in the CCTV cameras at • The size and scale of the problem
Glastonbury
• How does industry and Government approach it
• 3G network services for image transmission and 3G
CCTV together?
• UK in cash-in-transit and other security situations – • Dealing a lasting blow to criminals
case study
• Asset Management, remote monitoring – case study • Industry and enforcement efforts so far
• Tech Lab – advanced test facility for M2M devices- Tim Field, Head of Press and Public Affairs, Energy
latest research
Networks Association
Nigel Chadwick, Director, Stream Communications
12.20 NETWORKING LUNCH 4.30 Managing the data hungry VAS needs of M2M Security
,
1.20 M2M-Enable Security Solutions • Partnership models for successful service delivery
• Deutsche Telekom's business opportunities beyond • Supporting mission critical, heavy data M2M
connectivity
applications
• Security applications through integrated machine-to-
machine solutions • Ultrafast mobile networks and the opportunity for
• M2M for Security: From connectivity and hardware to M2M security
solutions and services
• Developer community and reliable partner network to Tom Gardner Wholesale Sales Manager, Hutchinson 3G
,
create and support security solutions
• Importance of reliable international network quality
5.10 CHAIRMAN'S CLOSING REMARKS AND
Juergen Hase, Head of Deutsche Telekom's M2M
Competence Center, Deutsche Telekom CLOSE OF DAY TWO
44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
4. PRE CONFERENCE WORKSHOP 7th May 2013, Copthorne Tara Hotel, London, United Kingdom
In association with
M2M and its impact on the
Security Industry
8.30am – 5.00pm
Overview of workshop Programme
The security industry is being transformed by many 8.30 Registration & Coffee
factors – societal and economic changes mean that 9.00 Chairman's Opening Remarks
more and more security is required for traditional
markets of property, cars, and other assets but 9.10 The future landscape for security
increasingly for non-traditional areas such as energy, Social, environmental, and economic changes –
food and general industry supply chain. what will the world look like in 2020?
Additionally the prevalence of new monitoring 10.10 Where we are now and how the 'cloud' and M2M
technology means that it is easier than ever for matters to Security Companies
customers to deploy their own CCTV and other
11.10 Morning Coffee
monitoring technologies creating a myriad of data.
Finally combined with cloud-based solutions this now 11.40 Micro- and Macro- disruptive technologies
means that small and large security providers have • Access control
access to the same technology infrastructure. With • Alarm management
this much change it is inevitable that there will be • Asset Security
new winners and losers and attending this workshop • Energy & Food security
will ensure that you are a winner. • Employee security
12.40 Networking Lunch
Why you should attend:
This workshop aims to explore what the future 1.40 Q&A on morning topics
environment looks like, you will learn how to identify 2.10 What do the new business models look like?
and exploit new opportunities in the market. • Industry case studies
• Data security
The participants will learn about new technologies • Managing continuity
entering the market, understand how to design and • Managing the H2M (Human to Machine) impact
deploy an M2M solution and how to assess the
impact to the people working in their own business 3.10 Afternoon Tea
and that of their customers. They will see first hand 3.40 Technology case studies
some of the latest technologies and learn from • NFC / IP-CCTV
expert opinion how to avoid some of the common 4.40 Q&A and wrap up
mistakes companies make using M2M.
5.00 Chairman's Closing Remarks and Close of Workshop
About the workshop hosts
Andrew Yeoman is the CEO of Concirrus Ltd. in London. He is responsible for the strategic direction of the
business and oversees the day-to-day operations. With more than 30-years experience in the technology
industry he has specialised for the last 15-years in understanding how to use technology to create, improve
and disrupt business models. In addition to his role at Concirrus, Andy is non-executive director for a number
of companies in the technology and security industry.
Craig Hollingworth is the COO of Concirrus Ltd. He is responsible for the market and business
development of Concirrus. With an impressive track record in the mobile and telematics industry,
Craig has held senior management and board positions for a number of companies including O2,
Orange and Masternaut prior to starting his own company .
Charlie Curson is a principle at Mandarin LLP where he specialises in helping companies design, develop
and implement strong growth strategies. Charlie's background includes Accenture, Innocent and Audi where
his keen insight and meticulous planning and attention to detail have been behind some of the most
impressive brand success stories in recent years.
Concirrus was formed with the belief that by connecting assets to the internet and making that information
ubiquitously available in the decision making process, customers can improve, create and disrupt business
models. This market is known as machine to machine (M2M) and it is estimated that by 2020 more than 100
billion devices will be connected to the 'internet of things'. Concirrus designs, builds and operates M2M
solution for its customers as a one-stop-shop and is 'making M2M easy' for companies Worldwide. For more
information please call 0207 969 2979 or check www.concirrus.com
Register online at: www.m2mforsecurity.com •
5. Sponsored by
Vodafone Increasing or updating the security of buildings and
assets can often be thought of as an increased cost and, for
many businesses this is not an area where it's easy to justify
installing intricate and sometimes expensive alarm systems. Using
wireless technology, M2M enabled devices, cameras and alarms
can be constantly connected to the emergency services or
private monitoring stations. Vodafone Global M2M is a global
supplier of M2M products and connectivity with more than 20
years' experience. We have the largest mobile telecommunications
network in the world can provide a global SIM, with one tariff,
supported by a bespoke M2M Service level agreement build to
suit your business needs. http://m2m.vodafone.com/home/
SkyWave Mobile Communications is a global provider of wireless
data communications for the Machine-to-Machine (M2M) market.
SkyWave's products provide dependable communication,
tracking, monitoring and remote management of fixed and mobile
assets. Over the past 15 years, SkyWave has designed,
manufactured and shipped more than 550,000 Inmarsat-based
satellite terminals to customers globally in the transportation,
maritime, oil and gas, utilities and government sectors. For more
information, please visit www.SkyWave.com
Supported by
For Sponsorship or Speaking
Opportunities please contact
Jamison Nesbitt
Business Development Director
P: +44 (0) 20 7827 6164
M: +44 (0) 7710 780 576
Email: jnesbitt@smi-online.co.uk
Don’t miss out on social
media networking!
Follow us on Twitter @UtilitiesSMi
and join us on Linkedin
http://uk.linkedin.com/in/smigroup
www.m2mforsecurity.com
6. M2M FOR SECURITY
Conference: 8th - 9th May 2013, Copthorne Tara Hotel, London, United Kingdom Workshop: 7th May 2013
4 WAYS TO REGISTER
ONLINE at www.m2mforsecurity.com
FAX your booking form to +44 (0) 870 9090 712 POST your booking form to: Events Team, SMi Group Ltd, 2nd Floor
PHONE on +44 (0) 870 9090 711 South, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS
□ Register by February 28th and receive £300
EARLY BIRD off the conference price
DISCOUNT □ Register by March 28th and receive £100
off the conference price
CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE
I would like to attend: (Please tick as appropriate) Fee Total
PUBLIC SECTOR AND ACADEMICS
Unique Reference Number □ Conference & Workshop £1498.00 + VAT £1797.60
□ Conference only £899.00 +VAT £1078.80
Our Reference LV U-015
□ Workshop only £599.00 + VAT £718.80
DELEGATE DETAILS COMMERCIAL ORGANISATIONS
Please complete fully and clearly in capital letters. Please photocopy for additional
□ Conference & Workshop £2198.00 +VAT £2637.60
delegates. □ Conference only £1599.00 +VAT £1918.80
Title: Forename: □ Workshop only £599.00 +VAT £718.80
Surname:
PROMOTIONAL LITERATURE DISTRIBUTION
Job Title: □ Distribution of your company’s promotional
literature to all conference attendees £999.00 + VAT £1198.80
Department/Division:
Company/Organisation: The conference fee includes refreshments, lunch, conference papers and access
to the Document Portal containing all of the presentations.
Email:
Address:
VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.
□ Please contact me to book my hotel
Town/City:
Alternatively call us on +44 (0) 870 9090 711,
Post/Zip Code: Country: email: hotels@smi-online.co.uk or fax +44 (0) 870 9090 712
Direct Tel: Direct Fax:
Mobile: DOCUMENTATION (Shipped 10-14 days after the event)
Switchboard: I cannot attend but would like to purchase access to the following Document Portal/
paper copy documentation: Price Total
Signature: Date: □ Access to the conference documentation
I agree to be bound by SMi's Terms and Conditions of Booking. on the Document Portal £499.00 + VAT £598.80
ACCOUNTS DEPT □ The Conference Presentations - paper copy £499.00 - £499.00
(or only £300 if ordered with the Document Portal)
Title: Forename:
Surname: PAYMENT
Email: Payment must be made to SMi Group Ltd, and received before the event, by one of
the following methods quoting reference U-015 and the delegate’s name. Bookings
Address (if different from above):
made within 7 days of the event require payment on booking, methods of payment are
below. Please indicate method of payment:
Town/City: □ UK BACS Sort Code 300009, Account 00936418
□ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Post/Zip Code: Country: Swift (BIC): LOYDGB21013, Account 00936418
Direct Tel: Direct Fax: IBAN GB48 LOYD 3000 0900 9364 18
□ Cheque We can only accept Sterling cheques drawn on a UK bank.
□ Credit Card □ Visa □ MasterCard □ American Express
Terms and Conditions of Booking All credit card payments will be subject to standard credit card charges.
Payment: If payment is not made at the time of booking, then an invoice will be issued and
must be paid immediately and prior to the start of the event. If payment has not been received
Card No: □□□□ □□□□ □□□□ □□□□
then credit card details will be requested and payment taken before entry to the event.
Bookings within 7 days of event require payment on booking. Access to the Document Portal
will not be given until payment has been received.
Valid From □□/□□ Expiry Date □□/□□
Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, another
delegate to take your place at any time prior to the start of the event. Two or more delegates
CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX card
may not ‘share’ a place at an event. Please make separate bookings for each delegate.
Cardholder’s Name:
Cancellation: If you wish to cancel your attendance at an event and you are unable to send
a substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,
providing that cancellation is made in writing and received at least 28 days prior to the start Signature: Date:
of the event. Regretfully cancellation after this time cannot be accepted. We will however
provide the conferences documentation via the Document Portal to any delegate who has I agree to be bound by SMi's Terms and Conditions of Booking.
paid but is unable to attend for any reason. Due to the interactive nature of the Briefings we
are not normally able to provide documentation in these circumstances. We cannot accept
Card Billing Address (If different from above):
cancellations of orders placed for Documentation or the Document Portal as these are
reproduced specifically to order If we have to cancel the event for any reason, then we will
.
make a full refund immediately but disclaim any further liability
, .
Alterations: It may become necessary for us to make alterations to the content, speakers,
timing, venue or date of the event compared to the advertised programme. VAT
Data Protection: The SMi Group gathers personal data in accordance with the UK Data
Protection Act 1998 and we may use this to contact you by telephone, fax, post or email to VAT at 20% is charged on the attendance fees for all delegates. VAT is also charged on
tell you about other products and services. Unless you tick here □ we may also share your
data with third parties offering complementary products or services. If you have any queries Document Portal and Literature Distribution for all UK customers and for those EU
or want to update any of the data that we hold then please contact our Database Manager customers not supplying a registration number for their own country here:
databasemanager@smi-online.co.uk or visit our website www .smi-online.co.uk/updates quoting
the URN as detailed above your address on the attached letter .
________________________________________________________________________________________________
If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at events@smi-online.co.uk