m2m for security
DESCRIPTION
TRANSCRIPT
8th to 9th May 2013, Copthorne Tara Hotel,
London, United Kingdom
KEY SPEAKERS INCLUDE:
• Vodafone M2M, Global Business Development
Manager M2M, Peter Manolescue
• Concirrus Limited, Founder and COO,
Craig Hollingworth and Founder and CEO,
Andrew Yeoman
• Analysys Mason, Lead Analyst, Steve Hilton
• Cooper Security, Managing Director, Matthew
Phelps
• Skywave Mobile Communications, Director of
Corporate Marketing, Jenn Markey
• Sony Europe GmbH, General Manager Head of
Video Security Europe, Bruno Winnen
• ADT Fire and Security, Security Product
Manager, Peter Stanton
• Telenor Connexion AB, CTO, Stephen Bryant
• Arkessa Limited, CTO, Paul Green
• Tew Plus, Director at CCTV Services UK,
Les Beverley
• Jabbakam, Owner Director, James Walker
• Stream Communications, Director,
Nigel Chadwick
• Transatel, CEO, Jacques Bonifay
• Deutsche Telekom, Head of M2M Competence
Center, Juergen Hase
• Three, Wholesale Sales Manager, Tom Gardner
• Barco, VP Global Strategic Marketing, Fredrik
Sjostedt
SPONSORED BY
M2M for the Security Industry
M2M and its impact on the Security Industry In association with Concirrus
8.30am - 5.00pm
PRE CONFERENCE WORKSHOP 7TH MAY 2013
www.m2mforsecurity.com Register online and receive full information on all of SMi’s conferences
Alternatively fax your registration to +44 (0) 870 9090 712 or call +44 (0) 870 9090 711
Book by February 28th and save £300 • Book by March 28th and save £100
Register online at: www.m2mforsecurity.com • Alternatively fax your registration to +
CASE STUDY
DAY ONE 8th May 2013 www.m2mforsecurity.com
8.30 REGISTRATION & COFFEE
9.00 CHAIRMAN'S OPENING REMARKSSteve Hilton, Principal Analyst, Analysys Mason
9.10 M2M for security: A key growth area on the verge of a monumental shiftThe security industry is on a verge of a monumentalshift in the wake of the technological advancementsnow being made in this fast growing sector. Vodafoneare heavily involved in all aspects of machine tomachine solutions for the security industry and see thisas a key focus and growth area for their M2M division.Key areas of focus;• Will the residential alarm industry survive the SmartHome onslaught?
• Can national and local alarm receiving centres findnew business models in a globally connected always-on world?
• If DIY alarms get any simpler how can installers makea living?
• Do cloud services offer a real opportunity or is it apassing fad?
• Will 4G/LTE offer real advantages? Who will be thewinners and losers?
• Is Big Data a big opportunity for security? Peter Manolescue, Global Business DevelopmentManager M2M, Vodafone M2M
9.50 M2M and its impact on the Security Industry• M2M is changing the landscape of Security solutions • Access and mobility control/Alarm management/AssetSecurity/Vehicle Security /Surveillance /Safety andSecurity of Employees
• Integrating M2M into enterprise Security systems• Micro and Macro disruption• New tariffs and service structures• Case Studies Craig Hollingworth, Founder and COO, Concirrus LtdAndrew Yeoman, Founder and CEO, Concirrus Ltd
10.30 MORNING COFFEE
11.00 The Future of M2M Security • What is the status and size of the market today?• What are top areas of growth and potential for thisindustry segment?
• What are some examples of successfulimplementations of security-related solutionsworldwide?
• What barriers could prevent continued growth?Steve Hilton, Principal Analyst, Analysys Mason
11.40 M2M, meeting the demands of the Security industry• Intruder M2M: Open interfacing without proprietarylogical or physical connectors
• Can/should M2M interfacing be a plug and playcapability?
• M2M and the value intruder detection can bring to thewider Security industry
Matthew Phelps, Managing Director, Cooper Security Ltd
12.20 NETWORKING LUNCH
1.50 Satellite's Role in Critical Infrastructure Protection• Monitor assets securely; anytime, anywhere• Efficient utilization and protection of high value assetsin sectors such as oil & gas and utilities
• Security risks associated with unreliable (or no)monitoring of SCADA equipment
• Case Study: Sample application of satellite M2Mwhere security is paramount.
Jenn Markey, Director of Corporate Marketing,Skywave Mobile Communications
2.30 To realise pervasive video security with M2M technology, now and future• Latest technologies and customers’ pain• Center to Edge to store data, Analyse video • Current use cases• Sony’s solutionBruno Winnen, General Manager Head of VideoSecurity Europe, Sony Europe GmbH
3.10 AFTERNOON TEA
3.40 APPLICATIONS PANEL 40 Minute Snapshot: The Battle for Smart Homes• Alarm systems, video monitoring, and other features— can now be manipulated from a touchpad, mobiledevice or computer
• Who is best placed to facilitate a fully connectedhome with video cameras and remote Web access?Telcos or Security firms?
• Are partnerships developing between security andtelco for Smart Homes? If they do partner, how willthis change the security response control centers?
• What is the future of control centers? Will theybecomem pure m2m rapid response?
• Can Security and Alarm industries survive? What dothese new business models look like?
Peter Manolescue, Global Business DevelopmentManager M2M, Vodafone M2M Juergen Hase, Head of Deutsche Telekom's M2MCompetence Center, Deutsche Telekom Steve Hilton, Lead Analyst, Analysys Mason
4.20 Automated M2M connectivity • IP CCTV and remote monitoring • Wireless communication systems (wireless alarmsignalling)
• Resilience in alarm monitoring• M2M business benefitsPeter Stanton, Security Product Manager, ADT Fireand Security
5.00 Turning security into a solution • Turning Security into a solution (Case Study)• Reduce costs• Additional revenue channels• More flexibility in their overall connectivity strategy• Security challenges in mobile M2M implementationsStephen Bryant, CTO, Telenor Connexion AB
5.40 CHAIRMAN'S CLOSING REMARKS AND CLOSE OF DAY ONE
CASE STUDY
CASE STUDY
44 (0) 870 9090 712 or call +44 (0) 870 9090 711 • GROUP DISCOUNTS AVAILABLE •
DAY TWO 9th May 2013 www.m2mforsecurity.com CASE STUDY
8.30 REGISTRATION & COFFEE
9.00 CHAIRMAN'S OPENING REMARKSAndrew Yeoman, Founder and CEO, Concirrus Limited
9.10 "Security with Freedom" Making security systems work anywhere • Wire-free communications optimised for the securityindustry
• Rapid deployment and ease of use – painless CCTV• Multiple user access• Multi-channel secure wireless communications usingmultiple carriers for ultimate security
• Integrated monitoring and access control in remotelocations
• Practical applications and delegate quiz Paul Green, CTO, Arkessa Limited
9.50 Enhancing Shared Situation Awareness in Crisis Operations• Network-centric visualization for Common-Operational-Picture
• Dynamic multi-sensor display capablities and scenariomanagement functions
• Increased speed & quality throughout the decision-making chain
• Distributed display solutions scalable to tactical,operational, joint applications
Fredrik Sjostedt, VP Global Strategic Marketing, Barco
10.30 MORNING COFFEE
11.00 Design and delivery of rapid deployment M2M security systems• Understanding the importance of telecoms design• Integrating M2M Solutions from design phase• Perimeter and asset protection • Designing and installation of critical communications,perimeter and asset protection - challenges of protecting sterile zones, remote locations and high security areas.- Behaviour monitoring and asset tracking
• Case StudiesLes Beverley, Director at CCTV Services UK, Tew Plus
11.40 Deploying Devices in the Security Sector• Ensuring optimal network management andconnectivity
• Network services deployed in the CCTV cameras atGlastonbury
• 3G network services for image transmission and 3GCCTV
• UK in cash-in-transit and other security situations –case study
• Asset Management, remote monitoring – case study• Tech Lab – advanced test facility for M2M devices-latest research
Nigel Chadwick, Director, Stream Communications
12.20 NETWORKING LUNCH
1.20 M2M-Enable Security Solutions• Deutsche Telekom's business opportunities beyondconnectivity
• Security applications through integrated machine-to-machine solutions
• M2M for Security: From connectivity and hardware tosolutions and services
• Developer community and reliable partner network tocreate and support security solutions
• Importance of reliable international network qualityJuergen Hase, Head of Deutsche Telekom's M2MCompetence Center, Deutsche Telekom
2.00 Telecom innovations for security service providers
• Enhance connectivity with High Coverage SIMs able to
connect to any network available in one country
• Impact of High Coverage SIMs for lone workers,
emergency situations and operational deployment
• Aggregated MVNO models for Security Service
Providers in Europe : integrating operator margin while
delivering a full service (connection + device +
application)
• Enrich you M2M application with connectivity services :
diagnostics, location-based services
Jacques Bonifay, CEO, Transatel
2.40 M2M Cloud for Security
Benefits of Cloud and emerging technologies
• Your organisation’s assets; Protecting each and every
one of those elements is a vital challenge
• Property and equipment
• Staff
• Your brand itself
Benefits of Cloud and emerging technologies
• Storage power of cloud computing
• User-friendly customer interface
• Create, access and manage your own unique networks
of IP camera's
Ease of task for end users
• Define what you want to see, when you want to see it,
who can see it and what actions they should take
James Wickes, Owner Director, Jabbakam
3.20 AFTERNOON TEA
3.50 Industry snap shot case study: Tackling metal theft
through prevention and deterrent
• The size and scale of the problem
• How does industry and Government approach it
together?
• Dealing a lasting blow to criminals
• Industry and enforcement efforts so far
Tim Field, Head of Press and Public Affairs, Energy
Networks Association
4.30 Managing the data hungry, VAS needs of M2M Security
• Partnership models for successful service delivery
• Supporting mission critical, heavy data M2M
applications
• Ultrafast mobile networks and the opportunity for
M2M security
Tom Gardner, Wholesale Sales Manager, Hutchinson 3G
5.10 CHAIRMAN'S CLOSING REMARKS AND
CLOSE OF DAY TWO
M2M and its impact on theSecurity Industry 8.30am – 5.00pm
Overview of workshop
The security industry is being transformed by manyfactors – societal and economic changes mean thatmore and more security is required for traditionalmarkets of property, cars, and other assets butincreasingly for non-traditional areas such as energy,food and general industry supply chain.Additionally the prevalence of new monitoringtechnology means that it is easier than ever forcustomers to deploy their own CCTV and othermonitoring technologies creating a myriad of data.Finally combined with cloud-based solutions this nowmeans that small and large security providers haveaccess to the same technology infrastructure. Withthis much change it is inevitable that there will benew winners and losers and attending this workshopwill ensure that you are a winner.
Why you should attend:This workshop aims to explore what the futureenvironment looks like, you will learn how to identifyand exploit new opportunities in the market.
The participants will learn about new technologiesentering the market, understand how to design anddeploy an M2M solution and how to assess theimpact to the people working in their own businessand that of their customers. They will see first handsome of the latest technologies and learn fromexpert opinion how to avoid some of the commonmistakes companies make using M2M.
About the workshop hosts
Andrew Yeoman is the CEO of Concirrus Ltd. in London. He is responsible for the strategic direction of thebusiness and oversees the day-to-day operations. With more than 30-years experience in the technologyindustry he has specialised for the last 15-years in understanding how to use technology to create, improveand disrupt business models. In addition to his role at Concirrus, Andy is non-executive director for a numberof companies in the technology and security industry.
Craig Hollingworth is the COO of Concirrus Ltd. He is responsible for the market and businessdevelopment of Concirrus. With an impressive track record in the mobile and telematics industry,Craig has held senior management and board positions for a number of companies including O2,Orange and Masternaut prior to starting his own company.
Charlie Curson is a principle at Mandarin LLP where he specialises in helping companies design, developand implement strong growth strategies. Charlie's background includes Accenture, Innocent and Audi wherehis keen insight and meticulous planning and attention to detail have been behind some of the mostimpressive brand success stories in recent years.
Concirrus was formed with the belief that by connecting assets to the internet and making that informationubiquitously available in the decision making process, customers can improve, create and disrupt businessmodels. This market is known as machine to machine (M2M) and it is estimated that by 2020 more than 100billion devices will be connected to the 'internet of things'. Concirrus designs, builds and operates M2Msolution for its customers as a one-stop-shop and is 'making M2M easy' for companies Worldwide. For moreinformation please call 0207 969 2979 or check www.concirrus.com
Programme
8.30 Registration & Coffee
9.00 Chairman's Opening Remarks
9.10 The future landscape for securitySocial, environmental, and economic changes – what will the world look like in 2020?
10.10 Where we are now and how the 'cloud' and M2M matters to Security Companies
11.10 Morning Coffee
11.40 Micro- and Macro- disruptive technologies• Access control• Alarm management• Asset Security• Energy & Food security• Employee security
12.40 Networking Lunch
1.40 Q&A on morning topics
2.10 What do the new business models look like?• Industry case studies• Data security• Managing continuity • Managing the H2M (Human to Machine) impact
3.10 Afternoon Tea
3.40 Technology case studies• NFC / IP-CCTV
4.40 Q&A and wrap up
5.00 Chairman's Closing Remarks and Close of Workshop
In association with
PRE CONFERENCE WORKSHOP 7th May 2013, Copthorne Tara Hotel, London, United Kingdom
Register online at: www.m2mforsecurity.com •
Vodafone Increasing or updating the security of buildings andassets can often be thought of as an increased cost and, formany businesses this is not an area where it's easy to justifyinstalling intricate and sometimes expensive alarm systems. Usingwireless technology, M2M enabled devices, cameras and alarmscan be constantly connected to the emergency services orprivate monitoring stations. Vodafone Global M2M is a globalsupplier of M2M products and connectivity with more than 20years' experience. We have the largest mobile telecommunicationsnetwork in the world can provide a global SIM, with one tariff,supported by a bespoke M2M Service level agreement build tosuit your business needs. http://m2m.vodafone.com/home/
SkyWave Mobile Communications is a global provider of wirelessdata communications for the Machine-to-Machine (M2M) market.SkyWave's products provide dependable communication,tracking, monitoring and remote management of fixed and mobileassets. Over the past 15 years, SkyWave has designed,manufactured and shipped more than 550,000 Inmarsat-basedsatellite terminals to customers globally in the transportation,maritime, oil and gas, utilities and government sectors. For moreinformation, please visit www.SkyWave.com
Sponsored by
www.m2mforsecurity.com
For Sponsorship or SpeakingOpportunities please contact
Jamison NesbittBusiness Development DirectorP: +44 (0) 20 7827 6164M: +44 (0) 7710 780 576Email: [email protected]
Don’t miss out on socialmedia networking! Follow us on Twitter @UtilitiesSMi and join us on Linkedinhttp://uk.linkedin.com/in/smigroup
Supported by
M2M FOR SECURITYConference: 8th - 9th May 2013, Copthorne Tara Hotel, London, United Kingdom Workshop: 7th May 2013
4 WAYS TO REGISTER
FAX your booking form to +44 (0) 870 9090 712PHONE on +44 (0) 870 9090 711
ONLINE at www.m2mforsecurity.com
If you have any further queries please call the Events Team on tel +44 (0) 870 9090 711 or you can email them at [email protected]
POST your booking form to: Events Team, SMi Group Ltd, 2nd FloorSouth, Harling House, 47-51 Great Suffolk Street, London, SE1 0BS
Payment: If payment is not made at the time of booking, then an invoice will be issued andmust be paid immediately and prior to the start of the event. If payment has not been receivedthen credit card details will be requested and payment taken before entry to the event.Bookings within 7 days of event require payment on booking. Access to the Document Portalwill not be given until payment has been received.
Substitutions/Name Changes: If you are unable to attend you may nominate, in writing, anotherdelegate to take your place at any time prior to the start of the event. Two or more delegatesmay not ‘share’ a place at an event. Please make separate bookings for each delegate.
Cancellation: If you wish to cancel your attendance at an event and you are unable to senda substitute, then we will refund/credit 50% of the due fee less a £50 administration charge,providing that cancellation is made in writing and received at least 28 days prior to the startof the event. Regretfully cancellation after this time cannot be accepted. We will howeverprovide the conferences documentation via the Document Portal to any delegate who haspaid but is unable to attend for any reason. Due to the interactive nature of the Briefings weare not normally able to provide documentation in these circumstances. We cannot acceptcancellations of orders placed for Documentation or the Document Portal as these arereproduced specifically to order. If we have to cancel the event for any reason, then we willmake a full refund immediately, but disclaim any further liability.
Alterations: It may become necessary for us to make alterations to the content, speakers,timing, venue or date of the event compared to the advertised programme.
Data Protection: The SMi Group gathers personal data in accordance with the UK DataProtection Act 1998 and we may use this to contact you by telephone, fax, post or email totell you about other products and services. Unless you tick here □ we may also share yourdata with third parties offering complementary products or services. If you have any queriesor want to update any of the data that we hold then please contact our Database [email protected] or visit our website www.smi-online.co.uk/updates quotingthe URN as detailed above your address on the attached letter.
Unique Reference Number
Our Reference LV U-015
Terms and Conditions of Booking
DELEGATE DETAILSPlease complete fully and clearly in capital letters. Please photocopy for additional
delegates.
Title: Forename:
Surname:
Job Title:
Department/Division:
Company/Organisation:
Email:
Address:
Town/City:
Post/Zip Code: Country:
Direct Tel: Direct Fax:
Mobile:
Switchboard:
Signature: Date:I agree to be bound by SMi's Terms and Conditions of Booking.
ACCOUNTS DEPT
Title: Forename:
Surname:
Email:
Address (if different from above):
Town/City:
Post/Zip Code: Country:
Direct Tel: Direct Fax:
Payment must be made to SMi Group Ltd, and received before the event, by one ofthe following methods quoting reference U-015 and the delegate’s name. Bookingsmade within 7 days of the event require payment on booking, methods of payment arebelow. Please indicate method of payment:
□ UK BACS Sort Code 300009, Account 00936418□ Wire Transfer Lloyds TSB Bank Plc, 39 Threadneedle Street, London, EC2R 8AU
Swift (BIC): LOYDGB21013, Account 00936418IBAN GB48 LOYD 3000 0900 9364 18
□ Cheque We can only accept Sterling cheques drawn on a UK bank.□ Credit Card □ Visa □MasterCard □ American Express
All credit card payments will be subject to standard credit card charges.
Card No: □□□□ □□□□ □□□□ □□□□Valid From □□/□□ Expiry Date □□/□□CVV Number □□□□ 3 digit security on reverse of card, 4 digits for AMEX cardCardholder’s Name:
Signature: Date:I agree to be bound by SMi's Terms and Conditions of Booking.
Card Billing Address (If different from above):
DOCUMENTATION (Shipped 10-14 days after the event)
I would like to attend: (Please tick as appropriate) Fee Total
PUBLIC SECTOR AND ACADEMICS□ Conference & Workshop £1498.00 + VAT £1797.60
□ Conference only £899.00 +VAT £1078.80
□ Workshop only £599.00 + VAT £718.80
COMMERCIAL ORGANISATIONS□ Conference & Workshop £2198.00 +VAT £2637.60
□ Conference only £1599.00 +VAT £1918.80
□ Workshop only £599.00 +VAT £718.80
PROMOTIONAL LITERATURE DISTRIBUTION □ Distribution of your company’s promotional
literature to all conference attendees £999.00 + VAT £1198.80
The conference fee includes refreshments, lunch, conference papers and access to the Document Portal containing all of the presentations.
I cannot attend but would like to purchase access to the following Document Portal/paper copy documentation: Price Total
□ Access to the conference documentation on the Document Portal £499.00 + VAT £598.80
□ The Conference Presentations - paper copy £499.00 - £499.00(or only £300 if ordered with the Document Portal)
VENUE Copthorne Tara Hotel, Scarsdale Place, Kensington, London, W8 5SR.
□ Please contact me to book my hotelAlternatively call us on +44 (0) 870 9090 711, email: [email protected] or fax +44 (0) 870 9090 712
VATVAT at 20% is charged on the attendance fees for all delegates. VAT is also charged onDocument Portal and Literature Distribution for all UK customers and for those EUcustomers not supplying a registration number for their own country here:
________________________________________________________________________________________________
PAYMENT
□ Register by February 28th and receive £300 off the conference price
□ Register by March 28th and receive £100 off the conference price
EARLY BIRDDISCOUNT
CONFERENCE PRICES GROUP DISCOUNTS AVAILABLE