Home
overview

SMi are delighted to announce Oil and Gas Cyber Security 2016. An estimated 250% rise in reported industrial control system incidents over the past four years suggests that the oil and gas companies now more than ever need to strengthen their cyber security units. Perfect security for any successful company is impossible. Inevitably, some doors need to be left open. The question the oil and gas companies are currently faced with is which ones are worth leaving open, and how, when open, are they best monitored to ensure the highest level of security in the company.


This conference will discuss where and how oil and gas companies should invest in their cyber security. Special focus will be on how companies can optimise the security of their industrial control systems. Strategy is key and therefore the conference will explain how companies can implement the best security strategy. Threat intelligence, threat analytics and many other industry hot topics will be addressed.

The cyber security of a company is only as strong as its weakest link. Therefore this conference will examine how companies can raise awareness of cyber security across the whole company and to each and every employee.

 


 


 

• Discuss the relationship between cyber security and physical security and why this is so significant in the energy sector
• Hear case studies from the oil and gas companies themselves
• Learn the best way to invest in cyber security in your companies and how to build an effective security strategy. Special focus will be on the supply chain and the reporting line.
• Listen to the latest regulation updates in European countries.
 

 Chief Executive Officer
Chief Information Officer
EMEA Lead, Risk and Compliance Solutions
Global Data Steward & Technologist
Group IT Manager
Technical Director
 Group Security Adviser
ICT infrastructure specialist
ICT Manager
Information & Cyber Security Consultant
IS Risk and Security Manager
Network Management Solutions
 

C&J Energy Services, Inc.; Chevron; Chevron Energy Technology Company; Chevron Information Technology Company; CyberX; ERPScan; ExxonMobil; FBI; Ghost Systems-Rye Technology; Gjøvik University College ; ICS-CERT; Independant; IRSM; Kane Russell Coleman & Logan PC ; Kaspersky Lab USA; Kongsberg Maritime, Inc.; L3 Communications; L-3 TRL Technology; Liberty Group Ventures, LLC; Lloyds Register Energy – Drilling; Lookingglass Cyber Solutions; Marsh, Inc.; National Institute Of Standards And Technology; Oracle; Pacific Northwest National Laboratory; Parsons; SAP NS2; Shell Oil Co; Siemens Corporation, Corporate Research; Statoil; Texas A & M University; Texas CISO Council; TGS; Thompson And Knight; Transocean; Transplace LLC; Waterfall Security Solutions;

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Chris Hankin

Chris Hankin, Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London

9:10 Regulation and policy, organising cyber security across the oil and gas sector

Heli Tiirmaa-Klaar

Heli Tiirmaa-Klaar, Cyber Security Policy Advisor, European External Action Service (EEAS)

  • What governments need to do to help critical infrastructure companies
  • Estonian national cyber security system as an example of well-functioning public and private partnership
  • Different national cyber security models in Europe  to protect critical cyber assets 
  • Interlinking cyber security issues across sectors
  • 9:45 How does trust improve cyber resilience?

    Johan Rambi

    Johan Rambi, Privacy & Security Officer, Alliander

  • Introduction of the EE-ISAC community and members
  • Information and sharing activities
  • Lessons learned and next steps
  • 10:20 Morning Coffee

    10:50 ICS security strategy and transformation – client and vendor perspective

    Trajce Dimkov

    Trajce Dimkov, Senior Manager, Deloitte

  • Building blocks of developing an ICS strategy and transformation program to execute the strategy
  • DO’s and DONTs in executing the strategy
  • Security requirements from Vendors perspective and how to address the growing ICS security requirements from multiple clients
  • A scalable approach
  • 11:25 Eyes Wide Shut: Have you been working in the dark?

    Daniel Tulen

    Daniel Tulen, CSE Advanced Threat Solutions, Cisco Systems

  • How to 'unleash the power of your network as a sensor' by Netflow
  • Visibility and comprehensive overview of your network security
  • Learn to take control and implement next generation of network security to address the insider threat
  • 12:00 Networking Lunch

    13:00 PANEL DISCUSSION: What can governments do to help?

  • What are the best codes and conducts that can be implemented across industry?
  • How can we enforce commitment and practice to these guidelines?
  • Are universal guidelines necessary?
  • Chris Hankin

    Chris Hankin, Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London

    Heli Tiirmaa-Klaar

    Heli Tiirmaa-Klaar, Cyber Security Policy Advisor, European External Action Service (EEAS)

    Bethany  Yates

    Bethany Yates, Energy Sector, CERT-UK

    Arthur Van Der Wees

    Arthur Van Der Wees, Managing Director, Arthurs Legal

    13:35 Maximising the protection of our assets: Security or resilience?

    Lhoussain Lhassani

    Lhoussain Lhassani, Senior Specialist, Stedin Netbeheer BV

  • Cyber security: What to protect and at what cost?
  • Investing and optimising the cyber security of our industrial control systems (ICS): Different roles 
  • What security is necessary and where must this implemented?
  • New challenges: The most appropriate approaches to the changing landscape of threats
  • Design and best practices to protect our ICS environment
  • 14:10 Development and control of Risk Mitigation Strategy

  • Introduction of the risk model of Bowstar, a recent development that has been developed by PIMS International in close cooperation with Gasunie and Engie and is used for their vital infrastructure 
  • Systematic development of the risk model including all escalations and mitigations for all life cycles (example on cyber and physical sabotage)
  • Development and management of the mitigation plan with the risk register of Bowstar
  • Rob Bos

    Rob Bos, CEO, PIMS International B.V.

    14:45 Afternoon Tea

    15:15 Embracing shadow IT in critical infrastructure

    Pieter Jansen

    Pieter Jansen, CEO and Co-Founder, Cybersprint

  • How I learned to stop worrying and love shadow IT
  • Bring your own device: Bring your own disaster?
  • Assessing, preventing, detecting and embracing shadow IT
  • 15:50 The insider threat: CERT-UK

    Bethany  Yates

    Bethany Yates, Energy Sector, CERT-UK

  • Understanding the human dimension
  • Measuring employees levels of awareness
  • ‘Insider threat’: What does this really mean to companies?
  • 16:25 Security Culture: Learning from safety

    Andrew  Wadsworth

    Andrew Wadsworth, Managing Consultant, Global Energy & Utilities, Pa Consulting

  • People are often regarded as the weakest link in our security defences and are key to good cyber security.
  • Good safety behaviour all at all times by everyone is essential to maintain a safe working environment
  • Maintaining security similarly needs good security behaviour by everyone
  • How do we measure the security culture in an organisation and identify if our security programmes are making the difference?
  • 17:00 Chairman’s Closing Remarks and Close of Day One

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Robert Bond

    Robert Bond, Head of Data Protection & Cyber Security Group, Charles Russell Speechlys LLP

    9:10 Cybersecurity and digital data in IOT ecosystems

    Arthur Van Der Wees

    Arthur Van Der Wees, Managing Director, Arthurs Legal

  • Data traffic is no longer one way – what does this mean for companies?
  • The risk involved in meeting the demand to know more
  • What are the security short comings in light of the new developments?
  • 9:45 Cyber security in the cloud

  • What is cloud computing?
  • Is it ‘safe’?
  • What cybersecurity threats are hiding inside the cloud?
  • How can we deal with them?
  • Franco Tessarollo

    Franco Tessarollo, Security Manager, Hera

    10:20 Morning Coffee

    10:50 Cyber risks to industrial control systems

    Jalal Bouhdada

    Jalal Bouhdada, Fouder and Principal Security Consultant, Applied Risk

    •         What are current trends in the threat landscape
    •         Case study for cyber threat actors
    •         Long term threats and best practices

    11:25 Cyber risks, due diligence and regulatory compliance

    Robert Bond

    Robert Bond, Head of Data Protection & Cyber Security Group, Charles Russell Speechlys LLP

  • Developing policies and procedures
  • Internal compliance audits
  • External compliance audits
  • The cost of non-compliance
  • 12:00 PANEL DISCUSSION: Emerging cyber threats in the oil and gas sector

  • What is happening today and why?
  • Are advanced persistent threats a real risk or should we rather spend our money and resources on cleaning viruses and malware from existing drilling assets?
  • The current risk situation and what is likely to happen within the next five years.
  • Damiano Bolzoni

    Damiano Bolzoni, COO and Owner, SecurityMatters B.V.

    Jalal Bouhdada

    Jalal Bouhdada, Fouder and Principal Security Consultant, Applied Risk

    12:35 Networking Lunch

    13:35 Brilliant failures in cyber security

    Paul Louis  Iske

    Paul Louis Iske, Proffessor, Maastricht University

  • Double-loop learning in complex  environments
  • How to deal with uncertainty and risk in a complex, dynamic world?
  • Building knowledge to support a climate for innovation and learning
  • Raising awareness from those who try, whether they succeed or fail
  • 14:10 The Defence Cyber Protection Partnership (DCC): Working together to protect the Defence sector from the cyber threat

    Daniel Selman

    Daniel Selman, Cyber Industry and Information Security Policy Deputy Head, Ministry of Defence

  • Why assurance of the supply chain’s level of cyber protection matters
  • Why the DCPP was formed and the objectives it was set
  • How the Cyber Security Model was developed and what it will mean for defence suppliers
  • Next steps
  • 14:45 Afternoon Tea

    15:15 Intensive Training: Establishing an ICS cyber security programme for the oil and gas sector and detect all kinds of cyber incidents

    Damiano Bolzoni

    Damiano Bolzoni, COO and Owner, SecurityMatters B.V.

  • Cyber-attacks and malware are not the only cyber incidents happening within industrial networks
  • Network segmentation and asset inventory are just the first steps to secure industrial networks
  • An analysis of real-life examples of cyber incidents that could have affected the business continuity of critical organizations
  • Discussion of the best practices to detect such cyber incidents
  • 17:00 Chairman’s Closing Remarks and Close of Day Two

    +

    FEATURED SPEAKERS

    Franco Tessarollo

    Franco Tessarollo

    Security Manager, Hera
    Heli Tiirmaa-Klaar

    Heli Tiirmaa-Klaar

    Cyber Security Policy Advisor, European External Action Service (EEAS)
    Johan Rambi

    Johan Rambi

    Privacy & Security Officer, Alliander
    Lhoussain Lhassani

    Lhoussain Lhassani

    Senior Specialist, Stedin Netbeheer BV

    Andrew Wadsworth

    Managing Consultant, Global Energy & Utilities, Pa Consulting
    Andrew  Wadsworth

    Arthur Van Der Wees

    Managing Director, Arthurs Legal
    Arthur Van Der Wees

    Bethany Yates

    Energy Sector, CERT-UK
    Bethany  Yates

    Chris Hankin

    Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London
    Chris Hankin

    Damiano Bolzoni

    COO and Owner, SecurityMatters B.V.
    Damiano Bolzoni

    Daniel Selman

    Cyber Industry and Information Security Policy Deputy Head, Ministry of Defence
    Daniel Selman

    Daniel Tulen

    CSE Advanced Threat Solutions, Cisco Systems
    Daniel Tulen

    Franco Tessarollo

    Security Manager, Hera
    Franco Tessarollo

    Heli Tiirmaa-Klaar

    Cyber Security Policy Advisor, European External Action Service (EEAS)
    Heli Tiirmaa-Klaar

    Jalal Bouhdada

    Fouder and Principal Security Consultant, Applied Risk
    Jalal Bouhdada

    Johan Rambi

    Privacy & Security Officer, Alliander
    Johan Rambi

    Lhoussain Lhassani

    Senior Specialist, Stedin Netbeheer BV
    Lhoussain Lhassani

    Paul Louis Iske

    Proffessor, Maastricht University
    Paul Louis  Iske

    Pieter Jansen

    CEO and Co-Founder, Cybersprint
    Pieter Jansen

    Rob Bos

    CEO, PIMS International B.V.
    Rob Bos

    Robert Bond

    Head of Data Protection & Cyber Security Group, Charles Russell Speechlys LLP
    Robert Bond

    Trajce Dimkov

    Senior Manager, Deloitte
    Trajce Dimkov

    Sponsors and Exhibitors

    Supporters

    Workshops

    Applied cyber security in the oil and gas industry
    Workshop

    Applied cyber security in the oil and gas industry

    Movenpick Hotel Amsterdam City Centre
    29th June 2016
    Amsterdam, Netherlands

    VENUE

    Movenpick Hotel Amsterdam City Centre

    Piet Heinkade 11, Amsterdam, Netherlands

    Rewarding its guests with a spectacular view over the city and river IJ from the 408 rooms, the Mövenpick Hotel Amsterdam City Centre offers a unique location. It lies within walking distance of the historical city centre of Amsterdam, Central Station and cultural hotspots. The hotel is easily reached from the highway and only 20 minutes from Schiphol Airport. With its 12 flexible and state-of-the-art meeting rooms with natural daylight and free internet, the hotel offers a perfect balance between business and leisure.

    HOTEL BOOKING FORM

    Question and Answer Session with the conference speakers: PA Consulting Group, Deloitte, CERT-UK, Ministry of Defence

    Download

    Interview with with Chris Hankin, Professor, Imperial College London

    Download

    SMi's Oil and Gas Cyber Security List of Attendees 2015

    Download

    Sponsors and Exhibitors


    Applied Risk

    Sponsors and Exhibitors
    http://www.applied-risk.com/

    Applied Risk is a leader in Industrial Automation and Control Systems (IACS) security and combating security breaches that pose a significant threat to industrial facilities. Operating on a global scale, we work with a wealth of large organisations that rely on our expertise to safeguard their critical assets. Our proven experience of identifying vulnerabilities and security risks is based on methodologies honed over years of conducting assessments in industrial environments.


    Cisco

    Sponsors and Exhibitors
    http://www.cisco.com

    Lancope enhances Cisco’s Security Everywhere strategy, enabling the network to become a security sensor, delivering continuous visibility, and accelerating incident response across the extended enterprise. Lancope provides deep understanding of network traffic, continuously monitoring and analyzing network flows to establish a security baseline, detect anomalous threats, and enable rapid containment.

    Media Partners


    International Journal of Critical Infrastructures

    Supporters
    http://www.inderscience.com/jhome.php?jcode=ijcis

    IJCIS provides a professional and scholarly forum for cross-learning between different scientific and technological disciplines, and between business and economic, as well as between societal and managerial, disciplines in the area of critical infrastructures. Critical infrastructures are networks for the provision of telecommunication and information services, energy services (electrical power, natural gas, oil and heat), water supply, transportation of people and goods, banking and financial services, government services and emergency services.


    MJMEnergy

    Supporters
    http://www.mjmenergy.com

    MJMEnergy offer energy consultancy, training and publishing solutions to energy companies worldwide. A multi-disciplined team of experts, all currently working within the industry, are available for consultancy assignments, training presentations and publishing projects.


    WSN Buzz

    Supporters
    http://www.wsnbuzz.com

    WSNBuzz.com is a blog providing fresh updates on smart grid technologies, covering new standards, products, deployments, industry moves and events of interest.


    OffComm News

    Supporters
    http://OffCommNews.com

    The resource for buyers and suppliers of telecommunications destined for remote & harsh environments. For mission critical operations, as well as the people based in these locations, OffComm News focuses on advancements in communications in and out of offshore rigs, the supporting maritime sector, deserts, mines and other E&P remote sites worldwide. The magazine delivers articles and news from around the globe every quarter covering connectivity innovation in operations and infrastructure, alongside crew welfare communications and entertainment developments.
    Apply for a free subscription at http://eepurl.com/sxkDT
    Or download the current edition with our compliments.


    Crowd Reviews

    Supporters
    http://www.crowdreviews.com/rankings-of-best-business-security-software

    CrowdReviews.com is a transparent online platform for determining which security products and services are the best based on the opinion of the crowd. The crowd consists of Internet users which have experienced products and services first-hand and have an interest in letting other potential buyers their thoughts on their experience. CrowdReviews.com is driven by an algorithm allowing for both customers and providers of products and services to understand how the rankings are determined. The service can be used by potential buyers to learn more about their vendors prior to making a purchasing decision.http://www.crowdreviews.com/rankings-of-best-business-security-software


    OilVoice

    Supporters
    http://www.oilvoice.com/

    OilVoice is a valuable source of upstream oil industry reference, featuring a global selection of oil company profiles in one location, alongside continually updated industry news, operational data, focused regional information, contact details and key industry personnel.


    Offshore Technology

    Supporters
    http://www.offshore-technology.com/



    Virus Bulletin

    Supporters
    http://www.virusbtn.com

    Virus Bulletin is a security information portal, testing and certification body with a formidable reputation for providing users with free of charge independent intelligence about the latest developments in the global threat landscape. It includes comparative product reviews featuring the unique VB100 (anti-virus) & VBSpam (anti-spam) award scheme and a wealth of material dating back to 1989. The annual international Virus Bulletin conference is cited by many as the IT security event of the year.


    Cyber Security Market

    Supporters
    http://www.cybersecuritymarket.com

    Find the latest information on Cyber Security, Access Control Management, Cyber Security Technologies and Markets.


    Cyber Security Review

    Supporters
    http://www.cybersecurity-review.com

    The Cyber Security Review is uniquely positioned to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the international community’s development of coherent policies and robust capabilities to protect cyberspace, improve security and enhance confidence in the resilience of the cyber-enabled world.


    www.oilandgastechnology.net" target="_blank"> sponsor image

    Oil & Gas Technology

    Supporters
    www.oilandgastechnology.net" target="_blank" class="link" align="right"> www.oilandgastechnology.net

    Oil & Gas Technology connects growth and western markets across the oil and gas industry. We provide technology news, exclusive interviews with industry insiders and analysis for upstream, downstream and pipeline sectors. Register now to receive our weekly newsletters and e-Magazines at no cost.


    TechnologyConference.com

    Supporters
    http://www.technologyconference.com

    TechnologyConference.com is a premier resource of professional events, providing the latest information on technology events for R&D, business development and marketing professionals in technology-intensive industries. TechnologyConference.com is one of the most widely-read technology event publications, providing the latest information on technology events for R&D, business development and marketing professionals in knowledge-intensive industries. Decision-makers at Fortune 500 companies, government agencies and R&D organizations watch the technology event announcements published at TechnologyConference.com and its media partnership network.


    International Journal of Information Privacy, Security and Integrity

    Supporters
    http://www.inderscience.com/ijipsi

    The International Journal of Information Privacy, Security and Integrity presents research results in the theory, application, implementation, analysis, design and evaluation of information privacy and security. IJIPSI also aims to bring together researchers in the various relevant disciplines to explore issues and problems in information integrity defined as information accuracy, consistency and reliability. The journal welcomes contributions on all aspects of information privacy, security and integrity


    Alexander's Oil and Gas Connections

    Supporters
    http://www.gasandoil.com

    Alexander’s Gas and Oil Connections is the web-service of Alexander Wöstmann, a national of the Netherlands from 1958 now living in Germany, and is the expression of the wish to give a different coverage on global energy-related developments.


    Gas Infrastructure Europe (GIE)

    Supporters
    http://www.gie.eu/

    Gas Infrastructure Europe (GIE) is an association representing the interests of European natural gas infrastructure operators active in natural gas transmission, storage and LNG regasification. GIE is a trusted partner of European institutions, regulatory bodies and industry stakeholders. It is based in Brussels, the heart of European policymaking. GIE currently represents 68 member companies from 25 countries.


    European Offshore Petroleum Newsletter

    Supporters
    http://www.ogilviepub.com

    European Offshore Petroleum Newsletter is the weekly executive report for petroleum professionals who rely on expert analysis, timely news, exclusive information and business opportunity leads. Subscribers to European Offshore Petroleum Newsletter receive the latest on: oil and gas field developments, activities of operators, fabricators, contractors and leading service and supply companies. It also includes the fortnightly Sharewatch, the exclusive financial share report on the European oil and service companies. For a free trial to European Offshore Petroleum Newsletter please e-mail subs@ogilviepub.com or register online at: http://www.ogilviepub.com or call +44 (0) 191 567 8497


    ABI Research

    Supporters
    http://www.abiresearch.com

    ABI Research is the leader in technology market intelligence. Our analysts act as an extension of the world’s most innovative organizations, accelerating their overall decision-making process to more quickly and confidently execute strategies. We assess markets to explore trends, offer insight into the changing landscape, and define tomorrow’s strategic technologies. For more information, visit www.abiresearch.com


    World Oils

    Supporters
    http://www.worldoils.com

    Worldoils is a company that combines the power of marketing as well as the in-house expertise for the Oil, Gas, Offshore and the Maritime industries. Worldoils' web portal www.worldoils.com has become a truly central platform for visitors who need information regarding oil and gas products and services, research, training, conferences, news and events as well as a popular advertising base for providers of Oil, Gas, Marine and Offshore services. Worldoils has also launched the jobs system and a marketplace. In the recent months, Worldoils has strengthened its position as a fast developing central place for buying and selling of land rigs, offshore rigs,barge rigs and other oilfield and subsea equipment.


    E&P Daily

    Supporters
    http://www.ogilviepub.com/publication_detail.php?id=1

    E&P Daily presents you with up to the minute vital facts on the international upstream industry. E-mailed to you every day, two pages in length, E&P Daily is an accurate and concise report that will immediately highlight the most significant international developments in the upstream industry. Regular features include ongoing and future projects, government policy and company news. Expert analysis will alert you to business opportunities worldwide. The weekly Sharewatch quickly highlights the status of the companies involved in the global upstream industry.


    Petroleum Africa

    Supporters
    http://www.petroleumafrica.com

    Petroleum Africa is the world's leading monthly magazine dedicated to providing in-depth upstream and downstream coverage of key issues affecting the fast-paced oil and gas industries of Africa, the last great exploration frontier. Its broad-based coverage and analysis of current activities provides you with the latest news, an African country focus, exclusive interviews, technology updates, company profiles, and essential political reviews from the world's top energy players. And for daily news from the continent www.petroleumafrica.com offers the latest information as it happens, along with an event calendar, country reports, industry links, and access to Petroleum Africa magazine articles.


    Homeland Security Corporation (HSRC)

    Supporters
    http://www.hsrc.biz

    Homeland Security Research Corp. (HSRC) is a Washington, DC-based international market research and strategic consulting firm serving the homeland security community. HSRC provides premium market, technology and industry expertise that enables our global clients to gain critical insight into the business opportunities that exist within the Homeland Security & Homeland Defense market. Government clients include the US, UK, Japan, Korea, Taiwan, Israel, Canada, Germany, Australia, Sweden, Finland, and Singapore. US Congress, DHS, US Army, US Navy, DOD, DOT, GAO, NATO, and the EU are among others. HSRC serves over 600 private sector clients, including all major defense contractors and many Fortune 500 companies.


    NRG Expert

    Supporters
    http://www.nrgexpert.com

    NRGExpert is an independent energy market intelligence and research company. We specialise in energy market research reports, energy market databases and energy market consulting as well as analysis and market forecasts. Our global energy market research reports cover the electricity, water and waste, gas, hydrogen, nuclear and the renewable energy markets. We follow the energy markets very closely and we produce a wide range of reports, databases and directories. We also answer very specific energy market information requirements with our energy market consulting and data services. We provide information to a wide range of companies, associations, education and government bodies and organisations.


    Cedigaz

    Supporters
    http://www.cedigaz.org

    Cedigaz is an international association dedicated to natural gas information, created in 1961 by a group of international gas companies and the Institut Français du Pétrole (IFP Energies Nouvelles). It is based near Paris. Cedigaz has more than 150 members in 40 countries. Cedigaz' goals consist in gathering, compiling and analysing worldwide economical information on natural gas, LNG and unconventional gas in an exhaustive and critical way. The information that Cedigaz deals with touches on all activities and aspects of the gas industry (exploration, reserves, production and processing, transportation, trade, storage, distribution and consumption of natural gas). Cedigaz diffuses the information in its periodic bulletins, surveys and online databases.


    International Journal of Information and Computer Security

    Supporters
    http://www.inderscience.com/ijics

    Computer security has been a major concern since the 1950s. The ubiquity of the internet has engendered the prevalence of information sharing among networked users and organisations. This has rendered possible countless invasions of privacy/security worldwide. The risk of invasion has generated enormous concern about information and computer security among businesses, governments, legislators, academics, researchers, scientists and the public. The International Journal of Information and Computer Security addresses development of information and computer security in the fields of information technology, political science, informatics, sociology, engineering and science.


    International Journal of Trust Management in Computing and Communications

    Supporters
    http://www.inderscience.com/ijtmcc

    The volatile growth of the internet and globalization that influences every facet of life are fuelled by the rapid acceleration of computing/communication technologies. Although security is a major concern, we must also protect ourselves from false/misleading information provided by some information/service providers. Traditional security mechanisms cannot protect against this type of threat. Trust management mechanisms on the other hand can provide protection. IJTMCC provides a forum for discussion on theoretical and practical aspects of the latest developments in this area.


    International Journal of Electronic Security and Digital Forensics

    Supporters
    http://www.inderscience.com/jhome.php?jcode=ijesdf

    IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security-related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and for individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, relevant case studies, and "best practice" for tackling cyber crime.


    Shale Gas International

    Supporters
    http://www.shalegas.international/

    Shale Gas International is a one-stop-shop for all things shale. Based in London, and with an international appeal, Shale Gas International website, newsletter, and focus reports, provide oil and gas professionals with timely information about this fast-paced industry.


    International Journal of Security and Networks

    Supporters
    http://www.inderscience.com/ijsn

    IJSN proposes and fosters discussion on and dissemination of network security related issues.

    SAVE TO


    Outlook Calendar  OUTLOOK CALENDAR
    Google Calendar  GOOGLE CALENDAR
    ICal Calendar  ICAL CALENDAR
    Yahoo! Calendar  YAHOO! CALENDAR

    Movenpick Hotel Amsterdam City Centre

    Piet Heinkade 11
    Amsterdam 1019 BR
    Netherlands

    Movenpick Hotel Amsterdam City Centre

    Rewarding its guests with a spectacular view over the city and river IJ from the 408 rooms, the Mövenpick Hotel Amsterdam City Centre offers a unique location. It lies within walking distance of the historical city centre of Amsterdam, Central Station and cultural hotspots. The hotel is easily reached from the highway and only 20 minutes from Schiphol Airport. With its 12 flexible and state-of-the-art meeting rooms with natural daylight and free internet, the hotel offers a perfect balance between business and leisure.

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.