Home
overview

SAVE THE DATE: EUROPEAN SMART GRID CYBER AND SCADA SECURITY LONDON MARCH 10th and 11th 2014  Rebooking now   

SMi's 3rd annual European Smart Grid Cyber and SCADA Security forum will address the current threat landscape of Smart Grid, Advanced Metering Infrastructure, Industrial Control Systems and SCADA vulnerabilities. Building on the success of the past two years, we will bring Government, Industry, top research and solution providers back to London for a formal interactive two day conference and workshop.

We will be highlight critical developments, case studies, advanced persistent threats and vulnerabilities during the course of the two day conference. The forum will address not only risk management asset strategy, but also dive deeper into technical threats, current attack profiles on the rise and currently, potentially, in circulation.

NEWS AND DOWNLOADS:
Infrastructure Security Labs will be joining us from the United States, discussing Security issues of Control Systems in Water Utilities.
They offer the following information free to you:
Vulnerabilities in Wireless Water Meters
Chemical and Biological Threats against Public Water Systems
 

Heavily supported by both European, UK and North American authorities, you will not want to miss the opportunity to network, gain competitive advantage and most importantly, share information in a sector that can only tackle the cyber threat if unified in both standards and vision. 

 

Gain valuable insight into developments such as:

  • A secure ICS does not exist! – How do we prepare?
  • On going work in early detection systems in Europe for Smart Infrastructure and ICS
  • Information sharing across public and private sectors, what is required for success?
  • Standards development both European and North America
  • Behavioral monitoring and intrusion detection
  • Risk Management strategies

Network and share information on emerging threats: Devices and Applications. Hear how industry is protecting themselves from insider threats and managing extended attack surfaces. Now more than ever society is heavily reliant on embedded connectivity across all sectors.  Cyber security for Smart Energy must be priority number one.

 

SMi Group is a global events business specialising in business to business conferences, workshops and
masterclasses.

We successfully create and run 250 events every year across 6 sectors including Defence and Security,
Energy and Utilities, Finance and Pharmaceutical.

We believe in bringing together the most knowledgeable experts from across the globe in each sector to
learn, engage, share and network be it in London, Paris or Singapore.

To further enhance the SMi experience, we have launched our very own SMi Event Communities. These will
be exclusive, private and secure communities in which our clients will learn, share, engage and network.
The SMi Event Communities will build and expand your experience beyond the conference, workshop or
Masterclass you attend. Not just another "social network”, SMi’s Event Communities have been specifically
designed around the needs of our delegates, speakers and sponsors, allowing all of our clients to foster
longer term relationships with all of the other attendees beyond the two day event for year round
engagement.

To take part all you need to do is register for this event.
SMi Group Communities
Learn Engage Share Network

New developments for 2013 will include presentations on Early detection systems, Industrial Control Systems/SCADA Security attacks and requirements. We will bring in key content onSmart Water Systems, whilst also exploring extended attack surfaces.

   

ABB; Abb Sace; Accenture Nederland B.V. ; Actua; Airwave Solutions; AIST; Alliander; Alliander N.V. ; Anritsu Engineering CO.,LTD,; Arqiva Ltd; Atos Worldgrid; Cardiff University; Cassidian; Centre for the Protection of National Infrastructure (CPNI); Centrica; CLP Power Hong Kong ; Con Edison of New York, Inc.; Dahl-Morrow International; Devoteam Consulting; E.ON Energie AG; Eandis; EBV Electronics; EDP Distribuicao; Electric Power Research Institute; EmeSec; Energa; Energy Networks Association; ENISA - European Network and Information Security Agency; ENTSO-E; ESA; ESB; esec; ESNA ; EU Commission; GDF SUEZ E&P UK Ltd; Gridmerge ltd; HP Enterprise Security; Inexus; Information-technology Promotion Agency, Japan; IOActive; IT Governance Ltd; KCS; KEMA Ltd; Kema Nederland BV; Latvenergo; National Engineers; Npower; NXP Semiconductors; Office of Cyber Security & Information Assurance ; Pike Research; Portcullis Computer Security; PwC LLP; Queens University Belfast ; Red-Dragonrising; Riscure; SAIC; Saudi Aramco; SBGI Utility Networks; Siemens; Sirrix AG; SmartGrid GB; Sourcefire; SSE; swissgrid AG; Symantec Deutchland Gmbh; Symantec Deutschland Gmbh; Symantec UK; Thales e-Security; The Attached Institute of ETRI; TUV SUD AB; Underwriters Laboratories Inc.; Underwriters Laboratories Incorporated; United Technologies Research Center; University of Tulsa; Vattenfall A B; Vattenfall R and D AB; Veridicore; Wien Energie - Stromnetz ; WITZ corporation; Yokogawa Electric Corporation; ZIV; ZIV GRID AUTOMATION;

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Edward Hamilton

Edward Hamilton, Senior Manager, PwC

9:10 KEYNOTE PRESENTATION: SECURING TOMORROW'S GRID - CAN IT BE DONE?

Patrick Miller

Patrick Miller, President and CEO , EnergySec

  • Technology's impact on the modern grid
  • Threat actors: research, crime and warfare
  • Standards, regulations and best practices
  • The human side of the equation
  • The road ahead
  • 9:40 ENHANCING THE SECURITY OF SMART GRIDS – ENISA’S CONTRIBUTION

    Evangelos  Ouzounis

    Evangelos Ouzounis , Senior Expert, Network Security Policy, ENISA - European Network and Information Security Agency

  • Recommendations on Smart Grids Security 
  • Minimum Security Measures
  • Risks Assessment and Management of Smart Grids
  • Certification of Smart Grids products
  • EU US co-operation on Smart Grids
  • 10:10 NEW FOR 2013: DEPLOYING WORLDWIDE CYBERSECURITY ON THERMAL POWER GENERATION CONTROL SYSTEMS

    Miguel Chavero

    Miguel Chavero, IT Manager in the Monitoring Diagnostic and Simulation Center, Iberdrola

  • Iberdrola overview
  • Iberdrola & Thermal Stations Strategy
  • CyberSecurity’s Goal and Vision
  • AURA Project (Cybersecurity projects examples)
  • Conclusions
  • 10:40 Morning Coffee

    11:10 CRITICAL INFRASTRUCTURE PROTECTION IS AT THE FOREFRONT OF THE PUBLIC AND PRIVATE SECTORS

    Sean McGurk

    Sean McGurk, Managing Principal Industrial Control Systems Cybersecurity, Verizon Business

  • With Interdependencies of the national critical infrastructure sectors many companies are focusing on risk mitigation to prevent a cascading event
  • Subsequently industry leaders are addressing challenges in policy, technology and procedures to reduce risk and provide a secure operational environment 
  • How technology is evolving with the use of intelligence reporting in order to enhance security
  • As the threat landscape develops so must the capabilities of solution providers in order to counter the malicious activity
  • 11:40 RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURE

    Hans Baars

    Hans Baars, Senior Consultant Management and Operations Consulting , DNV Kema

  • Making security a priority
  • Lack of standards and the effect on investment
  • Cyber Security and Electricity pricing- cause and effect
  • Fostering a culture of awareness
  • Measuring resiliency
  • Incident response and countermeasures
  • Technical, cultural, and political cooperation for success
  • 12:10 PROTECTING CRITICAL NETWORKING INFRASTRUCTURE FROM CYBER ATTACKS USING UNI-DIRECTIONAL GATEWAYS

    Wouter  Teepe

    Wouter Teepe, Product Manager, Fox IT

  • What kind of CNI are we talking about and what are we trying to protect?
  • Standardization efforts
  • Threat Scenarios
  • Migrating from IT defense to Industrial defense, the need for Defense in depth
  • Implementations of cyber protection in Transport and Nuclear (Power) CNI
  • 12:40 Networking Lunch

    13:40 SCADA AND ICS SECURITY EXPERIENCES

    Gitte Bergknut

    Gitte Bergknut, MU Nordic Information Security Manager, EON Sverige AB

    • Experiences of how to run a Cyber Security program
    • Business Awareness and Societal Responsibility
    -Compliance & Review
    -Training
    • Use of technical mitigations such as IDS in
    -cogeneration
    -hydro
    -heating
    • Results and lessons learned

    14:10 CASE STUDY: Systems Engineering: A practical approach to improving reliability and security in a typical utility

    Steve Brunasso

    Steve Brunasso , Manager of Security Services, California Water and Power

    California Water and Power - A typical metropolitan Utility with all the same challenges
    - Legacy Systems
    - Vendor Solutions
    - Turn key packaged system that cant be modified
    Management supports a Systems Engineering approach
    - Providing relaible systems with high security
    - Focus on integrity and availability
    Benefits
    -Allows the development of a security architecture engineered into utility best solutions in a cost effective and repoducible way

    14:40 NEW FOR 2013: FP7 EARLY WARNING DETECTION

    Corrado Leita

    Corrado Leita, Project Coordinator, CRISALIS

    FP7 project funded by DG Enterprise called CRISALIS, CRitical Infrastructure Security AnaLysIS

  • Project focuses: Creation of practical, short-term solutions for the protection of critical infrastructure environment from targeted attacks- primarily power grid
  • Consortium members- Enel, Symantec, Security Matters and Alliander
  • First deliverables of the project: Requirement study, in which we will study in depth the characteristics of the power generation and smart metering environments
  •  Identify risks and possible threat scenarios
  • Feedback on our activity
  • 15:10 NEW FOR 2013: ICS CYBER SECURITY IN POWER GENERATION AND FUTURE SCENARIO

    Daniela Pestonesi

    Daniela Pestonesi, IT and Security Systems, Enel Engineering and Research Spa

  • Electric grid and power generation scenario in Italy
  • Power Generation: Architecture and Frameworks
  • Risk Analysis: Threats and impacts
  • CI owner requirements for ICS protection
  • Enel Cyber Security ICS Laboratory
  • CRISALIS project participation
  • 15:40 Afternoon Tea

    16:10 ENHANCING NETWORK MONITORING AND SITUATIONAL AWARENESS IN CRITICAL INFRASTRUCTURE

    Damiano  Bolzoni

    Damiano Bolzoni, COO, Security Matters

  • Current approaches to network monitoring and situational awareness
  • Strengths and shortcomings of current approaches
  • Non-signature based approaches for improved monitoring and situational awareness
  • Discussion of 2 use cases

    Damiano on behalf of the University Twente will also be our host and leader for a Post Conference workshop on March 13th on Approaches to network monitoring and situational awareness for Critical Infrastructure, not to be missed

  • 16:40 CHALLENGES IN POWER-NETWORK SECURITY AND IT

    Rudolf Baumann

    Rudolf Baumann , Chairman of the Transmission Security Cooperation, Senior Advisor Operations , swissgrid AG

  • Updates and improvements in power-network and IT
  • Common processes, systems and collaboration procedures
  •  Integration of system planning, operations and IT
  •  Future developments and sharing knowledge
  • 17:10 HOW TO PROTECT YOUR CONTROL SYSTEMS AGAINST MALWARE

    Geir Mork

    Geir Mork, Director of Core Technology & SDK, Norman

    -Malware can be inserted in your control systems from many sources, ranging from USB thumb drives to your network
    -By using Windows based HMI or operator and engineer stations your threat surface has grown exponentially from the proprietary devices used earlier
    -Protection at device level and network level is necessary to maintain stability and uptime for your control system networks
    -Easy and simple solutions are hard to find...or are they?

    17:40 PRODUCT AND SOLUTION SECURITY IN INDUSTRIAL AUTOMATION SYSTEMS

    Stefan Woronka

    Stefan Woronka, Director Industrial Security Services, Siemens AG

  • Key elements that need to be revisited when setting up a security architecture for the industrial automation environment
  • Best practice example based on the concept of Defense in Depth and ISA 99/IEC 62443
  • Measures that have been implemented within Siemens
  • 18:10 Chairman’s Closing Remarks and Close of Day One

    18:15 SMi Sponsored Drinks Reception

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Edward Hamilton

    Edward Hamilton, Senior Manager, PwC

    9:10 SMART GRID INTEGRATES LEGACY AND NEW ICS (SCADA, DCS, PLC) SYSTEMS, DEVICES, AND APPLICATIONS

    Patricia  Robison

    Patricia Robison, Professor of Cyber Security, New York University
    View Bio

    • Smart Grid Cyber Security – Integrating legacy and new ICS enhances the grid and simultaneously increases complexity and vulnerability
    • Cyber Security – needs to address ICS at all levels:  field devices, the device systems, the applications supporting the devices and systems, the communications/network interfacing to the devices and systems, etc.
    • ICS Cyber Security Controls:  Technical, Physical, Administrative Risk Management – Smart Grid More challenging with increased complexity and extended systems and communications
    • Leverage existing ICS standards and frameworks:  IEC, NIST, DOE, ISA, ISO, NERC
    • Smart Grid Architecture and Frameworks with ICS
    • Threats and Vulnerabilities
    • Examples of ICS systems utilized for Smart Grid : transformers, switches, inverters, DG

    9:40 PROTECTING THE PRIVILEGED

    John  Worrall

    John Worrall , Chief Marketing Officer, Cyber Ark

  • The challenges of energy utilities in dealing with management of their privileged administrator and shared accounts across their ICS/SCADA and smart-grid networks
  • Securing remote interactive access into critical infrastructure and smart grids
  • Considerations and best practices for how to secure critical infrastructure with an inside-out security approach.
  • The ENISA (European Network and Information Security Agency) standard for Appropriate security measures for smart grids and its implication on securing privileged accounts and remote access
  • 10:10 ENEXIS CRYPTO SERVER PROJECT

    Philip Westbroek

    Philip Westbroek, Project Manager, Enexis

  • Enexis is a DSO with 2.6M E and 2M G customers
  • We currently have 120k E-meters and 100k G-meters (plus an additional 25k meters from pilots)
  • To protect the meter keys, we have implemented a cryptoserver solution
  • The solution consists of an ATOS (Utimaco) hardware security module with software components in our EnergyICT headend system
  •  Phase 1 of this solution is live since September 22, phase 2 (completely compliant to Dutch privacy&security directives) in June 2013
  • 10:40 Morning Coffee

    11:10 LESSONS LEARNED FROM THE NEW SMART METER/GRID RISK ASSESSMENT METHODOLOGY IN THE NETHERLANDS

    Johan Rambi

    Johan Rambi, Alliance Manager Privacy & Security, Alliander

  • Introduction
  • Explanation IS1 Risk Assessment methodology on Smart Meter/Grid in NL
  • Practice on case “sector Privacy & Security AMI requirements v2.0”
  • Lessons learned
  • Status European standard on Smart Grid Cyber Security
  • Next steps
  • 11:40 THE CHALLENGES OF SECURING AND DELIVERING SMART GRID TECHNOLOGIES AND SCADA SECURITY

  • Alternative technologies and delivering smart grids in difficult terrains (using case study examples)
  • SecUring smart grids and SCADA systems to defend the transmission of data and communications to manage infrastructures of utilities
  • The requirement for fully integrated, holistic and secure smart grids solutions
  • Smart grid applications
  • Tapio Savunen

    Tapio Savunen , Director Business Development , Cassidian

    David Alexander

    David Alexander, Capability Lead of ICS security , Cassidian

    12:10 NEW FOR 2013: SECURITY ISSUES OF CONTROL SYSTEMS & WIRELESS METERS AT DRINKING WATER UTILITIES

    John McNabb

    John McNabb, Principal, Infrastructure Security Labs

    • How do they differ from Smart energy meters?
    Communications infrastructure vulnerabilities of fixed and wireless
    • Lack of encryption
    • Theft
    • Data collection privacy
    • Billing

    12:40 Networking Lunch

    13:40 PROTECTING SMART GRID AND AMI WITH SECURITY CONVERGENCE FOR UNIFIED THREAT MANAGEMENT

    Jasvir Gill

    Jasvir Gill, Founder and CEO, Alert Enterprise Europe

  • Encrypting meter data, deploying firewalls and creating security perimeters is not enough
  • As new technology gets added to the grid, a more insidious risk needs to be addressed – insider threat
  • Monitoring of the trusted resources within the company – people with access to control rooms, field supervisors with access to head-ends for meter networks
  • The damage from a disgruntled employee or an insider with malicious intent can far exceed the network intruder
  • Learn how large Utilities in the US are leveraging Security Convergence Solutions to aggregate cyber threats via security automation tools like SIEMs and Vulnerability Scanners and combine those with behavior analytics for Unified Threat Management to prevent complex security incidents that could lead to wide-spread outage.
  • 14:10 TESTING, PART OF THE STRATEGY

  • Complexity of Smart Grid networks
  • Security Aspects of Smart Grid
  • The need for testing
  • How to secure the level of protection
  • Testing, main part of a strategy
  • Marc   Meulensteen

    Marc Meulensteen, Business Development Manager, Spirent Communications Plc

    14:40 NEW FOR 2013: CREATING AN APP CONNECTED TO A BACKEND SYSTEM

    Daniel Zajd

    Daniel Zajd, Senior R and D Engineer, Vattenfall A B

  • Low awareness within the organisation about the effects of a connected app
  • The least secure point in a network will be the target
  • An app will be an extension of the company environment
  • Data stored on the mobile device
  • 15:10 Afternoon Tea

    15:40 SECURING DEVICES FOR HOME AND CONTROL NETWORKS

    Robert Cragie

    Robert Cragie, Chair, Security Task Group, Zigbee Alliance

  • Home and Control Networks
  • What is a Home network (HAN)?
  • What is a Control Network?
  • Topologies
  • Devices
    • Types of devices on home and control networks
    • Distinguishing characteristics
    • Security challenges
    • Information Security Pillars
    • Cryptography
      • Public key cryptography
      • Symmetric key cryptography
      • Hybrid cryptography
      • Protocol stack security
        • Building blocks
        • Frame security
        • Authentication and key establishment
        • Credentials
        • ZigBee SEP 1.0 stack security description
        • ZigBee SEP 2.0 stack security description
  • 16:10 NEW FOR 2013: VULNERABILITIES IN CRITICAL INFRASTRUCTURE AND EMBEDDED DEVICES

    Justin  Clarke

    Justin Clarke, Security Researcher, Cylance

  • Key roles of embedded devices in our every day lives
  • Vulnerabilities in  embedded system
  • Findings and impact behind several recent SCADA vulnerabilities that had worldwide impact.
  • Moving towards a resolution of existing vulnerabilities and avoidance of future vulnerabilities.
    -Education of manufacturers, end users, academia, government, and the general public.
  • The process that occurs when end users or the general public identify vulnerabilities in critical infrastructure
    -What to expect
    -How to reduce your risk
    -How to leverage existing agencies
    -Processes to minimize your required effort
  • 16:40 CLOSING KEYNOTE: CYBER RISKS AND INSURANCE

    Jacob Ingerslev

    Jacob Ingerslev, Technology E&O Leader, CNA Insurance

  • Cyber Crime as an Industry
  • Legal environment
  • What is Cyber Insurance
  • Industry specific exposures
  • 17:10 Chairman’s Closing Remarks and Close of Day Two

    +

    FEATURED SPEAKERS

    Corrado Leita

    Corrado Leita

    Project Coordinator, CRISALIS
    Daniel Zajd

    Daniel Zajd

    Senior R and D Engineer, Vattenfall A B
    Daniela Pestonesi

    Daniela Pestonesi

    IT and Security Systems, Enel Engineering and Research Spa
    Evangelos  Ouzounis

    Evangelos Ouzounis

    Senior Expert, Network Security Policy, ENISA - European Network and Information Security Agency
    Gitte Bergknut

    Gitte Bergknut

    MU Nordic Information Security Manager, EON Sverige AB
    Justin  Clarke

    Justin Clarke

    Security Researcher, Cylance
    Miguel Chavero

    Miguel Chavero

    IT Manager SIMOD, Iberdrola Generation
    Patricia  Robison

    Patricia Robison

    Professor of Cyber Security, New York University
    Patrick Miller

    Patrick Miller

    President and CEO , EnergySec
    Rudolf Baumann

    Rudolf Baumann

    Chairman of the Transmission Security Cooperation, Senior Advisor Operations , swissgrid AG
    Sean McGurk

    Sean McGurk

    Managing Principal Industrial Control Systems Cybersecurity, Verizon Business

    Corrado Leita

    Project Coordinator, CRISALIS
    Corrado Leita

    Damiano Bolzoni

    COO, Security Matters
    Damiano  Bolzoni

    Daniel Zajd

    Senior R and D Engineer, Vattenfall A B
    Daniel Zajd

    Daniela Pestonesi

    IT and Security Systems, Enel Engineering and Research Spa
    Daniela Pestonesi

    David Alexander

    Capability Lead of ICS security , Cassidian
    David Alexander

    Edward Hamilton

    Senior Manager, PwC
    Edward Hamilton

    Evangelos Ouzounis

    Senior Expert, Network Security Policy, ENISA - European Network and Information Security Agency
    Evangelos  Ouzounis

    Geir Mork

    Director of Core Technology & SDK, Norman
    Geir Mork

    Gitte Bergknut

    MU Nordic Information Security Manager, EON Sverige AB
    Gitte Bergknut

    Greg Fitzgerald

    Chief Marketing Officer, Cylance
    Greg Fitzgerald

    Hans Baars

    Senior Consultant Management and Operations Consulting , DNV Kema
    Hans Baars

    Jacob Ingerslev

    Technology E&O Leader, CNA Insurance
    Jacob Ingerslev

    Jasvir Gill

    Founder and CEO, Alert Enterprise Europe
    Jasvir Gill

    Johan Rambi

    Alliance Manager Privacy & Security, Alliander
    Johan Rambi

    John Worrall

    Chief Marketing Officer, Cyber Ark
    John  Worrall

    John McNabb

    Principal, Infrastructure Security Labs
    John McNabb

    Justin Clarke

    Security Researcher, Cylance
    Justin  Clarke

    Marc Meulensteen

    Business Development Manager, Spirent Communications Plc
    Marc   Meulensteen

    Miguel Chavero

    IT Manager SIMOD, Iberdrola Generation
    Miguel Chavero

    Patricia Robison

    Professor of Cyber Security, New York University
    Patricia  Robison

    Patricia Robison is a Professor of Cyber Security at NY University, and also is Smart Grid Program Manager at Con Edison NYC

    Patrick Miller

    President and CEO , EnergySec
    Patrick Miller

    Philip Westbroek

    Project Manager, Enexis
    Philip Westbroek

    Robert Cragie

    Chair, Security Task Group, Zigbee Alliance
    Robert Cragie

    Rudolf Baumann

    Chairman of the Transmission Security Cooperation, Senior Advisor Operations , swissgrid AG
    Rudolf Baumann

    Sean McGurk

    Managing Principal Industrial Control Systems Cybersecurity, Verizon Business
    Sean McGurk

    Stefan Woronka

    Director Industrial Security Services, Siemens AG
    Stefan Woronka

    Steve Brunasso

    Manager of Security Services, California Water and Power
    Steve Brunasso

    Tapio Savunen

    Director Business Development , Cassidian
    Tapio Savunen

    Wouter Teepe

    Product Manager, Fox IT
    Wouter  Teepe

    Workshops

    Copthorne Tara Hotel

    Scarsdale Place
    Kensington
    London W8 5SR
    United Kingdom

    Copthorne Tara Hotel

    The Copthorne Tara Hotel London Kensington is an elegant contemporary four-star hotel in prestigious Kensington, located just a two minutes walk from High Street Kensington underground station, making exploring easy. The hotel offers well-appointed and comfortable guest rooms combining Standard, Superior and Club accommodation. Club rooms offer iconic views over the city and include Club Lounge access for complimentary breakfast and refreshments. Guests can sample the authentic Singaporean, Malaysian and Chinese cuisine at Bugis Street, traditional pub fare at the Brasserie Restaurant & Bar or relax with a delicious drink at West8 Cocktail Lounge & Bar.

    The Copthorne Tara Hotel boasts 745 square meters of flexible meeting space, consisting of the Shannon Suite and the Liffey Suite, ideal for hosting conferences, weddings and social events. Facilities include access to the business centre 24 hours a day, fully equipped fitness room, gift shop, theatre desk and Bureau de Change. With ample onsite parking outside the London congestion charge zone and excellent transport links via Heathrow Airport, the hotel is the perfect location for business or leisure stays. The hotel is within close proximity to the shops of High Street Kensington, Knightsbridge and Westfield London, Olympia Conference Centre, Royal Albert Hall, Kensington Palace and Hyde Park.

     

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SMI Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@smi-online.co.uk

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SMi GROUP LTD

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SMi Group Ltd, 1 Westminster Bridge Road, London, SE1 7XW, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smi-online.co.uk Email: events@smi-online.co.uk
    Registered in England No: 3779287 VAT No: GB 976 2951 71




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.