Home
European Smart Grid Cyber and SCADA Security
11 March - 12 March 2013
European Smart Grid Cyber and SCADA Security

SAVE THE DATE: EUROPEAN SMART GRID CYBER AND SCADA SECURITY LONDON MARCH 10th and 11th 2014  Rebooking now   

SAE Media Group's 3rd annual European Smart Grid Cyber and SCADA Security forum will address the current threat landscape of Smart Grid, Advanced Metering Infrastructure, Industrial Control Systems and SCADA vulnerabilities. Building on the success of the past two years, we will bring Government, Industry, top research and solution providers back to London for a formal interactive two day conference and workshop.

We will be highlight critical developments, case studies, advanced persistent threats and vulnerabilities during the course of the two day conference. The forum will address not only risk management asset strategy, but also dive deeper into technical threats, current attack profiles on the rise and currently, potentially, in circulation.

NEWS AND DOWNLOADS:
Infrastructure Security Labs will be joining us from the United States, discussing Security issues of Control Systems in Water Utilities.
They offer the following information free to you:
Vulnerabilities in Wireless Water Meters
Chemical and Biological Threats against Public Water Systems
 

FEATURED SPEAKERS

Corrado Leita

Corrado Leita

Project Coordinator, CRISALIS
Daniel Zajd

Daniel Zajd

Senior R and D Engineer, Vattenfall A B
Daniela Pestonesi

Daniela Pestonesi

IT and Security Systems, Enel Engineering and Research Spa
Evangelos  Ouzounis

Evangelos Ouzounis

Senior Expert, Network Security Policy, ENISA - European Network and Information Security Agency
Gitte Bergknut

Gitte Bergknut

MU Nordic Information Security Manager, EON Sverige AB
Justin  Clarke

Justin Clarke

Security Researcher, Cylance
Miguel Chavero

Miguel Chavero

IT Manager SIMOD, Iberdrola Generation
Patricia  Robison

Patricia Robison

Professor of Cyber Security, New York University
Patrick Miller

Patrick Miller

President and CEO , EnergySec
Rudolf Baumann

Rudolf Baumann

Chairman of the Transmission Security Cooperation, Senior Advisor Operations , swissgrid AG
Sean McGurk

Sean McGurk

Managing Principal Industrial Control Systems Cybersecurity, Verizon Business

Corrado Leita

Project Coordinator, CRISALIS
Corrado Leita

Damiano Bolzoni

COO, Security Matters
Damiano  Bolzoni

Daniel Zajd

Senior R and D Engineer, Vattenfall A B
Daniel Zajd

Daniela Pestonesi

IT and Security Systems, Enel Engineering and Research Spa
Daniela Pestonesi

David Alexander

Capability Lead of ICS security , Cassidian
David Alexander

Edward Hamilton

Senior Manager, PwC
Edward Hamilton

Evangelos Ouzounis

Senior Expert, Network Security Policy, ENISA - European Network and Information Security Agency
Evangelos  Ouzounis

Geir Mork

Director of Core Technology & SDK, Norman
Geir Mork

Gitte Bergknut

MU Nordic Information Security Manager, EON Sverige AB
Gitte Bergknut

Greg Fitzgerald

Chief Marketing Officer, Cylance
Greg Fitzgerald

Hans Baars

Senior Consultant Management and Operations Consulting , DNV Kema
Hans Baars

Jacob Ingerslev

Technology E&O Leader, CNA Insurance
Jacob Ingerslev

Jasvir Gill

Founder and CEO, Alert Enterprise Europe
Jasvir Gill

Johan Rambi

Alliance Manager Privacy & Security, Alliander
Johan Rambi

John Worrall

Chief Marketing Officer, Cyber Ark
John  Worrall

John McNabb

Principal, Infrastructure Security Labs
John McNabb

Justin Clarke

Security Researcher, Cylance
Justin  Clarke

Marc Meulensteen

Business Development Manager, Spirent Communications Plc
Marc   Meulensteen

Miguel Chavero

IT Manager SIMOD, Iberdrola Generation
Miguel Chavero

Patricia Robison

Professor of Cyber Security, New York University
Patricia  Robison

Patricia Robison is a Professor of Cyber Security at NY University, and also is Smart Grid Program Manager at Con Edison NYC

Patrick Miller

President and CEO , EnergySec
Patrick Miller

Philip Westbroek

Project Manager, Enexis
Philip Westbroek

Robert Cragie

Chair, Security Task Group, Zigbee Alliance
Robert Cragie

Rudolf Baumann

Chairman of the Transmission Security Cooperation, Senior Advisor Operations , swissgrid AG
Rudolf Baumann

Sean McGurk

Managing Principal Industrial Control Systems Cybersecurity, Verizon Business
Sean McGurk

Stefan Woronka

Director Industrial Security Services, Siemens AG
Stefan Woronka

Steve Brunasso

Manager of Security Services, California Water and Power
Steve Brunasso

Tapio Savunen

Director Business Development , Cassidian
Tapio Savunen

Wouter Teepe

Product Manager, Fox IT
Wouter  Teepe

We also welcome to the event for the first time, highly valued presenations from Iberdrola, Enel, E.ON, EnergySec, California Water and Power as well influential solution providers Fox IT, DNV KEMA, AlertEnterprise, Waterfall Securities, and cyber research firm and consultant professionals Cylance and Infrastructure Security Labs.

Conference agenda

clock

8:30

Registration & Coffee

clock

9:00

Chairman's Opening Remarks

Edward Hamilton

Edward Hamilton, Senior Manager, PwC

clock

9:10

KEYNOTE PRESENTATION: SECURING TOMORROW'S GRID - CAN IT BE DONE?

Patrick Miller

Patrick Miller, President and CEO , EnergySec

  • Technology's impact on the modern grid
  • Threat actors: research, crime and warfare
  • Standards, regulations and best practices
  • The human side of the equation
  • The road ahead
  • clock

    9:40

    ENHANCING THE SECURITY OF SMART GRIDS – ENISA’S CONTRIBUTION

    Evangelos  Ouzounis

    Evangelos Ouzounis , Senior Expert, Network Security Policy, ENISA - European Network and Information Security Agency

  • Recommendations on Smart Grids Security 
  • Minimum Security Measures
  • Risks Assessment and Management of Smart Grids
  • Certification of Smart Grids products
  • EU US co-operation on Smart Grids
  • clock

    10:10

    NEW FOR 2013: DEPLOYING WORLDWIDE CYBERSECURITY ON THERMAL POWER GENERATION CONTROL SYSTEMS

    Miguel Chavero

    Miguel Chavero, IT Manager in the Monitoring Diagnostic and Simulation Center, Iberdrola

  • Iberdrola overview
  • Iberdrola & Thermal Stations Strategy
  • CyberSecurity’s Goal and Vision
  • AURA Project (Cybersecurity projects examples)
  • Conclusions
  • clock

    10:40

    Morning Coffee

    clock

    11:10

    CRITICAL INFRASTRUCTURE PROTECTION IS AT THE FOREFRONT OF THE PUBLIC AND PRIVATE SECTORS

    Sean McGurk

    Sean McGurk, Managing Principal Industrial Control Systems Cybersecurity, Verizon Business

  • With Interdependencies of the national critical infrastructure sectors many companies are focusing on risk mitigation to prevent a cascading event
  • Subsequently industry leaders are addressing challenges in policy, technology and procedures to reduce risk and provide a secure operational environment 
  • How technology is evolving with the use of intelligence reporting in order to enhance security
  • As the threat landscape develops so must the capabilities of solution providers in order to counter the malicious activity
  • clock

    11:40

    RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURE

    Hans Baars

    Hans Baars, Senior Consultant Management and Operations Consulting , DNV Kema

  • Making security a priority
  • Lack of standards and the effect on investment
  • Cyber Security and Electricity pricing- cause and effect
  • Fostering a culture of awareness
  • Measuring resiliency
  • Incident response and countermeasures
  • Technical, cultural, and political cooperation for success
  • clock

    12:10

    PROTECTING CRITICAL NETWORKING INFRASTRUCTURE FROM CYBER ATTACKS USING UNI-DIRECTIONAL GATEWAYS

    Wouter  Teepe

    Wouter Teepe, Product Manager, Fox IT

  • What kind of CNI are we talking about and what are we trying to protect?
  • Standardization efforts
  • Threat Scenarios
  • Migrating from IT defense to Industrial defense, the need for Defense in depth
  • Implementations of cyber protection in Transport and Nuclear (Power) CNI
  • clock

    12:40

    Networking Lunch

    clock

    13:40

    SCADA AND ICS SECURITY EXPERIENCES

    Gitte Bergknut

    Gitte Bergknut, MU Nordic Information Security Manager, EON Sverige AB

    • Experiences of how to run a Cyber Security program
    • Business Awareness and Societal Responsibility
    -Compliance & Review
    -Training
    • Use of technical mitigations such as IDS in
    -cogeneration
    -hydro
    -heating
    • Results and lessons learned

    clock

    14:10

    CASE STUDY: Systems Engineering: A practical approach to improving reliability and security in a typical utility

    Steve Brunasso

    Steve Brunasso , Manager of Security Services, California Water and Power

    California Water and Power - A typical metropolitan Utility with all the same challenges
    - Legacy Systems
    - Vendor Solutions
    - Turn key packaged system that cant be modified
    Management supports a Systems Engineering approach
    - Providing relaible systems with high security
    - Focus on integrity and availability
    Benefits
    -Allows the development of a security architecture engineered into utility best solutions in a cost effective and repoducible way

    clock

    14:40

    NEW FOR 2013: FP7 EARLY WARNING DETECTION

    Corrado Leita

    Corrado Leita, Project Coordinator, CRISALIS

    FP7 project funded by DG Enterprise called CRISALIS, CRitical Infrastructure Security AnaLysIS

  • Project focuses: Creation of practical, short-term solutions for the protection of critical infrastructure environment from targeted attacks- primarily power grid
  • Consortium members- Enel, Symantec, Security Matters and Alliander
  • First deliverables of the project: Requirement study, in which we will study in depth the characteristics of the power generation and smart metering environments
  •  Identify risks and possible threat scenarios
  • Feedback on our activity
  • clock

    15:10

    NEW FOR 2013: ICS CYBER SECURITY IN POWER GENERATION AND FUTURE SCENARIO

    Daniela Pestonesi

    Daniela Pestonesi, IT and Security Systems, Enel Engineering and Research Spa

  • Electric grid and power generation scenario in Italy
  • Power Generation: Architecture and Frameworks
  • Risk Analysis: Threats and impacts
  • CI owner requirements for ICS protection
  • Enel Cyber Security ICS Laboratory
  • CRISALIS project participation
  • clock

    15:40

    Afternoon Tea

    clock

    16:10

    ENHANCING NETWORK MONITORING AND SITUATIONAL AWARENESS IN CRITICAL INFRASTRUCTURE

    Damiano  Bolzoni

    Damiano Bolzoni, COO, Security Matters

  • Current approaches to network monitoring and situational awareness
  • Strengths and shortcomings of current approaches
  • Non-signature based approaches for improved monitoring and situational awareness
  • Discussion of 2 use cases

    Damiano on behalf of the University Twente will also be our host and leader for a Post Conference workshop on March 13th on Approaches to network monitoring and situational awareness for Critical Infrastructure, not to be missed

  • clock

    16:40

    CHALLENGES IN POWER-NETWORK SECURITY AND IT

    Rudolf Baumann

    Rudolf Baumann , Chairman of the Transmission Security Cooperation, Senior Advisor Operations , swissgrid AG

  • Updates and improvements in power-network and IT
  • Common processes, systems and collaboration procedures
  •  Integration of system planning, operations and IT
  •  Future developments and sharing knowledge
  • clock

    17:10

    HOW TO PROTECT YOUR CONTROL SYSTEMS AGAINST MALWARE

    Geir Mork

    Geir Mork, Director of Core Technology & SDK, Norman

    -Malware can be inserted in your control systems from many sources, ranging from USB thumb drives to your network
    -By using Windows based HMI or operator and engineer stations your threat surface has grown exponentially from the proprietary devices used earlier
    -Protection at device level and network level is necessary to maintain stability and uptime for your control system networks
    -Easy and simple solutions are hard to find...or are they?

    clock

    17:40

    PRODUCT AND SOLUTION SECURITY IN INDUSTRIAL AUTOMATION SYSTEMS

    Stefan Woronka

    Stefan Woronka, Director Industrial Security Services, Siemens AG

  • Key elements that need to be revisited when setting up a security architecture for the industrial automation environment
  • Best practice example based on the concept of Defense in Depth and ISA 99/IEC 62443
  • Measures that have been implemented within Siemens
  • clock

    18:10

    Chairman’s Closing Remarks and Close of Day One

    clock

    18:15

    SMi Sponsored Drinks Reception

    clock

    8:30

    Registration & Coffee

    clock

    9:00

    Chairman's Opening Remarks

    Edward Hamilton

    Edward Hamilton, Senior Manager, PwC

    clock

    9:10

    SMART GRID INTEGRATES LEGACY AND NEW ICS (SCADA, DCS, PLC) SYSTEMS, DEVICES, AND APPLICATIONS

    Patricia Robison, Professor of Cyber Security, New York University

    • Smart Grid Cyber Security – Integrating legacy and new ICS enhances the grid and simultaneously increases complexity and vulnerability
    • Cyber Security – needs to address ICS at all levels:  field devices, the device systems, the applications supporting the devices and systems, the communications/network interfacing to the devices and systems, etc.
    • ICS Cyber Security Controls:  Technical, Physical, Administrative Risk Management – Smart Grid More challenging with increased complexity and extended systems and communications
    • Leverage existing ICS standards and frameworks:  IEC, NIST, DOE, ISA, ISO, NERC
    • Smart Grid Architecture and Frameworks with ICS
    • Threats and Vulnerabilities
    • Examples of ICS systems utilized for Smart Grid : transformers, switches, inverters, DG

    clock

    9:40

    PROTECTING THE PRIVILEGED

    John  Worrall

    John Worrall , Chief Marketing Officer, Cyber Ark

  • The challenges of energy utilities in dealing with management of their privileged administrator and shared accounts across their ICS/SCADA and smart-grid networks
  • Securing remote interactive access into critical infrastructure and smart grids
  • Considerations and best practices for how to secure critical infrastructure with an inside-out security approach.
  • The ENISA (European Network and Information Security Agency) standard for Appropriate security measures for smart grids and its implication on securing privileged accounts and remote access
  • clock

    10:10

    ENEXIS CRYPTO SERVER PROJECT

    Philip Westbroek

    Philip Westbroek, Project Manager, Enexis

  • Enexis is a DSO with 2.6M E and 2M G customers
  • We currently have 120k E-meters and 100k G-meters (plus an additional 25k meters from pilots)
  • To protect the meter keys, we have implemented a cryptoserver solution
  • The solution consists of an ATOS (Utimaco) hardware security module with software components in our EnergyICT headend system
  •  Phase 1 of this solution is live since September 22, phase 2 (completely compliant to Dutch privacy&security directives) in June 2013
  • clock

    10:40

    Morning Coffee

    clock

    11:10

    LESSONS LEARNED FROM THE NEW SMART METER/GRID RISK ASSESSMENT METHODOLOGY IN THE NETHERLANDS

    Johan Rambi

    Johan Rambi, Alliance Manager Privacy & Security, Alliander

  • Introduction
  • Explanation IS1 Risk Assessment methodology on Smart Meter/Grid in NL
  • Practice on case “sector Privacy & Security AMI requirements v2.0”
  • Lessons learned
  • Status European standard on Smart Grid Cyber Security
  • Next steps
  • clock

    11:40

    THE CHALLENGES OF SECURING AND DELIVERING SMART GRID TECHNOLOGIES AND SCADA SECURITY

  • Alternative technologies and delivering smart grids in difficult terrains (using case study examples)
  • SecUring smart grids and SCADA systems to defend the transmission of data and communications to manage infrastructures of utilities
  • The requirement for fully integrated, holistic and secure smart grids solutions
  • Smart grid applications
  • Tapio Savunen

    Tapio Savunen , Director Business Development , Cassidian

    David Alexander

    David Alexander, Capability Lead of ICS security , Cassidian

    clock

    12:10

    NEW FOR 2013: SECURITY ISSUES OF CONTROL SYSTEMS & WIRELESS METERS AT DRINKING WATER UTILITIES

    John McNabb

    John McNabb, Principal, Infrastructure Security Labs

    • How do they differ from Smart energy meters?
    Communications infrastructure vulnerabilities of fixed and wireless
    • Lack of encryption
    • Theft
    • Data collection privacy
    • Billing

    clock

    12:40

    Networking Lunch

    clock

    13:40

    PROTECTING SMART GRID AND AMI WITH SECURITY CONVERGENCE FOR UNIFIED THREAT MANAGEMENT

    Jasvir Gill

    Jasvir Gill, Founder and CEO, Alert Enterprise Europe

  • Encrypting meter data, deploying firewalls and creating security perimeters is not enough
  • As new technology gets added to the grid, a more insidious risk needs to be addressed – insider threat
  • Monitoring of the trusted resources within the company – people with access to control rooms, field supervisors with access to head-ends for meter networks
  • The damage from a disgruntled employee or an insider with malicious intent can far exceed the network intruder
  • Learn how large Utilities in the US are leveraging Security Convergence Solutions to aggregate cyber threats via security automation tools like SIEMs and Vulnerability Scanners and combine those with behavior analytics for Unified Threat Management to prevent complex security incidents that could lead to wide-spread outage.
  • clock

    14:10

    TESTING, PART OF THE STRATEGY

  • Complexity of Smart Grid networks
  • Security Aspects of Smart Grid
  • The need for testing
  • How to secure the level of protection
  • Testing, main part of a strategy
  • Marc   Meulensteen

    Marc Meulensteen, Business Development Manager, Spirent Communications Plc

    clock

    14:40

    NEW FOR 2013: CREATING AN APP CONNECTED TO A BACKEND SYSTEM

    Daniel Zajd

    Daniel Zajd, Senior R and D Engineer, Vattenfall A B

  • Low awareness within the organisation about the effects of a connected app
  • The least secure point in a network will be the target
  • An app will be an extension of the company environment
  • Data stored on the mobile device
  • clock

    15:10

    Afternoon Tea

    clock

    15:40

    SECURING DEVICES FOR HOME AND CONTROL NETWORKS

    Robert Cragie

    Robert Cragie, Chair, Security Task Group, Zigbee Alliance

  • Home and Control Networks
  • What is a Home network (HAN)?
  • What is a Control Network?
  • Topologies
  • Devices
    • Types of devices on home and control networks
    • Distinguishing characteristics
    • Security challenges
    • Information Security Pillars
    • Cryptography
      • Public key cryptography
      • Symmetric key cryptography
      • Hybrid cryptography
      • Protocol stack security
        • Building blocks
        • Frame security
        • Authentication and key establishment
        • Credentials
        • ZigBee SEP 1.0 stack security description
        • ZigBee SEP 2.0 stack security description
  • clock

    16:10

    NEW FOR 2013: VULNERABILITIES IN CRITICAL INFRASTRUCTURE AND EMBEDDED DEVICES

    Justin  Clarke

    Justin Clarke, Security Researcher, Cylance

  • Key roles of embedded devices in our every day lives
  • Vulnerabilities in  embedded system
  • Findings and impact behind several recent SCADA vulnerabilities that had worldwide impact.
  • Moving towards a resolution of existing vulnerabilities and avoidance of future vulnerabilities.
    -Education of manufacturers, end users, academia, government, and the general public.
  • The process that occurs when end users or the general public identify vulnerabilities in critical infrastructure
    -What to expect
    -How to reduce your risk
    -How to leverage existing agencies
    -Processes to minimize your required effort
  • clock

    16:40

    CLOSING KEYNOTE: CYBER RISKS AND INSURANCE

    Jacob Ingerslev

    Jacob Ingerslev, Technology E&O Leader, CNA Insurance

  • Cyber Crime as an Industry
  • Legal environment
  • What is Cyber Insurance
  • Industry specific exposures
  • clock

    17:10

    Chairman’s Closing Remarks and Close of Day Two


    Senior Manager
    PwC
    Principal
    Infrastructure Security Labs
    Security Researcher
    Cylance
    IT Manager SIMOD
    Iberdrola Generation
    Professor of Cyber Security
    New York University
    Chair, Security Task Group
    Zigbee Alliance
    Chairman of the Transmission Security Cooperation, Senior Advisor Operations
    swissgrid AG
    Managing Principal Industrial Control Systems Cybersecurity
    Verizon Business
    Product Manager
    Fox IT
    Project Coordinator
    CRISALIS
    Manager of Security Services
    California Water and Power
    Director of Core Technology & SDK
    Norman
    Project Manager
    Enexis
    President and CEO
    EnergySec
    Founder and CEO
    Alert Enterprise Europe
    Chief Marketing Officer
    Cyber Ark
    Business Development Manager
    Spirent Communications Plc
    Director Industrial Security Services
    Siemens AG
    Capability Lead of ICS security
    Cassidian
    Director Business Development
    Cassidian
    Chief Marketing Officer
    Cylance
    Senior Consultant Management and Operations Consulting
    DNV Kema
    COO
    Security Matters
    Senior R and D Engineer
    Vattenfall A B
    IT and Security Systems
    Enel Engineering and Research Spa
    Senior Expert, Network Security Policy
    ENISA - European Network and Information Security Agency
    MU Nordic Information Security Manager
    EON Sverige AB
    Technology E&O Leader
    CNA Insurance
    Alliance Manager Privacy & Security
    Alliander

    Workshops

    Copthorne Tara Hotel

    Scarsdale Place
    Kensington
    London W8 5SR
    United Kingdom

    Copthorne Tara Hotel

    The Copthorne Tara Hotel London Kensington is an elegant contemporary four-star hotel in prestigious Kensington, located just a two minutes walk from High Street Kensington underground station, making exploring easy. The hotel offers well-appointed and comfortable guest rooms combining Standard, Superior and Club accommodation. Club rooms offer iconic views over the city and include Club Lounge access for complimentary breakfast and refreshments. Guests can sample the authentic Singaporean, Malaysian and Chinese cuisine at Bugis Street, traditional pub fare at the Brasserie Restaurant & Bar or relax with a delicious drink at West8 Cocktail Lounge & Bar.

    The Copthorne Tara Hotel boasts 745 square meters of flexible meeting space, consisting of the Shannon Suite and the Liffey Suite, ideal for hosting conferences, weddings and social events. Facilities include access to the business centre 24 hours a day, fully equipped fitness room, gift shop, theatre desk and Bureau de Change. With ample onsite parking outside the London congestion charge zone and excellent transport links via Heathrow Airport, the hotel is the perfect location for business or leisure stays. The hotel is within close proximity to the shops of High Street Kensington, Knightsbridge and Westfield London, Olympia Conference Centre, Royal Albert Hall, Kensington Palace and Hyde Park.

     

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download

    Title


    Description

    Download

    Title


    Description


    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By submitting this form you agree to our privacy policy and consent to receiving communications, you may opt out at any time.