Home
overview

SAE Media Group are delighted to announce Oil and Gas Cyber Security 2016. An estimated 250% rise in reported industrial control system incidents over the past four years suggests that the oil and gas companies now more than ever need to strengthen their cyber security units. Perfect security for any successful company is impossible. Inevitably, some doors need to be left open. The question the oil and gas companies are currently faced with is which ones are worth leaving open, and how, when open, are they best monitored to ensure the highest level of security in the company.


This conference will discuss where and how oil and gas companies should invest in their cyber security. Special focus will be on how companies can optimise the security of their industrial control systems. Strategy is key and therefore the conference will explain how companies can implement the best security strategy. Threat intelligence, threat analytics and many other industry hot topics will be addressed.

The cyber security of a company is only as strong as its weakest link. Therefore this conference will examine how companies can raise awareness of cyber security across the whole company and to each and every employee.

 


 


 

• Discuss the relationship between cyber security and physical security and why this is so significant in the energy sector
• Hear case studies from the oil and gas companies themselves
• Learn the best way to invest in cyber security in your companies and how to build an effective security strategy. Special focus will be on the supply chain and the reporting line.
• Listen to the latest regulation updates in European countries.
 

 Chief Executive Officer
Chief Information Officer
EMEA Lead, Risk and Compliance Solutions
Global Data Steward & Technologist
Group IT Manager
Technical Director
 Group Security Adviser
ICT infrastructure specialist
ICT Manager
Information & Cyber Security Consultant
IS Risk and Security Manager
Network Management Solutions
 

C&J Energy Services, Inc.; Chevron; Chevron Energy Technology Company; Chevron Information Technology Company; CyberX; ERPScan; ExxonMobil; FBI; Ghost Systems-Rye Technology; Gjøvik University College ; ICS-CERT; Independant; IRSM; Kane Russell Coleman & Logan PC ; Kaspersky Lab USA; Kongsberg Maritime, Inc.; L3 Communications; L-3 TRL Technology; Liberty Group Ventures, LLC; Lloyds Register Energy – Drilling; Lookingglass Cyber Solutions; Marsh, Inc.; National Institute Of Standards And Technology; Oracle; Pacific Northwest National Laboratory; Parsons; SAP NS2; Shell Oil Co; Siemens Corporation, Corporate Research; Statoil; Texas A & M University; Texas CISO Council; TGS; Thompson And Knight; Transocean; Transplace LLC; Waterfall Security Solutions;

Conference programme

8:30 Registration & Coffee

9:00 Chairman's Opening Remarks

Chris Hankin

Chris Hankin, Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London

9:10 Regulation and policy, organising cyber security across the oil and gas sector

Heli Tiirmaa-Klaar

Heli Tiirmaa-Klaar, Cyber Security Policy Advisor, European External Action Service (EEAS)

  • What governments need to do to help critical infrastructure companies
  • Estonian national cyber security system as an example of well-functioning public and private partnership
  • Different national cyber security models in Europe  to protect critical cyber assets 
  • Interlinking cyber security issues across sectors
  • 9:45 How does trust improve cyber resilience?

    Johan Rambi

    Johan Rambi, Privacy & Security Officer, Alliander

  • Introduction of the EE-ISAC community and members
  • Information and sharing activities
  • Lessons learned and next steps
  • 10:20 Morning Coffee

    10:50 ICS security strategy and transformation – client and vendor perspective

    Trajce Dimkov

    Trajce Dimkov, Senior Manager, Deloitte

  • Building blocks of developing an ICS strategy and transformation program to execute the strategy
  • DO’s and DONTs in executing the strategy
  • Security requirements from Vendors perspective and how to address the growing ICS security requirements from multiple clients
  • A scalable approach
  • 11:25 Eyes Wide Shut: Have you been working in the dark?

    Daniel Tulen

    Daniel Tulen, CSE Advanced Threat Solutions, Cisco Systems

  • How to 'unleash the power of your network as a sensor' by Netflow
  • Visibility and comprehensive overview of your network security
  • Learn to take control and implement next generation of network security to address the insider threat
  • 12:00 Networking Lunch

    13:00 PANEL DISCUSSION: What can governments do to help?

  • What are the best codes and conducts that can be implemented across industry?
  • How can we enforce commitment and practice to these guidelines?
  • Are universal guidelines necessary?
  • Chris Hankin

    Chris Hankin, Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London

    Heli Tiirmaa-Klaar

    Heli Tiirmaa-Klaar, Cyber Security Policy Advisor, European External Action Service (EEAS)

    Bethany  Yates

    Bethany Yates, Energy Sector, CERT-UK

    Arthur Van Der Wees

    Arthur Van Der Wees, Managing Director, Arthurs Legal

    13:35 Maximising the protection of our assets: Security or resilience?

    Lhoussain Lhassani

    Lhoussain Lhassani, Senior Specialist, Stedin Netbeheer BV

  • Cyber security: What to protect and at what cost?
  • Investing and optimising the cyber security of our industrial control systems (ICS): Different roles 
  • What security is necessary and where must this implemented?
  • New challenges: The most appropriate approaches to the changing landscape of threats
  • Design and best practices to protect our ICS environment
  • 14:10 Development and control of Risk Mitigation Strategy

  • Introduction of the risk model of Bowstar, a recent development that has been developed by PIMS International in close cooperation with Gasunie and Engie and is used for their vital infrastructure 
  • Systematic development of the risk model including all escalations and mitigations for all life cycles (example on cyber and physical sabotage)
  • Development and management of the mitigation plan with the risk register of Bowstar
  • Rob Bos

    Rob Bos, CEO, PIMS International B.V.

    14:45 Afternoon Tea

    15:15 Embracing shadow IT in critical infrastructure

    Pieter Jansen

    Pieter Jansen, CEO and Co-Founder, Cybersprint

  • How I learned to stop worrying and love shadow IT
  • Bring your own device: Bring your own disaster?
  • Assessing, preventing, detecting and embracing shadow IT
  • 15:50 The insider threat: CERT-UK

    Bethany  Yates

    Bethany Yates, Energy Sector, CERT-UK

  • Understanding the human dimension
  • Measuring employees levels of awareness
  • ‘Insider threat’: What does this really mean to companies?
  • 16:25 Security Culture: Learning from safety

    Andrew  Wadsworth

    Andrew Wadsworth, Managing Consultant, Global Energy & Utilities, Pa Consulting

  • People are often regarded as the weakest link in our security defences and are key to good cyber security.
  • Good safety behaviour all at all times by everyone is essential to maintain a safe working environment
  • Maintaining security similarly needs good security behaviour by everyone
  • How do we measure the security culture in an organisation and identify if our security programmes are making the difference?
  • 17:00 Chairman’s Closing Remarks and Close of Day One

    8:30 Registration & Coffee

    9:00 Chairman's Opening Remarks

    Robert Bond

    Robert Bond, Head of Data Protection & Cyber Security Group, Charles Russell Speechlys LLP

    9:10 Cybersecurity and digital data in IOT ecosystems

    Arthur Van Der Wees

    Arthur Van Der Wees, Managing Director, Arthurs Legal

  • Data traffic is no longer one way – what does this mean for companies?
  • The risk involved in meeting the demand to know more
  • What are the security short comings in light of the new developments?
  • 9:45 Cyber security in the cloud

  • What is cloud computing?
  • Is it ‘safe’?
  • What cybersecurity threats are hiding inside the cloud?
  • How can we deal with them?
  • Franco Tessarollo

    Franco Tessarollo, Security Manager, Hera

    10:20 Morning Coffee

    10:50 Cyber risks to industrial control systems

    Jalal Bouhdada

    Jalal Bouhdada, Fouder and Principal Security Consultant, Applied Risk

    •         What are current trends in the threat landscape
    •         Case study for cyber threat actors
    •         Long term threats and best practices

    11:25 Cyber risks, due diligence and regulatory compliance

    Robert Bond

    Robert Bond, Head of Data Protection & Cyber Security Group, Charles Russell Speechlys LLP

  • Developing policies and procedures
  • Internal compliance audits
  • External compliance audits
  • The cost of non-compliance
  • 12:00 PANEL DISCUSSION: Emerging cyber threats in the oil and gas sector

  • What is happening today and why?
  • Are advanced persistent threats a real risk or should we rather spend our money and resources on cleaning viruses and malware from existing drilling assets?
  • The current risk situation and what is likely to happen within the next five years.
  • Damiano Bolzoni

    Damiano Bolzoni, COO and Owner, SecurityMatters B.V.

    Jalal Bouhdada

    Jalal Bouhdada, Fouder and Principal Security Consultant, Applied Risk

    12:35 Networking Lunch

    13:35 Brilliant failures in cyber security

    Paul Louis  Iske

    Paul Louis Iske, Proffessor, Maastricht University

  • Double-loop learning in complex  environments
  • How to deal with uncertainty and risk in a complex, dynamic world?
  • Building knowledge to support a climate for innovation and learning
  • Raising awareness from those who try, whether they succeed or fail
  • 14:10 The Defence Cyber Protection Partnership (DCC): Working together to protect the Defence sector from the cyber threat

    Daniel Selman

    Daniel Selman, Cyber Industry and Information Security Policy Deputy Head, Ministry of Defence

  • Why assurance of the supply chain’s level of cyber protection matters
  • Why the DCPP was formed and the objectives it was set
  • How the Cyber Security Model was developed and what it will mean for defence suppliers
  • Next steps
  • 14:45 Afternoon Tea

    15:15 Intensive Training: Establishing an ICS cyber security programme for the oil and gas sector and detect all kinds of cyber incidents

    Damiano Bolzoni

    Damiano Bolzoni, COO and Owner, SecurityMatters B.V.

  • Cyber-attacks and malware are not the only cyber incidents happening within industrial networks
  • Network segmentation and asset inventory are just the first steps to secure industrial networks
  • An analysis of real-life examples of cyber incidents that could have affected the business continuity of critical organizations
  • Discussion of the best practices to detect such cyber incidents
  • 17:00 Chairman’s Closing Remarks and Close of Day Two

    +

    FEATURED SPEAKERS

    Franco Tessarollo

    Franco Tessarollo

    Security Manager, Hera
    Heli Tiirmaa-Klaar

    Heli Tiirmaa-Klaar

    Cyber Security Policy Advisor, European External Action Service (EEAS)
    Johan Rambi

    Johan Rambi

    Privacy & Security Officer, Alliander
    Lhoussain Lhassani

    Lhoussain Lhassani

    Senior Specialist, Stedin Netbeheer BV

    Andrew Wadsworth

    Managing Consultant, Global Energy & Utilities, Pa Consulting
    Andrew  Wadsworth

    Arthur Van Der Wees

    Managing Director, Arthurs Legal
    Arthur Van Der Wees

    Bethany Yates

    Energy Sector, CERT-UK
    Bethany  Yates

    Chris Hankin

    Director of the Institute for Security Science and Technology and a Professor of Computing Science, Imperial College London
    Chris Hankin

    Damiano Bolzoni

    COO and Owner, SecurityMatters B.V.
    Damiano Bolzoni

    Daniel Selman

    Cyber Industry and Information Security Policy Deputy Head, Ministry of Defence
    Daniel Selman

    Daniel Tulen

    CSE Advanced Threat Solutions, Cisco Systems
    Daniel Tulen

    Franco Tessarollo

    Security Manager, Hera
    Franco Tessarollo

    Heli Tiirmaa-Klaar

    Cyber Security Policy Advisor, European External Action Service (EEAS)
    Heli Tiirmaa-Klaar

    Jalal Bouhdada

    Fouder and Principal Security Consultant, Applied Risk
    Jalal Bouhdada

    Johan Rambi

    Privacy & Security Officer, Alliander
    Johan Rambi

    Lhoussain Lhassani

    Senior Specialist, Stedin Netbeheer BV
    Lhoussain Lhassani

    Paul Louis Iske

    Proffessor, Maastricht University
    Paul Louis  Iske

    Pieter Jansen

    CEO and Co-Founder, Cybersprint
    Pieter Jansen

    Rob Bos

    CEO, PIMS International B.V.
    Rob Bos

    Robert Bond

    Head of Data Protection & Cyber Security Group, Charles Russell Speechlys LLP
    Robert Bond

    Trajce Dimkov

    Senior Manager, Deloitte
    Trajce Dimkov

    Sponsors and Exhibitors

    Supporters

    Workshops

    Applied cyber security in the oil and gas industry
    Workshop

    Applied cyber security in the oil and gas industry

    Movenpick Hotel Amsterdam City Centre
    29th June 2016
    Amsterdam, Netherlands

    Question and Answer Session with the conference speakers: PA Consulting Group, Deloitte, CERT-UK, Ministry of Defence

    Download

    Interview with with Chris Hankin, Professor, Imperial College London

    Download

    SMi's Oil and Gas Cyber Security List of Attendees 2015

    Download

    Sponsors and Exhibitors


    Applied Risk

    Sponsors and Exhibitors
    http://www.applied-risk.com/

    Applied Risk is a leader in Industrial Automation and Control Systems (IACS) security and combating security breaches that pose a significant threat to industrial facilities. Operating on a global scale, we work with a wealth of large organisations that rely on our expertise to safeguard their critical assets. Our proven experience of identifying vulnerabilities and security risks is based on methodologies honed over years of conducting assessments in industrial environments.


    Cisco

    Sponsors and Exhibitors
    http://www.cisco.com

    Lancope enhances Cisco’s Security Everywhere strategy, enabling the network to become a security sensor, delivering continuous visibility, and accelerating incident response across the extended enterprise. Lancope provides deep understanding of network traffic, continuously monitoring and analyzing network flows to establish a security baseline, detect anomalous threats, and enable rapid containment.

    Media Partners


    Cedigaz

    Supporters
    http://www.cedigaz.org

    Cedigaz is an international association dedicated to natural gas information, created in 1961 by a group of international gas companies and the Institut Français du Pétrole (IFP Energies Nouvelles). It is based near Paris. Cedigaz has more than 150 members in 40 countries. Cedigaz' goals consist in gathering, compiling and analysing worldwide economical information on natural gas, LNG and unconventional gas in an exhaustive and critical way. The information that Cedigaz deals with touches on all activities and aspects of the gas industry (exploration, reserves, production and processing, transportation, trade, storage, distribution and consumption of natural gas). Cedigaz diffuses the information in its periodic bulletins, surveys and online databases.


    Virus Bulletin

    Supporters
    http://www.virusbtn.com

    Virus Bulletin is a security information portal, testing and certification body with a formidable reputation for providing users with free of charge independent intelligence about the latest developments in the global threat landscape. It includes comparative product reviews featuring the unique VB100 (anti-virus) & VBSpam (anti-spam) award scheme and a wealth of material dating back to 1989. The annual international Virus Bulletin conference is cited by many as the IT security event of the year.


    World Oils

    Supporters
    http://www.worldoils.com

    Worldoils is a company that combines the power of marketing as well as the in-house expertise for the Oil, Gas, Offshore and the Maritime industries. Worldoils' web portal www.worldoils.com has become a truly central platform for visitors who need information regarding oil and gas products and services, research, training, conferences, news and events as well as a popular advertising base for providers of Oil, Gas, Marine and Offshore services. Worldoils has also launched the jobs system and a marketplace. In the recent months, Worldoils has strengthened its position as a fast developing central place for buying and selling of land rigs, offshore rigs,barge rigs and other oilfield and subsea equipment.


    www.oilandgastechnology.net" target="_blank"> sponsor image

    Oil & Gas Technology

    Supporters
    www.oilandgastechnology.net" target="_blank" class="link" align="right"> www.oilandgastechnology.net

    Oil & Gas Technology connects growth and western markets across the oil and gas industry. We provide technology news, exclusive interviews with industry insiders and analysis for upstream, downstream and pipeline sectors. Register now to receive our weekly newsletters and e-Magazines at no cost.


    Cyber Security Market

    Supporters
    http://www.cybersecuritymarket.com

    Find the latest information on Cyber Security, Access Control Management, Cyber Security Technologies and Markets. Cyber threats to federal information systems and cyber-based critical infrastructures are evolving and growing. These threats can be unintentional and intentional, targeted or nontargeted, and can come from a variety of sources, such as foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, and disgruntled employees and contractors working within an organization. Moreover, these groups and individuals have a variety of attack techniques at their disposal, and cyber exploitation activity has grown more sophisticated, more targeted, and more serious. As government, private sector, and personal activities continue to move to networked operations, as digital systems add ever more capabilities, as wireless systems become more ubiquitous, and as the design, manufacture, and service of information technology have moved overseas, the threat will continue to grow. In the absence of robust security programs, agencies have experienced a wide range of incidents involving data loss or theft, computer intrusions, and privacy breaches, underscoring the need for improved security practices. These developments have led government officials to become increasingly concerned about the potential for a cyber attack.


    International Journal of Information Privacy, Security and Integrity

    Supporters
    http://www.inderscience.com/ijipsi

    The International Journal of Information Privacy, Security and Integrity presents research results in the theory, application, implementation, analysis, design and evaluation of information privacy and security. IJIPSI also aims to bring together researchers in the various relevant disciplines to explore issues and problems in information integrity defined as information accuracy, consistency and reliability. The journal welcomes contributions on all aspects of information privacy, security and integrity


    MJMEnergy

    Supporters
    http://www.mjmenergy.com

    MJMEnergy offer energy consultancy, training and publishing solutions to energy companies worldwide. A multi-disciplined team of experts, all currently working within the industry, are available for consultancy assignments, training presentations and publishing projects.


    International Journal of Critical Infrastructures

    Supporters
    http://www.inderscience.com/ijcis

    IJCIS provides a professional and scholarly forum for cross-learning between different scientific and technological disciplines, and between business and economic, as well as between societal and managerial, disciplines in the area of critical infrastructures. Critical infrastructures are networks for the provision of telecommunication and information services, energy services (electrical power, natural gas, oil and heat), water supply, transportation of people and goods, banking and financial services, government services and emergency services.


    NRG Expert

    Supporters
    http://www.nrgexpert.com

    NRGExpert is an independent energy market intelligence and research company. We specialise in energy market research reports, energy market databases and energy market consulting as well as analysis and market forecasts. Our global energy market research reports cover the electricity, water and waste, gas, hydrogen, nuclear and the renewable energy markets. We follow the energy markets very closely and we produce a wide range of reports, databases and directories. We also answer very specific energy market information requirements with our energy market consulting and data services. We provide information to a wide range of companies, associations, education and government bodies and organisations.


    E&P Daily

    Supporters
    http://www.ogilviepub.com/publication_detail.php?id=1

    E&P Daily presents you with up to the minute vital facts on the international upstream industry. E-mailed to you every day, two pages in length, E&P Daily is an accurate and concise report that will immediately highlight the most significant international developments in the upstream industry. Regular features include ongoing and future projects, government policy and company news. Expert analysis will alert you to business opportunities worldwide. The weekly Sharewatch quickly highlights the status of the companies involved in the global upstream industry.


    International Journal of Electronic Security and Digital Forensics

    Supporters
    http://www.inderscience.com/ijesdf

    IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security-related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and for individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, relevant case studies, and "best practice" for tackling cyber crime.


    OffComm News

    Supporters
    http://OffCommNews.com

    The resource for buyers and suppliers of telecommunications destined for remote & harsh environments. For mission critical operations, as well as the people based in these locations, OffComm News focuses on advancements in communications in and out of offshore rigs, the supporting maritime sector, deserts, mines and other E&P remote sites worldwide. The magazine delivers articles and news from around the globe every quarter covering connectivity innovation in operations and infrastructure, alongside crew welfare communications and entertainment developments.
    Apply for a free subscription at http://eepurl.com/sxkDT
    Or download the current edition with our compliments.


    TechnologyConference.com

    Supporters
    http://www.technologyconference.com

    TechnologyConference.com is a premier resource of professional events, providing the latest information on technology events for R&D, business development and marketing professionals in technology-intensive industries. TechnologyConference.com is one of the most widely-read technology event publications, providing the latest information on technology events for R&D, business development and marketing professionals in knowledge-intensive industries. Decision-makers at Fortune 500 companies, government agencies and R&D organizations watch the technology event announcements published at TechnologyConference.com and its media partnership network.


    Crowd Reviews

    Supporters
    http://www.crowdreviews.com/rankings-of-best-business-security-software

    CrowdReviews.com is a transparent online platform for determining which security products and services are the best based on the opinion of the crowd. The crowd consists of Internet users which have experienced products and services first-hand and have an interest in letting other potential buyers their thoughts on their experience. CrowdReviews.com is driven by an algorithm allowing for both customers and providers of products and services to understand how the rankings are determined. The service can be used by potential buyers to learn more about their vendors prior to making a purchasing decision.http://www.crowdreviews.com/rankings-of-best-business-security-software


    WSN Buzz

    Supporters
    http://www.wsnbuzz.com

    WSNBuzz.com is a blog providing fresh updates on smart grid technologies, covering new standards, products, deployments, industry moves and events of interest.


    Shale Gas International

    Supporters
    http://www.shalegas.international/

    Shale Gas International is a one-stop-shop for all things shale. Based in London, and with an international appeal, Shale Gas International website, newsletter, and focus reports, provide oil and gas professionals with timely information about this fast-paced industry.


    Offshore Technology

    Supporters
    http://www.offshore-technology.com/



    OilVoice

    Supporters
    http://www.oilvoice.com/

    OilVoice is a valuable source of upstream oil industry reference, featuring a global selection of oil company profiles in one location, alongside continually updated industry news, operational data, focused regional information, contact details and key industry personnel.


    Alexander's Oil and Gas Connections

    Supporters
    http://www.gasandoil.com

    Alexander’s Gas and Oil Connections is the web-service of Alexander Wöstmann, a national of the Netherlands from 1958 now living in Germany, and is the expression of the wish to give a different coverage on global energy-related developments.


    Homeland Security Corporation (HSRC)

    Supporters
    http://www.hsrc.biz

    HSRC provides premium off-the-shelf market reports on present and emerging technologies and industry expertise, enabling global clients to gain time-critical insight into business opportunities. All reports include in-depth information and analysis of emerging markets, technologies, and industries broken down by geography, market, vertical, technology, product, and revenue stream. Our reports support Homeland Security & Public Safety communities worldwide in their strategic decision-making process, providing up-to-date market knowledge, analysis, and insights. HSRC offers customized research services geared towards providing our clients with clear, actionable recommendations designed to empower decision-making and to help exploit emerging opportunities in the market. The customized research services provide a deep analysis of specific markets and eco-systems, target geographies, strategic segments and verticals, competitor analysis and technological benchmarks. The custom research services are provided as an ad hoc assignment or as an ongoing service.


    International Journal of Security and Networks

    Supporters
    http://www.inderscience.com/ijsn

    IJSN proposes and fosters discussion on and dissemination of network security related issues.


    ABI Research

    Supporters
    http://www.abiresearch.com

    ABI Research is the leader in technology market intelligence. Our analysts act as an extension of the world’s most innovative organizations, accelerating their overall decision-making process to more quickly and confidently execute strategies. We assess markets to explore trends, offer insight into the changing landscape, and define tomorrow’s strategic technologies. For more information, visit www.abiresearch.com


    Gas Infrastructure Europe (GIE)

    Supporters
    http://www.gie.eu/

    Gas Infrastructure Europe (GIE) is an association representing the interests of European natural gas infrastructure operators active in natural gas transmission, storage and LNG regasification. GIE is a trusted partner of European institutions, regulatory bodies and industry stakeholders. It is based in Brussels, the heart of European policymaking. GIE currently represents 68 member companies from 25 countries.


    International Journal of Trust Management in Computing and Communications

    Supporters
    http://www.inderscience.com/ijtmcc

    The volatile growth of the internet and globalization that influences every facet of life are fuelled by the rapid acceleration of computing/communication technologies. Although security is a major concern, we must also protect ourselves from false/misleading information provided by some information/service providers. Traditional security mechanisms cannot protect against this type of threat. Trust management mechanisms on the other hand can provide protection. IJTMCC provides a forum for discussion on theoretical and practical aspects of the latest developments in this area.


    European Offshore Petroleum Newsletter

    Supporters
    http://www.ogilviepub.com

    European Offshore Petroleum Newsletter is the weekly executive report for petroleum professionals who rely on expert analysis, timely news, exclusive information and business opportunity leads. Subscribers to European Offshore Petroleum Newsletter receive the latest on: oil and gas field developments, activities of operators, fabricators, contractors and leading service and supply companies. It also includes the fortnightly Sharewatch, the exclusive financial share report on the European oil and service companies. For a free trial to European Offshore Petroleum Newsletter please e-mail subs@ogilviepub.com or register online at: http://www.ogilviepub.com or call +44 (0) 191 567 8497


    International Journal of Information and Computer Security

    Supporters
    http://www.inderscience.com/ijics

    Computer security has been a major concern since the 1950s. The ubiquity of the internet has engendered the prevalence of information sharing among networked users and organisations. This has rendered possible countless invasions of privacy/security worldwide. The risk of invasion has generated enormous concern about information and computer security among businesses, governments, legislators, academics, researchers, scientists and the public. The International Journal of Information and Computer Security addresses development of information and computer security in the fields of information technology, political science, informatics, sociology, engineering and science.


    Petroleum Africa

    Supporters
    http://www.petroleumafrica.com

    Petroleum Africa is the world's leading monthly magazine dedicated to providing in-depth upstream and downstream coverage of key issues affecting the fast-paced oil and gas industries of Africa, the last great exploration frontier. Its broad-based coverage and analysis of current activities provides you with the latest news, an African country focus, exclusive interviews, technology updates, company profiles, and essential political reviews from the world's top energy players. And for daily news from the continent www.petroleumafrica.com offers the latest information as it happens, along with an event calendar, country reports, industry links, and access to Petroleum Africa magazine articles.

    Movenpick Hotel Amsterdam City Centre

    Piet Heinkade 11
    Amsterdam 1019 BR
    Netherlands

    Movenpick Hotel Amsterdam City Centre

    Rewarding its guests with a spectacular view over the city and river IJ from the 408 rooms, the Mövenpick Hotel Amsterdam City Centre offers a unique location. It lies within walking distance of the historical city centre of Amsterdam, Central Station and cultural hotspots. The hotel is easily reached from the highway and only 20 minutes from Schiphol Airport. With its 12 flexible and state-of-the-art meeting rooms with natural daylight and free internet, the hotel offers a perfect balance between business and leisure.

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out