Sunteți pe pagina 1din 6

Premier Conference, Exhibition & Networking Forum

Advanced IDS Implementation to Futureproof Smart


Power Generation, Transmission, and Distribution
3-Day Conference, Exhibition & Networking Forum
29-31 January 2019 | Amsterdam, The Netherlands

In-depth Insights On: 10+ Utility Case Studies


 IDS and OT Roadmap: foundations for Philip Tonkin Yugo Neumorni Dragomir Vatkov
successful IDS deployment to underpin Global Head of Cyber Board Member, Chair Cyber Security
a robust OT Cybersecurity strategy Operational Technology Cybersecurity Council Architecture & Solutions
which meets the demands of the NIS National Grid EuroCIO Association innogy SE
directive and the threat landscape & CISO - Hidroelectrica

 Organisational Alignment: ensuring a Nuno Pereira Agustin Valencia Robin Massink


proactive approach to facilitate buy-in OT Cyber Security Officer OT Cybersecurity IT Security Specialist
from senior management and EDP Distribuição Iberdrola Alliander
cooperation between business units
from OT and IT Martin Sloan Ivo Maritz
Chief Information Security Chief Information Security
 IDS Procurement: examining key Officer Officer Early Bird Discount!
specifications for electric utilities to Drax Power BKW Register before 28th December
identify and compare vendors and €200 off delegate passes
implement the best solutions Erki Poder Nikolaus Wirtz
€1000 off exhibition spaces
partnerships for their environment Managing Project Manager Research Assistant
Elektrilevi E.ON Energy Research Centre
 Implementation, Integration, and
Configuration: installing and tuning IDS Expert Advice from:
solutions to optimise their monitoring
Mark Ossel Professor Chris Hankin Laurence Duquerroy,
and analysis power, while eliminating
Boardmember Director, Institute of Cyber Applications &
false positives and alarm fatigue
OSGP Alliance Security & Technology Telecommunications Project
Vice President Imperial College London Manager – European Space
 SOC Development: embedding robust
Networked Energy Services Agency
and dynamic security capabilities into
your organisation through upskilling of Matthew Freeman Maarten Hoeve Bas Kruimer
personnel, acquisition and retention of Global Head of Researcher Senior Manager
the best talent, and installation of the Cybersecurity ENCS Accenture Security
most intuitive SIEM DNV GL

 Advanced technologies: examining


Technology Innovations from:
new techniques and tools for more Elisa Costante Dani Grabois Roee Schreiber
advanced traffic monitoring including Chief Technology Security Senior Principal Director, Security
deep learning and artificial intelligence Officer Principal Accenture Security
Security Matters Accenture Security

Supporting Partners: Silver Sponsor: Produced by:

Exhibitor:

© Copyright Phoenix Forums t/a Smart Grid Forums 2018 www.smartgrid-forums.com/ids


Dear Colleague, Sponsorship & Exhibition Opportunities
Welcome to the inaugural Energy Intrusion Detection 2019
conference, exhibition, and networking forum. Aimed at
cybersecurity teams from smart utility operators, this 3-day
event provides a roadmap for the procurement and
implementation of IDS solutions to secure their critical
networks.

Our in-depth, independent, and utility-centric research has


revealed IDS to be the most crucial system to be implemented
in order to ensure robust cybersecurity for grid and generation
operators. As digital and IT technology converges with utilities
traditional OT environment, there is a rapidly growing threat
landscape for which these companies must prepare.
Would you like the opportunity to raise your brand profile,
demonstrate your products and services, and share your expertise
Join 100+ cybersecurity experts and implementation leaders,
with the most targeted and influential group of utility cybersecurity
specialised in the electric utility domain, for three intensive implementation leaders and decision makers?
days of presentations and case-studies on practical IDS
implementations, challenges faced, and lessons learned. Our adjoining exhibition area provides the perfect platform for you
to do this and more! Capped at 10 stands we ensure a focused and
Technology choices, implementation lessons and future relevant display of the latest tools, technologies and services for our
roadmaps will be discussed in the context of organisational audience and maximum visibility for each exhibitor.
objectives and regulatory pressures. This is the conference you
need to benchmark your preparedness to meet the monitoring To find out more about the various sponsorship and exhibition
demands of the NIS Directive and your readiness to face the opportunities:
wide-ranging spectrum of threats to critical infrastructure.
Call: +44 (0)20 8349 6362
Email: registration@smartgrid-forums.com
Event highlights include: Download: Exhibition Opportunities Brochure

 Case study programme - gain in-depth insights into the IDS


implementation strategies of pioneering European utilities and Testimonials from Past Events
understand how new technologies and use-cases are being
introduced to improve “Excellent conference, excellent programme, excellent
networking, and a great opportunity to learn and share about
 Technology innovation panel - quiz the leading IDS suppliers on cyber security. The most hot topic in the digital transformation
the strength of their solutions and suitability for integration into of the energy sector.”
the smart-utility environment Aurelio Blanquet, EDP
@ SmartSec Europe 2016
 Testing, implementation, and operation tutorial - through an
extended tutorial at the end of conference day three, gain all the "This conference provided an array of technically detailed
knowledge you need to prepare PoCs, test tools, and integrate presentations. Rather than being too generic and high level, the
them into your network environment material presented facilitated much learning in a short time
frame. There was also an excellent level of informal interaction
 Roundtable discussions – choose from a selection of intimate among participants. A couple of days well spent."
roundtables, each one targeted at a key theme from the opening Cormac Long, ESB Ireland
@ UtiliNet Europe 2018
day’s discussion, to delve even deeper into the most specific
issues impacting your organisation “Good opportunity to share updates with colleagues in IT/OT.
Discover different approaches for the same problems. Learn new
 Networking evening reception - relax and unwind after a full day market developments.”
of in-depth presentations and panel discussions, meet with Ton Rijnan, Tennet
colleagues from across the European cybersecurity community, @ NextGen SCADA Europe 2018
allow reflect on new ideas and opportunities for collaboration
"A very useful time, open exchange of ideas and information.
Kind Regards, Excellent real-world presentations.”
Allan Wales, SP Energy Networks
@ IEC 61850 Europe 2017

Robin Sarfas “For me the IEC 61850 is quite new. The workshop was very
Producer | Smart Grid Forums useful to get a better idea of what the IEC 61850 is and what it
means. Different use cases that were presented gives me a good
idea of the benefits and options."
PS: Early Bird Rates – Save €200 on delegate places and €1,000 on Hans Slootjes, Stedin
exhibitor places by booking before Friday 28th December 2018! @ IEC 61850 Europe 2017
PPS: Group Booking Discounts – Save a further 10% on 3+ delegates
booked by the same organisation at the same time!

© Copyright Phoenix Forums t/a Smart Grid Forums 2018 www.smartgrid-forums.com/ids


Conference Day One | Tuesday 29th January 2019
08:00 Registration and refreshments 14:45 IDS Implementation and Integration – optimising IDS deployment to
maximise effectiveness while minimising both investment and
08:45 Chair’s opening remarks potential disruption to critical network operations
Yugo Neumorni, Board Member and Cybersecurity Council Chair – EuroCIO  Minimising disruptions while deploying IDS to optimise security
Association & CISO – Hidroelectrica while reducing organisational risk
 Appraising your existing architecture and the traffic patterns of
09:00 Intrusion Detection Systems (IDS) Roadmap – making IDS a key pillar of your OT your control systems to guide the deployment of your chosen IDS
cybersecurity strategy to maximise return on investment as security demands solution
evolve in tandem with the Smart Grid  Fully leveraging the experience and knowledge contained in your
 Leveraging the rapid growth and improvement of IDS technology to better control room to get a complete picture of your control
monitor and protect your network control environment in the face of an architecture and establish how best to integrate IDS
evolving threat landscape  Balancing the desire for full IDS deployment with the need to
 Ensuring the readiness of an empowered CISO and technically adept minimise or eliminate downtime for your critical systems during
cybersecurity team prepared to face the challenges of procuring and handling implementation
new technology and optimise investment  Identifying areas of particular vulnerability and prioritising their
 Exploring a broad range of anomaly detection tools and technologies, protection to support IDS deployment to the most impactful
thoroughly evaluating them to ensure the best possible fit with your control locations
system environment  Planning for further network decentralisation and likely
 Prioritising high-value IDS use cases to protect your engineering and movement away from traditional star network topology to
operational systems as they are integrated into a more connected and digital ensure your IDS provides reliable functionality as the network
world evolves
 Providing a clear and considered roadmap to guide decisions and capitalise on Nuno Pereira, OT Cyber Security Officer – EDP Distribuição
IDS, allowing the benefits of a smarter grid to grow unimpeded by security
threats 15:30 Afternoon refreshments, networking, and exhibition
Yugo Neumorni, Board Member and Cybersecurity Council Chair – EuroCIO
Association & CISO – Hidroelectrica 16:00 OT Vulnerability Testing – performing vulnerability tests on OT
devices to stress-test the security of your network and address
09:45 Maximising Board Support – translating technical risks and opportunities into a weaknesses
compelling business case for full investment in IDS  Performing rigorous tests which are representative of real-world
 Turning abstract concepts such as threats and vulnerabilities into a concrete attacks to simulate performance in the real-world threat
risk assessment and demonstrating a compelling business case to prioritise landscape
IDS as a key part of your cybersecurity programme  Stressing the importance of software resilience as a key
 Leveraging regulatory frameworks including the NIS directive to emphasise component of overall system security
the compliance risks associated with a failure to fully secure your critical  Working with vendor equipment to check and test its security
systems performance before introducing it into your network
 Utilising pertinent examples of recent cybersecurity incidents to highlight the environment
growth and evolution of malicious activities globally and demonstrate how  Drawing on real-world examples of attacks from the field to
IDS can prevent future catastrophes accurately simulate threats and utilising reverse engineering and
 Learning from recent deployments to provide realistic projections for IDS vulnerability research to test critical devices
investment in order to mitigate fears of spiralling costs  Managing risk through thorough testing to establish what devices
 Securing timely and significant budget allocation to rapidly establish IDS at the to use, decide how to apply patches and fixes, and identify weak
core of Smart Grid cybersecurity links
Philip Tonkin, Global Head of Cyber Operational Technology – Dani Grabois, Security Senior Principal – Accenture Security
National Grid

10:30 Morning refreshments, networking, and exhibition

11:00 Organisational Alignment Panel – ensuring collaboration and cooperation 16:45 Standards Development – supporting the development and adoption
between relevant business units to implement your IDS solutions holistically and of communications protocols to improve the security and
maximise their benefits interoperability of network systems and devices across the grid
 Overcoming organisational, technical, and cultural barriers to ingrain an  Developing the Open Grid Standard Protocol to support the
inclusive cybersecurity framework which allows IDS implementation without smooth integration of IDS
disrupting the availability of critical systems  Providing greater value to utilities through independently-
 Facilitating and motivating collaboration between OT and IT specialists to certified, multi-vendor interoperability
leverage their specific expertise without diminishing their functional  Processing vast quantities of data from remote IoT deployments
specialism throughout the network
 Aligning the implementation of IDS systems at a local scale with the overall  Analysing data using algorithms and rules to identify anomalous
strategy and roadmap developed at the highest levels of your organisation behaviour and potential threats
 Working with other utilities and cross-industry partners to share experience  Fostering collaboration in the utility domain to ensure a well-
and minimise “reinventing the wheel” when building your capabilities and integrated and secure Smart Grid
configuring your IDS Mark Ossel, Boardmember – OSGP Alliance and Vice President –
 Bringing managers, specialists, and end-users together to make sure that IDS Networked Energy Services
is installed effectively and that the corresponding cybersecurity benefits are
realised for the whole company 17:30 Roundtable discussions – during this session the audience breaks out
Agustin Valencia Gil-Ortega, OT Cybersecurity – Iberdrola into several smaller working groups, each focussed on specific themes
that arose during the day’s presentations. Each working group will
12:30 Lunch, networking, and exhibition comprise of representatives of the entire electric utility Cybersecurity
community to ensure a well-rounded and holistic discussion. Key issues
14:00 IDS Procurement – designing a thorough and efficient procurement process raised, and solutions proposed, will be collated for presentation to the
assessing multiple vendors to select the best solutions and partners for your wider group at the end of the session.
business
 Setting out well-defined procedures for comparing different IDS solution 19:00 Networking reception – time to relax after an intensive day of
providers and establishing their fit with your organisation, processes and presentations and discussion! All participants are invited to join this
existing systems networking reception where you will have the opportunity to enjoy the
 Developing a comprehensive set of functional requirements and criteria to company of colleagues from across the European Smart Grid
effectively benchmark different vendors and their portfolios of solutions cybersecurity community.
 Exploring different strategies and techniques for evaluating vendor solutions
and setting up a testing procedure which assesses their technical
performance, company fit, and robustness for future requirements
 Engaging key representatives from across your business in the procurement
process to ensure maximum buy-in and a robust implementation
 Setting out a rigorous procurement process which maximises return on your
investment and fully engages your whole business
Erki Poder, Managing Project Manager – Elektrilevi

© Copyright Phoenix Forums t/a Smart Grid Forums 2018 www.smartgrid-forums.com/ids


Conference Day Two | Wednesday 30th January 2019
08:00 Registration and refreshments 14:00 Active Monitoring Use Case – increasing the active components of your
monitoring capabilities to enable more centralised and efficient IDS
08:45 Chair’s opening remarks deployments
Professor Chris Hankin, Director, Institute of Cyber Security  Developing a centralised remote engineering workstation to monitor
& Technology – Imperial College London behaviour and traffic including in more distributed parts of the
network
09:00 Advanced Machine Learning & AI – leveraging  Implementing solutions capable of active monitoring to receive
improvements to advanced analytics and machine learning process communications from distributed nodes in the network
technology to automatically configure IDS and improve its
 Working together with key internal stakeholders to instil trust in new
reliability
IDS solutions and ensure confidence in their introduction to your
 Utilising developments in artificial intelligence to
increase the autonomy and accuracy of IDS solutions network
 Exploiting AI’s inherent capabilities for processing and  Actively requesting information on remote modules and firmware to
analysis to deal with the growing volume and increase network visibility while optimising investment and
complexity of network traffic and detect more deployment costs
sophisticated threats Ivo Maritz, Chief Information Security Officer – BKW
 Using machine learning as part of the system
configuration process to better recognise patterns in 14:45 Improved Situational Awareness – incorporating monitoring and analysis
network behaviour and adapt to benign or planned of the network’s cyberphysical performance to improve anomaly
changes to the network topology detection and support traditional tools
 Specifying key requirements for IDS functional visibility  Increasing the depth of IDS capabilities beyond the monitoring of
to avoid ‘black-box-like’ performance while network traffic to include behavioural changes which could be the
maintaining system integrity result of malicious activity
 Assessing the improvements to IDS supported by  Comparing a variety of packet inspection techniques including
combining advanced AI and machine learning with machine learning to establish their potential benefits
traditional capabilities  Identifying and quantifying the cyberphysical characteristics of
Martin Sloan, Chief Information Security Officer – malfunctioning apparatus including changes to temperature,
Drax Power frequency, sound, and power quality
 Prioritising key behavioural criteria to efficiently monitor the most
09:45 IDS Functionality – understanding the core functionalities pertinent indicators of malicious activity
of next-generation IDS and examining the different  Quantifying the potential for increased situational awareness of your
techniques that underpin these control equipment to effectively complement existing IDS technology
 Investigating different types of IDS solution and Professor Chris Hankin, Director, Institute of Cyber Security & Technology
implementation based on their ability to reliably – Imperial College London
deliver key functionality and value-adding benefits
 Comparing NIDS and HIDS implementations based on 15:30 Afternoon refreshments, networking, and exhibition
their suitability for your network architecture,
including factors such as effectiveness, cost, and ease 16:00 IDS Configuration – tuning your IDS to correctly identify rogue network
of use traffic using multiple analysis techniques to improve reliability and limit
 Evaluating the fit for purpose of more traditional false positives
signature-based IDS, compared with the capabilities of  Setting out clear roles and responsibilities for collaborating with your
other technologies including protocol or pattern-based IDS supplier to achieve the highest standards of accuracy and trust
software  Providing a representative and repeatable testing environment and
 Deploying advanced systems capable of data set to make sure your chosen solution is well suited to
communicating actively with control components to monitoring your network traffic
improve the depth of anomaly detection beyond traffic  Tuning your IDS to better discern benign network traffic and
analysis automatically recognise it to reduce incidences of false positives
 Ensuring your IDS solution is supported by the most  Exploiting the ability of advanced IDS to build a complete inventory of
advanced and futureproof technology to guarantee network devices, identifying potential liabilities, recognising future
reliable and consistent performance connections, and alerting the SOC to potentially malicious agents
Agustin Valencia Gil-Ortega, OT Cybersecurity – Iberdrola  Introducing more autonomous IDS solutions to automatically adapt to
changes in your control system environment and minimise human
intervention while remaining alert to an evolving threat landscape

10:30 Morning refreshments, networking, and exhibition 16:45 SOC Development for IDS – exploring approaches to embedding IDS into
a variety of SOC frameworks to ensure full preparedness for timely and
11:00 Technology Innovation Panel - exploring cutting edge IDS constructive responses to anomalies
tools and solutions, specifically for implementation in the  Identifying the optimal integration of IDS into new and establishes
utility environment SOCs to ensure they effectively react to and investigate alerts
During this session, each technology innovator will give a 15-  Upskilling SOC staff with the knowledge and tools necessary to
minute presentation on results achieved from the process different alerts and investigate them to identify the cause
application of their solution in the electric utility and nature of any anomalies
environment, as well as their research and development
 Ensuring coherent lines of communication between control rooms
activity to meet future demands and challenges. The
presentations will be followed by 30 minutes of Q&A and and the SOC to mutually benefit from specific expertise as it pertains
panel discussion, whereby you will get the opportunity to to specific alerts
quiz the tech experts, understand their innovation plans  Empowering your cybersecurity team to safely develop and test new
more fully, and influence the direction of new product use cases in sensitive environments in order to maximise the
development to better meet your OT cybersecurity coverage of your IDS and protect your entire network
requirements.  Developing and testing a robust SIEM to detect significant network
Elisa Costante, Chief Technology Officer – Security Matters events from huge volumes of event logs
 Putting in place a fully equipped and staffed SOC to continually
12:30 Lunch, networking, and exhibition develop cybersecurity strategy, manage day-to-day security
requirements, and remain adaptable to organisational demands
Nikolaus Wirtz, Research Assistant – E.ON Energy Research Centre

© Copyright Phoenix Forums t/a Smart Grid Forums 2018 www.smartgrid-forums.com/ids


Conference Day Three | Thursday 31st January 2019
08:00 Registration and refreshments 14:00 Distributed Energy Resources – fully preparing the grid to
monitor a growing number of DERs connected to your critical
08:45 Chair’s opening remarks control systems via the LV network
Matthew Freeman, Global Head of Cybersecurity – DNV GL  Developing and maintaining a secure distribution network
ecosystem while incorporating decentralised energy assets
09:00 Communications Architecture – leveraging more powerful IDS tools including microgeneration, EV charging, and battery
to support the security of more vulnerable and higher capacity storage
telecoms networks  Capturing and processing vast flows of data generated by a
 Maintaining security levels as grid communications evolve from multitude of assets installed across an ever-increasing
secure-by-design, serialised connections to a greater level of number of customer sites
interconnection via IP networks  Optimising IDS architecture to support grid security in
 Implementing the IDS capacity required to process and analyse response to a growth in potentially vulnerable, publicly
previously unseen volumes of traffic generated by large-scale accessible distributed energy assets
AMI and IoT deployment  Preparing for new vulnerabilities for your vital SCADA and
 Using IDS to mitigate the risks associated with a shift in substation environments caused by a growth in unreliably
communications technology towards more vulnerable packet secured smart home devices
telecoms solutions  Estimating the likely increase in security threats as a result
 Setting high standards for the interoperability of your IDS with of DER connections and the impact of IDS on your
other vendor systems to ensure protection is retained across awareness levels
your entire network Maarten Hoeve, Researcher – ENCS
 Enabling the complete, end-to-end monitoring of your
communications architecture to maintain the security of your 14:45 Space and Cybersecurity – examining the potential of space
systems as the flow of data grows exponentially technology to enhance smart grid cybersecurity and intrusion
Robin Massink, IT Security Specialist – Alliander detection capabilities
 Identifying potential opportunities for the application of
09:45 Vulnerability Assessment – establishing a highly mature vulnerability space-based tools to improve cybersecurity and support a
assessment, mapping technical and business risks, to achieve a range of new monitoring capabilities
focused prioritisation of identified vulnerabilities  Investigating how space technology can be integrated into
 Ensuring the success of SOC and CIRT teams through targeted and the specifics of the electric utility environment
efficient responses to business risk  Exploring potential use cases including monitoring the
 Effectively processing a vast number of events in an increasingly behaviour and migration of connected IoT devices to
diverse and complex range of protected environments identify possible threats
 Implementing a SIEM to enable broad and timely identification of  Building a roadmap for future collaboration between the
threats through the proper correlation of various security events space and energy sectors to leverage mutually beneficial
 Establishing vectors of attack, attack propagation and impact, and technical partnerships
gaps in cyber defences based on incident reports from a variety Laurence Duquerroy, Applications & Telecommunications
of state-of-the-art security tools Project Manager – European Space Agency
 Fully utilising available resources and knowhow to maximise the
impact of SOC and CERT teams 15:30 Afternoon refreshments, networking, and exhibition
Dragomir Vatkov, Cyber Security Architect – innogy SE
Solution Testing Tutorial – rigorously testing vendors’ IDS tools
10:30 Morning refreshments, networking, and exhibition against a broad range of criteria to ensure they meet key
functional requirements, integrate well into your existing
11:00 SCADA Protection Use Case – utilising IDS to holistically monitor and architecture, and remain robust in a changing landscape
secure a more interconnected and automated control environment  Establishing a process for the reliable and fair evaluation of
 Implementing a head-end IDS deployment to SCADA/DMS third-party IDS solutions to enable you to choose a system
systems to provide top-down, global monitoring of your entire which fits your network and stands the test of time
control environment  Comparing third-party, in-house, and hybrid testing
 Optimising the placement of your IDS based on a balance of strategies considering cost, effectiveness and
internal and external threats to maximise its value and detect as independence
many legitimate threats as possible  Choosing and prioritising key, quantifiable criteria and
 Guaranteeing readiness to adapt to growing levels of data performance metrics to assess both the solutions’
including increased use of real-time data suitability for your security ecosystem and benchmark
 Overcoming the specific implementation and operation products against one another
challenges faced when working in the SCADA environment  Developing a secure and representative testing
 Ensuring the continued security and performance of your most environment in both laboratory and active network
fundamental network control systems by deploying robust IDS scenarios
without compromising availability  Utilising a range of advanced data sets as well as
Fred Streefland, Chief Security Officer NEUR – Palo Alto Networks techniques such as ethical hacking and adversarial machine
learning to ensure rigorous stress-testing against the most
11:45 AMI Security Use Case – exploring the potential for IDS to cost sophisticated threats
effectively mitigate the risks associated with mass AMI deployment  Measuring solutions’ adaptability in the face of changes to
 Supporting the security and reliability of AMI located in network architecture to ensure their robustness in
unsecured locations by recognising and responding to security identifying unpredictable future threats
breaches from networks and devices  Implementing a robust, multi-faceted, and clearly defined
 Delivering robust monitoring of AMI networks in spite of limits to testing process to provide a watertight case for the best
the computational and communication power at the devices’ choice of IDS solution to fit your cybersecurity strategy
disposal Roee Schreiber, Principal Director, Security – Accenture Security
 Comparing the threats driving AMI IDS deployments at different Dani Grabois, Security Senior Principal – Accenture Security
network levels including the HAN, NAN, and WAN Bas Kruimer, Senior Manager – Accenture Security
 Optimising IDS deployment for AMI to rapidly detect and react to
cyber-attacks, preventing fraud and protecting potentially
sensitive customer information

12:30 Lunch, networking, and exhibition

© Copyright Phoenix Forums t/a Smart Grid Forums 2018 www.smartgrid-forums.com/ids


Premier Conference, Exhibition & Networking Forum

Advanced IDS Implementation to Futureproof Smart


Power Generation, Transmission, and Distribution
3-Day Conference, Exhibition & Networking Forum
29-31 January 2019 | Amsterdam, The Netherlands

Pricing & Discounts


Early Bird Rate Standard Rate
Book before
Friday 28th December 2018
3-Day Delegate €2,395 + 21% VAT €2,595 + 21% VAT
= €2,897.95 = €3,139.95
3-Day Group Booking Delegate (3+ Delegates) €2,155.50 + 21% VAT €2,335.50 + 21% VAT
= €2,608.15 = €2,825.95
Exhibitor (incl 2 Conference Passes) €6,000 + 21% VAT €7,000 + 21% VAT
= €7,260.00 €8,470.00

Register Venue & Accommodation


Early Bird Discount!
Please visit the registration page of the event website at: NH Amsterdam Zuid Register before 28th December
www.smartgrid-forums.com/ids fill in your details, and Buitenveldert €200 off delegate passes
select Credit Card, PayPal, or invoice payment options. van Leijenberghlaan 221 €1000 off exhibition spaces
1082 GG
Contact Us Amsterdam – The Netherlands

Call: +44 (0)20 8349 6360 +31 (0)20 70 18 042


Email: registration@smartgrid-forums.com To receive a preferential rate on your room booking please
book before 14th December, quoting the code EID19

Terms & Conditions

Payment: payment must be made at the time of booking to guarantee your place, Exhibitor set-up commences at 7am on the first day of the conference, and breakdown
either by credit card, or invoice which must be settled on receipt of the invoice and takes place after 4pm on the last day of the conference. Exhibitor packages include 2
prior to the first day of the conference. If payment has not been received by the first conference passes. Additional passes may be purchased at 10% discount on the published
day of the conference, then credit card details will be requested onsite and payment rates.
will be taken before entry to the conference. Bookings made within 14 days of the
conference require payment by credit card on booking. Cancellations: regretfully cancellations cannot be facilitated but transfer to a future
conference is permissible. We will provide the speaker presentation materials to any
Delegate Inclusions: the delegate fee covers attendance of conference sessions, delegate who has paid but is unable to attend. If we have to cancel an event for any
speaker presentation materials, lunch and refreshments during the course of the reason, we will make a full refund immediately, but disclaim any further liability.
conference, and the networking reception. It does not cover the cost of flights, hotel
rooms, room service or evening meals. If after booking your place you are unable to Alterations: it may be necessary for us to make alterations to the content, speakers,
attend you may nominate, in writing, another delegate to take your place at any time timing, venue or date of the event compared with the original programme.
prior to the start of the conference. Two or more delegates may not ‘share’ a place
at the conference. Please make separate bookings for each delegate. Data Protection: Phoenix Forums t/a Smart Grid Forums gathers personal data in
accordance with EU GDPR 2016 and we may use this to contact you by post, email,
Exhibitors: the exhibition is located in the networking and catering area alongside telephone, fax, SMS to tell you about our other products and services. We may also
the conference room to ensure maximum footfall and visibility for all exhibitors. Each contact you with information about complementary products and services from carefully
exhibitor will be allocated a 3m x 2m space with table, 2 chairs, power sockets and selected third parties. If you do not wish to receive information about our other events or
WiFi access. The exact location of each exhibitor will be determined 2 weeks prior to products from selected third parties, please write to us at: database@smartgrid-
the conference. forums.com

© Copyright Phoenix Forums t/a Smart Grid Forums 2018 www.smartgrid-forums.com/ids

S-ar putea să vă placă și