Internet of Things Security Foundation Conference | 40+ Speakers

Internet of Things Security Foundation Conference

Internet of Things Security Foundation unveil over 30 speakers for the 6th Annual IoT Security Foundation Conference, PLUS more to be announced soon. The IoTSF Cybersecurity Conference is a four-day virtual event, from 1st to 4th December, 2020, that will illuminate and educate delegates with best practice, next-practice and the latest developments in IoT cyber security.

Book Tickets here

The Internet of Things Security Foundation Conference features talks by leading cyber security experts, training workshops and track sessions for executives, developers, engineers, managers and security professionals including:

Keynote Speech:“AI-Driven Cyber Defense for Endpoint Energy Assets”
Leo Simonovich, VP & Global Head, Industrial Cyber, Siemens Energy
Keynote Speech:“IoT Security Challenges and Opportunities in the 5G Era”
Mihoko Matsubara, Chief Cybersecurity Strategist, NTT CorporationKeynote Speech:“When One Size Solution Doesn’t Fit All”
Kat Megas, Program Manager for the NIST Cybersecurity for Internet of Things (IoT) program, NIST

“Software Provenance – Where Do We Draw the Line?”
Matt Wyckhouse, CEO, Finite State

“Securing the Industrial IoT”
Simon Butcher, Principal Embedded Security Engineer, Arm

“Secure Management of Things in AWS IoT”
Dave Walker, Principal Specialist Solution Architect for Security and Compliance, Amazon Web Services

“Practical Physical Attacks Against Embedded Systems and Their Secure Design to Mitigate Them”
Rohini Narasipur, Product security engineer and incident handler, Bosch PSIRT

“Challenges of Vulnerability Management and Disclosure Processes in a Big Organisation – The Bosch PSIRT”
Carolina Adaros, Product Security Incident Handler, Bosch PSIRT

“Shining the Light of Truth: a Journey into Vulnerability Disclosure Practices at Consumer IoT Product Companies”
David Rogers MBE, Founder, Copper Horse

“IoT on the Frontline – when a 3rd Party 0day Becomes your Problem…”
Adam Laurie, Global Lead Hardware Hacker, IBM

“Sensory Overload – Cybersecurity Threats for Next Generation Vehicles”
Steve Povolny, Head of Advanced Threat Research, McAfee

“Secure by Design, Still a USP in a Competitive Environment”
Ivan Reedman, Head Tinkerer and Ponderer, NCC Group

“The Consumer IoT Attack Surface – an Architectural Deep Dive on the Threats and Mitigations for Real World IOT Deployments”
Nick Allott, CEO, NquiringMinds

“One Way or Another, they’re Going to Get you: Threats to Press Freedom from the Internet of Things”
Anjuli Shere, Analyst/Writer/Researcher, University of Oxford

“Securing the Internet of Medical Things”
Andy Bridden, IoT Security Consultant, PA Consulting

“The IoT is Littered with Security Disasters. As the Distinction from OT Blurs how do we Avoid Repeating them?”
Ken Munro, Partner, Pen Test Partners

“Meeting the Industry 4.0 Security Challenges of IEC 62443”
Haydn Povey, CEO, Secure Thingz

“IoT Security Reference Architecture”
Professor Kwok-Yan LAM, Professor of Computer Science, Nanyang Technological University

“ETSI EN 303 645 – the Ultimate IoT Testing Baseline. Lessons Learned and way Forward”
Razvan Venter, Team Lead Security Compliance and Certifications, Secura B.V.

“How eSIM Technology Can be Used Within the IoT”
Zofia Domanska, Product Manager, G+D

“IoT security, and it’s Disturbing Status”
Pieter Meulenhoff, Quality control, internships & security training, Eurofins Cyber Security

“Supply Chain Integrity”
Amyas Phillips, Chair of the IoTSF Supply Chain Integrity Working Group, IoT Consultant & Security Scientist, Ambotec

“New Guidance and Best Practices on the Security of Smart Built Environments, IoTSF”
James Willison, Founder, Unified Security

“What is a Smart Built Environment, and Why it Matters?”
Sarb Sembhi, Co-Chair of Smart Built Environment Group, CTO & CISO, Virtually Informed

Join the IoTSF Conference and:

  • Learn About the Potential Risks & Vulnerabilities Associated with IoT Systems & Connected Devices
  • Gain an Understanding of IoT Security Best Practice for the Design of Products & Services
  • Understand what to Specify & Look for When Procuring IoT Products & Services
  • Learn About the Current and Future State of Standards, Regulation & Assurance
  • Discover the Lessons Learned in Real Life War Stories
  • Hear From Leading Experts & Companies Offering Security Products, Solutions & Services

Internet of Things Security Foundation Conference

Internet of Things Security Foundation Conference

The 6th Annual Internet of Things Security Foundation Conference is a four-day virtual event that takes place between Tuesday 1st and Friday 4th December 2020.  Join the IoTSF for 4 days of expert talks & training sessions to expand your knowledge on the best practice and the latest developments in IoT cyber security. The IoTSF Conference features talks by leading cyber security experts, training workshops and track sessions for executives, developers, engineers, managers and security professionals.

  • Learn about the potential risks and vulnerabilities associated with IoT systems and connected devices
  • Gain an understanding of IoT security best practice for the design of products and services
  • Understand what to specify and look for when procuring IoT products and services
  • Learn about the current and future state of standards, regulation and assurance
  • Gain from the lessons learned in real life experiences/war stories
  • Hear from leading experts and companies offering security products, solutions and services

For more details of the Internet of Things Security Foundation Conference see:  Conference website.

Book Tickets here

The IoT Security Foundation has announced first set of speakers for the 6th Annual IoT Security Foundation Conference:

Keynote Speech
“AI-driven Cyber Defense for Endpoint Energy Assets”
Leo Simonovich
VP & Global Head, Industrial Cyber at Siemens Energy

Protecting endpoint operating technologies (OT) is an increasingly important challenge for the energy sector. As energy companies continue to digitize existing assets and build new assets with intrinsic network connectivity, they present an ever-expanding attack surface to escalating attacks. Overall, the energy industry has made tremendous progress in maturing cybersecurity capabilities. Yet current practices leave significant gaps due to lag between updates.

This keynote will describe in detail the current challenges faced by energy companies, the implications of observable industry trends, the characteristics that potential cyber-security solutions must meet, and why they believe AI and ML technologies can meet these requirements now and in the future.

Keynote Speech
“IoT security challenges and opportunities in the 5G era”
Mihoko Matsubara
Chief Cybersecurity Strategist at NTT Corporation

This presentation aims to analyse IoT security issues and opportunities at both the policy and technical level in the 5G era. The world is now more concerned over IoT and 5G security due to growing security threats during the pandemic and mounting geopolitical tensions. Yet, this talk will also shed light on collaborative efforts by government and industry for a smart world and 5G security as well as financial incentives to embed security in new projects in their early stages.

Software Provenance – Where Do We Draw the Line?
Matt Wyckhouse
CEO at Finite State

There has been a lot of uproar about supply chain security – from 5G deployments around the world to threats to our power grids – and it seems that a day doesn’t go by without some new threat or government action. Many governments around the world, and in particular the US, are trying to “solve” supply chain risk management by introducing regulations focused on banning vendors from the supply chain. Notably, the US has taken several actions to try to limit vendors from potential adversary countries (such as China) from being involved in supply chains for certain types of critical infrastructure.

This talk will discuss how simple analysis of a vendor’s country of origin is a failing and incomplete model of supply chain risk. While geopolitical analysis is an important risk factor, the truth is that every device, every software application, and every vendor has some level of geopolitical risk. We live in a world that is fueled by global supply chains and open source software that is built by global, distributed teams of engineers. So where do we draw the line?

Lesley Kipling
Chief Cybersecurity Advisor at Microsoft EMEA

Previously lead investigator for Microsoft’s detection and response team (DART), Lesley Kipling has spent more than 16 years responding to our customers’ largest and most impactful cybersecurity incidents. As Chief Cybersecurity Advisor, she now provides customers, partners and agencies around the globe with deep insights into how and why security incidents happen, how to harden defences and more importantly, how to automate response and contain attacks with the power of the cloud and machine learning.