Internet of Things Security Foundation Conference | 40+ Speakers

Internet of Things Security Foundation Conference

Internet of Things Security Foundation unveil over 30 speakers for the 6th Annual IoT Security Foundation Conference, PLUS more to be announced soon. The IoTSF Cybersecurity Conference is a four-day virtual event, from 1st to 4th December, 2020, that will illuminate and educate delegates with best practice, next-practice and the latest developments in IoT cyber security.

Book Tickets here

The Internet of Things Security Foundation Conference features talks by leading cyber security experts, training workshops and track sessions for executives, developers, engineers, managers and security professionals including:

Keynote Speech:“AI-Driven Cyber Defense for Endpoint Energy Assets”
Leo Simonovich, VP & Global Head, Industrial Cyber, Siemens Energy
Keynote Speech:“IoT Security Challenges and Opportunities in the 5G Era”
Mihoko Matsubara, Chief Cybersecurity Strategist, NTT CorporationKeynote Speech:“When One Size Solution Doesn’t Fit All”
Kat Megas, Program Manager for the NIST Cybersecurity for Internet of Things (IoT) program, NIST

“Software Provenance – Where Do We Draw the Line?”
Matt Wyckhouse, CEO, Finite State

“Securing the Industrial IoT”
Simon Butcher, Principal Embedded Security Engineer, Arm

“Secure Management of Things in AWS IoT”
Dave Walker, Principal Specialist Solution Architect for Security and Compliance, Amazon Web Services

“Practical Physical Attacks Against Embedded Systems and Their Secure Design to Mitigate Them”
Rohini Narasipur, Product security engineer and incident handler, Bosch PSIRT

“Challenges of Vulnerability Management and Disclosure Processes in a Big Organisation – The Bosch PSIRT”
Carolina Adaros, Product Security Incident Handler, Bosch PSIRT

“Shining the Light of Truth: a Journey into Vulnerability Disclosure Practices at Consumer IoT Product Companies”
David Rogers MBE, Founder, Copper Horse

“IoT on the Frontline – when a 3rd Party 0day Becomes your Problem…”
Adam Laurie, Global Lead Hardware Hacker, IBM

“Sensory Overload – Cybersecurity Threats for Next Generation Vehicles”
Steve Povolny, Head of Advanced Threat Research, McAfee

“Secure by Design, Still a USP in a Competitive Environment”
Ivan Reedman, Head Tinkerer and Ponderer, NCC Group

“The Consumer IoT Attack Surface – an Architectural Deep Dive on the Threats and Mitigations for Real World IOT Deployments”
Nick Allott, CEO, NquiringMinds

“One Way or Another, they’re Going to Get you: Threats to Press Freedom from the Internet of Things”
Anjuli Shere, Analyst/Writer/Researcher, University of Oxford

“Securing the Internet of Medical Things”
Andy Bridden, IoT Security Consultant, PA Consulting

“The IoT is Littered with Security Disasters. As the Distinction from OT Blurs how do we Avoid Repeating them?”
Ken Munro, Partner, Pen Test Partners

“Meeting the Industry 4.0 Security Challenges of IEC 62443”
Haydn Povey, CEO, Secure Thingz

“IoT Security Reference Architecture”
Professor Kwok-Yan LAM, Professor of Computer Science, Nanyang Technological University

“ETSI EN 303 645 – the Ultimate IoT Testing Baseline. Lessons Learned and way Forward”
Razvan Venter, Team Lead Security Compliance and Certifications, Secura B.V.

“How eSIM Technology Can be Used Within the IoT”
Zofia Domanska, Product Manager, G+D

“IoT security, and it’s Disturbing Status”
Pieter Meulenhoff, Quality control, internships & security training, Eurofins Cyber Security

“Supply Chain Integrity”
Amyas Phillips, Chair of the IoTSF Supply Chain Integrity Working Group, IoT Consultant & Security Scientist, Ambotec

“New Guidance and Best Practices on the Security of Smart Built Environments, IoTSF”
James Willison, Founder, Unified Security

“What is a Smart Built Environment, and Why it Matters?”
Sarb Sembhi, Co-Chair of Smart Built Environment Group, CTO & CISO, Virtually Informed

Join the IoTSF Conference and:

  • Learn About the Potential Risks & Vulnerabilities Associated with IoT Systems & Connected Devices
  • Gain an Understanding of IoT Security Best Practice for the Design of Products & Services
  • Understand what to Specify & Look for When Procuring IoT Products & Services
  • Learn About the Current and Future State of Standards, Regulation & Assurance
  • Discover the Lessons Learned in Real Life War Stories
  • Hear From Leading Experts & Companies Offering Security Products, Solutions & Services

Internet of Things Security Foundation Conference

Internet of Things Security Foundation Conference

The 6th Annual Internet of Things Security Foundation Conference is a four-day virtual event that takes place between Tuesday 1st and Friday 4th December 2020.  Join the IoTSF for 4 days of expert talks & training sessions to expand your knowledge on the best practice and the latest developments in IoT cyber security. The IoTSF Conference features talks by leading cyber security experts, training workshops and track sessions for executives, developers, engineers, managers and security professionals.

  • Learn about the potential risks and vulnerabilities associated with IoT systems and connected devices
  • Gain an understanding of IoT security best practice for the design of products and services
  • Understand what to specify and look for when procuring IoT products and services
  • Learn about the current and future state of standards, regulation and assurance
  • Gain from the lessons learned in real life experiences/war stories
  • Hear from leading experts and companies offering security products, solutions and services

For more details of the Internet of Things Security Foundation Conference see:  Conference website.

Book Tickets here

The IoT Security Foundation has announced first set of speakers for the 6th Annual IoT Security Foundation Conference:

Keynote Speech
“AI-driven Cyber Defense for Endpoint Energy Assets”
Leo Simonovich
VP & Global Head, Industrial Cyber at Siemens Energy

Protecting endpoint operating technologies (OT) is an increasingly important challenge for the energy sector. As energy companies continue to digitize existing assets and build new assets with intrinsic network connectivity, they present an ever-expanding attack surface to escalating attacks. Overall, the energy industry has made tremendous progress in maturing cybersecurity capabilities. Yet current practices leave significant gaps due to lag between updates.

This keynote will describe in detail the current challenges faced by energy companies, the implications of observable industry trends, the characteristics that potential cyber-security solutions must meet, and why they believe AI and ML technologies can meet these requirements now and in the future.

Keynote Speech
“IoT security challenges and opportunities in the 5G era”
Mihoko Matsubara
Chief Cybersecurity Strategist at NTT Corporation

This presentation aims to analyse IoT security issues and opportunities at both the policy and technical level in the 5G era. The world is now more concerned over IoT and 5G security due to growing security threats during the pandemic and mounting geopolitical tensions. Yet, this talk will also shed light on collaborative efforts by government and industry for a smart world and 5G security as well as financial incentives to embed security in new projects in their early stages.

Software Provenance – Where Do We Draw the Line?
Matt Wyckhouse
CEO at Finite State

There has been a lot of uproar about supply chain security – from 5G deployments around the world to threats to our power grids – and it seems that a day doesn’t go by without some new threat or government action. Many governments around the world, and in particular the US, are trying to “solve” supply chain risk management by introducing regulations focused on banning vendors from the supply chain. Notably, the US has taken several actions to try to limit vendors from potential adversary countries (such as China) from being involved in supply chains for certain types of critical infrastructure.

This talk will discuss how simple analysis of a vendor’s country of origin is a failing and incomplete model of supply chain risk. While geopolitical analysis is an important risk factor, the truth is that every device, every software application, and every vendor has some level of geopolitical risk. We live in a world that is fueled by global supply chains and open source software that is built by global, distributed teams of engineers. So where do we draw the line?

Lesley Kipling
Chief Cybersecurity Advisor at Microsoft EMEA

Previously lead investigator for Microsoft’s detection and response team (DART), Lesley Kipling has spent more than 16 years responding to our customers’ largest and most impactful cybersecurity incidents. As Chief Cybersecurity Advisor, she now provides customers, partners and agencies around the globe with deep insights into how and why security incidents happen, how to harden defences and more importantly, how to automate response and contain attacks with the power of the cloud and machine learning.

Internet of Things Thames Valley Virtual Meetup | 7th April

Internet of Things Thames Valley Meetup for business, academic, public sector and technical professionals interested in the IoT.

THIS WILL BE A VIRTUAL ONLINE MEETUP
PLEASE REGISTER VIA ZOOM HERE:
https://zoom.us/webinar/register/WN_kd8SeDG1TzS6Yq5bHa4RLw

Talks:

Simon Fabri, Head of Connected Car Architecture, Jaguar Land Rover
“Connected Car at Jaguar Land Rover – The brains and the brawn”

Sarah Mannion, Enterprise Evangelist, NVIDIA
“NVIDIA: Autonomous Objects Made Easy”

Isaac George, SVP & Head of European Operations, Happiest Minds Technologies
“Enhanced Customer Experience Connected Car Ecosystem”

Alice Grant, Computer Futures
“Women in Tech and Mind the Gap”

Rob McDonald on behalf of Thames Valley Berkshire
“Thames Valley Berkshire, Smart City Cluster – Update”

Paul McGuinness, CTO, MIT Dynamic Technologies
“UCentric IoT”

Agenda:

7.00 Welcome – Duncan Purves
7.05 “Connected Car at Jaguar Land Rover – The brains and the brawn” Simon Fabri, Head of Connected Car Architecture, Jaguar Land Rover
7.25 “NVIDIA: Autonomous Objects Made Easy” Sarah Mannion, Enterprise Evangelist, NVIDIA
7.45 “Enhanced Customer Experience Connected Car Ecosystem” Isaac George, SVP & Head of European Operations, Happiest Minds Technologies
8.00 “Women in Tech and Mind the Gap”, Alice Grant, Computer Futures
8.10 “Thames Valley Berkshire, Smart City Cluster – Update” Rob McDonald, on behalf of Thames Valley Berkshire
8.20’Showcase Talks’
“UCentric IoT” Paul McGuinness, CTO, MIT Dynamic Technologies
8.30 Q&A
8.40 End of Virtual Meetup

Internet of Things Thames Valley Meetup | 11th September

Internet of Things Thames Valley Meetup

There is just 1 week to the next Internet of Things Thames Valley Meetup @tv_iot on 11th September at the Green Park Conference Centre, 100 Longwater Avenue, Green Park, Reading, Berkshire, RG2 6GP.

Internet of Things Thames Valley

Reading, GB
1,772 Members

This group is open (free) for business, academic, public sector and technical professionals interested in the ‘Internet of Things’ who wish network, share knowledge, experienc…

Next Meetup

IoT Thames Valley Meetup #27

Wednesday, Sep 11, 2019, 6:00 PM
68 Attending

Check out this Meetup Group →

This is a free to attend Meetup. Networking from 6pm.

The Talks & Speakers include:

“5G and Connected Communities, where we are, how we got there and the challenges to come” – Guy Matthews, Director of Emerging Technology, CGI Business Consulting
5G has reached the cusp of moving from a decade of R&D into a decade of deployment across the globe. It will bring immense change across major industries and herald the growth of technologies like immersive and AI. But what is 5G and how will it be implemented across urban and rural communities? This short presentation will cover the basics of 5G, the state of development in the UK and globally, and the remaining commercial and technical challenges to 5G development at scale and load.

“Saving lives on British railways with IQRF” – Šimon Chudoba, CEO IQRF Alliance
IoT can not only reduce operation and maintenance costs or enable completely new business models but literally save lives and avoid derailments on railways. Simon will present one of the solutions of IQRF Alliance members which monitors railway embankments in the UK.

“Can you Trust your Smart Building?” – Duncan Purves, 2 Insight Ltd
Understand the security issues associated with ‘smart’ building systems and why they are important to you

Solar panels embedded in clothes charge a mobile phone

Clothing embedded with tiny solar cells the size of a flea will allow wearers to generate electricity on the move and charge items like mobile phones and smartwatches.
Read more at:
The cells are encapsulated in a resin which allows the textile fabric to be washed and worn like any other form of clothing. Measuring only three millimetres in length and 1.5 millimetres in width, the cells are almost invisible to the naked eye and cannot be felt by the wearer. For all intents and purposes, garments appear exactly the same as any other form of clothing despite having the capability to generate electricity

Pindrop brings voice authentication to IoT devices, intelligent assistants, and connected cars

Forget passwords and PIN codes — Pindrop wants to make our lives more secure with voice biometrics.

From VentureBeat Article:

Pindrop brings voice authentication to IoT devices, intelligent assistants, and connected cars

The Atlanta, Georgia-based company today announced Voice Identity Platform, a speech authentication solution for IoT, voice assistants, smart homes and offices, and connected cars.

Its platform-agnostic tech is akin to Google’s Voice Match in Google Assistant, which can differentiate among the unique voice signatures of up to 10 Google Home users, and Amazon’s voice profiles in Alexa.

Pindrop’s patented Pindrop Protect technology takes into account factors such as location, behavior, device type, audio, voice, and time of day to confirm identity. By scoring each voice interaction based on AI-driven anomaly detection and using voice printing to correlate matches with what Pindrop claims is one of the world’s largest audio databases of its kind, the company contends it is able to lower handle times by up to 60 seconds.

Arrow Intelligent Systems sponsoring the IoT Thames Valley Meetup

Thank you to Arrow Intelligent Systems @ArrowISpossible who are sponsoring the Internet of Things Thames Valley Meetup #IoT @tv_iot at Green Park Conference Centre, Reading on 26th September, 2018.

At Arrow Intelligent Systems (AIS), your mission is our mission. From design engineering services, global marketing and integration, global logistics, and business solutions, our dedicated team of experts is bringing it all together to help you deliver the latest technologies to market – quickly and efficiently.

IoT Scotland Network based on LoRa

Scotland is to get a new  Internet of Things network. The network, called IoT Scotland, will allow the collection of data from smart devices through a wireless sensor network  based on LoRa wireless technology.

The £6m, three-year project has been funded with investment from both the public and private sectors.

Initially, the network will cover Scotland’s seven cities, Glasgow, Inverness, Edinburgh, Aberdeen, Dundee, Perth, and Stirling, with the aim of expanding it throughout Scotland.

https://www.holyrood.com/articles/news/scotland-get-%E2%80%98most-advanced%E2%80%99-internet-things-network-uk

Wi-Fi Alliance introduces EasyMesh

Wi-Fi CERTIFIED EasyMesh™ brings a standards-based approach to Wi-Fi networks that utilize multiple access points (APs), combining the benefits of easy to use, self-adapting Wi-Fi with greater flexibility in device choice that comes with interoperable Wi-Fi CERTIFIED™ devices. Wi-Fi EasyMesh™ networks employ multiple access points that work together to form a unified network that provides smart, efficient Wi-Fi throughout the home and outdoor spaces.

For more information see:

WiFi EasyMesh

 

How cave-dwelling fish could help stop an #IoT catastrophe

From an article by Colm Gorey, Silicon Republic:

How cave-dwelling fish could help stop an IoT catastrophe

A peculiar trait of a cave-dwelling fish has inspired a device that could help us avoid disruption caused by a saturation of IoT signals in one place.

As we plough ahead towards a future where many city spaces are covered in connected devices as part of the internet of things (IoT), there are fears that we could reach the point of a spectral bandwidth crunch.

So, efforts to find ways for devices to avoid being jammed by a neighbouring signal have led researchers to some strange places, the latest of which happens to be home to a species of cave-dwelling fish.

In a paper published to the journal Optics Express, The Optical Society revealed how the species called Eigenmannia live in complete darkness.

In order to survive, they emit an electric field to communicate with other fish and to sense the surrounding environment. When two fish emit this field near each other, it has the potential to interfere with and jam the signal, which would obviously be bad for the fish.

However, thanks to a unique neural algorithm, the fish can adjust their electric communication signals to prevent this interference. For us humans, this same ability can be harnessed to create a light-based jamming avoidance response (JAR) device.