The 6th Annual Internet of Things Security Foundation Conference is a four-day virtual event that takes place between Tuesday 1st and Friday 4th December 2020. Join the IoTSF for 4 days of expert talks & training sessions to expand your knowledge on the best practice and the latest developments in IoT cyber security. The IoTSF Conference features talks by leading cyber security experts, training workshops and track sessions for executives, developers, engineers, managers and security professionals.
- Learn about the potential risks and vulnerabilities associated with IoT systems and connected devices
- Gain an understanding of IoT security best practice for the design of products and services
- Understand what to specify and look for when procuring IoT products and services
- Learn about the current and future state of standards, regulation and assurance
- Gain from the lessons learned in real life experiences/war stories
- Hear from leading experts and companies offering security products, solutions and services
For more details of the Internet of Things Security Foundation Conference see: Conference website.
The IoT Security Foundation has announced first set of speakers for the 6th Annual IoT Security Foundation Conference:
“AI-driven Cyber Defense for Endpoint Energy Assets”
VP & Global Head, Industrial Cyber at Siemens Energy
Protecting endpoint operating technologies (OT) is an increasingly important challenge for the energy sector. As energy companies continue to digitize existing assets and build new assets with intrinsic network connectivity, they present an ever-expanding attack surface to escalating attacks. Overall, the energy industry has made tremendous progress in maturing cybersecurity capabilities. Yet current practices leave significant gaps due to lag between updates.
This keynote will describe in detail the current challenges faced by energy companies, the implications of observable industry trends, the characteristics that potential cyber-security solutions must meet, and why they believe AI and ML technologies can meet these requirements now and in the future.
“IoT security challenges and opportunities in the 5G era”
Chief Cybersecurity Strategist at NTT Corporation
This presentation aims to analyse IoT security issues and opportunities at both the policy and technical level in the 5G era. The world is now more concerned over IoT and 5G security due to growing security threats during the pandemic and mounting geopolitical tensions. Yet, this talk will also shed light on collaborative efforts by government and industry for a smart world and 5G security as well as financial incentives to embed security in new projects in their early stages.
Software Provenance – Where Do We Draw the Line?
CEO at Finite State
There has been a lot of uproar about supply chain security – from 5G deployments around the world to threats to our power grids – and it seems that a day doesn’t go by without some new threat or government action. Many governments around the world, and in particular the US, are trying to “solve” supply chain risk management by introducing regulations focused on banning vendors from the supply chain. Notably, the US has taken several actions to try to limit vendors from potential adversary countries (such as China) from being involved in supply chains for certain types of critical infrastructure.
This talk will discuss how simple analysis of a vendor’s country of origin is a failing and incomplete model of supply chain risk. While geopolitical analysis is an important risk factor, the truth is that every device, every software application, and every vendor has some level of geopolitical risk. We live in a world that is fueled by global supply chains and open source software that is built by global, distributed teams of engineers. So where do we draw the line?
Chief Cybersecurity Advisor at Microsoft EMEA
Previously lead investigator for Microsoft’s detection and response team (DART), Lesley Kipling has spent more than 16 years responding to our customers’ largest and most impactful cybersecurity incidents. As Chief Cybersecurity Advisor, she now provides customers, partners and agencies around the globe with deep insights into how and why security incidents happen, how to harden defences and more importantly, how to automate response and contain attacks with the power of the cloud and machine learning.