Loading Events

[fullwidth background_color=”” background_image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/RoyalSocietyEntrance-e1448432825340-300×164.jpg” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”center center” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”100px” padding_bottom=”100px” padding_left=”40px” padding_right=”40px” hundred_percent=”no” equal_height_columns=”yes” hide_on_mobile=”yes” menu_anchor=”” class=”” id=””][two_third last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”rgba(255,255,255,.7)” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”30px” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]

 

The IoTSF Conference now takes place at THE ROYAL SOCIETY on December 1st, London

[/two_third][/fullwidth][fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”20″ padding_bottom=”0px” padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][three_fifth last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ class=”” id=””]

[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”20″ padding_bottom=”0px” padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][three_fifth last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ class=”” id=””]

[button link=”https://www.eventbrite.co.uk/e/iot-security-foundation-conference-tickets-18737130261″ color=”darkgray” size=”xlarge” type=”” shape=”” target=”_blank” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”no” icon_position=”left” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ alignment=”right” class=”padding-bottom:50px;” id=””]REGISTER[/button]

Conference Overview

The inaugural IoT Security Foundation Conference is a one-day event and follows on from the popular IoT Security Summit held earlier in the year at Bletchley Park. Whilst the Summit looked at the problems with IoT security, this conference will look closer at the need for security, applications and what organisations should be doing to ensure a security first, fit for purpose and resilient approach.

The primary targeted audience is the technology providers and the technology adopters of IoT, alongside academia, press, government and wider stakeholder groups.

An accompanying table-top exhibition complements the conference track and the day ends with a drinks reception allowing extra time to discuss the themes of the day and additional networking.

The conference has a senior and expert level line up of speakers and we will continue to make announcements on this website. More speakers will be announced shortly.

The ticket price for IoTSF and/or NMI members is only £245 and only £345 for non-members (prices exclusive of tax). Non-members will have the opportunity to be reimbursed the difference in ticket price if they take up membership before the end of 2015.

If IoT security is important to your job, or IoT important to your company then this event is for you. Nowhere else will you find such security insight in an IoT event or a connected community with such dept of expertise – we warmly invite you to join us.

Outline Agenda

✔ Session: IoT security, the big picture

The Threats and the Opportunities

✔ Session: Real world case studies of IoT security breaches and how to avoid them in future

Featuring Automotive, Consumer and Medical

✔ Session: Making it safe to connect

Exploring the Solutions Space

Registration is from 9am – refreshments and lunch served – conference closes 5pm with a drinks reception for those wishing to continue networking.

Announced Speakers

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]Tim-Hahn-picture

Tim Hahn

Chief Architect for IoT Security and Distinguished Engineer at IBM

“It’s not just the devices”

[/one_fourth]

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]paul-dorey-picture

Professor Paul Dorey

Royal Holloway, University of London and CSOconfidential

“So who owns the security of the IoT?”

[/one_fourth]

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]Caroline-Rivett-Picture

Caroline Rivett

Director, Cyber Security and Privacy at KPMG

“Security of the Medical Internet of Things”

[/one_fourth]

[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]

Simon Moore

CTO, Secure Thingz

“Delivering trustworthy products in IoT”

[/one_fourth]

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]Tony King-Smith prpl Foundation

Tony King-Smith

Board Member prpl Foundation and EVP Marketing at Imagination Technologies

“Mind the gaps: why we need new, truly open, multi-domain heterogeneous solutions”

[/one_fourth]

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]

Ken Munro

Director, Pen Test Partners

“Snoopers Charter? What is your IoT device up to in your home?”

[/one_fourth]

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]Will Keegan Lynx

Will Keegan

Technical Director, Software Security at Lynx Software Technologies, Inc

“Protecting Critical Industrial Infrastructure Using Isolation Technology and Threat Intelligence” co-speaker

[/one_fourth]

[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]David DuFour picture

David DuFour

Senior Director of Security Architecture, Webroot

“Protecting Critical Industrial Infrastructure Using Isolation Technology and Threat Intelligence” co-speaker

[/one_fourth]

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]

Marc Rogers

Head of InfoSec at Cloudflare Inc.

“What I learned about IOT from hacking the Tesla Model S”

[/one_fourth]

[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]

Robin Duke-Woolley

CEO, Beecham Research

“Market Opportunities for Security in the IoT Market”

[/one_fourth]

[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]

John Haine

IoT Security Foundation Chair

“IoTSF Update and Status”

[/one_fourth]

[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]

Jessica Rushworth

Director, Government Engagement and Policy, Digital Catapult

“IoT Security – The Policy Perspective”

[/one_fourth]

Sponsorship & Exhibition

Thank you to our Sponsors

[images picture_size=”fixed” hover_type=”none” autoplay=”yes” columns=”5″ column_spacing=”13″ scroll_items=”” show_nav=”yes” mouse_scroll=”no” border=”yes” lightbox=”yes” class=”” id=””][image link=”http://www.imgtec.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2013/08/Imagination-Technologies.jpg” alt=”Imagination”][image link=”http://www.cadence.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot3.jpg” alt=”Cadence”][image link=”http://www.ghs.com/” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot5.jpg” alt=”Green Hills Software”][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/BLACKBERRY-IOT.jpg” alt=””][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/IC-RES-IOT1.jpg” alt=””][/images]

And Supporters

[images picture_size=”fixed” hover_type=”none” autoplay=”yes” columns=”5″ column_spacing=”13″ scroll_items=”” show_nav=”yes” mouse_scroll=”no” border=”yes” lightbox=”yes” class=”” id=””][image link=”http://www.lynx.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot1.jpg” alt=”Lynx”][image link=”http://www.phaedsys.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot2.jpg” alt=”Phaedrus Systems”][image link=”http://www.devicemanagement.org” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot4.jpg” alt=”Device Management Forum”][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/XITEX-IOT1.jpg” alt=””][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/CRYPTOSOFT-IOT1.jpg” alt=””][image link=”http://www.thecyberwire.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot6.jpg” alt=”The Cyberwire”][image link=”http://www.iotinsights.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot7.jpg” alt=”IOT Insights”][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/Synopsys-IOT.jpg” alt=””][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/IET-Logo-no-strapline.jpg” alt=””][/images]

 

We have different levels of sponsorship and exhibition opportunities available at a first come, first served basis.

Gold Sponsor: £5000

Silver Sponsor: £1500 – £2000

Bronze Sponsor: £1000 – £1200

Exhibitor: £1195

(All prices are exclusive of VAT)

 

[content_boxes layout=”clean-horizontal” columns=”1″ icon_align=”left” title_size=”” backgroundcolor=”” icon_circle=”” icon_circle_radius=”” iconcolor=”” circlecolor=”” circlebordercolor=”” circlebordercolorsize=”” outercirclebordercolor=”” outercirclebordercolorsize=”” icon_size=”” link_type=”text” link_area=”” animation_delay=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ margin_top=”” margin_bottom=”” class=”” id=””]
[content_box title=”” icon=”” backgroundcolor=”” iconcolor=”” circlecolor=”” circlebordercolor=”” circlebordercolorsize=”” outercirclebordercolor=”” outercirclebordercolorsize=”” iconrotate=”” iconspin=”no” image=”” image_width=”35″ image_height=”35″ link=”https://iotsecurityfoundation.org/wp-content/uploads/2015/09/IoTSF-Conference-2015-Sponsorship-Guide-v1-0.pdf” linktarget=”_self” linktext=”DOWNLOAD” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″]For more information on sponsorship and exhibition opportunities, please download the IoTSF Conference Supporter Opportunites Document. [/content_box]
[/content_boxes]

[button link=”https://www.eventbrite.co.uk/e/iot-security-foundation-conference-tickets-18737130261″ color=”darkgray” size=”xlarge” type=”” shape=”” target=”_blank” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”no” icon_position=”left” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ alignment=”right” class=”” id=””]REGISTER[/button]

 

Share This Story, Choose Your Platform!