IoT Security Foundation Conference
1st December 2015 @ 9:00 am - 6:30 pm
[fullwidth background_color=”” background_image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/RoyalSocietyEntrance-e1448432825340-300×164.jpg” background_parallax=”fixed” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”center center” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”100px” padding_bottom=”100px” padding_left=”40px” padding_right=”40px” hundred_percent=”no” equal_height_columns=”yes” hide_on_mobile=”yes” menu_anchor=”” class=”” id=””][two_third last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”rgba(255,255,255,.7)” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”30px” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
The IoTSF Conference now takes place at THE ROYAL SOCIETY on December 1st, London
[button link=”https://www.eventbrite.co.uk/e/iot-security-foundation-conference-tickets-18737130261″ color=”darkgray” size=”xlarge” type=”” shape=”” target=”_blank” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”no” icon_position=”left” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ alignment=”right” class=”padding-bottom:50px;” id=””]REGISTER[/button]
Conference Overview
The inaugural IoT Security Foundation Conference is a one-day event and follows on from the popular IoT Security Summit held earlier in the year at Bletchley Park. Whilst the Summit looked at the problems with IoT security, this conference will look closer at the need for security, applications and what organisations should be doing to ensure a security first, fit for purpose and resilient approach.
The primary targeted audience is the technology providers and the technology adopters of IoT, alongside academia, press, government and wider stakeholder groups.
An accompanying table-top exhibition complements the conference track and the day ends with a drinks reception allowing extra time to discuss the themes of the day and additional networking.
The conference has a senior and expert level line up of speakers and we will continue to make announcements on this website. More speakers will be announced shortly.
The ticket price for IoTSF and/or NMI members is only £245 and only £345 for non-members (prices exclusive of tax). Non-members will have the opportunity to be reimbursed the difference in ticket price if they take up membership before the end of 2015.
If IoT security is important to your job, or IoT important to your company then this event is for you. Nowhere else will you find such security insight in an IoT event or a connected community with such dept of expertise – we warmly invite you to join us.
Outline Agenda
✔ Session: IoT security, the big picture
The Threats and the Opportunities
✔ Session: Real world case studies of IoT security breaches and how to avoid them in future
Featuring Automotive, Consumer and Medical
✔ Session: Making it safe to connect
Exploring the Solutions Space
Registration is from 9am – refreshments and lunch served – conference closes 5pm with a drinks reception for those wishing to continue networking.
Announced Speakers
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Tim Hahn
Chief Architect for IoT Security and Distinguished Engineer at IBM
“It’s not just the devices”
[/one_fourth]
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Professor Paul Dorey
Royal Holloway, University of London and CSOconfidential
“So who owns the security of the IoT?”
[/one_fourth]
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Caroline Rivett
Director, Cyber Security and Privacy at KPMG
“Security of the Medical Internet of Things”
[/one_fourth]
[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Simon Moore
CTO, Secure Thingz
“Delivering trustworthy products in IoT”
[/one_fourth]
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Tony King-Smith
Board Member prpl Foundation and EVP Marketing at Imagination Technologies
“Mind the gaps: why we need new, truly open, multi-domain heterogeneous solutions”
[/one_fourth]
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Ken Munro
Director, Pen Test Partners
“Snoopers Charter? What is your IoT device up to in your home?”
[/one_fourth]
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Will Keegan
Technical Director, Software Security at Lynx Software Technologies, Inc
“Protecting Critical Industrial Infrastructure Using Isolation Technology and Threat Intelligence” co-speaker
[/one_fourth]
[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
David DuFour
Senior Director of Security Architecture, Webroot
“Protecting Critical Industrial Infrastructure Using Isolation Technology and Threat Intelligence” co-speaker
[/one_fourth]
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Marc Rogers
Head of InfoSec at Cloudflare Inc.
“What I learned about IOT from hacking the Tesla Model S”
[/one_fourth]
[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Robin Duke-Woolley
CEO, Beecham Research
“Market Opportunities for Security in the IoT Market”
[/one_fourth]
[one_fourth spacing=”yes” last=”no” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
John Haine
IoT Security Foundation Chair
“IoTSF Update and Status”
[/one_fourth]
[one_fourth spacing=”yes” last=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ class=”” id=””]
Jessica Rushworth
Director, Government Engagement and Policy, Digital Catapult
“IoT Security – The Policy Perspective”
[/one_fourth]
Sponsorship & Exhibition
Thank you to our Sponsors
[images picture_size=”fixed” hover_type=”none” autoplay=”yes” columns=”5″ column_spacing=”13″ scroll_items=”” show_nav=”yes” mouse_scroll=”no” border=”yes” lightbox=”yes” class=”” id=””][image link=”http://www.imgtec.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2013/08/Imagination-Technologies.jpg” alt=”Imagination”][image link=”http://www.cadence.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot3.jpg” alt=”Cadence”][image link=”http://www.ghs.com/” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot5.jpg” alt=”Green Hills Software”][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/BLACKBERRY-IOT.jpg” alt=””][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/IC-RES-IOT1.jpg” alt=””][/images]
And Supporters
[images picture_size=”fixed” hover_type=”none” autoplay=”yes” columns=”5″ column_spacing=”13″ scroll_items=”” show_nav=”yes” mouse_scroll=”no” border=”yes” lightbox=”yes” class=”” id=””][image link=”http://www.lynx.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot1.jpg” alt=”Lynx”][image link=”http://www.phaedsys.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot2.jpg” alt=”Phaedrus Systems”][image link=”http://www.devicemanagement.org” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot4.jpg” alt=”Device Management Forum”][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/XITEX-IOT1.jpg” alt=””][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/CRYPTOSOFT-IOT1.jpg” alt=””][image link=”http://www.thecyberwire.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot6.jpg” alt=”The Cyberwire”][image link=”http://www.iotinsights.com” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/10/iot7.jpg” alt=”IOT Insights”][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/Synopsys-IOT.jpg” alt=””][image link=”” linktarget=”_self” image=”https://iotsecurityfoundation.org/wp-content/uploads/2015/11/IET-Logo-no-strapline.jpg” alt=””][/images]
We have different levels of sponsorship and exhibition opportunities available at a first come, first served basis.
Gold Sponsor: £5000
Silver Sponsor: £1500 – £2000
Bronze Sponsor: £1000 – £1200
Exhibitor: £1195
(All prices are exclusive of VAT)
[content_boxes layout=”clean-horizontal” columns=”1″ icon_align=”left” title_size=”” backgroundcolor=”” icon_circle=”” icon_circle_radius=”” iconcolor=”” circlecolor=”” circlebordercolor=”” circlebordercolorsize=”” outercirclebordercolor=”” outercirclebordercolorsize=”” icon_size=”” link_type=”text” link_area=”” animation_delay=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ margin_top=”” margin_bottom=”” class=”” id=””]
[content_box title=”” icon=”” backgroundcolor=”” iconcolor=”” circlecolor=”” circlebordercolor=”” circlebordercolorsize=”” outercirclebordercolor=”” outercirclebordercolorsize=”” iconrotate=”” iconspin=”no” image=”” image_width=”35″ image_height=”35″ link=”https://iotsecurityfoundation.org/wp-content/uploads/2015/09/IoTSF-Conference-2015-Sponsorship-Guide-v1-0.pdf” linktarget=”_self” linktext=”DOWNLOAD” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″]For more information on sponsorship and exhibition opportunities, please download the IoTSF Conference Supporter Opportunites Document. [/content_box]
[/content_boxes]
[button link=”https://www.eventbrite.co.uk/e/iot-security-foundation-conference-tickets-18737130261″ color=”darkgray” size=”xlarge” type=”” shape=”” target=”_blank” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”no” icon_position=”left” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ alignment=”right” class=”” id=””]REGISTER[/button]