BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//IoT Security Foundation - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://iotsecurityfoundation.org
X-WR-CALDESC:Events for IoT Security Foundation
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20180325T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20181028T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20190331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20191027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20200329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20201025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20211031T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20221030T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210616T140000
DTEND;TZID=Europe/London:20210616T163000
DTSTAMP:20260429T124112
CREATED:20210519T111853Z
LAST-MODIFIED:20210526T152215Z
UID:21122-1623852000-1623861000@iotsecurityfoundation.org
SUMMARY:IoTSF Plenary 30
DESCRIPTION:This virtual plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides\, Smart Buildings & Supply Chain Integrity groups. \nThis plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers from NIST and Beau Woods from I am the Calvary. \n\nThis event is for IoTSF members and is open to invited non-members.\nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members\nFind out more about IoTSF here: https://iotsecurityfoundation.org\nIf you are not a member and would like to attend\, or you have any queries please email Angela.tansey@techworks.org.uk\n\nRegister for FreeBEAU WOODS\n I am the Cavalry \n×Beau Woods\nI am the Cavalry\nBeau Woods is a Senior Advisor with CISA\, Cyber Safety Innovation Fellow with the Atlantic Council\, a leader with the I Am The Cavalry grassroots initiative\, Founder/CEO of Stratigos Security\, and sits on the board of several non-profits. \nHis work bridges the gap between the security research and public policy communities\, to ensure connected technology that can impact life and safety is worthy of our trust. He formerly served as Entrepreneur in Residence with the US FDA\, and Managing Principal Consultant at Dell SecureWorks. \nOver the past several years in this capacity\, he has consulted with the energy\, healthcare\, automotive\, aviation\, rail\, and IoT industries\, as well as cyber security researchers\, US and international policy makers\, and the White House. Beau is a published author\, frequent public speaker\, often quoted in media\, and is often engaged for public or private speaking venues. \nRead Bio
URL:https://iotsecurityfoundation.org/event/iotsf-plenary-30/
LOCATION:Webinar
CATEGORIES:Plenary Session
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2021/05/iotsfplen30.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210601
DTEND;VALUE=DATE:20210603
DTSTAMP:20260429T124112
CREATED:20210514T091212Z
LAST-MODIFIED:20210514T091212Z
UID:21116-1622505600-1622678399@iotsecurityfoundation.org
SUMMARY:ManuSec: Cyber Security for Manufacturing Summit
DESCRIPTION:ManuSec: Cyber Security for Manufacturing Summit launches online on 1st – 2nd June. \nThis is an opportunity for manufacturing security leaders across Europe to come together and join forces with 100’s of experts across the region.\nThroughout the 2-day program\, attendees will learn how to build resilience\, mitigate risks and develop a cyber security strategy to combat new and ongoing threats.\nAttendees will also benefit from access to ManuSec Europe’s co-hosted Data Manufacturing Summit – Earning up to 24 CPE credits and gaining expert knowledge and\ninsights from across both streams!\nAgenda topics include: \n\nMaking cyber security a priority in your digital transformation journey\nThe impact of cyber attacks on industrial environments\nReducing security risks posed by the human factor\nCyber security for SCADA and plant control systems\nAchieving business resilience through converged IT-OT cyber security strategies\nAnd\, more!\n\nTake a look at the detailed agenda and secure your free pass* using the code “IOT-SEC” online here\n*Offer is valid for end-users only. Vendors and consultants are not eligible but can redeem but can redeem a 15% discount with the code IOT-15
URL:https://iotsecurityfoundation.org/event/manusec-cyber-security-for-manufacturing-summit/
CATEGORIES:Conference,Summit
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2021/05/ManuSec-June-21.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210324T150000
DTEND;TZID=Europe/London:20210324T154500
DTSTAMP:20260429T124112
CREATED:20210216T120630Z
LAST-MODIFIED:20210216T123712Z
UID:21051-1616598000-1616600700@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Secure Edge Computing with Amazon Web Services IoT and MULTOS
DESCRIPTION:About This Webinar\nJoin Amazon Web Services and MULTOS to learn about the benefits of using AWS IoT Greengrass for managing edge computing tasks and how the MULTOS Trust Core can be used as cryptographic hardware root of trust for securing devices\, communications and data. \nOur speakers will introduce the AWS IoT ecosystem\, explaining some key concepts\, discuss security and present a live demo of Greengrass in action. \nAgenda\nWelcome & Introductions\nWhat is AWS IoT Greengrass?\nHow MULTOS supports Greengrass\nThe Demo\nQ&A \nWhen: Wednesday\, March 24\, 2021 · 03:00:00 PM · London\nDuration: 45 minutes\nLanguage: English\nWho can attend? Everyone\nDial-in available? (listen only): Yes\nDial-in Number: Please register for this Webinar to view the dial-in info. \nClick Here for More Information & Registration
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-secure-edge-computing-with-amazon-web-services-iot-and-multos/
LOCATION:Virtual Event
CATEGORIES:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210310T140000
DTEND;TZID=Europe/London:20210310T163000
DTSTAMP:20260429T124112
CREATED:20210212T154806Z
LAST-MODIFIED:20210212T154945Z
UID:21045-1615384800-1615393800@iotsecurityfoundation.org
SUMMARY:IoTSF Virtual Plenary
DESCRIPTION:Join us on 10th March to hear about IoTSF’s projects & industry guest speakers covering key developments in IoT Security\nREGISTER HERE \nAbout this Event \nYou are invited to join us on Wednesday 10th March for the 29th IoT Security Foundation Plenary Session. \nThis virtual plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides\, Smart Buildings & Supply Chain Integrity groups. This plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers. This event is for IoTSF members and is open to invited non-members. \nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members \nFind out more about IoTSF here: https://iotsecurityfoundation.org \nIf you are not a member and would like to attend\, or you have any queries please email IoTSF Community Manager\, Jenny Devoy.
URL:https://iotsecurityfoundation.org/event/iotsf-virtual-plenary/
LOCATION:Virtual Event
CATEGORIES:Plenary Session
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2021/02/iotp2.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210225T100000
DTEND;TZID=Europe/London:20210225T113000
DTSTAMP:20260429T124112
CREATED:20210216T123246Z
LAST-MODIFIED:20210216T123840Z
UID:21052-1614247200-1614252600@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: How Far Can We Trust The Internet of Things?
DESCRIPTION:Are currently deployed IoT solutions futureproof? Will we ever be able to make them truly secure? And what are the implications for smart cities and other connected applications? ​ \nLed by the SYNERGIA consortium with an opening talk by John Moor of the IoT Security Foundation\, this event looks to bring together businesses to discuss how we can address the potential security risks that leave current IoT devices vulnerable as the world becomes increasingly more connected. \nSYNERGIA is a consortium dedicated to the development of a secure-by-design IoT platform for large scale networks of low-power\, resource-constrained devices.​ ​ \nClick Here to find out more and register
URL:https://iotsecurityfoundation.org/event/how-far-can-we-trust-the-internet-of-things/
LOCATION:Virtual Event
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210127T090000
DTEND;TZID=Europe/London:20210130T140000
DTSTAMP:20260429T124112
CREATED:20201214T154147Z
LAST-MODIFIED:20210112T105814Z
UID:20998-1611738000-1612015200@iotsecurityfoundation.org
SUMMARY:Hardwear.io Security Training Berlin 2021
DESCRIPTION:Are you interested in reverse engineering\, side channel analysis\, fault injection attacks\, whitebox crypto\, or just hardware security in general? Hardwear.io offers some amazing hands-on live training in January 2021 – all online! \nJoin one of the upcoming Hardware Security Trainings: \n• Assessing and Exploiting Control Systems & IIoT by Justin Searle\n• Breaking Practical White-Box Crypto by Guillaume Vinet\n• EMFI and Voltage Fault injection attacks with Raiden by Adam Laurie & Grzegorz Wypych\n• Advanced Microcontrollers Firmware Exploitation by Alexander Bolshev and Tao Sauvage \nCLICK HERE TO SECURE YOUR TICKET\nVisit the website – https://hardwear.io/berlin-2021/online-training
URL:https://iotsecurityfoundation.org/event/hardwear-io-security-training-berlin-2021/
LOCATION:Webinar
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/12/BERLIN_Square.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201201
DTEND;VALUE=DATE:20201205
DTSTAMP:20260429T124112
CREATED:20200601T074706Z
LAST-MODIFIED:20200601T075155Z
UID:20725-1606780800-1607126399@iotsecurityfoundation.org
SUMMARY:IoTSF Virtual Conference 2020
DESCRIPTION:The 6th Annual Internet of Things Security Foundation Conference is a four-day virtual event that takes place between Tuesday 1st and Friday 4th December 2020. The Annual IoTSF Conference has built a loyal global following from the IoT stakeholder communities and is renowned for delivering high quality conference programmes. \nThe era of IoT describes the world as it transforms to be ever-digital and increasingly connected. Along with the power of digital comes the reciprocal cyber threat\, and we continue to witness an increasing number of attacks enabled by products that lack protection against well-known exploits\, have been badly configured or suffer from poor maintenance. This causes businesses to be hesitant\, concerns governments\, increases the likelihood of regulation and ultimately frustrates markets. \n\nVendors must build secure\, purchasers must buy secure\, and users must be secure: to be without security in a digital world is not an option. Society and industry need to fight back as no one should design\, buy\, or use a connected product\, service or system that lacks fit-for-purpose security. Yet there are no ‘one-size fits all’ security solutions – they are dependent on the application. Most of the attacks we see today can be effectively defended against\, many by relatively simple measures. Organisations need to be informed\, the solutions presented\, choices made\, and those choices need to be in keeping with their business context. \nWelcome to the 2020 IoT Security Foundation Virtual Conference where we aim to illuminate and educate delegates with an update on the threat landscape\, standards & regulation\, best practice\, next-practice and the latest developments in IoT cyber security. The IoTSF Conference features talks by leading cyber security experts\, training workshops and track sessions for executives\, developers\, engineers\, managers and security professionals. \nThe conference will have a senior and expert level line up of speakers which are announced as part of the promotional activity and can be found on the dedicated conference website: https://iotsfconference.com \n \nAs the World’s Longest Running IoT Security Conference\, this event attracts a wide range of decision makers\, including CEO’s\, CSO’s\, CTO’s\, Chief Security Strategists\, Directors\, Engineers\, Software and Hardware developers\, Development Managers\, Technical Directors\, Security Experts\, Academics\, Government and Press. \nSecure Your Place
URL:https://iotsecurityfoundation.org/event/iotsf-virtual-conference-2020/
CATEGORIES:Conference
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/06/Date-Announced-Square-2020-IoTSF-Conference-scaled.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201102
DTEND;VALUE=DATE:20201103
DTSTAMP:20260429T124112
CREATED:20200821T100604Z
LAST-MODIFIED:20200821T100604Z
UID:20888-1604275200-1604361599@iotsecurityfoundation.org
SUMMARY:Webinar : Manage Vulnerability Reports / November
DESCRIPTION:Register NowWithout mechanisms to report\, manage and resolve vulnerabilities\, the security of consumer IoT products will diminish over time – and the likelihood of attack or abuse will increase. New standards and regulatory change mean organisations need to prepare to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. \nWebinars will run for appox. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n1st September\n13:00\n06:00\n01:00\n05:00\n\n\n5th October\n18:00\n11:00\n06:00\n10:00\n\n\n2nd November\n02:00*\n18:00\n13:00\n18:00\n\n\n\n\n* 3rd November
URL:https://iotsecurityfoundation.org/event/webinar-manage-vulnerability-reports-november/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201030
DTEND;VALUE=DATE:20201031
DTSTAMP:20260429T124112
CREATED:20200821T103206Z
LAST-MODIFIED:20200821T103206Z
UID:20892-1604016000-1604102399@iotsecurityfoundation.org
SUMMARY:Webinar : Keeping Software Updated / 30th October
DESCRIPTION:Register NowSecurity software updates are vital because every IoT product is susceptible to vulnerabilities. If updates cannot be provisioned\, the security of the product will diminish over time. New standards and upcoming regulatory change mean organisations need to provide transparency on how long their products are supported with security software updates or by other suitable means. \nWebinars run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n28th August\n13:00\n06:00\n01:00\n05:00\n\n\n1st October\n18:00\n11:00\n06:00\n10:00\n\n\n30th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 31st October
URL:https://iotsecurityfoundation.org/event/webinar-keeping-software-updated-30th-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201027
DTEND;VALUE=DATE:20201028
DTSTAMP:20260429T124112
CREATED:20200821T095102Z
LAST-MODIFIED:20200821T103928Z
UID:20885-1603756800-1603843199@iotsecurityfoundation.org
SUMMARY:Webinar : Eliminate Universal Default Passwords / October
DESCRIPTION:Register NowUniversal passwords weaken IoT security: if one device is compromised\, all devices with that password are also compromised. New standards and upcoming regulatory change mean organisations need to assess how their IoT products use passwords and ensure universal default passwords are eliminated. \nWebinars will run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n26th August\n13:00\n06:00\n01:00\n05:00\n\n\n29th September\n18:00\n11:00\n06:00\n10:00\n\n\n27th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 28th October
URL:https://iotsecurityfoundation.org/event/webinar-eliminate-universal-default-passwords-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201006
DTEND;VALUE=DATE:20201010
DTSTAMP:20260429T124112
CREATED:20200827T111235Z
LAST-MODIFIED:20200904T110026Z
UID:20901-1601960400-1602219599@iotsecurityfoundation.org
SUMMARY:Informa IoT Security Summit Virtual Conference
DESCRIPTION:With the impact of COVID-19\, cybersecurity risks have been heightened in the sudden turn of unexpected events. IoT Security Summit Virtual will help you ensure your security is robust against disruption\, measuring your IoT progress with the right security framework. \nLearn from security experts on how to keep your community secure by improving the safety and reliability of your security processes. Our dedicated content will cover how you can better protect your data and devices with emerging IoT technologies that will revolutionize security across data\, devices\, edge and network security. It’s important now\, more than ever\, to ensure your organization can react effectively to security threats while adapting to the new normal. \nFor more information visit: IoT Security Summint Virtual Conference
URL:https://iotsecurityfoundation.org/event/informa-iot-security-summit-virtual-conference/
CATEGORIES:Conference
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2020/08/IoT-Security-Summit_logo_RGB.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201005
DTEND;VALUE=DATE:20201006
DTSTAMP:20260429T124112
CREATED:20200821T100216Z
LAST-MODIFIED:20200821T103711Z
UID:20887-1601856000-1601942399@iotsecurityfoundation.org
SUMMARY:Webinar : Manage Vulnerability Reports / October
DESCRIPTION:Register NowWithout mechanisms to report\, manage and resolve vulnerabilities\, the security of consumer IoT products will diminish over time – and the likelihood of attack or abuse will increase. New standards and regulatory change mean organisations need to prepare to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. \nWebinars will run for appox. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n1st September\n13:00\n06:00\n01:00\n05:00\n\n\n5th October\n18:00\n11:00\n06:00\n10:00\n\n\n2nd November\n02:00*\n18:00\n13:00\n18:00\n\n\n\n\n* 3rd November
URL:https://iotsecurityfoundation.org/event/webinar-manage-vulnerability-reports-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201001
DTEND;VALUE=DATE:20201002
DTSTAMP:20260429T124112
CREATED:20200821T102911Z
LAST-MODIFIED:20200821T102936Z
UID:20891-1601510400-1601596799@iotsecurityfoundation.org
SUMMARY:Webinar : Keeping Software Updated / 1st October
DESCRIPTION:Register NowSecurity software updates are vital because every IoT product is susceptible to vulnerabilities. If updates cannot be provisioned\, the security of the product will diminish over time. New standards and upcoming regulatory change mean organisations need to provide transparency on how long their products are supported with security software updates or by other suitable means. \nWebinars run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n28th August\n13:00\n06:00\n01:00\n05:00\n\n\n1st October\n18:00\n11:00\n06:00\n10:00\n\n\n30th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 31st October
URL:https://iotsecurityfoundation.org/event/webinar-keeping-software-updated-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200929
DTEND;VALUE=DATE:20200930
DTSTAMP:20260429T124112
CREATED:20200821T094910Z
LAST-MODIFIED:20200821T103836Z
UID:20884-1601337600-1601423999@iotsecurityfoundation.org
SUMMARY:Webinar : Eliminate Universal Default Passwords / September
DESCRIPTION:Register NowUniversal passwords weaken IoT security: if one device is compromised\, all devices with that password are also compromised. New standards and upcoming regulatory change mean organisations need to assess how their IoT products use passwords and ensure universal default passwords are eliminated. \nWebinars will run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n26th August\n13:00\n06:00\n01:00\n05:00\n\n\n29th September\n18:00\n11:00\n06:00\n10:00\n\n\n27th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 28th October
URL:https://iotsecurityfoundation.org/event/webinar-eliminate-universal-default-passwords-september/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200927T080000
DTEND;TZID=Europe/London:20201002T200000
DTSTAMP:20260429T124112
CREATED:20200917T081844Z
LAST-MODIFIED:20200917T081844Z
UID:20913-1601193600-1601668800@iotsecurityfoundation.org
SUMMARY:Hardwear.io Security Trainings and Conference Netherlands 2020
DESCRIPTION:Are you someone who is into embedded and hardware security? There are some amazing live hands-on trainings and conference talks offered by Hardwear.io this year – all online! \nHardwear.io Security Conference & Trainings is a platform for the hardware and security community\, where researchers showcase and discuss their innovative research on attacking and defending hardware. \nTraining: 27th to 30th September; 9.00 AM – 2.00 PM CEST \nConference: 1st to 2nd October; 6.00 PM – 9.00 PM CEST \nRegistration: https://hardwear.io/netherlands-2020/online-training.php \nConference Talks:  \n\nTaming Hydrofluoric Acid to Extract Firmware by John McMaster\nJackHammer: Rowhammer and Cache Attacks on Heterogeneous FPGA-CPU Platforms by Daniel Moghimi\, Thore Tiemann\, Zane Weissman\nPractical reverse engineering of ECC-based authentication device with zero knowledge by Dr. Sergei Skorobogatov\nReversing & Emulating Samsung’s Shannon Baseband by Grant Hernandez & Marius Muench\nCANanalyze: a python framework for automotive protocols by Erwan Le Disez & Etienne Charron\nToasting MCUs: A Firmware Extraction by EMFI by Karim M. Abdellatif & Olivier Hériveaux\nThings not to do when using an IOMMU by Ilja van Sprundel & Joseph Tartaro\nBadVibes – Sound Recovery using Bulb’s Vibrations by Boris Zadov & Yaron Pirutin\nLooking at Silicon by Ken Shirriff\nUnder the hood of a CPU: Reverse Engineering the P6 microcode by Peter Bosch\n\nHardware Security Trainings: \n\nConnected car hacking by Guillaume Heilles & Maxime Rossi Bellom\nHunting UEFI firmware implants by Alex Matrosov(postponed to 2-5 Nov)\nTEEPwn: breaking TEEs by experience by Cristofaro Mune\nRF hacking with software-defined radio by Sébastien Dudek\nBootPwn – pwning secure boot by experience by Niek Timmers\nMachine learning and SCA: an advanced tutorial by Stjepan Picek\nAdvanced microcontrollers firmware exploitation by Alexander Bolshev\nEmbedded physical attacks 101 by Lejla Batina\, Kostas Papagiannopoulos\, Leo Weissbart & Niels Samwel
URL:https://iotsecurityfoundation.org/event/hardwear-io-security-trainings-and-conference-netherlands-2020/
CATEGORIES:Conference,Training
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/09/HW_Conference_Registration.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200922T150000
DTEND;TZID=Europe/London:20200922T173000
DTSTAMP:20260429T124112
CREATED:20200514T155626Z
LAST-MODIFIED:20200514T155626Z
UID:20701-1600786800-1600795800@iotsecurityfoundation.org
SUMMARY:The 28th IoT Security Foundation Plenary
DESCRIPTION:You are invited to join us on Tuesday 22nd September 2020\, 15:00 – 17:30\, for the 28th IoT Security Foundation Plenary Session. \nThis virtual plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides\, Smart Buildings & Supply Chain Integrity groups. This plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers. This event is for IoTSF members and is open to invited non-members. \nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members \nFind out more about IoTSF here: https://iotsecurityfoundation.org \nIf you are not a member and would like to attend\, or you have any queries please email IoTSF Community Manager\, Jenny Devoy  \nSECURE YOUR PLACE
URL:https://iotsecurityfoundation.org/event/the-28th-iot-security-foundation-plenary/
LOCATION:Virtual Event
CATEGORIES:Plenary Session
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200916T190000
DTEND;TZID=Europe/London:20200916T210000
DTSTAMP:20260429T124112
CREATED:20200904T105154Z
LAST-MODIFIED:20200904T105935Z
UID:20906-1600282800-1600290000@iotsecurityfoundation.org
SUMMARY:IoT Thames Valley Virtual Meetup
DESCRIPTION:A detailed look at IoT attack vectors in the home\nNick Allott\, CEO of nquiringminds will be giving a talk: “A detailed look at IoT attack vectors in the home” at the IoT Thames Valley Virtual Meetup on 16th September. \nNick’s presentation will be based upon work undertaken with the University of Oxford as part of the Innovate UK supported ManySecured Collaborative Intelligent Gateway project. \nYou can REGISTER (free to attend) for the Virtual Meetup and Nick’s talk here: \nhttps://zoom.us/meeting/register/tJMtc-uoqT4vG9OgL0WRlgQEarO-qEoCQQ0q \nPrecis of Nick’s talk:\nDomestic IoT architectures are deceptively complex. NQM and University of Oxford have been working on a detailed architectural analysis of IoT deployment architectures. The emergent taxonomy has proven useful in better understanding the nature of the threat and the mitigations (and innovation) needed to better protect ourselves. \nThis talk with go through this architecture in detail\, highlighting some of the practical steps we can talk to improve the IoT security state of the art.
URL:https://iotsecurityfoundation.org/event/iot-thames-valley-virtual-meetup/
LOCATION:Virtual Event
CATEGORIES:Meetup
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/09/IoT-TV-logo.jpg
ORGANIZER;CN="Duncan Purves":MAILTO:duncan@connect2.io
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200901
DTEND;VALUE=DATE:20200902
DTSTAMP:20260429T124112
CREATED:20200821T095908Z
LAST-MODIFIED:20200821T104105Z
UID:20886-1598918400-1599004799@iotsecurityfoundation.org
SUMMARY:Webinar : Manage Vulnerability Reports / September
DESCRIPTION:Register NowWithout mechanisms to report\, manage and resolve vulnerabilities\, the security of consumer IoT products will diminish over time – and the likelihood of attack or abuse will increase. New standards and regulatory change mean organisations need to prepare to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. \nWebinars will run for appox. 2 hours. \n\n\n\n\n \nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n1st September\n13:00\n06:00\n01:00\n05:00\n\n\n5th October\n18:00\n11:00\n06:00\n10:00\n\n\n2nd November\n02:00*\n18:00\n13:00\n18:00\n\n\n\n\n* 3rd November
URL:https://iotsecurityfoundation.org/event/webinar-manage-vulnerability-reports-september/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200828
DTEND;VALUE=DATE:20200829
DTSTAMP:20260429T124112
CREATED:20200821T102407Z
LAST-MODIFIED:20200821T102617Z
UID:20889-1598572800-1598659199@iotsecurityfoundation.org
SUMMARY:Webinar : Keeping Software Updated / August
DESCRIPTION:Register NowSecurity software updates are vital because every IoT product is susceptible to vulnerabilities. If updates cannot be provisioned\, the security of the product will diminish over time. New standards and upcoming regulatory change mean organisations need to provide transparency on how long their products are supported with security software updates or by other suitable means. \nWebinars run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n28th August\n13:00\n06:00\n01:00\n05:00\n\n\n1st October\n18:00\n11:00\n06:00\n10:00\n\n\n30th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 31st October
URL:https://iotsecurityfoundation.org/event/webinar-keeping-software-updated-august/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200826
DTEND;VALUE=DATE:20200827
DTSTAMP:20260429T124112
CREATED:20200821T094611Z
LAST-MODIFIED:20200821T103626Z
UID:20880-1598400000-1598486399@iotsecurityfoundation.org
SUMMARY:Webinar : Eliminate Universal Default Passwords / August
DESCRIPTION:Register NowUniversal passwords weaken IoT security: if one device is compromised\, all devices with that password are also compromised. New standards and upcoming regulatory change mean organisations need to assess how their IoT products use passwords and ensure universal default passwords are eliminated. \nWebinars will run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n26th August\n13:00\n06:00\n01:00\n05:00\n\n\n29th September\n18:00\n11:00\n06:00\n10:00\n\n\n27th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 28th October
URL:https://iotsecurityfoundation.org/event/webinar-eliminate-universal-default-passwords-august/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200708T150000
DTEND;TZID=Europe/London:20200708T173000
DTSTAMP:20260429T124112
CREATED:20200514T155151Z
LAST-MODIFIED:20200514T155713Z
UID:20697-1594220400-1594229400@iotsecurityfoundation.org
SUMMARY:The 27th IoT Security Foundation Plenary
DESCRIPTION:You are invited to join us on Wednesday 8th July 2020\, 15:00 – 17:30\, for the 27th IoT Security Foundation Plenary Session. \nThis virtual plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides\, Smart Buildings & Supply Chain Integrity groups. This plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers. This event is for IoTSF members and is open to invited non-members. \nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members \nFind out more about IoTSF here: https://iotsecurityfoundation.org \nIf you are not a member and would like to attend\, or you have any queries please email IoTSF Community Manager\, Jenny Devoy  \nSECURE YOUR PLACE
URL:https://iotsecurityfoundation.org/event/the-27th-iot-security-foundation-plenary/
LOCATION:Virtual Event
CATEGORIES:Plenary Session
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200609T150000
DTEND;TZID=Europe/London:20200609T170000
DTSTAMP:20260429T124112
CREATED:20200515T141750Z
LAST-MODIFIED:20200515T141750Z
UID:20702-1591714800-1591722000@iotsecurityfoundation.org
SUMMARY:IoTSF Supply Chain Integrity Project Meeting
DESCRIPTION:The IoT Security Foundation (IoTSF) is hosting its third Supply Chain Integrity Project meeting on Tuesday 9th June 15:00-17:00 BST. \nThis virtual meeting will gather various supply chain stakeholders to discuss and establish the known security challenges within smart supply chains and analyse the priorities of this project. \nSupply chains are increasingly recognised as a major vector for cyber-attacks. Highly notorious examples include Stuxnet and NotPetya. National security agencies including NIST (US)\, ENISA (EU)\, NCSC (UK) have begun developing recommendations for generic IT systems\, but to date no organisation has released guidelines specifically developed for IoT. Supply chain security is also a real and present problem for device OEMs\, who suffer billion in lost revenues through numerous abuses of their intellectual property\, including counterfeiting\, overproduction and IP theft. \nTechnologies and services to mitigate these problems exist\, but the IoT industry is unable to evaluate them confidently. The Supply Chain Integrity Project’s mission is to help IoT operators manage cyber risks to which they are exposed through their suppliers. By addressing the problem of delivering devices into deployments in a trustworthy initial state and maintaining their trustworthiness throughout their operational lifespans it supports the IoT Security Foundation’s mission to “Make it safe to connect”\, and complements preceding work on securing deployed devices. \nThe project will gather information on IoT supply chains in order to build a representative model\, security analysis of which will lead to a set of prioritised recommendations accessible to a wide audience beyond the security community. Participants will gain opportunities to show leadership through their contributions to the industry\, and to gain a lead in their own product development. \nThis meeting is open to IoTSF members and non-members working within the smart supply chain. If you have any queries about this project\, email contact@iotsecurityfoundation.org \nTo secure your place please click here
URL:https://iotsecurityfoundation.org/event/iotsf-supply-chain-integrity-project-meeting-2/
LOCATION:Virtual Event
CATEGORIES:Meeting
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/05/iotsfsp3.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200512T093000
DTEND;TZID=Europe/London:20200512T130000
DTSTAMP:20260429T124112
CREATED:20200430T081111Z
LAST-MODIFIED:20200501T103856Z
UID:20643-1589275800-1589288400@iotsecurityfoundation.org
SUMMARY:IoTSF Supply Chain Integrity Project Meeting
DESCRIPTION:The IoT Security Foundation (IoTSF) is hosting its second Supply Chain Integrity Project meeting on Tuesday 12th May 09:30-13:00 BST.  This virtual meeting will gather various supply chain stakeholders to discuss and establish the known security challenges within smart supply chains and analyse the priorities of this project. \nSupply chains are increasingly recognised as a major vector for cyber-attacks. Highly notorious examples include Stuxnet and NotPetya. National security agencies including NIST (US)\, ENISA (EU)\, NCSC (UK) have begun developing recommendations for generic IT systems\, but to date no organisation has released guidelines specifically developed for IoT. Supply chain security is also a real and present problem for device OEMs\, who suffer billion in lost revenues through numerous abuses of their intellectual property\, including counterfeiting\, overproduction and IP theft. \nTechnologies and services to mitigate these problems exist\, but the IoT industry is unable to evaluate them confidently. \nThe Supply Chain Integrity Project’s mission is to help IoT operators manage cyber risks to which they are exposed through their suppliers. By addressing the problem of delivering devices into deployments in a trustworthy initial state and maintaining their trustworthiness throughout their operational lifespans it supports the IoT Security Foundation’s mission to “Make it safe to connect”\, and complements preceding work on securing deployed devices. \nThe project will gather information on IoT supply chains in order to build a representative model\, security analysis of which will lead to a set of prioritised recommendations accessible to a wide audience beyond the security community. Participants will gain opportunities to show leadership through their contributions to the industry\, and to gain a lead in their own product development. \nThis meeting is open to IoTSF members and non-members working within the smart supply chain\, to register your place\, email Angela Tansey \nIf you have any queries about this project\, email contact@iotsecurityfoundation.org
URL:https://iotsecurityfoundation.org/event/iotsf-supply-chain-integrity-project-meeting/
LOCATION:Virtual Meeting
CATEGORIES:Meeting
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2020/04/SCIP-IMAGE-1b.png
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200213T123000
DTEND;TZID=Europe/London:20200213T170000
DTSTAMP:20260429T124112
CREATED:20191206T115558Z
LAST-MODIFIED:20191206T115558Z
UID:20505-1581597000-1581613200@iotsecurityfoundation.org
SUMMARY:IoTSF Member Plenary 26
DESCRIPTION:Join us on 13th February for an exciting day of IoTSF project talks and industry guest speakers covering key developments in IoT Security.\nYou are invited to join us on Thursday 13th February 2020 for the 26th IoT Security Foundation Plenary Session. \nThis plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides and Smart Buildings groups. This plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers. \nThis event is for the IoTSF members and is also open to non-members. \nNot sure if your company is a member? Check Here \nIf you are not a member and would like to attend\, or you have any queries please email IoTSF Community Manager Jenny Devoy \nREGISTER NOW
URL:https://iotsecurityfoundation.org/event/iotsf-member-plenary-26/
LOCATION:The Caledonian Club\, 9 Halkin Street\, Belgravia\, London\, SW1X 7DR\, United Kingdom
CATEGORIES:Plenary Session
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2019/12/Plenary-26-EB-graphic.png
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200120T120000
DTEND;TZID=Europe/London:20200120T163000
DTSTAMP:20260429T124112
CREATED:20191206T113828Z
LAST-MODIFIED:20191206T113828Z
UID:20500-1579521600-1579537800@iotsecurityfoundation.org
SUMMARY:IoTSF Smart Buildings Cyber Security Workshop
DESCRIPTION:Free Smart Buildings and Enterprise IoT Security Workshop by IoT Security Foundation Working Group\nWe would like to invite you to join us on Monday 20th January 2020 at the IoT Security Foundation’s Workshop on the challenges of IoT Security for Smart Buildings. The main focus of our discussions will be to agree an outline of content for a new Guideline which includes the perspectives of the key Smart Buildings’ Security stakeholders.\nThere are many stakeholders who have a need\, and interest\, in fit for purpose security in this area – from solution providers to occupiers. Hence the issues are likely widespread and multi-faceted. \nIn short\, the increasing number of exposed IoT vulnerabilities suggest that something needs to be done to respond to the growing threats that accompany the adoption of connected (“IoT”) technologies in buildings. We assert that the best way to address the many issues is collaboratively\, with key stakeholders. Hence the starting objective we’ve set for the group\, is ‘to understand\, specify\, procure\, install/integrate\, validate\, operate and maintain IoT systems securely in buildings throughout the working life’. \nBut we’d like to hear what you think – what is your perspective? \n1. What problems in the Smart Buildings’ cyber security space have you experienced or know of? \n2. Which are the most urgent problems you think need to be addressed? For example\, because the impact and risk are both high. \n3. What is your view on the different needs\, roles\, and responsibilities of the Smart Building eco-system and other stakeholders? – such as: \n\nTechnology providers and integrators: how should they provision fit for purpose security over the intended life cycle? What assurances should they provide?\nDemand-side users: operators and occupiers. What is required for successful deployment and maintenance?\nGovernment\, policy makers and regulators: Is there a need for basic regulation?\n\nFurther questions we would like to consider as a group. \n\nIs there enough awareness and advice for keeping smart buildings safe across different stakeholders?\nWhat are the relevant standards and best practices that are currently used in the design\, implementation\, procurement\, operation/maintenance of smart building systems? How well do they achieve their goals? Is anything missing or that could be improved?\n\nFinally\, in the light of these questions\, and to get the most out of the workshop please consider this question: What are the top 3 challenges you think the group should begin to address and where you have an interest to help solve? \nPlease take a little time to prepare so we can get the best out of the available time. \nMonday 20th January 2020 12:00-16:30\nRegistration & Lunch: 12:00-13:00; Workshop 13:00-16:30\nFree to attend\nWe look forward to meeting you and working with you. \nSarb Sembhi and James Willison\, IoT Security Foundation Smart Buildings Leaders \nRegister Now
URL:https://iotsecurityfoundation.org/event/iotsf-smart-buildings-cyber-security-workshop/
LOCATION:The Caledonian Club\, 9 Halkin Street\, Belgravia\, London\, SW1X 7DR\, United Kingdom
CATEGORIES:Meeting,Workshop
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2019/12/smart-buildings-2.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20191126T080000
DTEND;TZID=Europe/London:20191126T180000
DTSTAMP:20260429T124112
CREATED:20190514T130133Z
LAST-MODIFIED:20190619T094732Z
UID:19198-1574755200-1574791200@iotsecurityfoundation.org
SUMMARY:5th Annual IoTSF Conference
DESCRIPTION:  \nNow in its 5th year\, The IoT Security Foundation’s Annual Conference returns on 26th November at the ILEC Conference Centre\, London. Building on the success of previous years\, the IoTSF Conference is a one-day event that has grown a loyal global following from the IoT stakeholder communities. \nIoTSF has built a reputation for delivering high-calibre conference programmes by providing a holistic view of the threat landscape\, showcasing real-world examples of fit-for-purpose security implementation and educating delegates on the tools available to build secure\, buy secure and be secure. \nJoin us for the 2019 IoT Security Foundation Conference where we aim to illuminate\, educate and keep you up-to-date with best practice\, next-practice and the latest developments in IoT cyber security. \nView Conference WebsiteConference Call For Papers Open to 27th June\nView Call For Papers PageWant To Get Involved?\nView Sponsorship
URL:https://iotsecurityfoundation.org/event/5th-annual-iotsf-conference/
LOCATION:ILEC Conference Centre\, 47 Lillie Road\, London\, SW6 1UD\, United Kingdom
CATEGORIES:Conference
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2019/05/IoTSF-Conf-2019-Square-Image-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20191112
DTEND;VALUE=DATE:20191114
DTSTAMP:20260429T124112
CREATED:20190129T142621Z
LAST-MODIFIED:20190619T094733Z
UID:19020-1573516800-1573689599@iotsecurityfoundation.org
SUMMARY:IoTSF Training Course : Foundations of  IoT Security / Austria
DESCRIPTION:At the completion of this course\, attendees will know how to secure a connected IoT product from scratch. This course is run across 2 days. \nCourse attendees benefit from a fully inclusive package\, will receive a certificate of completion\, be registered on the IoTSF database and inducted into the Training Alumni platform. \nInterested parties are encouraged to book early as places are limited \nFind Out More
URL:https://iotsecurityfoundation.org/event/iotsf-training-course-foundations-of-iot-security-austria/
LOCATION:Innsbruck\, Austria
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2019/01/iot-training2.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20191107T091500
DTEND;TZID=Europe/London:20191107T180000
DTSTAMP:20260429T124112
CREATED:20190524T104633Z
LAST-MODIFIED:20190619T094733Z
UID:19207-1573118100-1573149600@iotsecurityfoundation.org
SUMMARY:Secure IoT 2019 (IoTSF Promoted Event)
DESCRIPTION:The third annual Secure IoT\, Internet of Things cyber security conference will be held at the Green Park Conference Centre\, 100 Longwater Avenue\, Green Park\, Reading\, Berkshire\, RG2 6GP\, on Thursday\, 7th November. \nLearn about the security issues\, risks\, threats and vulnerabilities associated with IoT systems and connected device. Gain an understanding IoT security best practice and meet leading experts and companies offering security products\, solutions and services. \nConference Website: https://tvsecureiot.uk \nBook Tickets: https://www.eventbrite.co.uk/e/secure-iot-2019-tickets-59043403409
URL:https://iotsecurityfoundation.org/event/secure-iot-2019-iotsf-promoted-event/
LOCATION:Green Park Conference Centre\, 100 Longwater Avenue\, Green Park\, Reading\, RG2 6GP\, United Kingdom
CATEGORIES:Conference
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2019/05/secureiot2019.png
ORGANIZER;CN="Duncan Purves":MAILTO:duncan@connect2.io
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20191106T183000
DTEND;TZID=Europe/London:20191107T010000
DTSTAMP:20260429T124112
CREATED:20190702T103859Z
LAST-MODIFIED:20190702T103859Z
UID:19235-1573065000-1573088400@iotsecurityfoundation.org
SUMMARY:TechWorks Gala Dinner & Awards Ceremony
DESCRIPTION:For the latest information on the TechWorks Gala Dinner & Awards Ceremony\, visit our event website.\nSECURE YOUR GALA TICKET NOWThis prestigious event brings together hundreds of executives & professionals from across the industry\, providing an excellent opportunity to network with industry leaders\, meet new clients or host existing clients and build brand awareness.\nDuring the Gala Dinner\, we announce the winners of the TechWorks Awards – celebrating achievements & behaviours conducive to a healthy & vibrant industry. \nThe TechWorks awards are open to all organisations active within the tech industry\, with award categories to fit a wide range of sectors. They are FREE to enter\, with a simple online process. \n Details on when the awards open will be available soon. In the meantime\, if you have any questions please contact us (info@techworks.org.uk) \nSponsorship Opportunities\nThere are several ways in which your company can support this event\, knowing that all the proceeds are reinvested in activities that support the Deep Tech community. \nPlatinum – Signals a major interest in the health of the sector and will position your company as a significant patron and benefactor.Drinks Reception – Getting the evening off to a great start with the Gala Dinner and Awards Ceremony Drinks ReceptionDinner Wine – Complementing a fine dining experience is a beautiful wine\, branded with your company logo (can you put SOLD across this as Synopsys are sponsoring)Beer Bar & Cocktail Bar (Bundle Deal on request) – Always draws a crowd placing you at the centre of the actionTables – Host a table for 10/12 guests to reward staff\, entertain clients or build new relationshipsAwards – Celebrate the achievements of the Industry’s most influential professionals and organisations at the TechWorks Awards 2019! \nDOWNLOAD THE SPONSORSHIP DOCUMENT
URL:https://iotsecurityfoundation.org/event/techworks-gala-dinner-awards-ceremony/
LOCATION:ROYAL GARDEN HOTEL\, 2-24 Kensington High St\, Kensington\, London\, West Lothian\, W8 4PT\, United Kingdom
CATEGORIES:Meetup
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2019/07/AD2019-WB3.jpg
ORGANIZER;CN="TechWorks":MAILTO:info@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20190924
DTEND;VALUE=DATE:20190926
DTSTAMP:20260429T124112
CREATED:20190129T141605Z
LAST-MODIFIED:20190619T094734Z
UID:19011-1569283200-1569455999@iotsecurityfoundation.org
SUMMARY:IoTSF Training Course : Foundations of  IoT Security / UK
DESCRIPTION:At the completion of this course\, attendees will know how to secure a connected IoT product from scratch. This course is run across 2 days. \nCourse attendees benefit from a fully inclusive package\, will receive a certificate of completion\, be registered on the IoTSF database and inducted into the Training Alumni platform. \nInterested parties are encouraged to book early as places are limited \nFind Out More
URL:https://iotsecurityfoundation.org/event/iotsf-training-course-foundations-of-iot-security/
LOCATION:Windsor\, United Kingdom
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2019/01/iot-training2.jpg
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
END:VCALENDAR