BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//IoT Security Foundation - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://iotsecurityfoundation.org
X-WR-CALDESC:Events for IoT Security Foundation
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20190331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20191027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20200329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20201025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20211031T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20220327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20221030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20231029T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20220408T140000
DTEND;TZID=Europe/London:20220408T150000
DTSTAMP:20260429T154045
CREATED:20220328T152529Z
LAST-MODIFIED:20220328T152529Z
UID:21495-1649426400-1649430000@iotsecurityfoundation.org
SUMMARY:IoTSF Member Event: Collaboration\, Cooperation & Compliance Webinar
DESCRIPTION:The EU is set to have the most well-defined IoT security and privacy regulations in the world\, and other regions will soon follow suit. Security solutions in IoT are nearly as prevalent as IoT solutions themselves\, yet this very abundance could be causing as many problems as it solves\, especially when it comes to compliance. As manufacturers\, solution owners\, and even system integrators address security with buzzwords and piece-meal solutions\, they increase future operating overhead and financial risk – with potentially devastating consequences. \nIn this panel we will discuss: \n\nThe role of collaboration in compliance with regulations.\nHow forming future-looking security communities provides reliable and effective security solutions through the lifetime of an IoT device or project.\nHow cooperation among vendors can be leveraged at every step in the value chain.\n\nFind out more and register here: https://www.zariot.com/resources/collaboration-cooperation-compliance
URL:https://iotsecurityfoundation.org/event/iotsf-member-event-collaboration-cooperation-compliance-webinar/
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2022/03/CCC-image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20220406T100000
DTEND;TZID=Europe/London:20220406T110000
DTSTAMP:20260429T154045
CREATED:20220323T090050Z
LAST-MODIFIED:20220321T115331Z
UID:21485-1649239200-1649242800@iotsecurityfoundation.org
SUMMARY:Addressing the Swedish IoT Security Challenge
DESCRIPTION:The modern world is increasingly digital\, connected and driven by software. Many more connected products and services are being introduced to our homes\, businesses\, institutions\, industry\, infrastructure and government activities. Innovation and productivity gains will be significant\, but with those gains there is also a cyberthreat which must be managed so that society and economies do not become open game for bad actors with bad intent. \nThe Internet of Things (IoT) is a term used to describe the next wave of the Internet and the proliferation of devices and services that are connected to it. IoT must be trustworthy and secure to be successful yet that goal is not a simple task and many corporations and governments world-wide are constantly playing catchup. What can be done to stay ahead of the emerging threats? What role does good practice\, standards and regulation have in keeping us safe? Who should care and what does this mean for Sweden? Where do we stand? \nThis webinar will discuss the global situation of IoT security\, provide a perspective from Sweden and suggest how many of the challenges can be addressed collaboratively – together we’re stronger. \nOur expert speakers for this free webinar are: \n\nChrister Åhlund\, Chaired Professor in Pervasive and Mobile Computing\, Luleå University\nGustav Söderlind\, Executive Officer\, Myndigheten för Samhällsskydd och Beredskap (MSB)\nHaydn Povey – CEO & Founder\, Secure Thingz Ltd\, and member of the Executive Steering Board at IoT Security Foundation\nJohn Moor\, Managing Director\, IoT Security Foundation\nModerator: Leif Häggmark\, Dataföreningen\n\nDo you see the challenge and the opportunity? Do you want to make sure the digital world is safe and secure? Come along and find out how on April 6th. \nRegister your place here: https://register.gotowebinar.com/register/8779121382489262093
URL:https://iotsecurityfoundation.org/event/addressing-the-swedish-iot-security-challenge/
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2022/03/Sweden-Consortium.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20220330T140000
DTEND;TZID=Europe/London:20220330T173000
DTSTAMP:20260429T154045
CREATED:20220316T130051Z
LAST-MODIFIED:20220316T152848Z
UID:21481-1648648800-1648661400@iotsecurityfoundation.org
SUMMARY:IoTSF Plenary
DESCRIPTION:Join us on 30th March to hear about IoTSF’s projects & industry guest speakers covering key developments in IoT Security\nAbout this event \nThis virtual plenary session follows the progress of the IoTSF Working Group Projects\, features industry guest speakers\, wider IoTSF operations and partnership updates as well as member networking rooms. \nThis event is for IoTSF members and is open to invited non-members. \nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members \nIf you are not a member and would like to attend\, or you have any queries please email Angela.tansey@techworks.org.uk \nRegister for FREE
URL:https://iotsecurityfoundation.org/event/iotsf-plenary-2/
LOCATION:Webinar
CATEGORIES:Plenary Session
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2022/03/plen31.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20211209T183000
DTEND;TZID=Europe/London:20211210T010000
DTSTAMP:20260429T154045
CREATED:20210519T122714Z
LAST-MODIFIED:20210721T085952Z
UID:21137-1639074600-1639098000@iotsecurityfoundation.org
SUMMARY:TechWorks Gala Dinner and Awards Ceremony
DESCRIPTION:The IoT Security Foundations Champion Award will be announced at the TechWorks Gala Dinner on Thursday 9th December 2021\, at the Leonardo Royal Hotel London St Paul’s. Click the link to find out more and apply (it’s free and a simple process) \nWe are grateful to the Award sponsor\, Paratus People to help us raise awareness of the importance of good cybersecurity hygiene across all applications of IoT. \nCombined\, the flagship ‘duo of events’ – the evening Gala Dinner and preceding Industry Summit\, brings together hundreds of executives & professionals from across the technology industry\, providing an excellent opportunity to network with industry leaders\, meet new clients or host existing clients and build brand awareness. \nAt the dinner\, winners of all the TechWorks Awards are announced – celebrating achievements & behaviours conducive to a healthy & vibrant industry. \nThe TechWorks awards are open to all\, with award categories to fit a wide range of technology sectors including semiconductors\, automotive and IoT. They are FREE to enter\, with a simple online process. \nIf you have any questions please email the TechWorks support team at info@techworks.org.uk \nFor the most up to date information on this event\, please visit the event and summit website \nEARLY BIRD TICKETSSPONSORWEBSITE
URL:https://iotsecurityfoundation.org/event/techworks-gala-dinner-and-awards-ceremony/
LOCATION:Leonardo Royal Hotel London St Paul’s\, 10 Godliman Street\, London\, EC4V 5AJ
CATEGORIES:Promoted Events
ATTACH;FMTTYPE=image/gif:https://iotsecurityfoundation.org/wp-content/uploads/2021/05/AD2021-1.gif
ORGANIZER;CN="TechWorks":MAILTO:angela.tansey@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20211209T120000
DTEND;TZID=Europe/London:20211209T163000
DTSTAMP:20260429T154045
CREATED:20210706T115620Z
LAST-MODIFIED:20210721T085825Z
UID:21202-1639051200-1639067400@iotsecurityfoundation.org
SUMMARY:TechWorks Industry Summit
DESCRIPTION:EARLY BIRD TICKETSWEBSITESPONSORThe UK economy and technology industry has undergone dramatic change as a result of Brexit and the Covid-19 Pandemic.\nThe aim of the summit is to share the success and achievements of TechWorks in the last 12 months showcasing how we have risen to the challenges to support our member during these difficult times and to look forward to the opportunities that the Deep Tech sector offers us and how we plan to leverage these by forming new collaborative networks to further the ‘Deep Tech’ industry in the UK.
URL:https://iotsecurityfoundation.org/event/techworks-industry-summit/
LOCATION:Leonardo Royal Hotel London St Paul’s\, 10 Godliman Street\, London\, EC4V 5AJ
CATEGORIES:TechWorks Event
ATTACH;FMTTYPE=image/gif:https://iotsecurityfoundation.org/wp-content/uploads/2021/05/IS2021.gif
ORGANIZER;CN="TechWorks":MAILTO:angela.tansey@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20211207T103000
DTEND;TZID=Europe/London:20211207T120000
DTSTAMP:20260429T154045
CREATED:20211125T115621Z
LAST-MODIFIED:20211125T115621Z
UID:21419-1638873000-1638878400@iotsecurityfoundation.org
SUMMARY:IoTSF Bucharest Launch Event
DESCRIPTION:Calling all passionate of Internet of Things in Romania to join our conversation on how to secure the current Industrial Revolution. Welcome to the inaugural event of IoTSF Bucharest Chapter. \nIoTSF Bucharest will build a community chapter dedicated on exploring the cybersecurity implications of IoT in the current Industrial Revolution. We will explore what is different in the mindset of a globally distributed network of edge processing nodes that control cyber-physical systems. \nThere are a lot of things to talk about\, but first\, we invite you to our launch event\, to introduce each other\, open a conversation and dare to push the change. \nClick here for more information and registration \nTuesday 7th December 12:30-14:00 CEST / 10:30-12:00 GMT
URL:https://iotsecurityfoundation.org/event/iotsf-bucharest-launch-event/
CATEGORIES:Meeting,Webinar,Workshop
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2021/11/bucharest-launch-event-graphic-5.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20211123T100000
DTEND;TZID=Europe/London:20211123T110000
DTSTAMP:20260429T154045
CREATED:20211109T184347Z
LAST-MODIFIED:20211109T184347Z
UID:21381-1637661600-1637665200@iotsecurityfoundation.org
SUMMARY:IoTSF Member Event: Meeting the Challenge of OTA for Embedded Linux Systems
DESCRIPTION:Webinar Overview:\nIn this webinar we look at the challenges of managing the process of updating software on embedded Linux systems remotely – often referred to as an Over The Air or OTA update. \nThe Webinar will cover: \n\nThe necessity and challenges of updating devices in the field\nSecurity issues when dealing with remote device updates\nThe importance of a robust implementation\nAdditional security measures required for OTA\nAdding an OTA mechanism to an embedded Linux build system\, like Yocto.\n\nToradex will demonstrate how this challenge can be solved in a real world example\, using the Torizon Platform on hardware featuring NXP i.MX Applications Processors. \n  \nCLICK HERE TO REGISTER \nAsia and Europe\nTuesday\, November 23\, 2021 \nTime: 10-11am (GMT) 11am-12pm (CET) 3.30-4.30pm (IST) \n\n\nAmericas\nTuesday\, November 23\, 2021 \nTime: 10-11am (PST) 11-12pm (MST) 12-1pm (CST) 1-2pm (EST)
URL:https://iotsecurityfoundation.org/event/iotsf-member-event-meeting-the-challenge-of-ota-for-embedded-linux-systems/
CATEGORIES:Training,Webinar
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2021/11/Untitled-design-3-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20211103T090000
DTEND;TZID=Europe/London:20211104T170000
DTSTAMP:20260429T154045
CREATED:20210608T095224Z
LAST-MODIFIED:20210609T143104Z
UID:21177-1635930000-1636045200@iotsecurityfoundation.org
SUMMARY:IoTSF Virtual Conference 2021
DESCRIPTION:The 7th Annual Internet of Things Security Foundation Conference is a two-day virtual event that takes place Wednesday 3rd and Thursday 4th November 2021. The Annual IoTSF Conference has built a loyal global following from the IoT stakeholder communities and is renowned for delivering high quality conference programmes.\n\nThe era of IoT describes the world as it transforms to be ever-digital and increasingly connected. Along with the power of digital comes the reciprocal cyber threat\, and we continue to witness an increasing number of attacks enabled by products that lack protection against well-known exploits\, have been badly configured or suffer from poor maintenance. This causes businesses to be hesitant\, concerns governments\, increases the likelihood of regulation and ultimately frustrates markets.\n\nVendors must build secure\, purchasers must buy secure\, and users must be secure: to be without security in a digital world is not an option. Society and industry need to fight back as no one should design\, buy\, or use a connected product\, service or system that lacks fit-for-purpose security. Yet there are no ‘one-size fits all’ security solutions – they are dependent on the application. Most of the attacks we see today can be effectively defended against\, many by relatively simple measures. \nOrganisations need to be informed\, the solutions presented\, choices made\, and those choices need to be in keeping with their business context. Welcome to the 2021 IoT Security Foundation Virtual Conference where we aim to illuminate and educate delegates with an update on the threat landscape\, standards & regulation\, best practice\, next-practice and the latest developments in IoT cyber security. The IoTSF Conference features talks by leading cyber security experts and track sessions for executives\, developers\, engineers\, managers and security professionals.
URL:https://iotsecurityfoundation.org/event/iotsf-virtual-conference-2021/
LOCATION:Virtual Event
CATEGORIES:Conference
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2021/06/iotsfvc-bnr.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20211019T170000
DTEND;TZID=Europe/London:20211019T180000
DTSTAMP:20260429T154045
CREATED:20211013T135647Z
LAST-MODIFIED:20211013T135647Z
UID:21321-1634662800-1634666400@iotsecurityfoundation.org
SUMMARY:IoTSF Member Event: Defending the Cloud: PCIe and CXL Data Security for High-Performance Computing
DESCRIPTION:Cloud computing is going through a significant overhaul and continues to grow globally with increasing presence of hyperscale cloud providers for big data\, high-performance computing (HPC)\, and analytics. In-house data centers are increasingly going off-premise\, resulting in the co-location of data centers that manage and store data for companies and application developers to improve scalability and reduce IT costs. This huge\, and growing\, amount of data with confidential and critical information must be protected. In addition\, new laws and regulations to comply with data privacy rules\, along with standards updates for PCI Express (PCIe) and CXL for Integrity and Data Encryption (IDE)\, put more pressure on solution providers to secure their systems and data starting with the SoC. \nIn this presentation\, attendees will: \n\nLearn about today’s known threats for cloud and edge computing systems\nUnderstand new developments in PCIe and CXL security solutions\, including IDEs\nWalk through a cloud computing use case that addresses the applications’ security\, performance\, and latency requirements with DesignWare® Security IP\n\n  \nBy the end of the presentation\, attendees will understand the importance of securing data moving through PCIe and CXL interfaces\, market point of view\, and get a reference example for how security can be addressed with DesignWare IP. \n  \nFind out more & Register HERE
URL:https://iotsecurityfoundation.org/event/iotsf-member-event-defending-the-cloud-pcie-and-cxl-data-security-for-high-performance-computing/
CATEGORIES:Promoted Events,Webinar
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2021/10/synopsys-webinar.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210721T100000
DTEND;TZID=Europe/London:20210721T150000
DTSTAMP:20260429T154045
CREATED:20210519T114907Z
LAST-MODIFIED:20210708T130808Z
UID:21126-1626861600-1626879600@iotsecurityfoundation.org
SUMMARY:AESIN Virtual Security Conference
DESCRIPTION:Register\n\n\nThe Automotive Electronic Systems Innovation Network is a sibling community to the IoT Security Foundation. Each year it hosts a dedicated cybersecurity conference focussed on the evolving automotive domain. IoTSF members are welcome to join the proceedings – registration is free:\n\n\n\n\n\nAt the AESIN Security Conferences in 2019 and 2020 Industry and Academia combined to set out the Cyber resilience challenge facing the automotive industry as we transition to greater autonomy\, ever increasing levels of connectivity and vehicle system complexity. To outline an approach and to ask for your help in understanding how to operationalise Cyber Resilience\, what research could be repurposed to kick start a solution\, and how to meet and where necessary influence our regulatory obligations. \n\n\nNow in 2021 we’re back to explain and debate what\, with your help we\, we have done to refine the approach and to demonstrate its technical and economic feasibility at scale. \nHosted by Peter Davies\, Director Security Concepts\, this Virtual Conference will provide insight into the latest thinking and experiences from leading cross-industry players\, considering topics such as skills requirements\, digital trust\, secure architecture\, cryptographic keys/authentication\, robustness – resilient application interfaces and remote updates/access/firmware OTA (over-the-air). \nIn three sessions we will cover: \n\nOperationalising Cyber Resilience engineering\nCyber Resilience legal and insurance\n3rd party access\, data and software implants\, developing the EcoSystem\n\n\n\n\n\nDr Stephen Lambert\, AESIN Chairman \nDr Stephen Lambert received his Doctorate from the University of Warwick by looking at the applicability of hybrid and electric drivetrains in motorsport. Following this he worked at Lotus Engineering\, developing hybrid and electric demonstrator vehicles.. \nREAD MORE×Dr Stephen Lambert\nAESIN Chairman \nDr Stephen Lambert received his Doctorate from the University of Warwick by looking at the applicability of hybrid and electric drivetrains in motorsport. Following this he worked at Lotus Engineering\, developing hybrid and electric demonstrator vehicles for a number of OEMs. \nThrough this role\, he found himself working closely with battery manufacturers as a key partner for these projects. He has since worked in various roles around developing battery technology in areas such as Formula 1 and high performance road cars. He is now responsible for the electrification strategy for automotive customers with McLaren Applied technologies\, where he is helping deliver advantage by empowering customer to introduce and protect new vehicle concepts and technologies and to drive differentiation in the market \nCloseDavid Skipp\nDirector\, Ford Motor Company\n \nDavid Skipp is Director\, Autonomous Vehicle & Mobility Strategy\, Ford Mobility at Ford Motor Company. In this role since May 2020\, David leads European strategy development for Autonomous Vehicles (AV) and Mobility Solutions. David also works closely with a number of industry bodies\, and… \nREAD MORE×David Skipp\nDirector\, Ford Motor Company \n \nDavid Skipp is Director\, Autonomous Vehicle & Mobility Strategy\, Ford Mobility at Ford Motor Company. In this role since May 2020\, David leads European strategy development for Autonomous Vehicles (AV) and Mobility Solutions. David also works closely with a number of industry bodies\, and is currently Chair of the Intelligent Connected Autonomous Mobility (ICAM) working group of UK Automotive Council. \nIn his previous role\, David was Director\, Partnerships & Innovation\, Ford Mobility\, responsible for working with external partners to build a portfolio of opportunities to grow Mobility business solutions. \nSince graduating from Brunel University with a multi-discipline engineering degree\, David has held a number of Powertrain Development\, Vehicle Development\, Research and Strategic Planning roles in over 30 years at Ford Motor Company. \nClosePeter Davies\, Technical Director\, Thales \nI love what I do\, approach everything with energy and enthusiasm and can always see an angle. As a Technical Director of Thales in the UK I have been their leading expert on Cryptography in the UK responsible for providing cryptography and information security direction and expertise… \nREAD MORE×Peter Davies\nTechnical Director\, Thales \nI love what I do\, approach everything with energy and enthusiasm and can always see an angle. As a Technical Director of Thales in the UK I have been their leading expert on Cryptography in the UK responsible for providing cryptography and information security direction and expertiseon a variety of products and projects. Previous work includes the development and certification of flexible and interoperable commercial security solutions that are also widely used by governments; these solutions are available worldwide and support the security of both communications and infomatics in an international\, multi grade environment. My specialist knowledge is at the core of the cyber defence and forensics activities that I undertake combatting existential treats against business. I can\, and have\, interacted on security and products at any level from Prime Minister\, through Board to deep technical including Agencies\, Certification Labs and partners developing and sustaining business opportunities worldwide. I have generated patents in the area of digital DNA and my research covers aspects of technical security as well as aspects of super-identities and their role in combatting human based cyber-attacks. I have lead EU security research contract and have acted as a n expert on others. As well as contributing to standards I am a frequent speaker at international conferences and deliver lectures to postgraduate information and cyber security programmes in the UK and worldwide. \nClose
URL:https://iotsecurityfoundation.org/event/aesin-virtual-security-conference/
LOCATION:Virtual Event
CATEGORIES:Virtual Conference,Webinar
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2021/05/AESIN-Security-Conference-2.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210705
DTEND;VALUE=DATE:20210711
DTSTAMP:20260429T154045
CREATED:20210602T102800Z
LAST-MODIFIED:20210708T130356Z
UID:21167-1625443200-1625961599@iotsecurityfoundation.org
SUMMARY:Promoted Event: Hardwear.io Security Trainings & Conference USA 2021
DESCRIPTION:About this event\n\n\nHardwear.io Security Conference and Training is a platform for hardware and security community where researchers showcase and discuss their innovative research on attacking and defending hardware. \nThe third hardwear.io – USA edition will include practical 4-Days online trainings and 2 days conference includes technical Talks\, CTF & Fixup networking event. \nFor more information\, visit: https://hardwear.io/usa-2021 \n\nTraining Date: 5-8 July 2021 | Time: 9:00am to 2:00pm PDT\nConference Date: 9-10 July 2021 | Time: 9:00am to 1:00pm PDT\n\nTraining List \n\nAssessing and Exploiting PLCs by Justin\nProtecting the CAN bus by Ken\nIC Reverse Engineering Code Dump by Olivier\nOptimizing crypto on embedded microcontrollers by Peter Schwabe\nReverse Engineering Firmware with Ghidra by Eric\nBootPwn: Breaking Secure Boot by Experience by Niek & Cristofaros\nEMFI and Voltage Fault injection attacks with Raiden by Grzegorz & Adam\n\nKeynote Speakers: \n\nProf. Yongdae Kim\, Department of Electrical Engineering at KAIST\nColin O’Flynn\, C.T.O. of NewAE Technology\n\nConference Talks:  \n\nJiska Classen: Interacting with *OS hardware from user space\nAndrew Zonenberg: Boost your hardware reversing with glscopeclient\nTa-Lun Yen: Enabling dynamic analysis of Legacy Embedded Systems in full emulated environment\nJoshua Beaker: Proving the efficacy of software countermeasures for fault injection\n\nEXCLUSIVE IoTSF DISCOUNT: use COMMUNITY5 for 5% discount on training \nFor more information\, visit: https://hardwear.io/usa-2021
URL:https://iotsecurityfoundation.org/event/promoted-event-hardwear-io-security-trainings-conference-usa-2021/
CATEGORIES:Conference,Promoted Events,Training,Workshop
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2021/06/HW-USA-2021_final__General-docial-media-1.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210616T140000
DTEND;TZID=Europe/London:20210616T163000
DTSTAMP:20260429T154045
CREATED:20210519T111853Z
LAST-MODIFIED:20210526T152215Z
UID:21122-1623852000-1623861000@iotsecurityfoundation.org
SUMMARY:IoTSF Plenary 30
DESCRIPTION:This virtual plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides\, Smart Buildings & Supply Chain Integrity groups. \nThis plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers from NIST and Beau Woods from I am the Calvary. \n\nThis event is for IoTSF members and is open to invited non-members.\nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members\nFind out more about IoTSF here: https://iotsecurityfoundation.org\nIf you are not a member and would like to attend\, or you have any queries please email Angela.tansey@techworks.org.uk\n\nRegister for FreeBEAU WOODS\n I am the Cavalry \n×Beau Woods\nI am the Cavalry\nBeau Woods is a Senior Advisor with CISA\, Cyber Safety Innovation Fellow with the Atlantic Council\, a leader with the I Am The Cavalry grassroots initiative\, Founder/CEO of Stratigos Security\, and sits on the board of several non-profits. \nHis work bridges the gap between the security research and public policy communities\, to ensure connected technology that can impact life and safety is worthy of our trust. He formerly served as Entrepreneur in Residence with the US FDA\, and Managing Principal Consultant at Dell SecureWorks. \nOver the past several years in this capacity\, he has consulted with the energy\, healthcare\, automotive\, aviation\, rail\, and IoT industries\, as well as cyber security researchers\, US and international policy makers\, and the White House. Beau is a published author\, frequent public speaker\, often quoted in media\, and is often engaged for public or private speaking venues. \nRead Bio
URL:https://iotsecurityfoundation.org/event/iotsf-plenary-30/
LOCATION:Webinar
CATEGORIES:Plenary Session
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2021/05/iotsfplen30.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210601
DTEND;VALUE=DATE:20210603
DTSTAMP:20260429T154045
CREATED:20210514T091212Z
LAST-MODIFIED:20210514T091212Z
UID:21116-1622505600-1622678399@iotsecurityfoundation.org
SUMMARY:ManuSec: Cyber Security for Manufacturing Summit
DESCRIPTION:ManuSec: Cyber Security for Manufacturing Summit launches online on 1st – 2nd June. \nThis is an opportunity for manufacturing security leaders across Europe to come together and join forces with 100’s of experts across the region.\nThroughout the 2-day program\, attendees will learn how to build resilience\, mitigate risks and develop a cyber security strategy to combat new and ongoing threats.\nAttendees will also benefit from access to ManuSec Europe’s co-hosted Data Manufacturing Summit – Earning up to 24 CPE credits and gaining expert knowledge and\ninsights from across both streams!\nAgenda topics include: \n\nMaking cyber security a priority in your digital transformation journey\nThe impact of cyber attacks on industrial environments\nReducing security risks posed by the human factor\nCyber security for SCADA and plant control systems\nAchieving business resilience through converged IT-OT cyber security strategies\nAnd\, more!\n\nTake a look at the detailed agenda and secure your free pass* using the code “IOT-SEC” online here\n*Offer is valid for end-users only. Vendors and consultants are not eligible but can redeem but can redeem a 15% discount with the code IOT-15
URL:https://iotsecurityfoundation.org/event/manusec-cyber-security-for-manufacturing-summit/
CATEGORIES:Conference,Summit
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2021/05/ManuSec-June-21.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210324T150000
DTEND;TZID=Europe/London:20210324T154500
DTSTAMP:20260429T154045
CREATED:20210216T120630Z
LAST-MODIFIED:20210216T123712Z
UID:21051-1616598000-1616600700@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Secure Edge Computing with Amazon Web Services IoT and MULTOS
DESCRIPTION:About This Webinar\nJoin Amazon Web Services and MULTOS to learn about the benefits of using AWS IoT Greengrass for managing edge computing tasks and how the MULTOS Trust Core can be used as cryptographic hardware root of trust for securing devices\, communications and data. \nOur speakers will introduce the AWS IoT ecosystem\, explaining some key concepts\, discuss security and present a live demo of Greengrass in action. \nAgenda\nWelcome & Introductions\nWhat is AWS IoT Greengrass?\nHow MULTOS supports Greengrass\nThe Demo\nQ&A \nWhen: Wednesday\, March 24\, 2021 · 03:00:00 PM · London\nDuration: 45 minutes\nLanguage: English\nWho can attend? Everyone\nDial-in available? (listen only): Yes\nDial-in Number: Please register for this Webinar to view the dial-in info. \nClick Here for More Information & Registration
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-secure-edge-computing-with-amazon-web-services-iot-and-multos/
LOCATION:Virtual Event
CATEGORIES:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210310T140000
DTEND;TZID=Europe/London:20210310T163000
DTSTAMP:20260429T154045
CREATED:20210212T154806Z
LAST-MODIFIED:20210212T154945Z
UID:21045-1615384800-1615393800@iotsecurityfoundation.org
SUMMARY:IoTSF Virtual Plenary
DESCRIPTION:Join us on 10th March to hear about IoTSF’s projects & industry guest speakers covering key developments in IoT Security\nREGISTER HERE \nAbout this Event \nYou are invited to join us on Wednesday 10th March for the 29th IoT Security Foundation Plenary Session. \nThis virtual plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides\, Smart Buildings & Supply Chain Integrity groups. This plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers. This event is for IoTSF members and is open to invited non-members. \nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members \nFind out more about IoTSF here: https://iotsecurityfoundation.org \nIf you are not a member and would like to attend\, or you have any queries please email IoTSF Community Manager\, Jenny Devoy.
URL:https://iotsecurityfoundation.org/event/iotsf-virtual-plenary/
LOCATION:Virtual Event
CATEGORIES:Plenary Session
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2021/02/iotp2.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210225T100000
DTEND;TZID=Europe/London:20210225T113000
DTSTAMP:20260429T154045
CREATED:20210216T123246Z
LAST-MODIFIED:20210216T123840Z
UID:21052-1614247200-1614252600@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: How Far Can We Trust The Internet of Things?
DESCRIPTION:Are currently deployed IoT solutions futureproof? Will we ever be able to make them truly secure? And what are the implications for smart cities and other connected applications? ​ \nLed by the SYNERGIA consortium with an opening talk by John Moor of the IoT Security Foundation\, this event looks to bring together businesses to discuss how we can address the potential security risks that leave current IoT devices vulnerable as the world becomes increasingly more connected. \nSYNERGIA is a consortium dedicated to the development of a secure-by-design IoT platform for large scale networks of low-power\, resource-constrained devices.​ ​ \nClick Here to find out more and register
URL:https://iotsecurityfoundation.org/event/how-far-can-we-trust-the-internet-of-things/
LOCATION:Virtual Event
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20210127T090000
DTEND;TZID=Europe/London:20210130T140000
DTSTAMP:20260429T154045
CREATED:20201214T154147Z
LAST-MODIFIED:20210112T105814Z
UID:20998-1611738000-1612015200@iotsecurityfoundation.org
SUMMARY:Hardwear.io Security Training Berlin 2021
DESCRIPTION:Are you interested in reverse engineering\, side channel analysis\, fault injection attacks\, whitebox crypto\, or just hardware security in general? Hardwear.io offers some amazing hands-on live training in January 2021 – all online! \nJoin one of the upcoming Hardware Security Trainings: \n• Assessing and Exploiting Control Systems & IIoT by Justin Searle\n• Breaking Practical White-Box Crypto by Guillaume Vinet\n• EMFI and Voltage Fault injection attacks with Raiden by Adam Laurie & Grzegorz Wypych\n• Advanced Microcontrollers Firmware Exploitation by Alexander Bolshev and Tao Sauvage \nCLICK HERE TO SECURE YOUR TICKET\nVisit the website – https://hardwear.io/berlin-2021/online-training
URL:https://iotsecurityfoundation.org/event/hardwear-io-security-training-berlin-2021/
LOCATION:Webinar
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/12/BERLIN_Square.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201201
DTEND;VALUE=DATE:20201205
DTSTAMP:20260429T154045
CREATED:20200601T074706Z
LAST-MODIFIED:20200601T075155Z
UID:20725-1606780800-1607126399@iotsecurityfoundation.org
SUMMARY:IoTSF Virtual Conference 2020
DESCRIPTION:The 6th Annual Internet of Things Security Foundation Conference is a four-day virtual event that takes place between Tuesday 1st and Friday 4th December 2020. The Annual IoTSF Conference has built a loyal global following from the IoT stakeholder communities and is renowned for delivering high quality conference programmes. \nThe era of IoT describes the world as it transforms to be ever-digital and increasingly connected. Along with the power of digital comes the reciprocal cyber threat\, and we continue to witness an increasing number of attacks enabled by products that lack protection against well-known exploits\, have been badly configured or suffer from poor maintenance. This causes businesses to be hesitant\, concerns governments\, increases the likelihood of regulation and ultimately frustrates markets. \n\nVendors must build secure\, purchasers must buy secure\, and users must be secure: to be without security in a digital world is not an option. Society and industry need to fight back as no one should design\, buy\, or use a connected product\, service or system that lacks fit-for-purpose security. Yet there are no ‘one-size fits all’ security solutions – they are dependent on the application. Most of the attacks we see today can be effectively defended against\, many by relatively simple measures. Organisations need to be informed\, the solutions presented\, choices made\, and those choices need to be in keeping with their business context. \nWelcome to the 2020 IoT Security Foundation Virtual Conference where we aim to illuminate and educate delegates with an update on the threat landscape\, standards & regulation\, best practice\, next-practice and the latest developments in IoT cyber security. The IoTSF Conference features talks by leading cyber security experts\, training workshops and track sessions for executives\, developers\, engineers\, managers and security professionals. \nThe conference will have a senior and expert level line up of speakers which are announced as part of the promotional activity and can be found on the dedicated conference website: https://iotsfconference.com \n \nAs the World’s Longest Running IoT Security Conference\, this event attracts a wide range of decision makers\, including CEO’s\, CSO’s\, CTO’s\, Chief Security Strategists\, Directors\, Engineers\, Software and Hardware developers\, Development Managers\, Technical Directors\, Security Experts\, Academics\, Government and Press. \nSecure Your Place
URL:https://iotsecurityfoundation.org/event/iotsf-virtual-conference-2020/
CATEGORIES:Conference
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/06/Date-Announced-Square-2020-IoTSF-Conference-scaled.jpg
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201102
DTEND;VALUE=DATE:20201103
DTSTAMP:20260429T154045
CREATED:20200821T100604Z
LAST-MODIFIED:20200821T100604Z
UID:20888-1604275200-1604361599@iotsecurityfoundation.org
SUMMARY:Webinar : Manage Vulnerability Reports / November
DESCRIPTION:Register NowWithout mechanisms to report\, manage and resolve vulnerabilities\, the security of consumer IoT products will diminish over time – and the likelihood of attack or abuse will increase. New standards and regulatory change mean organisations need to prepare to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. \nWebinars will run for appox. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n1st September\n13:00\n06:00\n01:00\n05:00\n\n\n5th October\n18:00\n11:00\n06:00\n10:00\n\n\n2nd November\n02:00*\n18:00\n13:00\n18:00\n\n\n\n\n* 3rd November
URL:https://iotsecurityfoundation.org/event/webinar-manage-vulnerability-reports-november/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201030
DTEND;VALUE=DATE:20201031
DTSTAMP:20260429T154045
CREATED:20200821T103206Z
LAST-MODIFIED:20200821T103206Z
UID:20892-1604016000-1604102399@iotsecurityfoundation.org
SUMMARY:Webinar : Keeping Software Updated / 30th October
DESCRIPTION:Register NowSecurity software updates are vital because every IoT product is susceptible to vulnerabilities. If updates cannot be provisioned\, the security of the product will diminish over time. New standards and upcoming regulatory change mean organisations need to provide transparency on how long their products are supported with security software updates or by other suitable means. \nWebinars run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n28th August\n13:00\n06:00\n01:00\n05:00\n\n\n1st October\n18:00\n11:00\n06:00\n10:00\n\n\n30th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 31st October
URL:https://iotsecurityfoundation.org/event/webinar-keeping-software-updated-30th-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201027
DTEND;VALUE=DATE:20201028
DTSTAMP:20260429T154045
CREATED:20200821T095102Z
LAST-MODIFIED:20200821T103928Z
UID:20885-1603756800-1603843199@iotsecurityfoundation.org
SUMMARY:Webinar : Eliminate Universal Default Passwords / October
DESCRIPTION:Register NowUniversal passwords weaken IoT security: if one device is compromised\, all devices with that password are also compromised. New standards and upcoming regulatory change mean organisations need to assess how their IoT products use passwords and ensure universal default passwords are eliminated. \nWebinars will run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n26th August\n13:00\n06:00\n01:00\n05:00\n\n\n29th September\n18:00\n11:00\n06:00\n10:00\n\n\n27th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 28th October
URL:https://iotsecurityfoundation.org/event/webinar-eliminate-universal-default-passwords-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201006
DTEND;VALUE=DATE:20201010
DTSTAMP:20260429T154045
CREATED:20200827T111235Z
LAST-MODIFIED:20200904T110026Z
UID:20901-1601960400-1602219599@iotsecurityfoundation.org
SUMMARY:Informa IoT Security Summit Virtual Conference
DESCRIPTION:With the impact of COVID-19\, cybersecurity risks have been heightened in the sudden turn of unexpected events. IoT Security Summit Virtual will help you ensure your security is robust against disruption\, measuring your IoT progress with the right security framework. \nLearn from security experts on how to keep your community secure by improving the safety and reliability of your security processes. Our dedicated content will cover how you can better protect your data and devices with emerging IoT technologies that will revolutionize security across data\, devices\, edge and network security. It’s important now\, more than ever\, to ensure your organization can react effectively to security threats while adapting to the new normal. \nFor more information visit: IoT Security Summint Virtual Conference
URL:https://iotsecurityfoundation.org/event/informa-iot-security-summit-virtual-conference/
CATEGORIES:Conference
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2020/08/IoT-Security-Summit_logo_RGB.png
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201005
DTEND;VALUE=DATE:20201006
DTSTAMP:20260429T154045
CREATED:20200821T100216Z
LAST-MODIFIED:20200821T103711Z
UID:20887-1601856000-1601942399@iotsecurityfoundation.org
SUMMARY:Webinar : Manage Vulnerability Reports / October
DESCRIPTION:Register NowWithout mechanisms to report\, manage and resolve vulnerabilities\, the security of consumer IoT products will diminish over time – and the likelihood of attack or abuse will increase. New standards and regulatory change mean organisations need to prepare to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. \nWebinars will run for appox. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n1st September\n13:00\n06:00\n01:00\n05:00\n\n\n5th October\n18:00\n11:00\n06:00\n10:00\n\n\n2nd November\n02:00*\n18:00\n13:00\n18:00\n\n\n\n\n* 3rd November
URL:https://iotsecurityfoundation.org/event/webinar-manage-vulnerability-reports-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201001
DTEND;VALUE=DATE:20201002
DTSTAMP:20260429T154045
CREATED:20200821T102911Z
LAST-MODIFIED:20200821T102936Z
UID:20891-1601510400-1601596799@iotsecurityfoundation.org
SUMMARY:Webinar : Keeping Software Updated / 1st October
DESCRIPTION:Register NowSecurity software updates are vital because every IoT product is susceptible to vulnerabilities. If updates cannot be provisioned\, the security of the product will diminish over time. New standards and upcoming regulatory change mean organisations need to provide transparency on how long their products are supported with security software updates or by other suitable means. \nWebinars run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n28th August\n13:00\n06:00\n01:00\n05:00\n\n\n1st October\n18:00\n11:00\n06:00\n10:00\n\n\n30th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 31st October
URL:https://iotsecurityfoundation.org/event/webinar-keeping-software-updated-october/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200929
DTEND;VALUE=DATE:20200930
DTSTAMP:20260429T154045
CREATED:20200821T094910Z
LAST-MODIFIED:20200821T103836Z
UID:20884-1601337600-1601423999@iotsecurityfoundation.org
SUMMARY:Webinar : Eliminate Universal Default Passwords / September
DESCRIPTION:Register NowUniversal passwords weaken IoT security: if one device is compromised\, all devices with that password are also compromised. New standards and upcoming regulatory change mean organisations need to assess how their IoT products use passwords and ensure universal default passwords are eliminated. \nWebinars will run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n26th August\n13:00\n06:00\n01:00\n05:00\n\n\n29th September\n18:00\n11:00\n06:00\n10:00\n\n\n27th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 28th October
URL:https://iotsecurityfoundation.org/event/webinar-eliminate-universal-default-passwords-september/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200927T080000
DTEND;TZID=Europe/London:20201002T200000
DTSTAMP:20260429T154045
CREATED:20200917T081844Z
LAST-MODIFIED:20200917T081844Z
UID:20913-1601193600-1601668800@iotsecurityfoundation.org
SUMMARY:Hardwear.io Security Trainings and Conference Netherlands 2020
DESCRIPTION:Are you someone who is into embedded and hardware security? There are some amazing live hands-on trainings and conference talks offered by Hardwear.io this year – all online! \nHardwear.io Security Conference & Trainings is a platform for the hardware and security community\, where researchers showcase and discuss their innovative research on attacking and defending hardware. \nTraining: 27th to 30th September; 9.00 AM – 2.00 PM CEST \nConference: 1st to 2nd October; 6.00 PM – 9.00 PM CEST \nRegistration: https://hardwear.io/netherlands-2020/online-training.php \nConference Talks:  \n\nTaming Hydrofluoric Acid to Extract Firmware by John McMaster\nJackHammer: Rowhammer and Cache Attacks on Heterogeneous FPGA-CPU Platforms by Daniel Moghimi\, Thore Tiemann\, Zane Weissman\nPractical reverse engineering of ECC-based authentication device with zero knowledge by Dr. Sergei Skorobogatov\nReversing & Emulating Samsung’s Shannon Baseband by Grant Hernandez & Marius Muench\nCANanalyze: a python framework for automotive protocols by Erwan Le Disez & Etienne Charron\nToasting MCUs: A Firmware Extraction by EMFI by Karim M. Abdellatif & Olivier Hériveaux\nThings not to do when using an IOMMU by Ilja van Sprundel & Joseph Tartaro\nBadVibes – Sound Recovery using Bulb’s Vibrations by Boris Zadov & Yaron Pirutin\nLooking at Silicon by Ken Shirriff\nUnder the hood of a CPU: Reverse Engineering the P6 microcode by Peter Bosch\n\nHardware Security Trainings: \n\nConnected car hacking by Guillaume Heilles & Maxime Rossi Bellom\nHunting UEFI firmware implants by Alex Matrosov(postponed to 2-5 Nov)\nTEEPwn: breaking TEEs by experience by Cristofaro Mune\nRF hacking with software-defined radio by Sébastien Dudek\nBootPwn – pwning secure boot by experience by Niek Timmers\nMachine learning and SCA: an advanced tutorial by Stjepan Picek\nAdvanced microcontrollers firmware exploitation by Alexander Bolshev\nEmbedded physical attacks 101 by Lejla Batina\, Kostas Papagiannopoulos\, Leo Weissbart & Niels Samwel
URL:https://iotsecurityfoundation.org/event/hardwear-io-security-trainings-and-conference-netherlands-2020/
CATEGORIES:Conference,Training
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/09/HW_Conference_Registration.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200922T150000
DTEND;TZID=Europe/London:20200922T173000
DTSTAMP:20260429T154045
CREATED:20200514T155626Z
LAST-MODIFIED:20200514T155626Z
UID:20701-1600786800-1600795800@iotsecurityfoundation.org
SUMMARY:The 28th IoT Security Foundation Plenary
DESCRIPTION:You are invited to join us on Tuesday 22nd September 2020\, 15:00 – 17:30\, for the 28th IoT Security Foundation Plenary Session. \nThis virtual plenary session follows the progress of the IoTSF Working Group Projects which include the IoTSF Compliance Framework\, Secure Design Best Practice Guides\, Smart Buildings & Supply Chain Integrity groups. This plenary also features wider IoTSF operations and partnership updates as well as industry guest speakers. This event is for IoTSF members and is open to invited non-members. \nNot sure if your company is a member? Check here: https://iotsecurityfoundation.org/our-members \nFind out more about IoTSF here: https://iotsecurityfoundation.org \nIf you are not a member and would like to attend\, or you have any queries please email IoTSF Community Manager\, Jenny Devoy  \nSECURE YOUR PLACE
URL:https://iotsecurityfoundation.org/event/the-28th-iot-security-foundation-plenary/
LOCATION:Virtual Event
CATEGORIES:Plenary Session
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@techworks.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20200916T190000
DTEND;TZID=Europe/London:20200916T210000
DTSTAMP:20260429T154045
CREATED:20200904T105154Z
LAST-MODIFIED:20200904T105935Z
UID:20906-1600282800-1600290000@iotsecurityfoundation.org
SUMMARY:IoT Thames Valley Virtual Meetup
DESCRIPTION:A detailed look at IoT attack vectors in the home\nNick Allott\, CEO of nquiringminds will be giving a talk: “A detailed look at IoT attack vectors in the home” at the IoT Thames Valley Virtual Meetup on 16th September. \nNick’s presentation will be based upon work undertaken with the University of Oxford as part of the Innovate UK supported ManySecured Collaborative Intelligent Gateway project. \nYou can REGISTER (free to attend) for the Virtual Meetup and Nick’s talk here: \nhttps://zoom.us/meeting/register/tJMtc-uoqT4vG9OgL0WRlgQEarO-qEoCQQ0q \nPrecis of Nick’s talk:\nDomestic IoT architectures are deceptively complex. NQM and University of Oxford have been working on a detailed architectural analysis of IoT deployment architectures. The emergent taxonomy has proven useful in better understanding the nature of the threat and the mitigations (and innovation) needed to better protect ourselves. \nThis talk with go through this architecture in detail\, highlighting some of the practical steps we can talk to improve the IoT security state of the art.
URL:https://iotsecurityfoundation.org/event/iot-thames-valley-virtual-meetup/
LOCATION:Virtual Event
CATEGORIES:Meetup
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2020/09/IoT-TV-logo.jpg
ORGANIZER;CN="Duncan Purves":MAILTO:duncan@connect2.io
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200901
DTEND;VALUE=DATE:20200902
DTSTAMP:20260429T154045
CREATED:20200821T095908Z
LAST-MODIFIED:20200821T104105Z
UID:20886-1598918400-1599004799@iotsecurityfoundation.org
SUMMARY:Webinar : Manage Vulnerability Reports / September
DESCRIPTION:Register NowWithout mechanisms to report\, manage and resolve vulnerabilities\, the security of consumer IoT products will diminish over time – and the likelihood of attack or abuse will increase. New standards and regulatory change mean organisations need to prepare to receive and manage vulnerability reports and follow coordinated vulnerability disclosure best practices. \nWebinars will run for appox. 2 hours. \n\n\n\n\n \nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n1st September\n13:00\n06:00\n01:00\n05:00\n\n\n5th October\n18:00\n11:00\n06:00\n10:00\n\n\n2nd November\n02:00*\n18:00\n13:00\n18:00\n\n\n\n\n* 3rd November
URL:https://iotsecurityfoundation.org/event/webinar-manage-vulnerability-reports-september/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20200828
DTEND;VALUE=DATE:20200829
DTSTAMP:20260429T154045
CREATED:20200821T102407Z
LAST-MODIFIED:20200821T102617Z
UID:20889-1598572800-1598659199@iotsecurityfoundation.org
SUMMARY:Webinar : Keeping Software Updated / August
DESCRIPTION:Register NowSecurity software updates are vital because every IoT product is susceptible to vulnerabilities. If updates cannot be provisioned\, the security of the product will diminish over time. New standards and upcoming regulatory change mean organisations need to provide transparency on how long their products are supported with security software updates or by other suitable means. \nWebinars run for approx. 2 hours. \n\n\n\n\n\nHKT\nBST/GMT\nEDT/EST\nUTC\n\n\n\n\n28th August\n13:00\n06:00\n01:00\n05:00\n\n\n1st October\n18:00\n11:00\n06:00\n10:00\n\n\n30th October\n01:00*\n17:00\n13:00\n17:00\n\n\n\n\n* 31st October
URL:https://iotsecurityfoundation.org/event/webinar-keeping-software-updated-august/
LOCATION:Webinar
CATEGORIES:Webinar
ORGANIZER;CN="John Moor":MAILTO:john.moor@iotsecurityfoundation.org
END:VEVENT
END:VCALENDAR