BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//IoT Security Foundation - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://iotsecurityfoundation.org
X-WR-CALDESC:Events for IoT Security Foundation
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20150329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20151025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20160327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20161030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20170326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20171029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20180325T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20181028T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170516
DTEND;VALUE=DATE:20170519
DTSTAMP:20260503T202113
CREATED:20170131T115719Z
LAST-MODIFIED:20190619T094748Z
UID:16406-1494892800-1495151999@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Saudi Smart Cities Conference 2017
DESCRIPTION:Municipalities all over the world are facing increasing pressures to grow\, innovate and transform infrastructure\, attract more investment\, become more sustainable and improve the quality of life for all. ICT is used to enhance quality\, performance and interactivity of urban services\, to reduce costs and resource consumption and to improve contact between citizens and government.With the increasing urbanization putting more pressure on governments to innovate\, the smart city is a hugely attractive principle for city officials\, citizens and private sector and education is needed now! \nNispana is proud to announce its first Smart cities Summit\, scheduled to take place on the (16th\, 17th & 18th may 2017) in Riyadh\, Kingdom of Saudi Arabia. At the summit we’ll explore how to create successful collaboration between public & private sectors\, the monetization opportunities that will help to boost infrastructure\, increase investment\, make cities sustainable and improve quality of life for all. \n  \nFor more information\, please visit the conference website: http://www.saudismartcities.net/  \n  \n  \nFor specific queries contact: \nDar Al Riyadh \nMr. Saad Algarni\nE-mail: Saad.algarni@daralriyadh.com\nMobile: +966 545 393 444\nWebsite: www.daralriyadh.com \n  \nNispana Innovative Platforms \nMr. Jaisimha Das\, Head Marketing & Communications\nE-mail: jaisimha.das@nispana.com\nMobile: +966 54 545 7305\nTel: +91 80 4933 1001\nWebsite: www.saudismartcities.net & www.nispana.com
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-saudi-smart-cities-conference-2017/
LOCATION:InterContinental Riyadh\, Al Ma'Ather Street\, Riyadh\, 11481\, Saudi Arabia
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170511T160000
DTEND;TZID=Europe/London:20170511T170000
DTSTAMP:20260503T202113
CREATED:20170411T150634Z
LAST-MODIFIED:20190619T094749Z
UID:16810-1494518400-1494522000@iotsecurityfoundation.org
SUMMARY:Device Authority IoT IAM Webinar (IoTSF Promoted Event)
DESCRIPTION:Join IoTSF Founder Members’ Device Authority for a webinar on May 11th when they will discuss what IoT IAM (or Identity and Access Management for the Internet of Things) means and why it is important in today’s evolving landscape. \nLearn how to provision and manage device identity\, and secure the data end-to-end without human intervention; making sure your company is not part of the next big news story on IoT device attacks. \n\nWhat is IoT IAM and why is it important\nWhy IoT IAM is substantially different from traditional IAM\nHow zero-touch provisioning plays a part\nHow credentials can be securely managed\nData privacy concerns resolved\nWhy Security is crucial at POC stage and how it’s easy to deploy\nWhat are the analysts saying\n\nWebinar Registration & More Information
URL:https://iotsecurityfoundation.org/event/device-authority-iot-iam-webinar-iotsf-promoted-event/
CATEGORIES:Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170425T090000
DTEND;TZID=Europe/London:20170425T170000
DTSTAMP:20260503T202113
CREATED:20170220T155238Z
LAST-MODIFIED:20190619T094749Z
UID:16481-1493110800-1493139600@iotsecurityfoundation.org
SUMMARY:Secure Systems Summit 2017 (IoTSF Promoted Event)
DESCRIPTION:  \n  \n  \n  \n  \n  \n  \n  \n  \nConnecting millions of electronic devices is creating significant security risks\, and designing in security from day one is becoming ever-more crucial to successful electronics design. \nThe Secure Systems Summit brings together designers\, engineers and other key decision makers from both hardware and software disciplines to share their experience and expertise on the security challenges the electronics industry faces on a daily basis. \nOur programme will feature some of the top experts in the field of developing secure systems in areas such as chip level design\, trusted computing\, embedded software and app development and will offer practical advice on issues including: \nAuthentication\nTrustZone\nHypervisors\nEncrypted communications\nFPGA secure-boot\nPartitioning\nBiometrics and more… \nIoTSF are a supporting partner of Secure Systems Summit and talks include two IoTSF Executive Board Members\, Haydn Povey & Richard Marshall. For more information and registration go to: http://www.securesystemssummit.com
URL:https://iotsecurityfoundation.org/event/secure-systems-summit-2017-iotsf-promoted-event/
LOCATION:code node\, CodeNode\, 10 South Place\, London\, EC2M 7EB\, United Kingdom
CATEGORIES:Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170413T140000
DTEND;TZID=Europe/London:20170413T160000
DTSTAMP:20260503T202113
CREATED:20170306T094435Z
LAST-MODIFIED:20190619T094749Z
UID:16702-1492092000-1492099200@iotsecurityfoundation.org
SUMMARY:IoTSF Plenary Session 11 (Virtual)
DESCRIPTION:  \n  \n  \n  \n  \n  \nThis virtual plenary session is for IoTSF members only.  This session will discuss working group progress and actions for 2017. \nIoTSF members who would like to join can register here.  Joining instructions for Cisco Webex will be sent 48 hours prior to plenary. \nIf you have any queries\, please contact Jenny Devoy
URL:https://iotsecurityfoundation.org/event/iotsf-plenary-session-11-virtual/
CATEGORIES:Plenary Session
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170406
DTEND;VALUE=DATE:20170407
DTSTAMP:20260503T202113
CREATED:20170228T092314Z
LAST-MODIFIED:20190619T094749Z
UID:16517-1491436800-1491523199@iotsecurityfoundation.org
SUMMARY:IoTSF Partnered Event: Verification Futures Europe 2017
DESCRIPTION:REGISTER HERE \n \n\nIoTSF is please to be partnering TVS on Verification Futures Europe 2017.\nNow in its 7th successful year\, VF2017 Europe is a unique one day conference\, exhibition and industry networking event organised by T&VS in partnership with IoTSF to discuss the challenges faced in hardware and software verification with a focus on safety and security. The event gives the opportunity for end users to define their current and future verification challenges and collaborate with the vendors to create solutions. It’s also an excellent opportunity to network and catch up with other verification engineers across Europe. \nDon’t miss this exclusive opportunity to hear experts and peers discuss the latest verification challenges and how the latest tools and techniques are rising to meet those challenges. \n  \nView the Conference Agenda Here. \nFor more information on Verification Futures Europe 2017\, please visit the event website. \n  \n  \nREGISTER HERE
URL:https://iotsecurityfoundation.org/event/iotsf-partnered-event-verification-futures-europe-2017/
LOCATION:Holiday Inn\, Wharfdale Road\, Winnersh Triangle\, Reading\, RG41 5TS
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170405T090000
DTEND;TZID=Europe/London:20170405T130000
DTSTAMP:20260503T202113
CREATED:20170208T114232Z
LAST-MODIFIED:20190619T094750Z
UID:16441-1491382800-1491397200@iotsecurityfoundation.org
SUMMARY:Developing the OT Workforce to Protect our Nation’s Critical Infrastructure (IoTSF Promoted Event)
DESCRIPTION:  \n  \n  \n  \n  \n  \n  \n  \nWhat can be done to protect America’s critical infrastructure from cyberattack? \nDefending America’s critical infrastructure—the refineries\, power plants\, water treatment facilities\, and other industrial assets that we depend on every day—from cyberattack requires a workforce trained and skilled in operational technology (OT).  OT\, unlike information technology (IT)\, focuses on the automation of vital control systems\, processes\, and equipment underpinning industrial and manufacturing operations. To help business and industry leaders learn how to meet this critical challenge\, the Automation Federation and Northern Virginia Community College (NOVA) are co-sponsoring: \nDeveloping the OT Workforce to Protect our Nation’s Critical Infrastructure\nWednesday 5th April 2017  09:00-13:00\nRegional Center for Workforce Education and Training\nNOVA campus\nWoodbridge\, Virginia \n  \nThis unique conference will feature presentations by leading experts in OT cybersecurity and workforce development. To register (at no cost) and view the agenda\, click here. But don’t delay as space is limited!
URL:https://iotsecurityfoundation.org/event/developing-the-ot-workforce-to-protect-our-nations-critical-infrastructure-iotsf-promoted-event/
LOCATION:Northern Virginia Community College (NOVA)\, Regional Center for Workforce Education and Training\, NOVA Woodbridge Campus\, Woodbridge\, VA\, 22191\, United States
CATEGORIES:Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170405
DTEND;VALUE=DATE:20170407
DTSTAMP:20260503T202113
CREATED:20170113T092004Z
LAST-MODIFIED:20190619T094750Z
UID:16257-1491350400-1491523199@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Internet of Insurance
DESCRIPTION:The Internet of Things offers profound opportunities for insurers to better understand risk\, impose preventative solutions and differentiate product offerings in an increasingly competitive marketplace. Through combination of best practice industry case studies and expert insight\, the Internet of Insurance explores the business case for IoT in the industry. \nKey issues to be explored: \n\nTurning the unprecedented volume and velocity of new IoT data into valuable and actionable insights\nExploring how IoT can enable competitive advantage and market differentiation through industry best practices exchange\nEnsuring ROI for your IoT investment though detailed analysis of qualitative and quantitative benefits of new products\nMaximising the potential of insurtech through strategic partnerships and peer-to-peer learning\nSeamlessly integrating insurance products with cross-industry platforms to prepare for the future of insurance\n\n  \nIoTSF members enjoy 10% discount on delegate passes (not applicable for any solution providers or consultancies) using this promo code – ISF17 \nVisit the website to register and for more information – http://www.internetofbusiness.net/insurance/
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-internet-of-insurance/
LOCATION:Wotton House\, Guildford Rd\,\, Wooton\, Dorking\, RH5 6HS\, United Kingdom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170330T160000
DTEND;TZID=Europe/London:20170330T200000
DTSTAMP:20260503T202113
CREATED:20170209T122829Z
LAST-MODIFIED:20190619T094750Z
UID:16447-1490889600-1490904000@iotsecurityfoundation.org
SUMMARY:The Securing IoT Series
DESCRIPTION:ABOUT\nThis event will provide attendees with practical knowledge and tools to meet the many-faced challenges of IoT security. \nIn May 2015 the first summit on IoT security was held at the world famous Bletchley Park in the UK. It brought together industry thought leaders and experts to examine the status of security in evolving applications enabled by hyper connectivity. \nAt the close of the summit it was clear that something had to be done to address the wicked security challenges that IoT brings. Those challenges include complexity\, convenience\, cost and a general lack of awareness – with users\, purchasers and even throughout the supplier base. As a result\, the IoT Security Foundation was formed to meet the challenges head on – IoTSF is a collaboration of industry\, academia and other stakeholder groups united in the cause to drive both the quality and pervasiveness of security in IoT. \nJust as IoT is becoming prime time for industry\, so too must security as the threat of connection affects us all. Yet security needs to evolve along with the new frontiers of technology\, and all technology providers must provide a duty of care to their customers and the wider IoT eco-system. \nThere is no cost to attend\, yet space is limited for the first event in the series. Interested parties should register interest and await confirmation. \nAGENDA\n8:00 – 8:30 Reception & Coffee \nSession 1\nWelcome: John Sirianni\nIoT Security Foundation Introduction: Majid Bemanian\nGetting ahead of regulation – self-certification at low cost: Pamela Gupta \nBreak and Networking \nSession 2\n Security by virtualization: Cesare Garalti\nSecureThingz:  Steve Pancoast\nDevice Identity and Integrity are the new perimeter for IoT: Rao Cherukuri \nSummary Remarks followed by Networking\n12:00 Close \nTime and LocationMarch 30th 2017 08:00 – 12:00 \nOffices of Imagination Technologies\n3201 Scott Blvd.\nSanta Clara\, CA 95054\nUSA \nMAP \nHow to register Cost: There is no fee to attend this event \nSpaces are limited: Interested parties are invited to register interest via email jenny.devoy@nmi.org.uk and await confirmation \nMeet the speakers \nHOST :: John Sirianni \nAdvisor to IoT Cyber Security Innovators \nJohn’s passion for cyber security in smart-city and critical infrastructure comes from his expertise and experience in the development of operationally critical embedded devices and networked systems across Aviation\, Automotive\, Railway\, Medical\, Telecom\, & Wireless/RF industries.  Recent work has focused on IoT Gateways\, network based device discovery\, network based cyber behavior & anomaly detection\, and perimeter-less computing.   Today Mr Sirianni advises emerging IoT\, Cyber Security and AI innovators on new solution and market development strategies. \nIoT Security Foundation / Working Group #5 IoT Landscape & Smart City Advisor \n\n \nMajid Bemanian \nMember of the Board\, IoT Security Foundation / Director of Segment Marketing\, Imagination Technologies \nMajid Bemanian is responsible for driving Imagination Technologies strategic security initiatives and leading its market strategy for the networking and storage segments. He has more than 30 years of high-tech industry experience with hands-on engineering\, marketing and business management skills. Bemanian holds several patents and a B.S. degree in Electrical Engineering from the University of Nevada\, Reno \n\n \nPamela Gupta \nChair\, Self-Certification Working Group\, IoTSF / President\, OutSecure Inc. \nWith a powerful resume in Security Program definition and Strategy at major global Fortune 500 companies\, Pamela founded OutSecure Inc.\, because she knows companies are not protecting themselves with a strategic security program built to address information protection risks unique to their environment. Drawing upon a unique combination of more than 20 years of technical\, process\, policy\, and business experience in leading Fortune 500 companies Ms. Gupta provides consulting to public and private sector clients in the areas of privacy\, security\, cybercrime\, breach management\, and cyber strategy. \n\n \nCesare Garalti \nCTO\, prpl Foundation\nCesare Garlati is an internationally renowned leader in information security. Former VP of mobile security at Trend Micro\, he currently serves as Chief Security Strategist at prpl Foundation and Co-Chair of the Mobile Working Group at Cloud Security Alliance. Garlati holds a U.C. Berkeley MBA\, an M.S. in EECS and numerous professional certifications from Microsoft\, Cisco and Oracle/Sun. \n\n \nSteve Pancoast \nVP Engineering\, SecureThingz \nDuring his career\, Steve has been a leader focused on innovation\, business development and execution at multiple fortune 500 companies.  Steve joined Secure Thingz in October 2016\, as VP of Engineering where he leads the Engineering development organization and is focused on providing security solutions that establish a root of trust in IoT devices and enable secure software deployment/updates.  Prior to joining Secure Thingz\, Steve spent three years at Atmel as VP of SW\, Tools and Applications\, four years with Freescale as VP of Product Solutions for the Automotive and Industrial Solutions Group (AISG) and 10 years at STMicroelectronics\, where he most recently served as Sr. Director of the U.S. Consumer Application Labs. \n\n \nRao Cherukuri \nChief Product Officer\, Device Authority\nRao is a technology innovator\, entrepreneur and seasoned executive in Silicon Valley. He founded and led venture-backed IT infrastructure startups that delivered award-winning products over the last two decades in Networking\, Security and Analytics. He holds five patents in Trusted Computing\, Containers and Networking. Rao’s latest work is in the areas of IoT Security\, edge computing and fog computing. \n\n\nThe IoT Security Foundation gratefully acknowledges the sponsorship of Imagination Technologies in support of this event
URL:https://iotsecurityfoundation.org/event/the-securing-iot-series/
LOCATION:Imagination Technologies Santa Clara\, 3201 Scott Blvd.\, Santa Clara\, CA\, CA 95054\, United States
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2017/02/IoTseriesMar2017.jpg
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170329T181500
DTEND;TZID=Europe/London:20170329T213000
DTSTAMP:20260503T202113
CREATED:20170313T145522Z
LAST-MODIFIED:20190619T094751Z
UID:16712-1490811300-1490823000@iotsecurityfoundation.org
SUMMARY:IoT Thames Valley Meetup (IoTSF Promoted Event)
DESCRIPTION:This is a free to attend event and you can register here \nCompanies/speakers and exhibitors for the Meetup include: \n\nAmazon Web Services – Join this session with Technical Evangelist Ian Massingham and learn why and how organisations are using the Cloud as a back end for secure and scalable connected device applications.\nSurrey University’s\, 5G Innovation Centre – Adrian Braine\, Entrepreneur in Residence for the 5G Step Programmes will be giving a talk: ‘5G – Now connecting things!’ and members from the 5G Innovation centre will be exhibiting their IoT projects\nGSMA – Leo Whyte\, Strategic Engagement Director\, Connected Living\, will be giving a talk “Securing the Connected Future: Applying Best Practice Guidelines to Secure the IoT”\nKnowledge Transfer Network – Robin Kennedy will sharing the latest news and IoT opportunities.\nIoT Tech Expo Europe – Daniel Graham will be giving an Introduction to the IoT Tech Expo World Series\nSony SES – Steve Beck will be talking about their new IoT device power consumption analysis and optimisation platform\nAbacode – Erik Staaf\, VP EMEA will be presenting “Cyber Crime – the perfect storm is imminent” to highlight the key issues and how to solve them.\n\nAgenda\n6.15 – 6.45 Drinks & Pizza Reception\, Networking and meet the exhibitors \n6.45 Welcome – Duncan Purves \n6.50 “Building IoT Applications with AWS IoT” Ian Massingham\, Chief Evangelist\, Amazon Web Services \n7.15  “5G – Now connecting things!” Adrian Braine\, Surrey University’s\, 5G Innovation Centre \n7.30  “Securing the Connected Future: Applying Best Practice Guidelines to Secure the IoT” Leo Whyte\, Director\, Strategic Engagement\, Europe\,  GSMA \n7.45  “Innovate UK opportunities and news” Robin Kennedy\, KTN \n7.50 ‘ Showcase’\n–  “IoT Tech Expo Europe” Daniel Graham\, Head of Business Development \n–  “IoT device power consumption analysis and optimisation platform” Steve Beck\, Sony SES \n–  “Cyber Crime – the perfect storm is imminent” Erik Staaf\, VP EMEA\, Abacode \n8.05 Open to the Floor \n8.10 – 9.30 Networking and meet the exhibitors \nTo register or find more information: https://www.meetup.com/Internet-of-Things-Thames-Valley/events/235926473/ \nThursday 29th March 18:15-21:30 \nGreen Park Conference Centre\, \n100 Longwater Avenue Green Park\, \nReading\, RG2 6GP \nAbout IoT Thames Valley Meetup:\nThis group is open (free) for business\, academic\, public sector and technical professionals interested in the ‘Internet of Things’ who wish network\, share knowledge and experiences and develop business opportunities. \nWebsite address: https://www.meetup.com/Internet-of-Things-Thames-Valley \nLinkedIn Group: https://www.linkedin.com/groups/8271917
URL:https://iotsecurityfoundation.org/event/iot-thames-valley-meetup-iotsf-promoted-event/
CATEGORIES:Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170324T093000
DTEND;TZID=Europe/London:20170324T160000
DTSTAMP:20260503T202113
CREATED:20170222T110444Z
LAST-MODIFIED:20190619T094751Z
UID:16495-1490347800-1490371200@iotsecurityfoundation.org
SUMMARY:The Impact of Internet of Things on our Lives (IoTSF Promoted Event)
DESCRIPTION:  \n  \n  \n  \n  \n  \n  \n  \n  \n  \nIMPACTech & IoTSF would like to invite you to attend our ‘The Impact of Internet of Things on our Lives’ which highlights four important areas: developments and IoT technologies\, applications\, connected society and finally data and security. The event will take place on the 24th of March 2017 at IBM and features IoT Security talks from IoTSF Managing Director John Moor as well as other IoTSF members. \nThe rapid development of technology\, especially in the areas of sensors\, sensor-integrated systems and faster and more intelligent wireless networks\, has inspired the industry as a whole to find new ways to generate revenue and embrace the end users. \nPutting sensors in almost all of our everyday devices such as coffee machines\, fridges and washing machines allows the manufactures to capture live data about our behaviour. By understanding consumer trends\, the Internet of Things (IoT) will be able to increase connectivity and shape the way we interact with technology. \nHealthcare is a clear example of how the IoT can be beneficial to patients – by sharing their information with medical practitioners and helping them to be more informed on how and when to take their medications. Wearable health and fitness monitors are another example which help monitoring performance and provide their wearers with the optimal dietary and training regime. \nHaving smarter city infrastructure\, self-driving cars\, connected appliances and even smart lighting raise an important question… Who is in charge and how can we take control of our technology before it takes control of our lives? \nSome of the biggest challenges that face IoT are around data privacy & security\, cost of implementation and establishing a sense of control and trust within the system. Standards and having a common platform is another issue that needs to be addressed in order to make it easier for end users and consumers to adopt the IoT. \nThis event offers technical presentations and it will be a great opportunity for you to meet and engage with IoT experts from across academia and industry\, where innovative technology in this exciting and rapidly developing field can be exploited and challenged. \nDraft Programme\nChair: Christopher Gibson\, Technology Leader at IBM \nSession One: Technologies that Makes IoT a Reality \n09:30   Coffee & Registration \n10:00   Introduction & Welcome by Dr Ghaithaa Manla\, Impactech \n10:10   Joint Design of Signal Processing Algorithms and their Hardware Implementation for Wireless Communication by Dr Rob Maunder\, University of Southampton \n10:20   Low Power IoT Networking by Professor Kirk Martinez\, University of Southampton \n10:35   Security for Secure IoT: Advanced Architectures for IoT Gateways by Simon Forrest\, Director of Segment Marketing\, Consumer Electronics at Imagination Technology \n10:50   Panel Discussion \n11:00 Tea\, Coffee and Networking \nSession Two: Applications of IoT \n11:15  Enabling IoT Applications in a Secure SMART Environment by Rod White\, Senior Business Development Manager at Eseye \n11:30   Smart Transporting Systems by Dr Sebastian Stein\, University of Southampton \n11:40   Gert Jørgensen\, VP Sales & Marketing at Delta \n11:55   Environmental Monitoring\, University of Southampton \n12:05   The Challenge of Legacy Assets by Richard Lucas\, Manager Director at ASH Wireless Electronics \n12:20   Panel Discussion \n12:30 Lunch and Networking \nSession Three: Connected Society\, IoT as a Solution \n13:30   IoT Observatory by Dr Aastha Madaan\, University of Southampton \n13:40   Connecting Society through Co-operative Intelligent Traffic Systems by Paul Brookes\, Head of Research and Development for Siemens Mobility\, Intelligent Traffic Systems \n13:55   Designing for an Internet of Humans by Dr Paul Grace\, Consultant at IT Innovation \n14:10   Panel Discussion \n14:20 Tea\, Coffee and Networking \nSession Four: Data and Security \n14:35   Addressing the Wicked Challenges of IoT Security by John Moor\, Managing Director\, IoT Security Foundation \n14:50   Cyber Security in IoT by Gary Wills\, Associate Professor at the University of Southampton \n15:00   The Insecurity of Things by Leigh Chase\, Computer Scientist at IBM \n15:15   My friend Cayla\, the Hacked IoT Doll that Good Taste Forgot by Ken Munro\, Partner at Pen Test Partners \n15:30   Hardware-Level Security for the Internet of Things by Professor Mark Zwolinski\, University of Southampton \n15:45   Panel Discussion \n15:55   Wrap up & close \nClick here to register for free\n  \n 
URL:https://iotsecurityfoundation.org/event/the-impact-of-internet-of-things-on-our-lives-iotsf-promoted-event/
LOCATION:IBM\, Hursley Park Road\, Winchester\, SO21 2JN\, United Kingdom
CATEGORIES:Conference
ORGANIZER;CN="Dr Ghaithaa Manla":MAILTO:gm504@soton.ac.uk 
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170321
DTEND;VALUE=DATE:20170323
DTSTAMP:20260503T202113
CREATED:20170113T091705Z
LAST-MODIFIED:20190619T094751Z
UID:16254-1490054400-1490227199@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Internet of Retail
DESCRIPTION:The Internet of Things possesses the ability to greatly enhance the ways in which retailers are engaging with their customers. Advanced beacon\, RFID\, Sensor\, AI\, VR and wearable technologies are offering new ways to improve loyalty and increase revenue. However\, disassociation between the business and digital sides of companies coupled with previous project failures and negative consumer feedback is placing strain on new IoT projects. This 2nd Annual Internet of Retail event will present case studies from some of the world’s leading retailers who have overcome implementation pitfalls and are successfully harnessing IoT to heighten the customer journey. \nWhy do you need to attend the Internet of Retail: \n\nThe only 100% IoT in retail conference in Europe – no vendors can book as delegates to ensure high-quality peer-to-peer networking\nLearn proven lessons from early adopter IoT case studies to help sharpen your business case and accelerate results\nNo death by powerpoint – participate in interactive workshops and roundtables for frank and open problem-solving with peers\nDifferentiate yourself by identifying and nurturing innovative IoT start-ups\nMake partnerships in tailored one-to-one meetings with tech innovators that could grow your IoT project\n\n  \nIoTSF members enjoy 10% discount on delegate passes (not applicable for any solution providers or consultancies) using this promo code – ISF17 \nVisit the website to register and for more information – http://www.internetofbusiness.net/retail/
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-internet-of-retail/
LOCATION:DoubleTree Docklands Riverside\, 265 Rotherhithe Street\, London\, SE16 5HW\, United Kingdom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170315T080000
DTEND;TZID=Europe/London:20170316T170000
DTSTAMP:20260503T202113
CREATED:20170111T102645Z
LAST-MODIFIED:20190619T094752Z
UID:16210-1489564800-1489683600@iotsecurityfoundation.org
SUMMARY:Promoted Event: Smart IoT London
DESCRIPTION:  \n  \n  \n  \n  \n  \nSmart IoT London (15th-16th March 2017) is the premier global IoT conference and exhibition. Delivering an audience of 18\,515 attendees from Enterprise\, Service Providers and the Public Sector. \nAccess an exhibition of leading suppliers\, a world-class conference programme featuring 200 presentations and workshops completely FREE of charge. \n2017 will once again feature our hugely successful and popular Urban IoT Showcase and the Innovation Launchpad \nWhether you are already running projects using the IoT\, you are considering deployment or you just want to make sense of the hype\, this event covers all bases.  Register your interest in attending Smart IoT  \nThe IoT Security Foundation are Event Partners of Smart IoT London 2017\, our executive board and ambassadors are also speaking at this event. \nJohn Moor\, IoTSF Managing Director said “The IoT Security Foundation is the home of IoT security and we are delighted to be working with Smart IoT (London). We share the event’s ambition to help attendees see the bigger picture\, meet partners and understand what it takes to be successful in a dynamic environment. We’re also keen to promote a message of security first and resilience throughout the IoT supply chain so\, together\, we unlock IoT’s many benefits for society and the economy. We look forward to meeting you there.” \nLearn more here: http://www.smartiotlondon.com
URL:https://iotsecurityfoundation.org/event/promoted-event-smart-iot-london/
LOCATION:ExCeL London\, 1 Western Gateway\, Royal Victoria Dock\, London\, E16 1XL
CATEGORIES:Conference
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2017/01/smart-iot-london.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170307
DTEND;VALUE=DATE:20170309
DTSTAMP:20260503T202113
CREATED:20170203T120552Z
LAST-MODIFIED:20190619T094752Z
UID:16418-1488844800-1489017599@iotsecurityfoundation.org
SUMMARY:IoT International 7-8 March 2017\, Brussels (IoTSF Promoted Event)
DESCRIPTION:The inaugural IoT International Conference will provide comprehensive coverage of building the IoT from a critical device-level technologies perspective and examine how semiconductor designers\, manufacturers\, materials & equipment makers\, and other allied disciplines can realise effective IoT applications. \nHear industry leading insiders deliver over 20 presentations across five comprehensive themes including IoT Security\, IoT Sensors\, Device Technologies & the IoT Business\, IoT Diversity – the billion device ‘niche’ plus IoT device-level research\, development\, manufacturing & the supply chain. \nTo register or find or more information go to www.iotinternational.net
URL:https://iotsecurityfoundation.org/event/iot-international-7-8-march-2017-brussels-iotsf-promoted-event/
LOCATION:Sheraton Brussels Airport Hotel\, Brussels National Airport\, Brussels\, 1930\, Belgium
CATEGORIES:Conference
ORGANIZER;CN="iot international":MAILTO:info@iotinternational.net
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170307
DTEND;VALUE=DATE:20170309
DTSTAMP:20260503T202113
CREATED:20170113T091420Z
LAST-MODIFIED:20190619T094752Z
UID:16251-1488844800-1489017599@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Internet of Energy
DESCRIPTION:Faced with ambitious decarbonisation targets and dwindling profit margins\, the aging energy industry must embrace the opportunities of emerging technologies in order to progress. The Internet of Energy has been created for energy retailers\, TSOs and DSOs to help explore the business case for IoT. From transforming operational efficiency to facilitating new business models\, the event will address issues through early-adopter case studies and perspectives from new ‘disrupters’ in the energy value chain. \nTop 5 challenges to be addressed:  \n\nLearn how Duke Energy are using IoT-enabled infrastructure to support the deployment of the ‘Self-Healing’ grid\nHear how HIVEis forging innovative partnerships with device providers to the take advantage of the opportunity of the Smart Home\nDiscover how Enel’s commercial vehicle to grid service is supporting the rise of the ‘prosumer’\nUnderstand how E.ON are employing the internet to facilitate the operation of their global windfarm<\nHear from RWE on how to turn Big IoT data into value\n\n  \nIoTSF members enjoy 10% discount on delegate passes (not applicable for any solution providers or consultancies) using this promo code – ISF17 \nVisit the website to register and for more information – http://www.internetofbusiness.net/energy/
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-internet-of-energy/
LOCATION:Hotel Pullman Cologne\, Helenenstraße 14\, Köln\, 50667\, Germany
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170216T123000
DTEND;TZID=Europe/London:20170216T170000
DTSTAMP:20260503T202113
CREATED:20170111T160424Z
LAST-MODIFIED:20190619T094752Z
UID:16212-1487248200-1487264400@iotsecurityfoundation.org
SUMMARY:IoTSF London Plenary Session
DESCRIPTION: IoTSF members are invited to join us for our first physical plenary session of 2017 held at Digital Catapult\, Euston Road\, London. This plenary session follows the progress of the Working Groups and operations updates. \nThis event is for IoTSF members and invited guests only. If you are not a member and would like to attend\, please email Jenny Devoy. \nRegister Now
URL:https://iotsecurityfoundation.org/event/iotsf-london-plenary-session/
LOCATION:Digital Catapult Centre\, 101 Euston Road\, London\, NW1 2RA\, United Kingdom
ORGANIZER;CN="Jenny Devoy":MAILTO:jenny.devoy@nmi.org.uk
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170216
DTEND;VALUE=DATE:20170218
DTSTAMP:20260503T202113
CREATED:20170112T154211Z
LAST-MODIFIED:20190619T094753Z
UID:16233-1487203200-1487375999@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: World eSIM Summit
DESCRIPTION:  \nEmbedded SIM (eSIM) has long been desired by the equipment manufacturers\, in particular those focused on M2M and IoT. Benefits of programmable SIM are numerous – from the security/protection of the SIM to the remote provisioning. Now eSIM came to revolutionize the mobile telecommunications industry: the fixed-connectivity service of traditional (removable) SIM cards will be eventually replaced by the dynamic connectivity features of embedded SIMs. Earlier this year GSMA released a specification that allows consumers to remotely activate the SIM embedded in a device such as a smart watch\, fitness band or tablet. The process currently under way may lead to widespread industry adoption of eSIMs in the very near future. What challenges and opportunities does this eSIM disruption mean for the industry’s stakeholders?  World eSIM summit is designed as a dynamic networking event that will delve into cross-industry transformation taking place due to the eSIM revolution\, by gathering together top level executives and experts from mobile telecommunication\, technology solution providers\, connected device manufacturers and automotive. \n  \nFor more information\, please visit the World eSIM Summit website. \n 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-world-esim-summit/
LOCATION:Jalta Hotel\, Prague\, Czech Republic
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170208T100000
DTEND;TZID=Europe/London:20170210T160000
DTSTAMP:20260503T202113
CREATED:20161025T131942Z
LAST-MODIFIED:20190619T094754Z
UID:15280-1486548000-1486742400@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Internet of Things India 2017 Expo
DESCRIPTION:  \n  \n  \n  \n  \nInternet of Things (IoT) will revolutionize\, transform & create business opportunities for industries to become connected to an extent that has never been possible before. The Internet of Things is creating a new world\, a quantifiable and measureable world\, where people and businesses can manage their assets in better informed ways. By sensing our surrounding environment\, the IoT will create many practical improvements in our world\, increasing our convenience\, health and safety\, while at the same time improving energy efficiency and comfort. The IoT will be a new source of wealth creation. Several IoT-enabled services will be transformational\, driving impacts by connecting different elements of various industries together in new ways. \n“Internet of things India Expo 2017”(IoTIe) will be organised along with 25th Convergence India 2017 expo from 8-10 February at Pragati Maidan\, New Delhi. The show will bring together IoT ecosystem including hardware\, services\, software and governing bodies. It will cover development areas and future of IoT in India including Smart Cities\, Wearables\, Design applications\, enablers\, Industrial IoT\, data analytics. It will be supported by conferences\, business meetings\, startup showcase and investors insights. It is the India’s premier business platform to enhance knowledge\, share ideas\, networking and plan for future. \nClick here for more event information & registration.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-internet-of-things-india-2017-expo/
LOCATION:Pragati Maidan\, Mathura Road\, Railway Colony\, New Delhi\, Delhi\, 110002\, India
CATEGORIES:Conference
ORGANIZER;CN="Shishir Lahoti":MAILTO:shishirl@eigroup.in
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170207
DTEND;VALUE=DATE:20170209
DTSTAMP:20260503T202113
CREATED:20170113T090326Z
LAST-MODIFIED:20190619T094754Z
UID:16246-1486425600-1486598399@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Internet of Manufacturing
DESCRIPTION:  \nIndustrie 4.0 is creating profound opportunities for manufacturers to transform business models\, innovate new products and increase productivity. \nThe 2nd Annual Internet of Manufacturing will bring together over 150 manufacturing leaders across Europe to discuss how to realise the potential of IoT and stay competitive in a rapidly evolving market. Inspiring keynotes will be combined with results-driven case studies and perspectives from government and standardisation bodies to help accelerate the industry’s readiness for change. \nTop 5 challenges to be addressed:  \n\nMaximise the profitability of your connected product business model – how can IoT drive business growth and innovation?\nIntelligent factories- how can IoT increase production efficiency and quality?\nThe data-driven enterprise- how to use IoT data to fuel insightful decisions and deliver customer value\nGerman Mittelstand and Industrie 4.0 -how the most innovative SMEs are avoiding being left behind\nMinimise your risk of a cyber-attack- how to develop a robust and proactive IoT security strategy\n\nVisit the website for more information – http://www.internetofbusiness.net/manufacturing/
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-internet-of-manufacturing/
LOCATION:Hotel Vier Jahreszeiten Kempinski München\, Maximilianstraße 17\, München\, 80539\, Germany
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170123
DTEND;VALUE=DATE:20170125
DTSTAMP:20260503T202113
CREATED:20160414T091250Z
LAST-MODIFIED:20190619T094754Z
UID:14359-1485129600-1485302399@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: IoT Tech Expo Europe
DESCRIPTION:The Internet of Things (IoT) Tech Expo Event will bring together key industries from across Europe for two days of top level content and discussion. Industries include Manufacturing\, Transport\, Health\, Logistics\, Government\, Energy and Automotive. Introducing and exploring the latest innovations within the Internet of Things\, this conference is not to be missed. \nTaking place in London’s Olympia on the 23-24th January\, Europe’s leading IoT event will host IT decision makers\,developers & makers\, OEM’s\, government and local council officials\, automotive exec’s\, operators\, technology providers\, investors\, venture capitalistsand many more. IoT Tech Expo Europe is set to showcase the most cutting edge technologies from more than 100 exhibitors and provide insight from over 200 speakerssharing their unparalleled industry knowledge and real-life experiences. \nThis year’s Expo will highlight the most innovative advancements in technologies which are affecting IoT. There will be cases and dedicated tracks covering the entire Internet of Things ecosystem including Smart Cities\, Connected Living\, Developing & Tech in the IoT\, Connected Industry and Data & Security. \nWith previous attendees from the likes of Google\, Blackberry\, Thames Water\, National Grid\, Nokia\, IBM and Cisco to name a few\, the IoT Tech Expo is shaping up to be the IoT event not to be missed in 2017. \nAttendees are expected from across the entire IoT industry with representatives from sectors including government\, energy\, education\, transportation\, healthcare\, manufacturing\, M2M and many more. Take advantage of this opportunity to experience two days of discussion\, exploration\, in-depth analysis and high level networking at this year’s IoT Tech Expo. \n  \nFor more information and to register\, please visit the IoT Tech Expo website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-tech-expo-europe/
LOCATION:Olympia\, Hammersmith Road\, Kensington\, London\, W14 8UX\, United Kingdom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170119T160000
DTEND;TZID=Europe/London:20170119T170000
DTSTAMP:20260503T202113
CREATED:20161214T131956Z
LAST-MODIFIED:20190619T094755Z
UID:16190-1484841600-1484845200@iotsecurityfoundation.org
SUMMARY:IoTSF Promotes: Webinar IoT Security Automation for Connected Surveillance Cameras
DESCRIPTION:Solving one of today’s biggest security challenges: IoT Security Automation for Connected Surveillance Cameras\nJanuary 19th at 16:00 GMT\, 11:00 EST\, 8:00 PST\nWith recent camera attacks there is a need for increased IoT security posture. \nThe DDoS attack carried out by hackers using tens of millions of unprotected IoT devices has presented what security pros have known for a long time: IoT devices are vulnerable to attacks. In this attack\, millions of webcams were unknowingly recruited to conduct the attack on major ISPs. Many of these webcams are now being recalled. \nFind out exactly how to increase your IoT security posture\, from experts at Device Authority \n\nManufacturer-Independent Security\n\n\nAutomated Camera Security Management\n\nDevice registration\nCertificate provisioning\nPassword management\n\n\n\n\nScalability\n\nLarge-scale security automation for system integrators and customers\n\n\n\nVisit the Event page here.
URL:https://iotsecurityfoundation.org/event/iotsf-promotes-webinar-iot-security-automation-for-connected-surveillance-cameras/
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2016/12/Device-authority-webinar.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170112T183000
DTEND;TZID=Europe/London:20170112T213000
DTSTAMP:20260503T202113
CREATED:20161209T124851Z
LAST-MODIFIED:20190619T094755Z
UID:16171-1484245800-1484256600@iotsecurityfoundation.org
SUMMARY:IoTSF promotes: How to Secure the Internet of Things
DESCRIPTION:John Moor\, Managing Director of the IoT Security Foundation\, will present as guest speaker at the next Hardware Pioneers event: How to Secure the Internert of Things. \nWhat a better way of starting the new year than talking about one of the most discussed and controversial topics of the Internet of Things: security.\nIn order to deep dive into the present and future challenges of IoT security we have invited at Hardware Pioneers three top UK experts from UL\, IoT Security Foundation and TechUK. \nDrinks will be served throughout the night. \n>Learn more on the Event website.
URL:https://iotsecurityfoundation.org/event/iotsf-promotes-how-to-secure-the-internet-of-things/
LOCATION:TechUK\, 10 St Bride Street\, London\, EC4A 4AD
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2016/12/iotsf-promo-event.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161206T083000
DTEND;TZID=Europe/London:20161206T190000
DTSTAMP:20260503T202113
CREATED:20161031T094510Z
LAST-MODIFIED:20190619T094755Z
UID:15382-1481013000-1481050800@iotsecurityfoundation.org
SUMMARY:IoT Security Foundation Conference 2016
DESCRIPTION:Register TodayCONFERENCE COUNTDOWN0000Days00Hrs00Min00SecCONFERENCE OVERVIEW\nBuilding an Internet of Trust\nSecurity is often considered in strictly technical terms\, but in the future worlds of IoT\, many parties will be involved in delivering and maintaining devices\, data and services – from chip vendors and software developers through ODM’s to service providers. Maintaining security needs not just good encryption\, it demands that every party in the supply chain recognises the importance of security and implements it in the business processes\, products and systems. Somehow industry needs to build a “chain of trust” which will allow each player to identify trusted suppliers and in turn provide trusted products and services to their customers. \nThe conference will look at what it takes to build an Internet of Trusted Things\, what is currently underway\, what we can learn from the past to predict the future and the necessary duties of care providers and adopters need to ensure. \nThis 2nd IoT Security Foundation Conference is a one-day event and follows on from the 2015 conference held at the Royal Society and the original IoT Security Summit at Bletchley Park. \nThe primary targeted audiences for the conference are the technology providers and the technology adopters of IoT\, alongside academia\, press\, government and wider stakeholder groups. \nOnce again the 2016 IoTSF Conference is set to have a senior and expert level line up of speakers – we’ll be making successive announcements along the way on this website and via our newsletter (register with this site to receive updates). \nAn accompanying table-top exhibition will complement the conference track and the day ends with a drinks reception allowing extra time to discuss the themes of the day and additional networking. \nAGENDA\nDownload Agenda\n \nStrategic Track – Kelvin Theatre\n\nTechnical Track – Turin Theatre\n09:15-10:00 Welcome & Keynote Speaker\n\n“Welcome” John Moor\, MD IoT Security Foundation\n“What will Security Standards and Certification Look Like Ten Years from Now?” – Ross Anderson\, Professor of Security Engineering\, University of Cambridge\n\n10:00-11:00 Strategic Session 1: The Big Picture\n\n “I Trust 72.4% of People\, How Many Things Should I Trust?” – Mike Westmacott\, Principal Cybersecurity Consultant at Thales\n“The Future of IoT Security and “Cybercrime”” – Craig Heath\, Director at Franklin Heath\n\n10:00-11:00 Technical Session 1\n\n“Welcome to the technical track” – Jeff Day\, BT\n“Why is IoT Security so Hard and What Can We Do About It? – Some Lessons from the Frontline…”- Nick Allott\, CEO at Nquiring Minds\n\ng \nBreak\n11:30-13:00 Strategic Session 2: IoT Security in Context\n\n“Protecting the Connected Car” – Martin Borrett\, CTO at IBM Security Europe\n“The roles and goals of identity management in future Smart Cities” – Gert Botha\, Chief Executive Officer at Hive Technology\n“Grasping New Technology – Securely” Ian Phillips\, Information Security Architect at Roke Manor Research\n\n11:30-13:00 Technical Session 2\n\n“In Silicon we Trust: How to Fix the Internet of Broken Things” – Cesare Garlati\, Chief Security Strategist at prpl Foundation\n“Authenticate Everything – Security for the IoT” – Geert-Jan Schrijen\, CTO at Intrinsic-ID\n“Towards Effective Security Monitoring for IoT” – Siraj Shaikh\, Founder & Chief Scientific Officer at CyberOwl\n\nLunch\n14:00-15:30 Strategic Session 3: Practical Guides to Improving Security\n\n“Supply Chain of Trust” – David Dufour\, Cyber Security Architect at Webroot\n“How not to be a headline for IoT Security” – Richard Marshall\, Managing Consultant at Xitex\n\ng \ng \ng \n14:00-15:30 Technical Session 3\n\n“IoT: Attack of the Clone Army?” – Dr Ralf Huuck\, Director & Senior Architect at Synopsys\n“Industrial IoT Security Issues and Solutions” – Chris Shire\, Business Development Manager at Infineon\n“Multos Providing Appropriate Trust for IoT Devices?” – Paul Wilson\, Commercial Manager at MAOSCO\n\nBreak\n16:00-17:30 Strategic Session 4: Addressing Security Through Collaboration\n\n“Securing the Internet of Things – an Analyst’s View on the Market” – Aapo Markkanen\, Principle Analyst at Machina Research\n“United We Stand; Addressing the Bigger Challenges of IoT Security with Collaboration” Panel Session featuring representatives from the IET\, International M2M Council\, IoTUK\, PRPL Foundation and IoTSF\n\ng \n16:00-17:30 Technical Session 4\n\n“Surely your thing doesn’t need a wire! How to choose an IoT Radio Access Network” – Joe Milbourn\, Senior Consultant at The Technology Partnership\n“The Realities of Maintaining a Secure Software Supply Chain” Christine Gadsby\, Director of Global Product Security & Adam Boulton\, SVP Security Technology at Blackberry\n“Weaponising IoT” Ken Munro\, Partner at Pen Test Partners\n\nResume in the Kelvin Theatre\n\nClosing Remarks & 2017 Outlook – John Haine\, IoTSF Chairman\n\n17:40-19:00 Drinks Reception\nSPEAKERS\nclick on speaker picture for abstract and biography \n\n“What will Security Standards and Certification Look Like Ten Years from Now?”\nRoss Anderson\, Professor of Security Engineering\, University of Cambridge \n×Ross Anderson\, University of Cambridge\nRoss John Anderson\, FRS\, FREng\, is a researcher\, writer\, and industry consultant in security engineering. He is Professor of Security Engineering at the Computer Laboratory\, University of Cambridge where he is part of the Security Group. Anderson’s research interests are in security\, cryptology\, dependability and technology policy. \nIn cryptography\, he designed with Eli Biham the BEAR\, LION and Tiger cryptographic primitives\, and co-wrote with Biham and Lars Knudsen the block cipher Serpent\, one of the finalists in the Advanced Encryption Standard (AES) competition. He has also discovered weaknesses in the FISH cipher and designed the stream cipher Pike. In 1998\, Anderson founded the Foundation for Information Policy Research\, a think tank and lobbying group on information-technology policy. Anderson is also a founder of the UK-Crypto mailing list and the economics of security research domain. \nHe is well-known among Cambridge academics as an outspoken defender of academic freedoms\, intellectual property and other matters of university politics. He is engaged in the ″Campaign for Cambridge Freedoms″ and has been an elected member of Cambridge University Council since 2002. In January 2004\, the student newspaper Varsity declared Anderson to be Cambridge University’s “most powerful person”. \nAnderson was elected a Fellow of the Royal Society (FRS) and a Fellow of the Royal Academy of Engineering (FREng) in 2009. \n“What will security standards and certification look like ten years from now?” \nThe “embedded systems” of 20 years ago became “things that think” a decade ago; the hype is now about the “Internet of Things” and no doubt by 2026 the marketing folks will have come up with a fresh slogan. However several trends are now visible as computers and communications find their way into all sorts of devices. \nFirst\, security is mostly an aspect of safety; indeed most European languages use the same word for both (Sicherheit\, surete\, seguridad\, sicurezza…).\nSecond\, although there are some cross-cutting technical standards (such as for crypto algorithms and protocols) and operational norms (such as the disclosure of breaches and vulnerabilities)\, these are by no means enough. Just as we don’t rely on product liability law to ensure car safety but have a large body of regulation around testing and type approval\, so also we have a growing body of standards and regulation around the security of everything from tachographs to smart meters. \nThird\, as regulators in fields from electric power distribution to healthcare realise they have to start thinking about malice as well as error and mischance\, security standards and certification will continue to get ever more complex. We have already seen conflicts between policy goals; cars today are easy to steal because of crypto export restrictions in the 1990s when their remote key entry systems were being designed. \nFourth\, the computer industry’s freewheeling approach will not translate well to industries such as energy and healthcare where certification and liability are taken very seriously; so complexity and conflicts can’t always just be optimistically waved away. \nFinally\, the predatory business models that characterise the IT industry will spread\, adding competition policy and consumer protection issues to the mix. The likely outcome is an ever more complex regulatory environment for many industries — and one which the UK will be ever less able to shape if the brexit vote leads to Britain abandoning the Single Market. \nClose\n“Protecting the Connected Car” \nMartin Borrett\, CTO\, IBM Security Europe \n×Martin Borrett\, IBM Security Europe\nMartin Borrett is an IBM Distinguished Engineer and CTO IBM Security Europe. He advises at the most senior level in clients on policy\, business\, technical and architectural issues associated with security. Martin leads IBM’s Security Blueprint work and is co-author of the IBM Redbooks “Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security” and “Understanding SOA Security”. He is Chairman of the European IBM Security Board of Advisors\, member of the Royal Society’s Cybersecurity Research Steering Group\, represents IBM at GFCE\, is a Fellow of the British Computer Society\, a Chartered Engineer (CEng) and member of the IET. Martin has a passion for sailing and has represented Great Britain; he is also a keen tennis player. \n“Protecting the Connected Car” \nThe intelligent\, connected vehicle becomes another actor in the world of the Internet-of-Things. It must access resources that require data protection\, validate the integrity of the device and provide a secure and unified consumer experience across web\, mobile and in-vehicle platforms. Today’s consumer wants a seamless experience with their digital preferences but they also want it to be secure. \nAs consumers’ enthusiasm for mobility and commerce services grows\, industry executives need to create a secure vehicle. One of the biggest challenges is to integrate the plethora of interfaces\, existing or new ones\, and to design security in from the start. Security\, while still at its beginning for the connected vehicle\, is a fundamental prerequisite to paving the way toward autonomous driving. \nWe will discuss how the consumer’s desire for a complete digital experience impacts security. How to handle security and data privacy over the vehicle lifecycle and the role and ability of the automotive industry to design and build a secure vehicle. \nClose\n“Grasping New Technology – Securely”\nIan Phillips\, Principal Consultant Engineer at Roke Manor \n×Ian Phillips\, Roke Manor\nIan Phillips is a systems engineer and information security architect\, working at Roke Manor Research part of the Chemring Group. \nBuilding on years of experience developing complex communications systems from emerging standards to production prototypes\, Ian is very interested in applying effective cyber security practices to emerging technology. He is passionate about integrating information security with good engineering so that security enables rather than obstructs capability. \nIan is a Chartered Engineer and holds qualifications in Information Risk Advice\, Penetration Testing\, Computer Forensics and Information Security Management. \n“Grasping New Technology – Securely” \nIn this talk\, Ian challenges the view that cyber security is the exclusive preserve of cyber security experts\, and that by marrying domain knowledge and systems engineering with Information Assurance\, security for emerging technologies\, such as IOT\, can be achieved whilst still grasping the benefits. Information security then becomes one of the enablers for adoption of new technology\, and not a frustrating after-thought. \nHistorically information security has often been applied as an afterthought to new technology proposals\, occurring after significant design decisions have been made\, earning information assurance the reputation of being obstructive\, frustrating users and developers alike. Through this talk Ian will show that by working with domain experts it is possible to establish an approach which marries key information assurance concepts with good systems engineering practice leading to an effective framework for delivering technology with information security. \nIOT presents the world with exciting opportunities arising from the collective use of diverse connected information. These opportunities can only be fully realised if users are able to trust the information sources and processing. Information security is thus a key enabler\, provided it is applied appropriately and effectively. The approach and framework outlined in this talk shows that this is a feasible aspiration. \nClose\n“Why is IoT Security so Hard and What Can We Do About It? – Some Lessons from the Frontline…”\nNick Allott\, CEO at Nquiring Minds \n×Nick Allott\, Nquiring Minds\nNick is CEO and Founder of NquiringMinds\, an award-winning Technology Company specializing in IOT (Internet of Things)\, Cyber Security and Data Analytics. \nNick was formerly CTO of both WAC (Wholesale Application Community) and OMTP\, both major international\, industry joint ventures\, which included all major Mobile Operators and handset manufactures. This followed a tenure as CTO of FastMobile\, a VC invested startup acquired by RIM and Technical Director for Motorola’s European Internet division. \nBefore this Nick held various executive positions at Shell\, Pearson Group\, Dorling Kindersley and Neural Computer Sciences. \nNick has Degree and PhD in Artificial Intelligence. \n“Why is IoT Security so Hard and What Can We Do About It? –  Some Lessons from the Frontline…” \nClose\n“IoT: Attack of the Clone Army?” \nDr Ralf Huuck\, Director & Senior Architect\, Synopsys \n×Dr Ralf Huuck\, Synopsys\nDr Ralf Huuck is a Director and Senior Architect with Synopsys’ Software Integrity Group focusing on software security and automated compliance tools. Earlier Dr Huuck spent over 12 years as a software research leader with R&D lab NICTA and as a CEO with security tools company Red Lizard Software. Dr Huuck is an Adjunct Associate Professor with UNSW\, Australia\, and a renowned author and speaker with over 50 international publications. \n“IoT: Attack of the Clone Army?” \nEach product in the “Internet of Things” space consists of thousands if not millions of identical device creating unprecedented security threats to infrastructure manipulation\, data loss and active denial-of-service attacks. In this talk we highlight why those device similarities lead to a vastly changed threat space compared to classical PC or even mobile system vulnerabilities. Moreover\, we present a number of prevention strategies that can be cost-effectively deployed already during the software and hardware development phases of IoT products. This includes emerging software security analysis and scanning tools that help organizations to manage their in-house development as well as their overall IoT supply chain risks. We also outline the rise of new third-party standards and IoT certification activities that complement individual efforts for creating a more resilient IoT infrastructure. \nClose\n“In Silicon we Trust: How to Fix the Internet of Broken Things”\nCesare Garlati\, Chief Security Strategist\, prpl Foundation \n×Cesare Garlati\, prpl Foundation\nCesare Garlati is an internationally renowned leader in information security. Former Vice President of mobile security at Trend Micro\, Cesare currently serves as Chief Security Strategist at prpl Foundation and Co-chair of the Mobile Working Group at Cloud Security Alliance. Prior to Trend Micro\, Mr. Garlati held director positions within leading mobility companies such as iPass\, Smith Micro Software and WaveMarket. Prior to this\, he was senior manager of product development at Oracle\, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite. \nCesare has been frequently quoted in the press\, including such media outlets as The Economist\, Financial Times\, The Register\, The Guardian\, ZD Net\, SC Magazine\, Computing and CBS News. An accomplished public speaker\, Cesare also has delivered presentations and highlighted speeches at many events\, including the Mobile World Congress\, Gartner Security Summits\, IDC CIO Forums\, CTIA Applications\, CSA Congress and RSA Conferences. \nCesare is a Fellow of the Cloud Security Alliance\, holds a Berkeley MBA\, a BS in Computer Science and numerous professional certifications from Microsoft\, Cisco and Sun. \n“In Silicon we Trust – How to Fix the Internet of Broken Things” \nIn this live-demo session Cesare Garlati\, Chief Security strategist at prpl Foundation and Co-Chair of the Mobile Working Group at Cloud Security Alliance\, will address four key areas which have introduced serious weaknesses into the IoT: the myth of security through obscurity\, connectivity\, unsigned firmware\, and system promiscuity. Mr. Garlati will then demonstrate a new approach to IoT security – based on open source software\, hardware virtualization and interoperable protocols – that can address these vulnerabilities\, which have already been shown to have potentially life-threatening consequences. \nClose\n“Multos Providing Appropriate Trust for IoT Devices?”\nPaul Wilson\, Commercial Manager\, MAOSCO \n×Paul Wilson\, MAOSCO\nPaul Wilson joined the MULTOS Consortium\, MAOSCO\, as Commercial Manager in 2016 bringing with him seventeen years’ experience in smart cards. His career has also spanned the electroplating industry and Royal Navy engineering. His previous six years consisted of business development\, promoting and selling smartcard products and solutions. His role at MAOSCO is relationship management of the MULTOS consortium and strategic business development for the MULTOS technology. \n“Multos Providing Appropriate Trust for IoT Devices” \nThe hype around IoT continues to build. However the issue of adequately securing these connected devices is too often glossed over in all the speculation and excitement about what they will be able to do for us in the future. \nPaul Wilson\, the Commercial Manager of the MULTOS Consortium (www.multos.com) discusses the important topics of device authenticity and integrity as well as data integrity and privacy and how MULTOS\, an open and trusted industry standard employed in the world of payments and ID can be employed to solve these issues. Importantly he will show how this can be done without having to re-invent the wheel\, or indeed spend huge amounts of money on supporting infrastructure and services. \nIn particular he explains how the unique features of the MULTOS operating system and its supporting eco-system can easily be employed to ensure complete lifecycle security. The talk will include demonstrations or a short video clip of MULTOS secured devices in action and how they can be easily provisioned in the field. \nClose\n“Authenticate Everything – Security for the IoT” \nGeert-Jan Schrijen\, CTO at Intrinsic-ID \n×Geert-Jan Schrijen\, Intrintic-ID\nGeert-Jan Schrijen received his Master’s degree in Electrical Engineering from the University of Twente in December 2000 on the topic of `active noise cancellation with multiple loudspeakers‘. In April 2001 he joined the security group of Philips Research in Eindhoven where he worked on digital rights management\, low-power authentication protocols\, private biometrics and Hardware Intrinsic Security™. Work on the latter topic resulted in the spin-off of Intrinsic-ID in October 2008. \nAs a senior algorithm designer within Intrinsic-ID\, Geert-Jan focused on the development of signal processing algorithms and security architectures for hardware-intrinsic key storage systems. In 2012 Geert-Jan became responsible for all development and engineering work at Intrinsic-ID in his role of VP Engineering. In August 2016 he was appointed as CTO of the company. \n“Authenticate Everything – Security for the IoT” \nIn a world where machines talk to other machines\, authentication becomes ever more critical. Smart chips\, from the sensor in your body or in the tires of your car to a powerful processor in a computer or in the Cloud\, will interact in ways that are too complicated and unpredictable for humans to fully comprehend. Authentication ensures the origin and integrity of any data received or instructions sent. Secure authentication needs a foundation in the hardware of devices. A new approach based on Physical Unclonable Functions (PUF) provides a scalable and secure solution that can protect chips over their entire lifetime. \nClose\n“Surely your thing doesn’t need a wire! How to choose an IoT Radio Access Network”\nJoe Milbourn\, Senior Consultant at The Technology Partnership \n×Joe Milbourn\, The Technology Partnership\nJoe is a senior consultant at TTP focused primarily in the modelling\, simulation\, and prototyping of complex systems.  Recent projects have included: connected computer vision systems for applications including the precise measurement of athlete position and analysis of road traffic movement; large scale monitoring and analysis of buildings and industrial installations; the development of very low power sensors connected via low-power\, long-range\, IoT RANs. \nDuring and after his doctoral studies Joe worked for Verigy\, a leading manufacturer of semiconductor test equipment. Joe has a MEng in Computers\, Electronics\, and Communications from the University of Bath and received his PhD in modelling redundant repair structures for DRAM from the University of Durham. \n“Surely your Thing Doesn’t Need a Wire! How to Choose an IoT RAN” \nSecure\, robust\, and resilient networks require a secure\, robust\, and resilient radio access network (unless you can use a wire).  Choosing the most suitable RAN depends not only on these important attributes but also on the range\, bandwidth\, cost\, and geographical coverage provided.  In this talk we’ll develop criteria for choosing a network and apply those criteria to a number of real products. \nClose\n“The roles and goals of identity management in future Smart Cities”\nGert Botha\, Chief Executive Officer at Hive Technology \n×Gert Botha\, Hiving Technology\nGert Botha is the CEO and one of the founding team members of Hive Technology — the Dubai based technology innovation\, consulting and wireless identification company that launched the world’s first single wireless identification technology. He is a seasoned management and technology consultant with 25 years diverse experience in the Public and Private sectors across various industries and countries. \nGert has spent the last 5 years’ side by side with the inventor of the technology\, Terry Ashwin\, aligning Hive’s Single Identification Technology to exactly what the market requires to address the identification of people and objects as the world migrates to a totally connected world where technology becomes pervasive. \nHe stays abreast of technology trends and consults with CIO’s\, CMO’s & CEO’s on technology strategy and how to use technology to innovate client service delivery. \n  \n“The Roles and Goals of Identity Management in Future Smart Cities” \nThis presentation explores the ways the security of Smart Cities is being influenced by different forms of identification and their management. \nIn the digital world of IT there has been a lot of effort put into successful control of access and authentication through use of existing forms of identification. \nBut things need to get physical… In the IoT we need to be sure that the identities of the many Things are clear and defensible. And in Smart Cities there are many specific examples of “physical things” and services of value and the need for easy management of identities. To be “easy” identity management needs to include low cost and widely deployable technologies that can support the marginally profitable business models that are essential in the Smart City environment. \nAs physical identities become manageable for the people in our cities there are opportunities to make the Smart City not just a convenient and secure place but to change the focus towards serving the Smart Citizen. \nClose\n“Towards Effective Security Monitoring for IoT”\nSiraj Shaikh\, Founder & Chief Scientific Officer at CyberOwl \n×Siraj Shaikh\, CyberOwl\nDr. Siraj Ahmed Shaikh is a Reader in Cyber Security at Coventry University. His research is concerned with systems security\, essentially at the intersection of cyber security and systems engineering. He is also the founder and chief scientist at CyberOwl which is developing early warning systems for the cyberspace. He has published over seventy peer-reviewed publications and his work has been funded by EPSRC\, MoD and RAEng. He is a Chartered Fellow of the BCS (FBCS CITP) and a Chartered Scientist (CSci). He is also the Vice-Chair of the TC6 on Communications Systems of the International Federation of Information Processing (IFIP). \n  \n“Towards Effective Security Monitoring for IoT” \nModern communication networks has its roots in connectivity and not accountability. Stealthy threats\, lying low and slow\, make it particularly difficult to monitor for increasingly multi-stage attacks designed to evade detection and defeat attribution. What is the future of network security monitoring in this post-attribution world? Could IoT security pose particular additional challenges of scale and complexity? We explore systematic deployment of target-centric sensing and early warning systems\, reflecting on trends from both industry and academia. \nClose\n“Securing the Internet of Things – an Analyst’s View on the Market” \nAapo Markkanen\, Principle Analyst at Machina Research \n×Aapo Markkanen\, Machina Research\nAapo Markkanen is a Principal Analyst at Machina Research\, where he studies various market and technology issues that will pave the way for\, and shape up\, tomorrow’s connected enterprise. He has a particular research interest in low-power communication technologies (including e.g. LPWA networks and competing mesh-based alternatives)\, the evolution of IoT security\, as well as fog/edge computing and the associated IoT gateways. \nBefore joining Machina Research\, Aapo worked as a Principal Analyst at ABI Research\, where he led various research activities related to M2M\, the Internet of Things\, and big data. \nAapo holds BSc and MSc degrees in management studies from the University of Tampere\, Finland. \n“Securing the Internet of Things – an Analyst’s View on the Market” \nSecurity has in the past year or so become possibly the hottest subject matter in the Internet of Things context. This presentation aims to provide an objective “analyst’s view” view on IoT security. Covering the topic on a relatively strategic level\, it first walks through the key characteristics that make IoT security different from – and often more difficult than – the traditional\, IT-centric cybersecurity\, and discusses what they mean from the perspective of an IoT-driven enterprise. Explored are then also the technology areas that can be currently considered instrumental in implementing robust IoT security\, as well as the ones that warrant attention in the longer term. Finally\, the presentation highlights recent trends and developments in the vendor landscape. \nClose\n“The Future of IoT Security and “Cybercrime””\nCraig Heath\, Director at Franklin Heath \n×Craig Heath\, Franklin Heath\nCraig Heath has worked in computer security since 1988\, on UNIX\, enterprise Java\, mobile\, and embedded device platforms. He provides independent security consultancy\, as well as chairing the IoT Security Foundation’s Working Group 4 and volunteering at Bletchley Park.  Craig is the author of several computer security publications\, including the book “Symbian OS Platform Security”. \n“The Future of IoT Security and “Cybercrime” \nStarting from trends in computer security and computer-enabled crime over the past 30 years and more\, this talk covers current concerns over the security of Internet of Things devices\, and considers the likely outcome over the next 5 to 10 years.  It’s clear that things are changing quickly\, and right now we are hearing many voices of doom\, but at the same time there are some reasons to be hopeful; on balance\, will the world be a safer or a riskier place in years to come? \nClose\n“Industrial IoT Security Issues and Solutions”\nChris Shire\, Business Development Manager at Infineon \n×Chris Shire\, Infineon\nChris Shire has a background in security technologies and semiconductor hardware. He joined Infineon (then Siemens) Chipcard & Security business line in 1998\, with many years experience in the industry. His current focus of activity is with projects in the IOT\, mobile\,identity\, transport ticketing and payment sectors. He is active in helping to set standards for the UK\, and establish new security solutions. \nChris is an active member of the IET\, UK Smart Card Club and has been a guest lecturer for several years on the RHUL Msc course for Smart Card Security. He has written several articles on security technology and contributed to textbooks on the subject. \n“Industrial IoT Security Issues and Solutions” \nIn 2016 the number of installations of  industrial IoT systems is growing fast\, but so are the number of attacks. This presentation will discuss a few high profile attacks\, identify their types and possible countermeasures. Industrial systems often are being connected to the Internet of Things after installation. This presentation will  also discuss what steps should be taken with legacy systems to  improve their security\, with some examples including  FPGA SoC based designs and industrial routers. \nClose\n“I Trust 72.4% of People\, How Many Things Should I Trust?”\nMike Westmacott\, Principal Cybersecurity Consultant at Thales \n×Mike Westmacott\, Thales\nMike works in the technical domain of the cyber security practice and operates broadly on the same basis as an attacker. He has conducted hundreds of penetration tests and audits against a wide variety of systems and targets\, combined with activities such as secure code review\, reverse engineering and wireless assessment. This experience has given Mike a deep understanding of both how security is developed within a system and also how vulnerabilities can be exploited. Mike is a CREST Registered Tester\, CREST Certified Network Intrusion Analyst (CCNIA) and has performed breach assessments in a wide variety of different industry sectors including finance\, eCommerce\, EU and UK government\, and aerospace. \n“I Trust 72.4% of People\, How Many Things Should I Trust?” \nOur daily interactions with one another are deeply entrenched in trust. As humans we build our individual trust relationships based on evidence and our internal and group notions of who is and isn’t trustworthy. How do we extend that trust into the digital world? What is it that forms digital trust between two computers? How do we interact across those two different realms? \nThis talk is for anyone who has ever said “I don’t trust that [expletive] machine!”. We will take a brief look at how human trust works\, and then investigate the digital world and the different ways that trust can be implemented in the IoT. The question of whether human-computer trust (and vice-versa) can truly be realised will be raised\, and consider if trust is a saleable commodity. \nClose\n“The Realities of Maintaining a Secure Software Supply Chain”  \nAdam Boulton\, Senior VP of Security Technology at Blackberry \n×Adam Boulton\, Blackberry\nAdam Boulton is a highly experienced technology security professional and Executive\, with over 12 years’ experience within security engineering. Adam is employed as the Senior Vice President of Security Technology. \nAdam graduated from Sheffield Hallam University in 2005 with a 1st Class BSc (Hons) in Software Engineering. Since graduating Adam has worked in security industry in a variety of technical roles from reverse engineering\, to wide ranging security assessments and secure software development. He has been an individual contributor on a wide range of technologies\, securing both security and safety critical systems. He has gained experience and a deep working knowledge of international product management and business development expertise in the fast moving Smartphone and secure mobile application space. In addition\, Adam provides the strategic direction for BlackBerry Cybersecurity services and delivers security assessments to high assurance markets. \nHis accolades include ISC2 Certified Information Systems Security Professional (CISSP)\, Certified Cloud Security Professional (CCSP)\, Certified Secure Software Lifecycle Professional (CSSLP)\, Qualified Security Team Member (QSTM)\, CyberScheme Team Member (CSTM) and Oracle Certified Java Associate (OCJA) and ISO 27001 Lead Auditor. \n“The Realities of Maintaining a Secure Software Supply Chain” – Co-Presented with Christine Gadsby \nThe monitoring and management of IoT devices in Enterprise and consumer spaces is a multi-faceted security minefield. With consumer demand for product innovation\, increased faster time to market\, and the pressures of investment in secure software development vendors are being pushed to breaking points. Nowhere do we see this as a bigger challenge than with connected vehicles\, combining both safety and security critical systems. This presents an entirely new challenge to the Enterprise with issues maintaining real time security patching for these critical systems. \nBlackBerry has a huge portfolio of embedded devices and IoT solutions. From our handset heritage through to QNX connected vehicles and BlackBerry RADAR\, BlackBerry Cybersecurity Services are sharing their experience and expertise in building safety and security critical systems. They will explore the challenges associated with security patch management for in-market products and services. \nClose\n“The Realities of Maintaining a Secure Software Supply Chain”  \nChristine Gadsby\, Director of Security Response at Blackberry \n×Christine Gadsby\, Blackberry\nChristine Gadsby is the Director of BlackBerry’s global Product Security Incident Response Team (PSIRT). This highly respected team monitors the security threat landscape and responds rapidly to emerging threats for all of BlackBerry’s products and services and those of its’ subsidiaries. \nChristine is passionate about vulnerability management and driving patching within complicated and complex systems. She played a critical role in creating BlackBerry’s 30-day Android patching strategy\, Customer Advisory program\, and leads BlackBerry’s open source software vulnerability management strategy. She has presented security response strategies and services to several high assurance governments including the NSA\, CESG\, CSE\, and GCHQ as well as several enterprise organizations. She has contributed to publications such as CSO magazine and Dark Reading and has spoken as an industry expert at several security industry conferences including Black Hat. She sits on several boards of industry response organizations and programs. She holds a Bachelors of Science degree in Information Technology and in Business Management from Western Governors University. \n“The Realities of Maintaining a Secure Software Supply Chain” – Co-Presented with Adam Boulton \nThe monitoring and management of IoT devices in Enterprise and consumer spaces is a multi-faceted security minefield. With consumer demand for product innovation\, increased faster time to market\, and the pressures of investment in secure software development vendors are being pushed to breaking points. Nowhere do we see this as a bigger challenge than with connected vehicles\, combining both safety and security critical systems. This presents an entirely new challenge to the Enterprise with issues maintaining real time security patching for these critical systems. \nBlackBerry has a huge portfolio of embedded devices and IoT solutions. From our handset heritage through to QNX connected vehicles and BlackBerry RADAR\, BlackBerry Cybersecurity Services are sharing their experience and expertise in building safety and security critical systems. They will explore the challenges associated with security patch management for in-market products and services. \nClose\n“Weaponising IoT”  \nKen Munro\, Partner at Pen Test Partners \n×Ken Munro\, Pen Test Partners\nKen is a security entrepreneur and industry maverick that has worked in infosec for over 15 years. After studying Applied Physics he tried his hand in the hospitality industry but soon discovered a talent for hacking\, persuading a till to print out mortgage amortisations. He went on to cut his teeth in the anti-virus industry before founding SecureTest\, a penetration testing business that quickly established a reputation for delivering high spec services using a boutique business model. NCC Group recognised the value of the proposition and acquired SecureTest in 2007. But Ken had found his calling and his penchant for pen testing saw him set up Pen Test Partners in 2010 which now boasts some of the best ethical hackers in the business\, each of whom has a stake in the firm. \nKen’s zeal for pen testing is matched only by his disdain for those vendors who resort to scaremongering to peddle point solutions. He is a fierce advocate of responsible disclosure and regularly researches and reveals security vulnerabilities in an effort to promote better security design and practice. He takes a key role in conducting investigations as well as encouraging team members to pursue their own research and the results are published on the company blog on a weekly basis as well as being publicised by the wider media. \nKen has a wealth of experience in penetration testing but it’s the systems and objects we come into contact with on an everyday basis that really pique his interest. This has seen him hack everything from hotel keycards\, to keyless cars and a range of Internet of Things (IoT) devices\, from wearable tech to children’s toys and smart home control systems. This has gained him some notoriety among the national press\, leading to regular appearances on BBC TV and BBC News online as well as the broadsheet press\, and he’s also a regular contributor to industry magazines\, penning articles for the legal\, security\, insurance\, oil and gas\, and manufacturing press. \n“Weaponising IoT” \nClose\n“Supply Chain of Trust”\nDavid Dufour\, Cyber Security Architect at Webroot \n×David Dufour\, Webroot\nDavid is a leader in the computer security and threat analytics industry with over 28 years of experience designing and implementing automated threat detection and remediation solutions with top tier software and hardware manufactures in the traditional IT space and the emerging IoT security landscape. He is currently Head of Security Architecture at U.S. based Webroot\, Inc. where his experience with machine learning\, contextual analytics\, integration automation and forensics has led to the development of several cutting edge solutions for mapping threat landscapes and the use of predictive algorithms for pre-attack determination. \n“Supply Chain of Trust” \nClose\nMark Zwolinski\, Professor of Electronics and Computer Science at University of Southampton \n×Mark Zwolinski\, University of Southampton\nMark Zwolinski is currently a Professor in the School of Electronics and Computer Science\, University of Southampton. He has authored two textbooks on digital design and has co-authored a third. He has written over 190 papers in the areas of EDA and test. His current research interests include hardware reliability\, fault tolerance\, behavioral modeling and hardware security. Dr. Zwolinski is a Fellow of IET and BCS and Senior Member of IEEE and ACM. \nClose\nJeff Day\, Senior Security Consultant at BT \n×Jeff Day\, BT\nJeff is Chair of the IoTSF Working Group 2 and a senior security consultant for British Telecommunications plc. With a background in software development and network administration\, Jeff now designs security into a variety of platforms\, networks & devices\, and has written some BT internal specifications and standards. As a member of the British Computer Society\, Jeff sits on their Security Community of Expertise body (SCoE) which acts as the security resource for the BCS\, working with government and industry to make IT in the UK a safer place to operate. Through SCoE he is also working with the Institute of Statecraft to deliver a new ethical cyber education programme for young people\, to help them make informed decisions about cyber safety and develop broad ethical & technical skills that will set them up for productive careers in the UK. Jeff is a Certified Information Systems Security Professional\, an accredited member of the Institute of Information Security Professionals\, a member of the Institute of Telecommunications Professionals\, and holds a Postgraduate Diploma in Computing for Commerce & Industry. \nClosePANEL\nUnited We Stand; Addressing the Bigger Challenges of IoT Security with Collaboration\n\nAbraham Joseph\, Founder & Editorial Director\, IoT Insights \n×Abraham Joseph\, Founder & Editorial Director\, IoT Insights \nAbraham is Founder and Editorial Director of IOT Insights and Chairman of the Device Management Forum. \nHe has over 20 years’ experience in telecommunications and IT and has managed major projects for investors\, regulators\, telecommunications and cable TV operators\, equipment vendors\, independent software vendors and enterprises. \nPrior to founding Device Management Forum\, he was Director of Consulting at Gartner and Consulting Director at Ovum. Previously he worked for over ten years in a variety of strategy\, business development\, marketing and product management roles at Alcatel and Nortel\, and as IT manager at a major UK health district. \nHe has written for and been featured in a number of publications including the Wall Street Journal\, the Sunday Telegraph\, Total Telecom and Mobile Europe. \nHe is a frequent chairman\, speaker and moderator at international conferences on a broad range of topics. He was organiser and chairman of IoT Summit at CeBIT 2016 and is currently developing the programme for IoT Summit 2017. \nHe has an MBA from Strathclyde Graduate Business School and a BSc in Electrical and Electronic Engineering from Polytechnic of the South Bank (South Bank University London). \nClose\nHugh Boyes\, Member of the Information Technology Policy Panel at The IET \n×Hugh Boyes\, The IET\nHugh Boyes is a Chartered Engineer\, a Fellow of the Institution of Engineering and Technology (IET) and holds the Certified Information Systems Security Professional (CISSP) credential issued by the International Information Systems Security Certification Consortium [(ISC)2]. \nHe divides his time between working as a Principal Fellow at the University of Warwick\, acting as the Cyber Security lead for IET\, and undertaking cyber security consultancy assignments. \nHe is one of the few cyber security specialists in the UK who focuses on cyber security of the built environment. He is the technical author on the recently published PAS1192-5 ‘Security-minded building information modelling\, digital built environments and smart asset management. \nAt the University his research interests relate cyber resilience and the cyber security of cyber-physical systems\, whilst at the IET he focuses on develop cyber security skills initiatives for engineering and technology communities and has published guidance and a code of practice on cyber security of the built environment. \nClose\nGilli Coston\, Founding Board Member at the International M2M Council \n×Gilli Coston\, International M2M Council\nA senior leader in the field of The Internet of Things\, M2M and Telecoms\, Gilli Coston’s pedigree and background spans 3 decades developing business and commercial partnerships in senior management and leadership roles.  Gilli has spent many years building high performing teams and held key roles such as Chief Strategy Officer\, Managing Director and now Vice President of Marketing in this dynamic technology and telecoms industry. \nGilli served 20 years with Telefonica and O2UK in the field of fleet & asset management as well as SMART metering and security management creating strategic partnerships\, new innovations and significant business development in a General Manager capacity.  Gilli then joined CGI a leader in the Systems Integration space\, Gilli developed strategy and solutions in The Internet of Things. \nJoining KORE (then Wyless) in 2013 as Chief Strategy officer and Managing Director of EMEA as part of the senior management team drove the growth and development of new business ahead of the acquisition of Wyless by KORE in April 2016. \nGilli currently holds the position as Vice President for Marketing – Products and strategic partnerships\, Gilli continues to promote high performance\, diversity and equality within KORE and within the Internet of Things industry.  She is a key sponsor of many Women in Technology & Telecoms sectors and performs as a board member of The Internet of Things and M2M Council\, established to promote strong working practices of Internet of Things and is a keen mentor for various Women in technology groups and individuals. \nClose\nJohn Haine\, Chairman of the IoT Security Foundation \n×John Haine\, IoT Security Foundation\nJohn Haine has spent his career in the electronics and communications industry\, working for British Telecom\, Marconi\, PA Consulting\, and with start-ups including Cognito and Ionica.  His technical background includes R&D in radio circuitry and microwave circuit theory; and the design of novel radio systems for cordless telephony\, mobile data\, and fixed wireless access.  He has led standardisation activities in both the latter areas in ETSI\, and contributed to WiMax. \nIn 1999 he joined TTP Communications working on research\, technology strategy and M&A activities; and after the company’s acquisition by Motorola became Director of Technology Strategy in Motorola Mobile Devices.  After leaving Motorola he was CTO Enterprise Systems with ip.access Limited\, the leading manufacturer of GSM picocells and 3G femtocells.  In early 2010 he joined Cognovo Limited\, which was acquired by u-blox AG in 2012. In u-blox John worked on RF platform strategy for future wireless modules.  He led u-blox’ involvement in a major 3GPP standards activity on low complexity cellular communications for the Internet of Things\, and the company’s early development of devices for trials and demonstrations. Now retired from u-blox he is Royal Academy of Engineering Visiting Professor at Bristol University\, focusing on Radio Systems for the Internet of Things. \nJohn has a first degree from Birmingham (1971) and a PhD from Leeds (1977) universities.  He is a member of the IET and IEEE and serves on the Cambridge Wireless Board. \nClose\nArt Swift\, President of the prpl Foundation \n×Art Swift\, prpl Foundation\nArt Swift is president of the prpl Foundation\, a technology non-profit promoting the development of open source software for embedded computing. He has more than 25 years of executive-level experience in the tech industry\, including CEO at low power chip-maker Transmeta (NASDAQ\, TMTA)\, CEO of mobile security supplier CUPP Computing AS\, CEO of nanotech innovator Unidym\, and vice president of marketing and business development at MIPS\, a leading provider of microprocessor IP. \nClose\nIdris Jahn\, Principal Consultant – Health and Data at IoTUK \n×Idris Jahn\, Principal Consultant – Health and Data at IoTUK\nIdris has over 20 years of experience in data integration and real-time systems. Much of his work has involved defining new and exciting use-cases for the Internet of Things. He is currently helping businesses to advance their healthcare solutions using IoT. Idris is also helping IoTUK to co-ordinate two NHS test beds using IoT for dementia and diabetes. \nIdris is also familiar with integration standards related to the IoT including MQTT and HyperCat. For the past 10 years Idris has been identifying IoT opportunities where multiple high velocity data sources need to be to analysed very quickly using Apama Complex Event Processing. This has given Idris opportunities to create real-time solutions for manufacturing optimisation; personalised consumer engagement for retailers\, sports clubs and mobile operators; social media analytics including sentiment for proactive support; improved patient engagement in healthcare using mobile and wearable devices. Idris has a BSc in Physics from UMIST and an MSc in Computer Science from Staffordshire University. \nCloseSPONSORS\nMEDIA PARTNERS\nEVENT PARTNERS & SUPPORTING ASSOCIATIONS\n \nFrom £295 ex-VAT \nACCOMODATION
URL:https://iotsecurityfoundation.org/event/iot-security-foundation-conference-2016/
LOCATION:The IET Savoy Place\, 2 Savoy Place\, London\, WC2R 0BL\, United Kingdom
CATEGORIES:Conference
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161130
DTEND;VALUE=DATE:20161202
DTSTAMP:20260503T202113
CREATED:20160113T154424Z
LAST-MODIFIED:20190619T094755Z
UID:13839-1480464000-1480636799@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Industry of Things Summit Asia
DESCRIPTION:The rise of digital technologies is transforming almost every aspect of modern life. A cluster of technological advances is changing how people live\, work and play. Physical and virtual areas of our lives are increasingly becoming intertwined. More and more of our interactions are mediated by machines. \nThe Internet of Things\, M2M (machine to machine) hyper-connectivity\, wearable technology\, intelligent living and ubiquitous computing are all increasingly important areas. The common underlying agenda is to develop new forms of connectivity\, new types of digital relationships\, and anchor opportunities presented by the greater integration of connected technologies into everyday lives. \nBoasting an interactive\, cutting edge agenda with visionary speaker line-up\, Smart Summit Asia is the platform for global authorities to present their “how-to” strategy and vision for a smart future. \nMake sure you are present on the 30th November and 1st December for THE Smart Home\, Smart City and Industrial Internet event of 2016. \n  \nFor more information\, please visit the Industry of Things Summit Asia website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-industry-of-things-summit-asia/
LOCATION:Copthorn Grand\, 392 Havelock Road\, 169663\, Singapore
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161115T080000
DTEND;TZID=Europe/London:20161116T170000
DTSTAMP:20260503T202113
CREATED:20161104T120853Z
LAST-MODIFIED:20190619T094756Z
UID:15539-1479196800-1479315600@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Addressing the technical challenges for enterprises deploying IoT solutions
DESCRIPTION:Enterprise network architects\, builders\, developers and technology professionals will play a pivotal role in driving IoT innovation and business adoption in 2016 and beyond. However\, there are huge challenges ahead. There is a growing requirement to connect the disparate parts of a distributed IoT business solution – from mobile devices\, to wearables and sensors\, to cloud and on premise legacy enterprise systems. Together with security and privacy concerns\, a lack of standards and the overwhelming volume of IoT platforms\, it can be a real challenge to make the right technology choices for the enterprise. \nIoTBuild provides a unique opportunity to join technology leaders\, innovators and peers to tackle the challenges of technology selection and building the Internet of Things. If you are moving from thinking about IoT to deploying IoT networks then this is an Forum is for you. The Forum will take place on the 15th & 16th November 2016 at the Doubletree by Hilton Tower Bridge\, London. Attendees represent the Retail\, Manufacturing\, Healthcare\, Transportation\, Smart Cities\, Financial services\, Energy\, Automotive and other industries whose plans for IoT are/have just got started. Job functions will vary depending on which department has been tasked with the IoT projects\, ranging from the CTO & CIO to Heads of Solutions Architecture\, Enterprise Architecture\, Software Engineering\, Application Development and more. \nTop 5 case studies: \n\nHear from Hive how customer focus\, roll-out planning and scaling was key to success \nLearn how Specsavers created a smart retail environment using IoT \nUnderstand how interoperability issues were overcome in Oxford’s IoT flood defence project \nHear ING address the challenges of building a real-time IoT analytics engine for enterprise \nDiscover how the TVH Group built an IoT-enabled predictive maintenance solution to seize competitive advantage\n\n  \nFor more information and to register\, visit the IoT Build website
URL:https://iotsecurityfoundation.org/event/addressing-the-technical-challenges-for-enterprises-deploying-iot-solutions/
LOCATION:DoubleTree by Hilton Hotel London\, 7 Pepys Street\, London\, EC3N 4AF\, United Kingdom
CATEGORIES:Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161109
DTEND;VALUE=DATE:20161111
DTSTAMP:20260503T202113
CREATED:20160622T124623Z
LAST-MODIFIED:20190619T094756Z
UID:14640-1478649600-1478822399@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: LPWAN World Forum
DESCRIPTION:  \nIoTSF Members receive a 20% discount on conference tickets. Please contact Rachel Palmer to receive the discount code.\nLPWAN World Forum is a 2 day conference and exhibition covering Low Power Wide Area Networks and its impact on IoT technology. \nHear from over 40 visionary speakers and leading case studies on how LPWANs are enabling a much wider range of M2M and Internet of Things (IoT) applications. \nTake part in roundtable discussions for in-depth learning and network with peers and colleagues in our exhibition and demo area. Gain a unique insight from the major industry contributors. \nMake sure you are present in London on the 9th and 10th November for THE IoT Networks event of 2016. \n  \nFor more information and to register\, please visit the LPWAN World Forum website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-lpwan-world-forum/
LOCATION:1 West Ferry Circus\, London\, E14 4HD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161101T123000
DTEND;TZID=Europe/London:20161101T160000
DTSTAMP:20260503T202113
CREATED:20160817T102608Z
LAST-MODIFIED:20190619T094756Z
UID:14928-1478003400-1478016000@iotsecurityfoundation.org
SUMMARY:IoTSF Members Plenary Session 7
DESCRIPTION:IoTSF members are invited to join us for our seventh plenary session\, hosted by KPMG. This plenary session follows the progress of the Working Groups and operations updates. \nThis event is for IoTSF members and invited guests only.  If you are not a member and would like to attend\, please email Jenny Devoy \n\n[button link=”https://www.eventbrite.co.uk/e/iotsf-plenary-session-7-tickets-27150150832″ color=”default” size=”medium” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”yes” icon_position=”left” modal=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ alignment=”right” class=”” id=””]REGISTER HERE[/button]
URL:https://iotsecurityfoundation.org/event/iotsf-members-plenary-session-7/
LOCATION:KPMG.\, 15 Canada Square\, London\, E14 5GL
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161020
DTEND;VALUE=DATE:20161022
DTSTAMP:20260503T202113
CREATED:20160414T090554Z
LAST-MODIFIED:20190619T094756Z
UID:14356-1476921600-1477094399@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: IoT Tech Expo North America
DESCRIPTION:The Internet of Things (IoT) Tech Expo Event will bring together key industries from across America for two days of top level content and discussion. Industries include Manufacturing\, Transport\, Health\, Logistics\, Government\, Energy and Automotive. Introducing and exploring the latest innovations within the Internet of Things\, this conference is not to be missed. \nTaking place in North America this October\, the IoT Tech Expo North America will host thousands of attendees including IT decision makers\, developers & makers\, OEM’s\, government and local council officials\, automotive exec’s\, operators\, technology providers\, investors\, venture capitalists and many more. IoT Tech Expo Europe is set to showcase the most cutting edge technologies from more than 100 exhibitors and provide insight from over 200 speakers sharing their unparalleled industry knowledge and real-life experiences. \nThis year’s Expo will highlight the most innovative advancements in technologies which are affecting IoT. There will be cases and dedicated tracks covering the entire Internet of Things ecosystem including Smart Cities\, Connected Living\, Wearables\, Developing for the Internet of Things\, Connected Health\, Connected Industry and Data & Security. \nAttendees are expected from across the entire IoT industry with representatives from sectors including government\, energy\, education\, transportation\, healthcare\, manufacturing\, M2M and many more. Take advantage of this opportunity to experience two days of discussion\, exploration\, in-depth analysis and high level networking at this year’s IoT Tech Expo. \n  \nFor more information and to register\, please visit the IoT Tech Expo website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-tech-expo-north-america/
LOCATION:Santa Clara Convention Centre\, 5001 Great America Parkway\, Santa Clara\, CA\, 95054\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161017T130000
DTEND;TZID=Europe/London:20161019T220000
DTSTAMP:20260503T202113
CREATED:20160926T090230Z
LAST-MODIFIED:20190619T094757Z
UID:15131-1476709200-1476914400@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: IoT Security Summit\, Boston
DESCRIPTION:  \nIoTSF are proud to be a supporting association of the 2016 IoT Security Summit\, Boston. \nIn its second year\, IoT Security 2016 is the only event of its kind to focus on the security and privacy issues surrounding IoT and how to manage the information and data associated with the rapidly increasing amount of connected devices.  \nBringing 550+ decision makers\, influencers and stakeholders together under one roof\, IoT Security will feature an expert speaker line-up\, Blockchain 360 pre-event day\, interactive Learning Labs\, case studies and networking parties designed to ignite discussion and enable business partnerships.  \nFor more information about the show or to register for a pass\, visit https://tmt.knect365.com/iot-security/  \nAs a supporting association\, IoTSF has arranged a 20% discount off passes with code: IOTSF20
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-security-summit-boston/
LOCATION:HYNES CONVENTION CENTER\, Boston\, MA\, 02115\, United States
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2016/09/IoT-Security-Summit_logo_RGB.jpg
ORGANIZER;CN="Morgan Johnson":MAILTO:Morgan.Johnson@knect365.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161012
DTEND;VALUE=DATE:20161014
DTSTAMP:20260503T202113
CREATED:20160728T113542Z
LAST-MODIFIED:20190619T094757Z
UID:14789-1476230400-1476403199@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Monetizing IoT Copenhagen
DESCRIPTION:There are hundreds of IoT conferences all around the world. What makes this one different?  The summit of experts will deliver advice and best practice examples that will support your business to successfully implement IoT technology. It’s also your opportunity to put your questions to those who have proven track record in making the most of the benefits IoT could bring to your company. \nPlease note\, IoT Security Foundation members are entitled to a 10% discount. Please\, contact IoTSF if interested. \nFor more information\, please visit Monetizing IoT website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-monetizing-iot-copenhagen/
LOCATION:Copenhagen Marriott Hotel\, Kalvebod Brygge 5\, Copenhagen\, 1560\, Denmark
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161010T130000
DTEND;TZID=Europe/London:20161010T170000
DTSTAMP:20260503T202113
CREATED:20160916T111859Z
LAST-MODIFIED:20190619T094757Z
UID:15101-1476104400-1476118800@iotsecurityfoundation.org
SUMMARY:IoTSF Virtual Plenary Meeting
DESCRIPTION:Our next IoTSF Plenary Meeting will be taking place virtually. \nMore information regarding the plenary meeting and agenda will be available soon. \n  \n[button link=”https://www.eventbrite.co.uk/e/iotsf-virtual-plenary-session-tickets-27700357515″ color=”default” size=”large” type=”3d” shape=”” target=”_blank” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”yes” icon_position=”right” modal=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ alignment=”right” class=”” id=””]REGISTER HERE[/button]
URL:https://iotsecurityfoundation.org/event/iotsf-virtual-plenary-meeting/
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
END:VCALENDAR