BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//IoT Security Foundation - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://iotsecurityfoundation.org
X-WR-CALDESC:Events for IoT Security Foundation
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20150329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20151025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20160327T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20161030T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20170326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20171029T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:20180325T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:20181028T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170216
DTEND;VALUE=DATE:20170218
DTSTAMP:20260503T213123
CREATED:20170112T154211Z
LAST-MODIFIED:20190619T094753Z
UID:16233-1487203200-1487375999@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: World eSIM Summit
DESCRIPTION:  \nEmbedded SIM (eSIM) has long been desired by the equipment manufacturers\, in particular those focused on M2M and IoT. Benefits of programmable SIM are numerous – from the security/protection of the SIM to the remote provisioning. Now eSIM came to revolutionize the mobile telecommunications industry: the fixed-connectivity service of traditional (removable) SIM cards will be eventually replaced by the dynamic connectivity features of embedded SIMs. Earlier this year GSMA released a specification that allows consumers to remotely activate the SIM embedded in a device such as a smart watch\, fitness band or tablet. The process currently under way may lead to widespread industry adoption of eSIMs in the very near future. What challenges and opportunities does this eSIM disruption mean for the industry’s stakeholders?  World eSIM summit is designed as a dynamic networking event that will delve into cross-industry transformation taking place due to the eSIM revolution\, by gathering together top level executives and experts from mobile telecommunication\, technology solution providers\, connected device manufacturers and automotive. \n  \nFor more information\, please visit the World eSIM Summit website. \n 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-world-esim-summit/
LOCATION:Jalta Hotel\, Prague\, Czech Republic
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170208T100000
DTEND;TZID=Europe/London:20170210T160000
DTSTAMP:20260503T213123
CREATED:20161025T131942Z
LAST-MODIFIED:20190619T094754Z
UID:15280-1486548000-1486742400@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Internet of Things India 2017 Expo
DESCRIPTION:  \n  \n  \n  \n  \nInternet of Things (IoT) will revolutionize\, transform & create business opportunities for industries to become connected to an extent that has never been possible before. The Internet of Things is creating a new world\, a quantifiable and measureable world\, where people and businesses can manage their assets in better informed ways. By sensing our surrounding environment\, the IoT will create many practical improvements in our world\, increasing our convenience\, health and safety\, while at the same time improving energy efficiency and comfort. The IoT will be a new source of wealth creation. Several IoT-enabled services will be transformational\, driving impacts by connecting different elements of various industries together in new ways. \n“Internet of things India Expo 2017”(IoTIe) will be organised along with 25th Convergence India 2017 expo from 8-10 February at Pragati Maidan\, New Delhi. The show will bring together IoT ecosystem including hardware\, services\, software and governing bodies. It will cover development areas and future of IoT in India including Smart Cities\, Wearables\, Design applications\, enablers\, Industrial IoT\, data analytics. It will be supported by conferences\, business meetings\, startup showcase and investors insights. It is the India’s premier business platform to enhance knowledge\, share ideas\, networking and plan for future. \nClick here for more event information & registration.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-internet-of-things-india-2017-expo/
LOCATION:Pragati Maidan\, Mathura Road\, Railway Colony\, New Delhi\, Delhi\, 110002\, India
CATEGORIES:Conference
ORGANIZER;CN="Shishir Lahoti":MAILTO:shishirl@eigroup.in
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170207
DTEND;VALUE=DATE:20170209
DTSTAMP:20260503T213123
CREATED:20170113T090326Z
LAST-MODIFIED:20190619T094754Z
UID:16246-1486425600-1486598399@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: Internet of Manufacturing
DESCRIPTION:  \nIndustrie 4.0 is creating profound opportunities for manufacturers to transform business models\, innovate new products and increase productivity. \nThe 2nd Annual Internet of Manufacturing will bring together over 150 manufacturing leaders across Europe to discuss how to realise the potential of IoT and stay competitive in a rapidly evolving market. Inspiring keynotes will be combined with results-driven case studies and perspectives from government and standardisation bodies to help accelerate the industry’s readiness for change. \nTop 5 challenges to be addressed:  \n\nMaximise the profitability of your connected product business model – how can IoT drive business growth and innovation?\nIntelligent factories- how can IoT increase production efficiency and quality?\nThe data-driven enterprise- how to use IoT data to fuel insightful decisions and deliver customer value\nGerman Mittelstand and Industrie 4.0 -how the most innovative SMEs are avoiding being left behind\nMinimise your risk of a cyber-attack- how to develop a robust and proactive IoT security strategy\n\nVisit the website for more information – http://www.internetofbusiness.net/manufacturing/
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-internet-of-manufacturing/
LOCATION:Hotel Vier Jahreszeiten Kempinski München\, Maximilianstraße 17\, München\, 80539\, Germany
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20170123
DTEND;VALUE=DATE:20170125
DTSTAMP:20260503T213123
CREATED:20160414T091250Z
LAST-MODIFIED:20190619T094754Z
UID:14359-1485129600-1485302399@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: IoT Tech Expo Europe
DESCRIPTION:The Internet of Things (IoT) Tech Expo Event will bring together key industries from across Europe for two days of top level content and discussion. Industries include Manufacturing\, Transport\, Health\, Logistics\, Government\, Energy and Automotive. Introducing and exploring the latest innovations within the Internet of Things\, this conference is not to be missed. \nTaking place in London’s Olympia on the 23-24th January\, Europe’s leading IoT event will host IT decision makers\,developers & makers\, OEM’s\, government and local council officials\, automotive exec’s\, operators\, technology providers\, investors\, venture capitalistsand many more. IoT Tech Expo Europe is set to showcase the most cutting edge technologies from more than 100 exhibitors and provide insight from over 200 speakerssharing their unparalleled industry knowledge and real-life experiences. \nThis year’s Expo will highlight the most innovative advancements in technologies which are affecting IoT. There will be cases and dedicated tracks covering the entire Internet of Things ecosystem including Smart Cities\, Connected Living\, Developing & Tech in the IoT\, Connected Industry and Data & Security. \nWith previous attendees from the likes of Google\, Blackberry\, Thames Water\, National Grid\, Nokia\, IBM and Cisco to name a few\, the IoT Tech Expo is shaping up to be the IoT event not to be missed in 2017. \nAttendees are expected from across the entire IoT industry with representatives from sectors including government\, energy\, education\, transportation\, healthcare\, manufacturing\, M2M and many more. Take advantage of this opportunity to experience two days of discussion\, exploration\, in-depth analysis and high level networking at this year’s IoT Tech Expo. \n  \nFor more information and to register\, please visit the IoT Tech Expo website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-tech-expo-europe/
LOCATION:Olympia\, Hammersmith Road\, Kensington\, London\, W14 8UX\, United Kingdom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170119T160000
DTEND;TZID=Europe/London:20170119T170000
DTSTAMP:20260503T213123
CREATED:20161214T131956Z
LAST-MODIFIED:20190619T094755Z
UID:16190-1484841600-1484845200@iotsecurityfoundation.org
SUMMARY:IoTSF Promotes: Webinar IoT Security Automation for Connected Surveillance Cameras
DESCRIPTION:Solving one of today’s biggest security challenges: IoT Security Automation for Connected Surveillance Cameras\nJanuary 19th at 16:00 GMT\, 11:00 EST\, 8:00 PST\nWith recent camera attacks there is a need for increased IoT security posture. \nThe DDoS attack carried out by hackers using tens of millions of unprotected IoT devices has presented what security pros have known for a long time: IoT devices are vulnerable to attacks. In this attack\, millions of webcams were unknowingly recruited to conduct the attack on major ISPs. Many of these webcams are now being recalled. \nFind out exactly how to increase your IoT security posture\, from experts at Device Authority \n\nManufacturer-Independent Security\n\n\nAutomated Camera Security Management\n\nDevice registration\nCertificate provisioning\nPassword management\n\n\n\n\nScalability\n\nLarge-scale security automation for system integrators and customers\n\n\n\nVisit the Event page here.
URL:https://iotsecurityfoundation.org/event/iotsf-promotes-webinar-iot-security-automation-for-connected-surveillance-cameras/
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2016/12/Device-authority-webinar.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20170112T183000
DTEND;TZID=Europe/London:20170112T213000
DTSTAMP:20260503T213123
CREATED:20161209T124851Z
LAST-MODIFIED:20190619T094755Z
UID:16171-1484245800-1484256600@iotsecurityfoundation.org
SUMMARY:IoTSF promotes: How to Secure the Internet of Things
DESCRIPTION:John Moor\, Managing Director of the IoT Security Foundation\, will present as guest speaker at the next Hardware Pioneers event: How to Secure the Internert of Things. \nWhat a better way of starting the new year than talking about one of the most discussed and controversial topics of the Internet of Things: security.\nIn order to deep dive into the present and future challenges of IoT security we have invited at Hardware Pioneers three top UK experts from UL\, IoT Security Foundation and TechUK. \nDrinks will be served throughout the night. \n>Learn more on the Event website.
URL:https://iotsecurityfoundation.org/event/iotsf-promotes-how-to-secure-the-internet-of-things/
LOCATION:TechUK\, 10 St Bride Street\, London\, EC4A 4AD
ATTACH;FMTTYPE=image/png:https://iotsecurityfoundation.org/wp-content/uploads/2016/12/iotsf-promo-event.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161206T083000
DTEND;TZID=Europe/London:20161206T190000
DTSTAMP:20260503T213123
CREATED:20161031T094510Z
LAST-MODIFIED:20190619T094755Z
UID:15382-1481013000-1481050800@iotsecurityfoundation.org
SUMMARY:IoT Security Foundation Conference 2016
DESCRIPTION:Register TodayCONFERENCE COUNTDOWN0000Days00Hrs00Min00SecCONFERENCE OVERVIEW\nBuilding an Internet of Trust\nSecurity is often considered in strictly technical terms\, but in the future worlds of IoT\, many parties will be involved in delivering and maintaining devices\, data and services – from chip vendors and software developers through ODM’s to service providers. Maintaining security needs not just good encryption\, it demands that every party in the supply chain recognises the importance of security and implements it in the business processes\, products and systems. Somehow industry needs to build a “chain of trust” which will allow each player to identify trusted suppliers and in turn provide trusted products and services to their customers. \nThe conference will look at what it takes to build an Internet of Trusted Things\, what is currently underway\, what we can learn from the past to predict the future and the necessary duties of care providers and adopters need to ensure. \nThis 2nd IoT Security Foundation Conference is a one-day event and follows on from the 2015 conference held at the Royal Society and the original IoT Security Summit at Bletchley Park. \nThe primary targeted audiences for the conference are the technology providers and the technology adopters of IoT\, alongside academia\, press\, government and wider stakeholder groups. \nOnce again the 2016 IoTSF Conference is set to have a senior and expert level line up of speakers – we’ll be making successive announcements along the way on this website and via our newsletter (register with this site to receive updates). \nAn accompanying table-top exhibition will complement the conference track and the day ends with a drinks reception allowing extra time to discuss the themes of the day and additional networking. \nAGENDA\nDownload Agenda\n \nStrategic Track – Kelvin Theatre\n\nTechnical Track – Turin Theatre\n09:15-10:00 Welcome & Keynote Speaker\n\n“Welcome” John Moor\, MD IoT Security Foundation\n“What will Security Standards and Certification Look Like Ten Years from Now?” – Ross Anderson\, Professor of Security Engineering\, University of Cambridge\n\n10:00-11:00 Strategic Session 1: The Big Picture\n\n “I Trust 72.4% of People\, How Many Things Should I Trust?” – Mike Westmacott\, Principal Cybersecurity Consultant at Thales\n“The Future of IoT Security and “Cybercrime”” – Craig Heath\, Director at Franklin Heath\n\n10:00-11:00 Technical Session 1\n\n“Welcome to the technical track” – Jeff Day\, BT\n“Why is IoT Security so Hard and What Can We Do About It? – Some Lessons from the Frontline…”- Nick Allott\, CEO at Nquiring Minds\n\ng \nBreak\n11:30-13:00 Strategic Session 2: IoT Security in Context\n\n“Protecting the Connected Car” – Martin Borrett\, CTO at IBM Security Europe\n“The roles and goals of identity management in future Smart Cities” – Gert Botha\, Chief Executive Officer at Hive Technology\n“Grasping New Technology – Securely” Ian Phillips\, Information Security Architect at Roke Manor Research\n\n11:30-13:00 Technical Session 2\n\n“In Silicon we Trust: How to Fix the Internet of Broken Things” – Cesare Garlati\, Chief Security Strategist at prpl Foundation\n“Authenticate Everything – Security for the IoT” – Geert-Jan Schrijen\, CTO at Intrinsic-ID\n“Towards Effective Security Monitoring for IoT” – Siraj Shaikh\, Founder & Chief Scientific Officer at CyberOwl\n\nLunch\n14:00-15:30 Strategic Session 3: Practical Guides to Improving Security\n\n“Supply Chain of Trust” – David Dufour\, Cyber Security Architect at Webroot\n“How not to be a headline for IoT Security” – Richard Marshall\, Managing Consultant at Xitex\n\ng \ng \ng \n14:00-15:30 Technical Session 3\n\n“IoT: Attack of the Clone Army?” – Dr Ralf Huuck\, Director & Senior Architect at Synopsys\n“Industrial IoT Security Issues and Solutions” – Chris Shire\, Business Development Manager at Infineon\n“Multos Providing Appropriate Trust for IoT Devices?” – Paul Wilson\, Commercial Manager at MAOSCO\n\nBreak\n16:00-17:30 Strategic Session 4: Addressing Security Through Collaboration\n\n“Securing the Internet of Things – an Analyst’s View on the Market” – Aapo Markkanen\, Principle Analyst at Machina Research\n“United We Stand; Addressing the Bigger Challenges of IoT Security with Collaboration” Panel Session featuring representatives from the IET\, International M2M Council\, IoTUK\, PRPL Foundation and IoTSF\n\ng \n16:00-17:30 Technical Session 4\n\n“Surely your thing doesn’t need a wire! How to choose an IoT Radio Access Network” – Joe Milbourn\, Senior Consultant at The Technology Partnership\n“The Realities of Maintaining a Secure Software Supply Chain” Christine Gadsby\, Director of Global Product Security & Adam Boulton\, SVP Security Technology at Blackberry\n“Weaponising IoT” Ken Munro\, Partner at Pen Test Partners\n\nResume in the Kelvin Theatre\n\nClosing Remarks & 2017 Outlook – John Haine\, IoTSF Chairman\n\n17:40-19:00 Drinks Reception\nSPEAKERS\nclick on speaker picture for abstract and biography \n\n“What will Security Standards and Certification Look Like Ten Years from Now?”\nRoss Anderson\, Professor of Security Engineering\, University of Cambridge \n×Ross Anderson\, University of Cambridge\nRoss John Anderson\, FRS\, FREng\, is a researcher\, writer\, and industry consultant in security engineering. He is Professor of Security Engineering at the Computer Laboratory\, University of Cambridge where he is part of the Security Group. Anderson’s research interests are in security\, cryptology\, dependability and technology policy. \nIn cryptography\, he designed with Eli Biham the BEAR\, LION and Tiger cryptographic primitives\, and co-wrote with Biham and Lars Knudsen the block cipher Serpent\, one of the finalists in the Advanced Encryption Standard (AES) competition. He has also discovered weaknesses in the FISH cipher and designed the stream cipher Pike. In 1998\, Anderson founded the Foundation for Information Policy Research\, a think tank and lobbying group on information-technology policy. Anderson is also a founder of the UK-Crypto mailing list and the economics of security research domain. \nHe is well-known among Cambridge academics as an outspoken defender of academic freedoms\, intellectual property and other matters of university politics. He is engaged in the ″Campaign for Cambridge Freedoms″ and has been an elected member of Cambridge University Council since 2002. In January 2004\, the student newspaper Varsity declared Anderson to be Cambridge University’s “most powerful person”. \nAnderson was elected a Fellow of the Royal Society (FRS) and a Fellow of the Royal Academy of Engineering (FREng) in 2009. \n“What will security standards and certification look like ten years from now?” \nThe “embedded systems” of 20 years ago became “things that think” a decade ago; the hype is now about the “Internet of Things” and no doubt by 2026 the marketing folks will have come up with a fresh slogan. However several trends are now visible as computers and communications find their way into all sorts of devices. \nFirst\, security is mostly an aspect of safety; indeed most European languages use the same word for both (Sicherheit\, surete\, seguridad\, sicurezza…).\nSecond\, although there are some cross-cutting technical standards (such as for crypto algorithms and protocols) and operational norms (such as the disclosure of breaches and vulnerabilities)\, these are by no means enough. Just as we don’t rely on product liability law to ensure car safety but have a large body of regulation around testing and type approval\, so also we have a growing body of standards and regulation around the security of everything from tachographs to smart meters. \nThird\, as regulators in fields from electric power distribution to healthcare realise they have to start thinking about malice as well as error and mischance\, security standards and certification will continue to get ever more complex. We have already seen conflicts between policy goals; cars today are easy to steal because of crypto export restrictions in the 1990s when their remote key entry systems were being designed. \nFourth\, the computer industry’s freewheeling approach will not translate well to industries such as energy and healthcare where certification and liability are taken very seriously; so complexity and conflicts can’t always just be optimistically waved away. \nFinally\, the predatory business models that characterise the IT industry will spread\, adding competition policy and consumer protection issues to the mix. The likely outcome is an ever more complex regulatory environment for many industries — and one which the UK will be ever less able to shape if the brexit vote leads to Britain abandoning the Single Market. \nClose\n“Protecting the Connected Car” \nMartin Borrett\, CTO\, IBM Security Europe \n×Martin Borrett\, IBM Security Europe\nMartin Borrett is an IBM Distinguished Engineer and CTO IBM Security Europe. He advises at the most senior level in clients on policy\, business\, technical and architectural issues associated with security. Martin leads IBM’s Security Blueprint work and is co-author of the IBM Redbooks “Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security” and “Understanding SOA Security”. He is Chairman of the European IBM Security Board of Advisors\, member of the Royal Society’s Cybersecurity Research Steering Group\, represents IBM at GFCE\, is a Fellow of the British Computer Society\, a Chartered Engineer (CEng) and member of the IET. Martin has a passion for sailing and has represented Great Britain; he is also a keen tennis player. \n“Protecting the Connected Car” \nThe intelligent\, connected vehicle becomes another actor in the world of the Internet-of-Things. It must access resources that require data protection\, validate the integrity of the device and provide a secure and unified consumer experience across web\, mobile and in-vehicle platforms. Today’s consumer wants a seamless experience with their digital preferences but they also want it to be secure. \nAs consumers’ enthusiasm for mobility and commerce services grows\, industry executives need to create a secure vehicle. One of the biggest challenges is to integrate the plethora of interfaces\, existing or new ones\, and to design security in from the start. Security\, while still at its beginning for the connected vehicle\, is a fundamental prerequisite to paving the way toward autonomous driving. \nWe will discuss how the consumer’s desire for a complete digital experience impacts security. How to handle security and data privacy over the vehicle lifecycle and the role and ability of the automotive industry to design and build a secure vehicle. \nClose\n“Grasping New Technology – Securely”\nIan Phillips\, Principal Consultant Engineer at Roke Manor \n×Ian Phillips\, Roke Manor\nIan Phillips is a systems engineer and information security architect\, working at Roke Manor Research part of the Chemring Group. \nBuilding on years of experience developing complex communications systems from emerging standards to production prototypes\, Ian is very interested in applying effective cyber security practices to emerging technology. He is passionate about integrating information security with good engineering so that security enables rather than obstructs capability. \nIan is a Chartered Engineer and holds qualifications in Information Risk Advice\, Penetration Testing\, Computer Forensics and Information Security Management. \n“Grasping New Technology – Securely” \nIn this talk\, Ian challenges the view that cyber security is the exclusive preserve of cyber security experts\, and that by marrying domain knowledge and systems engineering with Information Assurance\, security for emerging technologies\, such as IOT\, can be achieved whilst still grasping the benefits. Information security then becomes one of the enablers for adoption of new technology\, and not a frustrating after-thought. \nHistorically information security has often been applied as an afterthought to new technology proposals\, occurring after significant design decisions have been made\, earning information assurance the reputation of being obstructive\, frustrating users and developers alike. Through this talk Ian will show that by working with domain experts it is possible to establish an approach which marries key information assurance concepts with good systems engineering practice leading to an effective framework for delivering technology with information security. \nIOT presents the world with exciting opportunities arising from the collective use of diverse connected information. These opportunities can only be fully realised if users are able to trust the information sources and processing. Information security is thus a key enabler\, provided it is applied appropriately and effectively. The approach and framework outlined in this talk shows that this is a feasible aspiration. \nClose\n“Why is IoT Security so Hard and What Can We Do About It? – Some Lessons from the Frontline…”\nNick Allott\, CEO at Nquiring Minds \n×Nick Allott\, Nquiring Minds\nNick is CEO and Founder of NquiringMinds\, an award-winning Technology Company specializing in IOT (Internet of Things)\, Cyber Security and Data Analytics. \nNick was formerly CTO of both WAC (Wholesale Application Community) and OMTP\, both major international\, industry joint ventures\, which included all major Mobile Operators and handset manufactures. This followed a tenure as CTO of FastMobile\, a VC invested startup acquired by RIM and Technical Director for Motorola’s European Internet division. \nBefore this Nick held various executive positions at Shell\, Pearson Group\, Dorling Kindersley and Neural Computer Sciences. \nNick has Degree and PhD in Artificial Intelligence. \n“Why is IoT Security so Hard and What Can We Do About It? –  Some Lessons from the Frontline…” \nClose\n“IoT: Attack of the Clone Army?” \nDr Ralf Huuck\, Director & Senior Architect\, Synopsys \n×Dr Ralf Huuck\, Synopsys\nDr Ralf Huuck is a Director and Senior Architect with Synopsys’ Software Integrity Group focusing on software security and automated compliance tools. Earlier Dr Huuck spent over 12 years as a software research leader with R&D lab NICTA and as a CEO with security tools company Red Lizard Software. Dr Huuck is an Adjunct Associate Professor with UNSW\, Australia\, and a renowned author and speaker with over 50 international publications. \n“IoT: Attack of the Clone Army?” \nEach product in the “Internet of Things” space consists of thousands if not millions of identical device creating unprecedented security threats to infrastructure manipulation\, data loss and active denial-of-service attacks. In this talk we highlight why those device similarities lead to a vastly changed threat space compared to classical PC or even mobile system vulnerabilities. Moreover\, we present a number of prevention strategies that can be cost-effectively deployed already during the software and hardware development phases of IoT products. This includes emerging software security analysis and scanning tools that help organizations to manage their in-house development as well as their overall IoT supply chain risks. We also outline the rise of new third-party standards and IoT certification activities that complement individual efforts for creating a more resilient IoT infrastructure. \nClose\n“In Silicon we Trust: How to Fix the Internet of Broken Things”\nCesare Garlati\, Chief Security Strategist\, prpl Foundation \n×Cesare Garlati\, prpl Foundation\nCesare Garlati is an internationally renowned leader in information security. Former Vice President of mobile security at Trend Micro\, Cesare currently serves as Chief Security Strategist at prpl Foundation and Co-chair of the Mobile Working Group at Cloud Security Alliance. Prior to Trend Micro\, Mr. Garlati held director positions within leading mobility companies such as iPass\, Smith Micro Software and WaveMarket. Prior to this\, he was senior manager of product development at Oracle\, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite. \nCesare has been frequently quoted in the press\, including such media outlets as The Economist\, Financial Times\, The Register\, The Guardian\, ZD Net\, SC Magazine\, Computing and CBS News. An accomplished public speaker\, Cesare also has delivered presentations and highlighted speeches at many events\, including the Mobile World Congress\, Gartner Security Summits\, IDC CIO Forums\, CTIA Applications\, CSA Congress and RSA Conferences. \nCesare is a Fellow of the Cloud Security Alliance\, holds a Berkeley MBA\, a BS in Computer Science and numerous professional certifications from Microsoft\, Cisco and Sun. \n“In Silicon we Trust – How to Fix the Internet of Broken Things” \nIn this live-demo session Cesare Garlati\, Chief Security strategist at prpl Foundation and Co-Chair of the Mobile Working Group at Cloud Security Alliance\, will address four key areas which have introduced serious weaknesses into the IoT: the myth of security through obscurity\, connectivity\, unsigned firmware\, and system promiscuity. Mr. Garlati will then demonstrate a new approach to IoT security – based on open source software\, hardware virtualization and interoperable protocols – that can address these vulnerabilities\, which have already been shown to have potentially life-threatening consequences. \nClose\n“Multos Providing Appropriate Trust for IoT Devices?”\nPaul Wilson\, Commercial Manager\, MAOSCO \n×Paul Wilson\, MAOSCO\nPaul Wilson joined the MULTOS Consortium\, MAOSCO\, as Commercial Manager in 2016 bringing with him seventeen years’ experience in smart cards. His career has also spanned the electroplating industry and Royal Navy engineering. His previous six years consisted of business development\, promoting and selling smartcard products and solutions. His role at MAOSCO is relationship management of the MULTOS consortium and strategic business development for the MULTOS technology. \n“Multos Providing Appropriate Trust for IoT Devices” \nThe hype around IoT continues to build. However the issue of adequately securing these connected devices is too often glossed over in all the speculation and excitement about what they will be able to do for us in the future. \nPaul Wilson\, the Commercial Manager of the MULTOS Consortium (www.multos.com) discusses the important topics of device authenticity and integrity as well as data integrity and privacy and how MULTOS\, an open and trusted industry standard employed in the world of payments and ID can be employed to solve these issues. Importantly he will show how this can be done without having to re-invent the wheel\, or indeed spend huge amounts of money on supporting infrastructure and services. \nIn particular he explains how the unique features of the MULTOS operating system and its supporting eco-system can easily be employed to ensure complete lifecycle security. The talk will include demonstrations or a short video clip of MULTOS secured devices in action and how they can be easily provisioned in the field. \nClose\n“Authenticate Everything – Security for the IoT” \nGeert-Jan Schrijen\, CTO at Intrinsic-ID \n×Geert-Jan Schrijen\, Intrintic-ID\nGeert-Jan Schrijen received his Master’s degree in Electrical Engineering from the University of Twente in December 2000 on the topic of `active noise cancellation with multiple loudspeakers‘. In April 2001 he joined the security group of Philips Research in Eindhoven where he worked on digital rights management\, low-power authentication protocols\, private biometrics and Hardware Intrinsic Security™. Work on the latter topic resulted in the spin-off of Intrinsic-ID in October 2008. \nAs a senior algorithm designer within Intrinsic-ID\, Geert-Jan focused on the development of signal processing algorithms and security architectures for hardware-intrinsic key storage systems. In 2012 Geert-Jan became responsible for all development and engineering work at Intrinsic-ID in his role of VP Engineering. In August 2016 he was appointed as CTO of the company. \n“Authenticate Everything – Security for the IoT” \nIn a world where machines talk to other machines\, authentication becomes ever more critical. Smart chips\, from the sensor in your body or in the tires of your car to a powerful processor in a computer or in the Cloud\, will interact in ways that are too complicated and unpredictable for humans to fully comprehend. Authentication ensures the origin and integrity of any data received or instructions sent. Secure authentication needs a foundation in the hardware of devices. A new approach based on Physical Unclonable Functions (PUF) provides a scalable and secure solution that can protect chips over their entire lifetime. \nClose\n“Surely your thing doesn’t need a wire! How to choose an IoT Radio Access Network”\nJoe Milbourn\, Senior Consultant at The Technology Partnership \n×Joe Milbourn\, The Technology Partnership\nJoe is a senior consultant at TTP focused primarily in the modelling\, simulation\, and prototyping of complex systems.  Recent projects have included: connected computer vision systems for applications including the precise measurement of athlete position and analysis of road traffic movement; large scale monitoring and analysis of buildings and industrial installations; the development of very low power sensors connected via low-power\, long-range\, IoT RANs. \nDuring and after his doctoral studies Joe worked for Verigy\, a leading manufacturer of semiconductor test equipment. Joe has a MEng in Computers\, Electronics\, and Communications from the University of Bath and received his PhD in modelling redundant repair structures for DRAM from the University of Durham. \n“Surely your Thing Doesn’t Need a Wire! How to Choose an IoT RAN” \nSecure\, robust\, and resilient networks require a secure\, robust\, and resilient radio access network (unless you can use a wire).  Choosing the most suitable RAN depends not only on these important attributes but also on the range\, bandwidth\, cost\, and geographical coverage provided.  In this talk we’ll develop criteria for choosing a network and apply those criteria to a number of real products. \nClose\n“The roles and goals of identity management in future Smart Cities”\nGert Botha\, Chief Executive Officer at Hive Technology \n×Gert Botha\, Hiving Technology\nGert Botha is the CEO and one of the founding team members of Hive Technology — the Dubai based technology innovation\, consulting and wireless identification company that launched the world’s first single wireless identification technology. He is a seasoned management and technology consultant with 25 years diverse experience in the Public and Private sectors across various industries and countries. \nGert has spent the last 5 years’ side by side with the inventor of the technology\, Terry Ashwin\, aligning Hive’s Single Identification Technology to exactly what the market requires to address the identification of people and objects as the world migrates to a totally connected world where technology becomes pervasive. \nHe stays abreast of technology trends and consults with CIO’s\, CMO’s & CEO’s on technology strategy and how to use technology to innovate client service delivery. \n  \n“The Roles and Goals of Identity Management in Future Smart Cities” \nThis presentation explores the ways the security of Smart Cities is being influenced by different forms of identification and their management. \nIn the digital world of IT there has been a lot of effort put into successful control of access and authentication through use of existing forms of identification. \nBut things need to get physical… In the IoT we need to be sure that the identities of the many Things are clear and defensible. And in Smart Cities there are many specific examples of “physical things” and services of value and the need for easy management of identities. To be “easy” identity management needs to include low cost and widely deployable technologies that can support the marginally profitable business models that are essential in the Smart City environment. \nAs physical identities become manageable for the people in our cities there are opportunities to make the Smart City not just a convenient and secure place but to change the focus towards serving the Smart Citizen. \nClose\n“Towards Effective Security Monitoring for IoT”\nSiraj Shaikh\, Founder & Chief Scientific Officer at CyberOwl \n×Siraj Shaikh\, CyberOwl\nDr. Siraj Ahmed Shaikh is a Reader in Cyber Security at Coventry University. His research is concerned with systems security\, essentially at the intersection of cyber security and systems engineering. He is also the founder and chief scientist at CyberOwl which is developing early warning systems for the cyberspace. He has published over seventy peer-reviewed publications and his work has been funded by EPSRC\, MoD and RAEng. He is a Chartered Fellow of the BCS (FBCS CITP) and a Chartered Scientist (CSci). He is also the Vice-Chair of the TC6 on Communications Systems of the International Federation of Information Processing (IFIP). \n  \n“Towards Effective Security Monitoring for IoT” \nModern communication networks has its roots in connectivity and not accountability. Stealthy threats\, lying low and slow\, make it particularly difficult to monitor for increasingly multi-stage attacks designed to evade detection and defeat attribution. What is the future of network security monitoring in this post-attribution world? Could IoT security pose particular additional challenges of scale and complexity? We explore systematic deployment of target-centric sensing and early warning systems\, reflecting on trends from both industry and academia. \nClose\n“Securing the Internet of Things – an Analyst’s View on the Market” \nAapo Markkanen\, Principle Analyst at Machina Research \n×Aapo Markkanen\, Machina Research\nAapo Markkanen is a Principal Analyst at Machina Research\, where he studies various market and technology issues that will pave the way for\, and shape up\, tomorrow’s connected enterprise. He has a particular research interest in low-power communication technologies (including e.g. LPWA networks and competing mesh-based alternatives)\, the evolution of IoT security\, as well as fog/edge computing and the associated IoT gateways. \nBefore joining Machina Research\, Aapo worked as a Principal Analyst at ABI Research\, where he led various research activities related to M2M\, the Internet of Things\, and big data. \nAapo holds BSc and MSc degrees in management studies from the University of Tampere\, Finland. \n“Securing the Internet of Things – an Analyst’s View on the Market” \nSecurity has in the past year or so become possibly the hottest subject matter in the Internet of Things context. This presentation aims to provide an objective “analyst’s view” view on IoT security. Covering the topic on a relatively strategic level\, it first walks through the key characteristics that make IoT security different from – and often more difficult than – the traditional\, IT-centric cybersecurity\, and discusses what they mean from the perspective of an IoT-driven enterprise. Explored are then also the technology areas that can be currently considered instrumental in implementing robust IoT security\, as well as the ones that warrant attention in the longer term. Finally\, the presentation highlights recent trends and developments in the vendor landscape. \nClose\n“The Future of IoT Security and “Cybercrime””\nCraig Heath\, Director at Franklin Heath \n×Craig Heath\, Franklin Heath\nCraig Heath has worked in computer security since 1988\, on UNIX\, enterprise Java\, mobile\, and embedded device platforms. He provides independent security consultancy\, as well as chairing the IoT Security Foundation’s Working Group 4 and volunteering at Bletchley Park.  Craig is the author of several computer security publications\, including the book “Symbian OS Platform Security”. \n“The Future of IoT Security and “Cybercrime” \nStarting from trends in computer security and computer-enabled crime over the past 30 years and more\, this talk covers current concerns over the security of Internet of Things devices\, and considers the likely outcome over the next 5 to 10 years.  It’s clear that things are changing quickly\, and right now we are hearing many voices of doom\, but at the same time there are some reasons to be hopeful; on balance\, will the world be a safer or a riskier place in years to come? \nClose\n“Industrial IoT Security Issues and Solutions”\nChris Shire\, Business Development Manager at Infineon \n×Chris Shire\, Infineon\nChris Shire has a background in security technologies and semiconductor hardware. He joined Infineon (then Siemens) Chipcard & Security business line in 1998\, with many years experience in the industry. His current focus of activity is with projects in the IOT\, mobile\,identity\, transport ticketing and payment sectors. He is active in helping to set standards for the UK\, and establish new security solutions. \nChris is an active member of the IET\, UK Smart Card Club and has been a guest lecturer for several years on the RHUL Msc course for Smart Card Security. He has written several articles on security technology and contributed to textbooks on the subject. \n“Industrial IoT Security Issues and Solutions” \nIn 2016 the number of installations of  industrial IoT systems is growing fast\, but so are the number of attacks. This presentation will discuss a few high profile attacks\, identify their types and possible countermeasures. Industrial systems often are being connected to the Internet of Things after installation. This presentation will  also discuss what steps should be taken with legacy systems to  improve their security\, with some examples including  FPGA SoC based designs and industrial routers. \nClose\n“I Trust 72.4% of People\, How Many Things Should I Trust?”\nMike Westmacott\, Principal Cybersecurity Consultant at Thales \n×Mike Westmacott\, Thales\nMike works in the technical domain of the cyber security practice and operates broadly on the same basis as an attacker. He has conducted hundreds of penetration tests and audits against a wide variety of systems and targets\, combined with activities such as secure code review\, reverse engineering and wireless assessment. This experience has given Mike a deep understanding of both how security is developed within a system and also how vulnerabilities can be exploited. Mike is a CREST Registered Tester\, CREST Certified Network Intrusion Analyst (CCNIA) and has performed breach assessments in a wide variety of different industry sectors including finance\, eCommerce\, EU and UK government\, and aerospace. \n“I Trust 72.4% of People\, How Many Things Should I Trust?” \nOur daily interactions with one another are deeply entrenched in trust. As humans we build our individual trust relationships based on evidence and our internal and group notions of who is and isn’t trustworthy. How do we extend that trust into the digital world? What is it that forms digital trust between two computers? How do we interact across those two different realms? \nThis talk is for anyone who has ever said “I don’t trust that [expletive] machine!”. We will take a brief look at how human trust works\, and then investigate the digital world and the different ways that trust can be implemented in the IoT. The question of whether human-computer trust (and vice-versa) can truly be realised will be raised\, and consider if trust is a saleable commodity. \nClose\n“The Realities of Maintaining a Secure Software Supply Chain”  \nAdam Boulton\, Senior VP of Security Technology at Blackberry \n×Adam Boulton\, Blackberry\nAdam Boulton is a highly experienced technology security professional and Executive\, with over 12 years’ experience within security engineering. Adam is employed as the Senior Vice President of Security Technology. \nAdam graduated from Sheffield Hallam University in 2005 with a 1st Class BSc (Hons) in Software Engineering. Since graduating Adam has worked in security industry in a variety of technical roles from reverse engineering\, to wide ranging security assessments and secure software development. He has been an individual contributor on a wide range of technologies\, securing both security and safety critical systems. He has gained experience and a deep working knowledge of international product management and business development expertise in the fast moving Smartphone and secure mobile application space. In addition\, Adam provides the strategic direction for BlackBerry Cybersecurity services and delivers security assessments to high assurance markets. \nHis accolades include ISC2 Certified Information Systems Security Professional (CISSP)\, Certified Cloud Security Professional (CCSP)\, Certified Secure Software Lifecycle Professional (CSSLP)\, Qualified Security Team Member (QSTM)\, CyberScheme Team Member (CSTM) and Oracle Certified Java Associate (OCJA) and ISO 27001 Lead Auditor. \n“The Realities of Maintaining a Secure Software Supply Chain” – Co-Presented with Christine Gadsby \nThe monitoring and management of IoT devices in Enterprise and consumer spaces is a multi-faceted security minefield. With consumer demand for product innovation\, increased faster time to market\, and the pressures of investment in secure software development vendors are being pushed to breaking points. Nowhere do we see this as a bigger challenge than with connected vehicles\, combining both safety and security critical systems. This presents an entirely new challenge to the Enterprise with issues maintaining real time security patching for these critical systems. \nBlackBerry has a huge portfolio of embedded devices and IoT solutions. From our handset heritage through to QNX connected vehicles and BlackBerry RADAR\, BlackBerry Cybersecurity Services are sharing their experience and expertise in building safety and security critical systems. They will explore the challenges associated with security patch management for in-market products and services. \nClose\n“The Realities of Maintaining a Secure Software Supply Chain”  \nChristine Gadsby\, Director of Security Response at Blackberry \n×Christine Gadsby\, Blackberry\nChristine Gadsby is the Director of BlackBerry’s global Product Security Incident Response Team (PSIRT). This highly respected team monitors the security threat landscape and responds rapidly to emerging threats for all of BlackBerry’s products and services and those of its’ subsidiaries. \nChristine is passionate about vulnerability management and driving patching within complicated and complex systems. She played a critical role in creating BlackBerry’s 30-day Android patching strategy\, Customer Advisory program\, and leads BlackBerry’s open source software vulnerability management strategy. She has presented security response strategies and services to several high assurance governments including the NSA\, CESG\, CSE\, and GCHQ as well as several enterprise organizations. She has contributed to publications such as CSO magazine and Dark Reading and has spoken as an industry expert at several security industry conferences including Black Hat. She sits on several boards of industry response organizations and programs. She holds a Bachelors of Science degree in Information Technology and in Business Management from Western Governors University. \n“The Realities of Maintaining a Secure Software Supply Chain” – Co-Presented with Adam Boulton \nThe monitoring and management of IoT devices in Enterprise and consumer spaces is a multi-faceted security minefield. With consumer demand for product innovation\, increased faster time to market\, and the pressures of investment in secure software development vendors are being pushed to breaking points. Nowhere do we see this as a bigger challenge than with connected vehicles\, combining both safety and security critical systems. This presents an entirely new challenge to the Enterprise with issues maintaining real time security patching for these critical systems. \nBlackBerry has a huge portfolio of embedded devices and IoT solutions. From our handset heritage through to QNX connected vehicles and BlackBerry RADAR\, BlackBerry Cybersecurity Services are sharing their experience and expertise in building safety and security critical systems. They will explore the challenges associated with security patch management for in-market products and services. \nClose\n“Weaponising IoT”  \nKen Munro\, Partner at Pen Test Partners \n×Ken Munro\, Pen Test Partners\nKen is a security entrepreneur and industry maverick that has worked in infosec for over 15 years. After studying Applied Physics he tried his hand in the hospitality industry but soon discovered a talent for hacking\, persuading a till to print out mortgage amortisations. He went on to cut his teeth in the anti-virus industry before founding SecureTest\, a penetration testing business that quickly established a reputation for delivering high spec services using a boutique business model. NCC Group recognised the value of the proposition and acquired SecureTest in 2007. But Ken had found his calling and his penchant for pen testing saw him set up Pen Test Partners in 2010 which now boasts some of the best ethical hackers in the business\, each of whom has a stake in the firm. \nKen’s zeal for pen testing is matched only by his disdain for those vendors who resort to scaremongering to peddle point solutions. He is a fierce advocate of responsible disclosure and regularly researches and reveals security vulnerabilities in an effort to promote better security design and practice. He takes a key role in conducting investigations as well as encouraging team members to pursue their own research and the results are published on the company blog on a weekly basis as well as being publicised by the wider media. \nKen has a wealth of experience in penetration testing but it’s the systems and objects we come into contact with on an everyday basis that really pique his interest. This has seen him hack everything from hotel keycards\, to keyless cars and a range of Internet of Things (IoT) devices\, from wearable tech to children’s toys and smart home control systems. This has gained him some notoriety among the national press\, leading to regular appearances on BBC TV and BBC News online as well as the broadsheet press\, and he’s also a regular contributor to industry magazines\, penning articles for the legal\, security\, insurance\, oil and gas\, and manufacturing press. \n“Weaponising IoT” \nClose\n“Supply Chain of Trust”\nDavid Dufour\, Cyber Security Architect at Webroot \n×David Dufour\, Webroot\nDavid is a leader in the computer security and threat analytics industry with over 28 years of experience designing and implementing automated threat detection and remediation solutions with top tier software and hardware manufactures in the traditional IT space and the emerging IoT security landscape. He is currently Head of Security Architecture at U.S. based Webroot\, Inc. where his experience with machine learning\, contextual analytics\, integration automation and forensics has led to the development of several cutting edge solutions for mapping threat landscapes and the use of predictive algorithms for pre-attack determination. \n“Supply Chain of Trust” \nClose\nMark Zwolinski\, Professor of Electronics and Computer Science at University of Southampton \n×Mark Zwolinski\, University of Southampton\nMark Zwolinski is currently a Professor in the School of Electronics and Computer Science\, University of Southampton. He has authored two textbooks on digital design and has co-authored a third. He has written over 190 papers in the areas of EDA and test. His current research interests include hardware reliability\, fault tolerance\, behavioral modeling and hardware security. Dr. Zwolinski is a Fellow of IET and BCS and Senior Member of IEEE and ACM. \nClose\nJeff Day\, Senior Security Consultant at BT \n×Jeff Day\, BT\nJeff is Chair of the IoTSF Working Group 2 and a senior security consultant for British Telecommunications plc. With a background in software development and network administration\, Jeff now designs security into a variety of platforms\, networks & devices\, and has written some BT internal specifications and standards. As a member of the British Computer Society\, Jeff sits on their Security Community of Expertise body (SCoE) which acts as the security resource for the BCS\, working with government and industry to make IT in the UK a safer place to operate. Through SCoE he is also working with the Institute of Statecraft to deliver a new ethical cyber education programme for young people\, to help them make informed decisions about cyber safety and develop broad ethical & technical skills that will set them up for productive careers in the UK. Jeff is a Certified Information Systems Security Professional\, an accredited member of the Institute of Information Security Professionals\, a member of the Institute of Telecommunications Professionals\, and holds a Postgraduate Diploma in Computing for Commerce & Industry. \nClosePANEL\nUnited We Stand; Addressing the Bigger Challenges of IoT Security with Collaboration\n\nAbraham Joseph\, Founder & Editorial Director\, IoT Insights \n×Abraham Joseph\, Founder & Editorial Director\, IoT Insights \nAbraham is Founder and Editorial Director of IOT Insights and Chairman of the Device Management Forum. \nHe has over 20 years’ experience in telecommunications and IT and has managed major projects for investors\, regulators\, telecommunications and cable TV operators\, equipment vendors\, independent software vendors and enterprises. \nPrior to founding Device Management Forum\, he was Director of Consulting at Gartner and Consulting Director at Ovum. Previously he worked for over ten years in a variety of strategy\, business development\, marketing and product management roles at Alcatel and Nortel\, and as IT manager at a major UK health district. \nHe has written for and been featured in a number of publications including the Wall Street Journal\, the Sunday Telegraph\, Total Telecom and Mobile Europe. \nHe is a frequent chairman\, speaker and moderator at international conferences on a broad range of topics. He was organiser and chairman of IoT Summit at CeBIT 2016 and is currently developing the programme for IoT Summit 2017. \nHe has an MBA from Strathclyde Graduate Business School and a BSc in Electrical and Electronic Engineering from Polytechnic of the South Bank (South Bank University London). \nClose\nHugh Boyes\, Member of the Information Technology Policy Panel at The IET \n×Hugh Boyes\, The IET\nHugh Boyes is a Chartered Engineer\, a Fellow of the Institution of Engineering and Technology (IET) and holds the Certified Information Systems Security Professional (CISSP) credential issued by the International Information Systems Security Certification Consortium [(ISC)2]. \nHe divides his time between working as a Principal Fellow at the University of Warwick\, acting as the Cyber Security lead for IET\, and undertaking cyber security consultancy assignments. \nHe is one of the few cyber security specialists in the UK who focuses on cyber security of the built environment. He is the technical author on the recently published PAS1192-5 ‘Security-minded building information modelling\, digital built environments and smart asset management. \nAt the University his research interests relate cyber resilience and the cyber security of cyber-physical systems\, whilst at the IET he focuses on develop cyber security skills initiatives for engineering and technology communities and has published guidance and a code of practice on cyber security of the built environment. \nClose\nGilli Coston\, Founding Board Member at the International M2M Council \n×Gilli Coston\, International M2M Council\nA senior leader in the field of The Internet of Things\, M2M and Telecoms\, Gilli Coston’s pedigree and background spans 3 decades developing business and commercial partnerships in senior management and leadership roles.  Gilli has spent many years building high performing teams and held key roles such as Chief Strategy Officer\, Managing Director and now Vice President of Marketing in this dynamic technology and telecoms industry. \nGilli served 20 years with Telefonica and O2UK in the field of fleet & asset management as well as SMART metering and security management creating strategic partnerships\, new innovations and significant business development in a General Manager capacity.  Gilli then joined CGI a leader in the Systems Integration space\, Gilli developed strategy and solutions in The Internet of Things. \nJoining KORE (then Wyless) in 2013 as Chief Strategy officer and Managing Director of EMEA as part of the senior management team drove the growth and development of new business ahead of the acquisition of Wyless by KORE in April 2016. \nGilli currently holds the position as Vice President for Marketing – Products and strategic partnerships\, Gilli continues to promote high performance\, diversity and equality within KORE and within the Internet of Things industry.  She is a key sponsor of many Women in Technology & Telecoms sectors and performs as a board member of The Internet of Things and M2M Council\, established to promote strong working practices of Internet of Things and is a keen mentor for various Women in technology groups and individuals. \nClose\nJohn Haine\, Chairman of the IoT Security Foundation \n×John Haine\, IoT Security Foundation\nJohn Haine has spent his career in the electronics and communications industry\, working for British Telecom\, Marconi\, PA Consulting\, and with start-ups including Cognito and Ionica.  His technical background includes R&D in radio circuitry and microwave circuit theory; and the design of novel radio systems for cordless telephony\, mobile data\, and fixed wireless access.  He has led standardisation activities in both the latter areas in ETSI\, and contributed to WiMax. \nIn 1999 he joined TTP Communications working on research\, technology strategy and M&A activities; and after the company’s acquisition by Motorola became Director of Technology Strategy in Motorola Mobile Devices.  After leaving Motorola he was CTO Enterprise Systems with ip.access Limited\, the leading manufacturer of GSM picocells and 3G femtocells.  In early 2010 he joined Cognovo Limited\, which was acquired by u-blox AG in 2012. In u-blox John worked on RF platform strategy for future wireless modules.  He led u-blox’ involvement in a major 3GPP standards activity on low complexity cellular communications for the Internet of Things\, and the company’s early development of devices for trials and demonstrations. Now retired from u-blox he is Royal Academy of Engineering Visiting Professor at Bristol University\, focusing on Radio Systems for the Internet of Things. \nJohn has a first degree from Birmingham (1971) and a PhD from Leeds (1977) universities.  He is a member of the IET and IEEE and serves on the Cambridge Wireless Board. \nClose\nArt Swift\, President of the prpl Foundation \n×Art Swift\, prpl Foundation\nArt Swift is president of the prpl Foundation\, a technology non-profit promoting the development of open source software for embedded computing. He has more than 25 years of executive-level experience in the tech industry\, including CEO at low power chip-maker Transmeta (NASDAQ\, TMTA)\, CEO of mobile security supplier CUPP Computing AS\, CEO of nanotech innovator Unidym\, and vice president of marketing and business development at MIPS\, a leading provider of microprocessor IP. \nClose\nIdris Jahn\, Principal Consultant – Health and Data at IoTUK \n×Idris Jahn\, Principal Consultant – Health and Data at IoTUK\nIdris has over 20 years of experience in data integration and real-time systems. Much of his work has involved defining new and exciting use-cases for the Internet of Things. He is currently helping businesses to advance their healthcare solutions using IoT. Idris is also helping IoTUK to co-ordinate two NHS test beds using IoT for dementia and diabetes. \nIdris is also familiar with integration standards related to the IoT including MQTT and HyperCat. For the past 10 years Idris has been identifying IoT opportunities where multiple high velocity data sources need to be to analysed very quickly using Apama Complex Event Processing. This has given Idris opportunities to create real-time solutions for manufacturing optimisation; personalised consumer engagement for retailers\, sports clubs and mobile operators; social media analytics including sentiment for proactive support; improved patient engagement in healthcare using mobile and wearable devices. Idris has a BSc in Physics from UMIST and an MSc in Computer Science from Staffordshire University. \nCloseSPONSORS\nMEDIA PARTNERS\nEVENT PARTNERS & SUPPORTING ASSOCIATIONS\n \nFrom £295 ex-VAT \nACCOMODATION
URL:https://iotsecurityfoundation.org/event/iot-security-foundation-conference-2016/
LOCATION:The IET Savoy Place\, 2 Savoy Place\, London\, WC2R 0BL\, United Kingdom
CATEGORIES:Conference
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161130
DTEND;VALUE=DATE:20161202
DTSTAMP:20260503T213123
CREATED:20160113T154424Z
LAST-MODIFIED:20190619T094755Z
UID:13839-1480464000-1480636799@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Industry of Things Summit Asia
DESCRIPTION:The rise of digital technologies is transforming almost every aspect of modern life. A cluster of technological advances is changing how people live\, work and play. Physical and virtual areas of our lives are increasingly becoming intertwined. More and more of our interactions are mediated by machines. \nThe Internet of Things\, M2M (machine to machine) hyper-connectivity\, wearable technology\, intelligent living and ubiquitous computing are all increasingly important areas. The common underlying agenda is to develop new forms of connectivity\, new types of digital relationships\, and anchor opportunities presented by the greater integration of connected technologies into everyday lives. \nBoasting an interactive\, cutting edge agenda with visionary speaker line-up\, Smart Summit Asia is the platform for global authorities to present their “how-to” strategy and vision for a smart future. \nMake sure you are present on the 30th November and 1st December for THE Smart Home\, Smart City and Industrial Internet event of 2016. \n  \nFor more information\, please visit the Industry of Things Summit Asia website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-industry-of-things-summit-asia/
LOCATION:Copthorn Grand\, 392 Havelock Road\, 169663\, Singapore
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161115T080000
DTEND;TZID=Europe/London:20161116T170000
DTSTAMP:20260503T213123
CREATED:20161104T120853Z
LAST-MODIFIED:20190619T094756Z
UID:15539-1479196800-1479315600@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Addressing the technical challenges for enterprises deploying IoT solutions
DESCRIPTION:Enterprise network architects\, builders\, developers and technology professionals will play a pivotal role in driving IoT innovation and business adoption in 2016 and beyond. However\, there are huge challenges ahead. There is a growing requirement to connect the disparate parts of a distributed IoT business solution – from mobile devices\, to wearables and sensors\, to cloud and on premise legacy enterprise systems. Together with security and privacy concerns\, a lack of standards and the overwhelming volume of IoT platforms\, it can be a real challenge to make the right technology choices for the enterprise. \nIoTBuild provides a unique opportunity to join technology leaders\, innovators and peers to tackle the challenges of technology selection and building the Internet of Things. If you are moving from thinking about IoT to deploying IoT networks then this is an Forum is for you. The Forum will take place on the 15th & 16th November 2016 at the Doubletree by Hilton Tower Bridge\, London. Attendees represent the Retail\, Manufacturing\, Healthcare\, Transportation\, Smart Cities\, Financial services\, Energy\, Automotive and other industries whose plans for IoT are/have just got started. Job functions will vary depending on which department has been tasked with the IoT projects\, ranging from the CTO & CIO to Heads of Solutions Architecture\, Enterprise Architecture\, Software Engineering\, Application Development and more. \nTop 5 case studies: \n\nHear from Hive how customer focus\, roll-out planning and scaling was key to success \nLearn how Specsavers created a smart retail environment using IoT \nUnderstand how interoperability issues were overcome in Oxford’s IoT flood defence project \nHear ING address the challenges of building a real-time IoT analytics engine for enterprise \nDiscover how the TVH Group built an IoT-enabled predictive maintenance solution to seize competitive advantage\n\n  \nFor more information and to register\, visit the IoT Build website
URL:https://iotsecurityfoundation.org/event/addressing-the-technical-challenges-for-enterprises-deploying-iot-solutions/
LOCATION:DoubleTree by Hilton Hotel London\, 7 Pepys Street\, London\, EC3N 4AF\, United Kingdom
CATEGORIES:Conference
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161109
DTEND;VALUE=DATE:20161111
DTSTAMP:20260503T213123
CREATED:20160622T124623Z
LAST-MODIFIED:20190619T094756Z
UID:14640-1478649600-1478822399@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: LPWAN World Forum
DESCRIPTION:  \nIoTSF Members receive a 20% discount on conference tickets. Please contact Rachel Palmer to receive the discount code.\nLPWAN World Forum is a 2 day conference and exhibition covering Low Power Wide Area Networks and its impact on IoT technology. \nHear from over 40 visionary speakers and leading case studies on how LPWANs are enabling a much wider range of M2M and Internet of Things (IoT) applications. \nTake part in roundtable discussions for in-depth learning and network with peers and colleagues in our exhibition and demo area. Gain a unique insight from the major industry contributors. \nMake sure you are present in London on the 9th and 10th November for THE IoT Networks event of 2016. \n  \nFor more information and to register\, please visit the LPWAN World Forum website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-lpwan-world-forum/
LOCATION:1 West Ferry Circus\, London\, E14 4HD
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161101T123000
DTEND;TZID=Europe/London:20161101T160000
DTSTAMP:20260503T213123
CREATED:20160817T102608Z
LAST-MODIFIED:20190619T094756Z
UID:14928-1478003400-1478016000@iotsecurityfoundation.org
SUMMARY:IoTSF Members Plenary Session 7
DESCRIPTION:IoTSF members are invited to join us for our seventh plenary session\, hosted by KPMG. This plenary session follows the progress of the Working Groups and operations updates. \nThis event is for IoTSF members and invited guests only.  If you are not a member and would like to attend\, please email Jenny Devoy \n\n[button link=”https://www.eventbrite.co.uk/e/iotsf-plenary-session-7-tickets-27150150832″ color=”default” size=”medium” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”yes” icon_position=”left” modal=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ alignment=”right” class=”” id=””]REGISTER HERE[/button]
URL:https://iotsecurityfoundation.org/event/iotsf-members-plenary-session-7/
LOCATION:KPMG.\, 15 Canada Square\, London\, E14 5GL
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161020
DTEND;VALUE=DATE:20161022
DTSTAMP:20260503T213123
CREATED:20160414T090554Z
LAST-MODIFIED:20190619T094756Z
UID:14356-1476921600-1477094399@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: IoT Tech Expo North America
DESCRIPTION:The Internet of Things (IoT) Tech Expo Event will bring together key industries from across America for two days of top level content and discussion. Industries include Manufacturing\, Transport\, Health\, Logistics\, Government\, Energy and Automotive. Introducing and exploring the latest innovations within the Internet of Things\, this conference is not to be missed. \nTaking place in North America this October\, the IoT Tech Expo North America will host thousands of attendees including IT decision makers\, developers & makers\, OEM’s\, government and local council officials\, automotive exec’s\, operators\, technology providers\, investors\, venture capitalists and many more. IoT Tech Expo Europe is set to showcase the most cutting edge technologies from more than 100 exhibitors and provide insight from over 200 speakers sharing their unparalleled industry knowledge and real-life experiences. \nThis year’s Expo will highlight the most innovative advancements in technologies which are affecting IoT. There will be cases and dedicated tracks covering the entire Internet of Things ecosystem including Smart Cities\, Connected Living\, Wearables\, Developing for the Internet of Things\, Connected Health\, Connected Industry and Data & Security. \nAttendees are expected from across the entire IoT industry with representatives from sectors including government\, energy\, education\, transportation\, healthcare\, manufacturing\, M2M and many more. Take advantage of this opportunity to experience two days of discussion\, exploration\, in-depth analysis and high level networking at this year’s IoT Tech Expo. \n  \nFor more information and to register\, please visit the IoT Tech Expo website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-tech-expo-north-america/
LOCATION:Santa Clara Convention Centre\, 5001 Great America Parkway\, Santa Clara\, CA\, 95054\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161017T130000
DTEND;TZID=Europe/London:20161019T220000
DTSTAMP:20260503T213123
CREATED:20160926T090230Z
LAST-MODIFIED:20190619T094757Z
UID:15131-1476709200-1476914400@iotsecurityfoundation.org
SUMMARY:IoTSF Promoted Event: IoT Security Summit\, Boston
DESCRIPTION:  \nIoTSF are proud to be a supporting association of the 2016 IoT Security Summit\, Boston. \nIn its second year\, IoT Security 2016 is the only event of its kind to focus on the security and privacy issues surrounding IoT and how to manage the information and data associated with the rapidly increasing amount of connected devices.  \nBringing 550+ decision makers\, influencers and stakeholders together under one roof\, IoT Security will feature an expert speaker line-up\, Blockchain 360 pre-event day\, interactive Learning Labs\, case studies and networking parties designed to ignite discussion and enable business partnerships.  \nFor more information about the show or to register for a pass\, visit https://tmt.knect365.com/iot-security/  \nAs a supporting association\, IoTSF has arranged a 20% discount off passes with code: IOTSF20
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-security-summit-boston/
LOCATION:HYNES CONVENTION CENTER\, Boston\, MA\, 02115\, United States
ATTACH;FMTTYPE=image/jpeg:https://iotsecurityfoundation.org/wp-content/uploads/2016/09/IoT-Security-Summit_logo_RGB.jpg
ORGANIZER;CN="Morgan Johnson":MAILTO:Morgan.Johnson@knect365.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20161012
DTEND;VALUE=DATE:20161014
DTSTAMP:20260503T213123
CREATED:20160728T113542Z
LAST-MODIFIED:20190619T094757Z
UID:14789-1476230400-1476403199@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Monetizing IoT Copenhagen
DESCRIPTION:There are hundreds of IoT conferences all around the world. What makes this one different?  The summit of experts will deliver advice and best practice examples that will support your business to successfully implement IoT technology. It’s also your opportunity to put your questions to those who have proven track record in making the most of the benefits IoT could bring to your company. \nPlease note\, IoT Security Foundation members are entitled to a 10% discount. Please\, contact IoTSF if interested. \nFor more information\, please visit Monetizing IoT website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-monetizing-iot-copenhagen/
LOCATION:Copenhagen Marriott Hotel\, Kalvebod Brygge 5\, Copenhagen\, 1560\, Denmark
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20161010T130000
DTEND;TZID=Europe/London:20161010T170000
DTSTAMP:20260503T213123
CREATED:20160916T111859Z
LAST-MODIFIED:20190619T094757Z
UID:15101-1476104400-1476118800@iotsecurityfoundation.org
SUMMARY:IoTSF Virtual Plenary Meeting
DESCRIPTION:Our next IoTSF Plenary Meeting will be taking place virtually. \nMore information regarding the plenary meeting and agenda will be available soon. \n  \n[button link=”https://www.eventbrite.co.uk/e/iotsf-virtual-plenary-session-tickets-27700357515″ color=”default” size=”large” type=”3d” shape=”” target=”_blank” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”yes” icon_position=”right” modal=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ alignment=”right” class=”” id=””]REGISTER HERE[/button]
URL:https://iotsecurityfoundation.org/event/iotsf-virtual-plenary-meeting/
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20160928T183000
DTEND;TZID=Europe/London:20160928T214500
DTSTAMP:20260503T213123
CREATED:20160901T142321Z
LAST-MODIFIED:20190619T094757Z
UID:15043-1475087400-1475099100@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Internet of Things Thames Valley Meetup
DESCRIPTION:The Internet of Things Thames Valley Meetup group is open (free) for business\, academic\, public sector and technical professionals interested in the ‘Internet of Things’ who wish network\, share knowledge and experiences and develop business opportunities. \n  \nWe are pleased to share that IoTSF Member\, Ken Munro from Pen Test Partners will be presenting. \nKen Munro has been working in IT security for over 15 years. He writes for various newspapers and industry magazines\, and regularly advises the broader press and news broadcasters. He works at Pen Test Partners who specialise in helping organisations understand and quantify risk to their business. In an effort to get beyond the unhelpful FUD put about by many security vendors Ken speaks widely on computer security\, the Internet of Things\, and takes great pleasure in highlighting vulnerabilities. \n  \nKen’s talk will cover the following: \nOK\, Put a Wi-Fi Module in it. What Could Possibly Go Wrong?\n“From kettles to toys and even cars\, it seems there is nothing that cannot be internet enabled and controlled with an app. There are downsides though. Such as when a product leaks information\, or can be used to sabotage a network\, or even endanger personal safety? With live demos you’ll see how popular devices can be hacked and abused\, and what can be done to prevent it.” \nFor more information\, please visit the Internet of Things Thames Valley Meetup website.
URL:https://iotsecurityfoundation.org/event/internet-of-things-thames-valley-meetup/
LOCATION:Grow @Green Park a ConnectTVT Innovation Hub\, 250 South Oak Way\, Green Park\, Reading\, RG2 6UG
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160921
DTEND;VALUE=DATE:20160923
DTSTAMP:20260503T213123
CREATED:20160113T153407Z
LAST-MODIFIED:20190619T094757Z
UID:13835-1474416000-1474588799@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Industry of Things Summit
DESCRIPTION:  \nIncreasingly more businesses are recognising the impact of the Industrial Internet. Vertical industries are revolutionising their operations and strategies by maximising the benefits of connected devices and machine-to-machine communication. Automated processes are saving time and streamlining businesses. \nBig Data is at the heart of the Industry of Things\, and good use of data analytics will result in greater efficiency\, lower Opex and Capex and increasingly environmentally- friendly enterprises across a variety of vertical sectors. Transport\, Manufacturing\, Utilities\, Healthcare\, Agriculture and Retail are all industries currently implementing Industrial Internet solutions to transform their businesses. \nThe Industry of Things Summit will address technology advances as M2M\, the Internet of Things\, wireless networks\, and Big Data come together to deliver exponential change to the industrial ecosystem. We will explore developing trends and case studies from vertical industries leading the way in the Industry 4.0. The Industry of Things Summit will map out profitable business models\, highlighting cyber security concerns and overcoming connectivity and interoperability hurdles to transform vertical industries. \nBoasting an interactive\, cutting edge agenda with visionary speaker line-up\, The Industry of Things Summit is the platform for global authorities to present their “how-to” strategy and vision for a smart future. \n  \nFor more information\, please visit the Industry of Things Summit website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-industry-of-things-summit/
LOCATION:Olympia Conference Centre\, Hammersmith Road\, London\, W14 8UX\, United Kingdom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20160902T123000
DTEND;TZID=Europe/London:20160902T160000
DTSTAMP:20260503T213123
CREATED:20160706T085217Z
LAST-MODIFIED:20190619T094757Z
UID:14673-1472819400-1472832000@iotsecurityfoundation.org
SUMMARY:IoTSF Members Plenary Session 6
DESCRIPTION:IoTSF members are invited to join us for our sixth plenary session\, hosted by KPMG.  This plenary session follows progress with Working Groups and operations. \nThis event is for IoTSF members and invited guests only.  If you are not a member and would like to attend\, please email Jenny Devoy.
URL:https://iotsecurityfoundation.org/event/iotsf-members-plenary-session-6/
LOCATION:KPMG.\, 15 Canada Square\, London\, E14 5GL
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160901
DTEND;VALUE=DATE:20160903
DTSTAMP:20260503T213123
CREATED:20160510T141621Z
LAST-MODIFIED:20190619T094757Z
UID:14477-1472688000-1472860799@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: The IoT Show Asia 2016
DESCRIPTION:  \nWe are happy to announce that IoTSF Members receive a 15% discount on ticket prices. Please contact Rachel Palmer to receive the promotional code.\n  \nThe IoT Show Asia 2016 will focus on four key B2B IoT applications: Smart Factories\, Smart Cities\, Logistics and Worksites. The event will highlight the need for innovation\, for partnerships and for actual project deployment. \n\nLive end-user projects will be presented in the two-day executive conference\nNew start-ups as well as existing players will be showcasing the latest technology innovations on the exhibition floor\nThe entire eco-system will be brought together: platforms\, integrators\, networks and infrastructure\, sensors\, devices\, data analysts\, regulators\, financiers and start-ups\n\n  \nThis is The IoT Show’s second year\, and building on a very successful launch in 2015\, we are anticipating in excess of 1\,500 attendees from across Asia. This year the show will be co-located with two complementary events: The Commercial UAV Show and The Smart Machine Show. \nDownload event brochure to find out more \n  \nFor more information and to register\, please visit the IoT Show Asia website. \n  \n  \n 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-the-iot-show-asia-2016/
LOCATION:Suntec Singapore International Exhibition & Convention Centre\, 1 Raffles Boulevard\, Suntec City\, 039593 \, Singapore
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20160718T130000
DTEND;TZID=Europe/London:20160718T170000
DTSTAMP:20260503T213123
CREATED:20160712T141754Z
LAST-MODIFIED:20190619T094758Z
UID:14734-1468846800-1468861200@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: The Future of Cybersecurity
DESCRIPTION:“The Future of Cybersecurity” event is being held on the afternoon of Monday 18th July in London \nJoin the Knowledge Transfer Network to debate the priorities and challenges for the UK cybersecurity sector and hear more about upcoming UK government plans.\nThere will also be speakers from the European Commission who will speak about the new contractual Public-Private Partnership (PPP) on Cyber security\, aiming to stimulate the European cybersecurity industry. \nLunch and refreshments will be provided. \nMore details & registration are available via this link:\nhttps://www.eventbrite.co.uk/e/the-future-of-cybersecurity-registration-26071956925\n \n  \nAgenda\n13.00 Networking Lunch \n13.45 Welcome from the Digital Catapult  \n14.00 Welcome and Introductions – Dora Meredith\, Innovate UK\nBrief description of the aims for the afternoon and introduction to participants. \n14.10 Overview of European Cybersecurity R&I –  Aristotelis Tzafalias\, European Commission\nDescription of the current EU calls in the cyber security area and an overview of the cPPP. \n14.40 Overview of ECSO and Priorities – Luigi Rebuffi\, ECSO\nOverview of the current European industry priorities and cPPP developments. \n15.00 Overview of UK Cybersecurity for Growth and Innovation – Stephen Rhodes\, DCMS\nDescription of the work of DCMS on growth and innovation in this area\, including a short update on government plans. \n15.30 What are the Priorities for the UK Cybersecurity Sector?\nBreakout into group to discuss priorities for the UK sector. This will be fed into the UK cybersecurity roadmap and will also be fed into European cPPP discussions. \n16.20 Feedback  \n16.45 Summary and next steps \n17.00 End \n 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-the-future-of-cybersecurity/
LOCATION:Digital Catapult Centre\, 101 Euston Road\, London\, NW1 2RA\, United Kingdom
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20160705T090000
DTEND;TZID=Europe/London:20160705T130000
DTSTAMP:20260503T213123
CREATED:20160616T111452Z
LAST-MODIFIED:20190619T094758Z
UID:14625-1467709200-1467723600@iotsecurityfoundation.org
SUMMARY:IoTSF Members Plenary Session 5
DESCRIPTION:  \n  \n  \n  \nIoTSF members are invited to join us for our fifth plenary session\, hosted by founder members Digital Catapult.  This plenary session follows progress with Working Groups and operations. \nClick here to register your attendance.  Places are limited and offered on a first come\, first served basis. \nThis event is for IoTSF members and invited guests only.  If you are not a member and would like to attend\, email jenny.devoy@nmi.org.uk \n  \nHosted by \n\n \n  \n  \n  \n  \n 
URL:https://iotsecurityfoundation.org/event/iotsf-members-plenary-session-5/
LOCATION:Digital Catapult Centre\, 101 Euston Road\, London\, NW1 2RA\, United Kingdom
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160621
DTEND;VALUE=DATE:20160623
DTSTAMP:20260503T213123
CREATED:20160524T144053Z
LAST-MODIFIED:20190619T094758Z
UID:14543-1466467200-1466639999@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Future of Wireless International Conference
DESCRIPTION:NMI Members receive a 10% discount on ticket prices. To receive the discount\, please contact FWIC.\nNMI is delighted to promote and support the 2016 Future of Wireless International Conference.  This year’s conference explores how industry leaders are planning to transform and build new business models to harness a world with ubiquitous wireless. The conference will focus on how technology is pushing the boundaries across a number of industry segments. \n  \nRunning alongside London’s Tech Week the conference will bring together over 400 entrepreneurs and engineers from around the world\, together with C suite level decision makers to share their visions and enabling technologies for new markets\, industries and business models. The event is organised by CW (Cambridge Wireless) – the leading international community for companies involved in the research\, development and application of wireless and mobile technologies. \n  \nAs well as keynote sessions\, the conference will include vertical industry streams covering automotive\, retail\, industrial IoT\, utilities\, fintech\, entertainment and healthcare. Other activities will include the Innovation Showcase comprising of collaborative IoT start-up teams\, industry awards\, user experience and business model sessions\, as well as international business matchmaking. The conference includes the ‘Cambridge Debate’ facilitated by journalist and broadcaster Rory Cellan-Jones\,  who will bring together the Cambridge entrepreneur David Cleevely and Jacqueline Davey of IBM. \n  \nTickets remain available for both days\, and also for the prestigious dinner on the evening of the 21st which will be addressed by Paul Stein of Rolls Royce \nFor more information please see here or contact fwic@cambridgewireless.co.uk \nNMI members benefit from a 10% discount. \n  \n  \n 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-future-of-wireless-international-conference/
LOCATION:Savoy Place\, 2 Savoy Place\, London\, WC2R 0BL
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20160613T080000
DTEND;TZID=Europe/London:20160617T170000
DTSTAMP:20260503T213123
CREATED:20160510T075540Z
LAST-MODIFIED:20190619T094758Z
UID:14469-1465804800-1466182800@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: ETSI Security Week
DESCRIPTION:Now in its second year\, the ETSI security week will consist of an IoT Security Workshop running from Monday 13 to Wednesday 15 June 2016 followed by the ETSI Technical Committee CYBER plenary meeting taking place from 15 to 17 June 2016 and the hosted AIOTI Workshop on 16 June. \nThe 2016 ETSI Security Week will take place in Sophia Antipolis\, France on 13-17 June 2016. \nIoTSF chairman\, Prof. John Haine\, will be presenting at this event \nGetting to ETSI
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-etsi-security-week/
LOCATION:ETSI HQ\, 650 Route des Lucioles\, Sophia Antipolis\, 06921\, France
ORGANIZER;CN="ETSI":MAILTO:secretariat@etsi.org 
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160613
DTEND;VALUE=DATE:20160615
DTSTAMP:20260503T213123
CREATED:20160414T085736Z
LAST-MODIFIED:20190619T094758Z
UID:14353-1465776000-1465948799@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: IoT Tech Expo Central Europe
DESCRIPTION:  \nThe Internet of Things (IoT) Tech Expo Event will bring together key industries from across Central Europe for two days of top level content and discussion. Industries include Manufacturing\, Transport\, Health\, Logistics\, Government\, Energy and Automotive. Introducing and exploring the latest innovations within the Internet of Things\, this conference is not to be missed. \nTaking place in Berlin’s Congress Center on 13-14th June\, this year’s IoT Tech Expo Central Europe in Germany will host thousands of attendees including IT decision makers\, developers & makers\, OEM’s\, government and local council officials\, automotive exec’s\, operators\, technology providers\, investors\, venture capitalists and many more. The IoT Tech Expo is set to showcase the most cutting edge technologies from more than 100 exhibitors and provide insight from over 200 speakers sharing their unparalleled industry knowledge and real-life experiences. \nThe show will highlight the most innovative advancements in technologies which are affecting IoT. There will be cases and dedicated tracks covering the entire Internet of Things ecosystem including Smart Cities\, Connected Living\, Developing & IoT Technologies\, Connected Industry and Data & Security. \n  \nIoTSF Members will receive a 20% discount on ticket prices. Please contact Rachel Palmer for the promotional code. \nFor more information and to register\, please visit the IoT Tech Expo website. 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-tech-expo-central-europe/
LOCATION:bcc Berlin Congress Centre GmbH\, Alexanderstrabe 11\, Berlin\, 10178\, Germany
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20160607T080000
DTEND;TZID=Europe/London:20160608T173000
DTSTAMP:20260503T213123
CREATED:20160524T101720Z
LAST-MODIFIED:20190619T094758Z
UID:14526-1465286400-1465407000@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Insurance IoT Europe Summit
DESCRIPTION:Insurance IoT Europe is a two-day event on 7-8 June 2016 in London bringing 150 insurers together to discuss how to thrive in a connected world as digital and big data collide. This is the only event focussing 100% on IoT for insurers. \nA faculty of 30+ speakers working at the forefront of the industry will give insight on how the internet of things can be applied in insurance. The event shares what it takes to deliver an IoT strategy and better connect to customers. Speakers include C-level professionals\, and Heads of Strategy\, Innovation\, Digital\, and Product. \nBusiness-critical items on the agenda include how to: \n\nCreate a business case by exploring multiple uses for IoT across your organisation: find application examples in the car\, home\, self\, and commercial business lines as well as revenue generating models\nEmploy IoT as a value-added service for customers to gain their trust: determine best use-cases and value-added services to win your customer’s trust on data sharing\nIdentify new revenue streams and product opportunities: define the benefits new insurance products will bring to your business and use IoT to identify customer needs\nDiscover new risk models that move from reactive compensation to proactive protection: prepare for a fundamental shift in the way insurance models risk and find ways to reduce the claims and maximise profits\nOvercome real-time data ownership and management issues: get to grips with who should own data and ways to deal with real-time data to unearth actionable insights\n\nFind out more and register your attendance at www.fc-bi.com/insuranceiot
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-insurance-iot-europe-summit/
LOCATION:etc Venues St Paul’s\, 200 Aldersgate Street\, London\, EC1A 4HD\, United Kingdom
ORGANIZER;CN="Sam Jones":MAILTO:Sjones@fc-bi.com
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160531
DTEND;VALUE=DATE:20160603
DTSTAMP:20260503T213123
CREATED:20160414T072525Z
LAST-MODIFIED:20190619T094759Z
UID:14349-1464652800-1464911999@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: IoT Week 2016
DESCRIPTION:IoT Week is annual event that gathers industry and academia representatives from around the world. After Barcelona\, Venice\, Helsinki\, London and Lisbon\, the next\, 6th IoT Week will take place in Belgrade\, Serbia from May 31st to June 2nd. \nThe IoT Week is once again on a path to create an exciting\, dynamic\, fun and educational IoT environment with the program focused on IoT Large Scale Pilots deployments wrapped up in Research\, Industry and Innovation days. \nSmart cities\, smart agriculture\, IoT in retail\, smart manufacturing\, privacy protection in IoT world\, factories of the future – those are just some of the topics that will be discussed this year in Belgrade. \nThe organizers\, IoT Forum and local host company- DunavNET\, expect between 300 and 400 participants since by now they already have about 50 confirmed world IoT experts for speaking sessions. \n  \nFor more information and to register\, please visit the IoT Week website.
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-iot-week-2016/
LOCATION:Crowne Plaza Belgrade\, Vladimira Popovica 10\, Beograd \, 11070\, Serbia
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/London:20160527T130000
DTEND;TZID=Europe/London:20160527T163000
DTSTAMP:20260503T213123
CREATED:20160308T132046Z
LAST-MODIFIED:20190619T094759Z
UID:14314-1464354000-1464366600@iotsecurityfoundation.org
SUMMARY:IoTSF Members Plenary Session 4
DESCRIPTION:This Plenary Session is for IoTSF Members.  \nOutline Agenda  \n\nWorking Group’s 1 – 5  Summary Updates\nPlenary Chair Appointment\nInvited Guest Speaker: Art Swift CEO Cupp Computing and President prpl Foundation\n\nFull details will be distributed to registered attendees prior to meeting. \n  \n[button link=”https://www.eventbrite.co.uk/e/iotsf-members-plenary-session-4-tickets-24455000565″ color=”default” size=”large” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”1px” icon=”fa-arrow-right” icon_divider=”yes” icon_position=”left” modal=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ alignment=”left” class=”” id=””]Register Here[/button] \n  \n  \n 
URL:https://iotsecurityfoundation.org/event/iotsf-members-plenary-session-4/
LOCATION:KPMG.\, 15 Canada Square\, London\, E14 5GL
ORGANIZER;CN="IoT Security Foundation":MAILTO:contact@iotsecurityfoundation.org
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160510
DTEND;VALUE=DATE:20160512
DTSTAMP:20260503T213123
CREATED:20160321T094609Z
LAST-MODIFIED:20190619T094759Z
UID:14324-1462838400-1463011199@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: GSMA Mobile 360 Series - Privacy & Security
DESCRIPTION:The GSMA Mobile 360 Series – Privacy & Security is entirely focused on privacy and security across the wider global mobile enterprise ecosystem. \nIn cooperation with The Hague Security Delta and The Municipality of The Hague\, this two-day event will include a combination of keynote speakers\, panel discussions\, technology demonstrations and in-depth case studies that address the growing importance of mobile privacy and security through the entire value chain. \nIf data privacy and security aren’t your top corporate priority\, join us 10-11 May to find out why it should be at Mobile 360 – Privacy & Security. \n  \n  \nFor more information and to register\, please visit www.mobile360series.com
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-gsma-mobile-360-series-privacy-security/
LOCATION:The Hague\, Postbus 5818\, Rijswijk\, 2280 HV\, Netherlands
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160420
DTEND;VALUE=DATE:20160422
DTSTAMP:20260503T213123
CREATED:20160315T085658Z
LAST-MODIFIED:20190619T094759Z
UID:14319-1461110400-1461283199@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: CSP:2016 Cyber Security Professionals
DESCRIPTION:The Cyber Security Professionals event takes place at York Racecourse on 20th & 21st April 2016. \nThe two-day event is designed to help delegates from across the wider public sector\, private sector and third party sector to not just simply understand cyber challenges\, but to find ways to address them\, and to embrace the opportunities presented by a hyperconnected world. \nThis event will comprise conference\, workstreams and an exhibition area hosting vendors of cyber security products and services. There is a networking dinner on the evening of 20th April which is free to attend to all delegates. \n  \nFor more information\, please visit the CSP:2016 website. \n 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-csp2016-cyber-security-professionals/
LOCATION:York Racecourse\, Tadcaster Road York\, York\, YO23 1EX
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20160412
DTEND;VALUE=DATE:20160414
DTSTAMP:20260503T213123
CREATED:20160129T133104Z
LAST-MODIFIED:20190619T094759Z
UID:13943-1460419200-1460591999@iotsecurityfoundation.org
SUMMARY:IoTSF PROMOTED EVENT: Smart IoT London
DESCRIPTION:The Internet of Things is radically redefining just what it means to be connected.It will present unmissable\, undreamt-of possibilities for businesses all over the world. But it will need explaining. That’s where Smart IoT London 2016 comes in. \nSmart IoT London will deliver a cutting-edge conference programme focusing on understanding the business opportunities enabled by smart products and new ecosystems. \nGoverned by a Board of Patrons and chaired by Dr John Bates\, author of the best-selling book on IoT\, ‘Thingalytics’\, the programme will bring together 160 of the world’s global thought leaders to discuss how the IoT is deployed\, managed\, secured and best utilised to shape the future of business computing and big data analytics. \n  \nFor more information\, please visit the Smart ioT London website. \n  \n 
URL:https://iotsecurityfoundation.org/event/iotsf-promoted-event-smart-iot-london/
LOCATION:ExCeL London\, 1 Western Gateway\, Royal Victoria Dock\, London\, E16 1XL
END:VEVENT
END:VCALENDAR