SECURE YOUR TICKET

Our speakers have a wide range of presentations covering many aspects of IoT Security.

Click on a title below to read the abstract and find out more about our speakers

We’re all in this together Keynote – Dr. Stephen Pattison, VP Public Affairs, ARM

AI-driven Cyber Defence for Endpoint Energy AssetsKeynote – Leo Simonovich, VP & Global Head, Industrial Cyber, Siemens Energy

IoT security challenges and opportunities in the 5G eraKeynote – Dr. Mihoko Matsubara, Chief Cybersecurity Strategist, NTT Corporation

When one size solution doesn’t fit all –  Keynote – Katerina Megas, Program Manager, NIST Cybersecurity for IoT Program

Software Provenance – Where Do We Draw the Line? – Matt Wyckhouse, Co-Founder and CEO, Finite State

Securing the Industrial IoT – Simon Butcher, Principal Embedded Security Engineer, Arm

Secure Management of Things in AWS IoT – Dave Walker, Principal Specialist Solution Architect for Security and Compliance, AWS

Practical physical attacks against embedded systems and their secure design to mitigate them – Rohini Narasipur, Product security engineer and incident handler, Bosch PSIRT

Challenges of Vulnerability Management and Disclosure Processes in a big organisation – The Bosch PSIRT – Carolina Adaros, Product Security Incident Handler, Bosch PSIRT

IoT security and the supply chain: real-world problems and solutions – David Mudd, Global Digital Product Certification Director, The British Standards Institution

Shining the Light of Truth: a journey into vulnerability disclosure practices at consumer IoT product companies – David Rogers MBE, Founder, Copper Horse

PKI Certificates: a ticking time-bomb in your IoT system? – Matthew Dickie, CTO, Group-BMC

PKI Certificates: a tiNew Guidance and Best Practices on the security of Smart Built Environments, IoTSF – Jason Shaw, Associate Security Consultant, Hilson Moran.

IoT on the frontline – when a 3rd party 0day becomes your problem… – Adam Laurie, Global Lead Hardware Hacker, IBM

The Evolution of Chip to Cloud Security and Future Threats – Satyajit Sinha, Senior Analyst, IoT Analytics

Sensory Overload – Cybersecurity Threats for Next Generation Vehicles – Steve Povolny, Head of Advanced Threat Research, McAfee

Anatomy of Real-World IoT/OT Attacks and How to Defend Against Them – Phil Neray, Director of IoT/OT security strategy, Microsoft

Secure by Design, still a USP in a competitive environment – Ivan Reedman, Head Tinkerer and Ponderer, NCC Group

The Consumer IOT Attack Surface – an architectural deep dive on the threats and mitigations for real world IOT deployments – Nick Allott, CEO, NquiringMinds

One way or another, they’re going to get you: Threats to press freedom from the Internet of Things – Anjuli Shere, Analyst/Writer/Researcher, University of Oxford

Secure by Design: What is it and why do IoT use cases need it? – Rob Dobson, Vice President, Device Authority

Securing the Internet of Medical Things – Andy Bridden, IoT security consultant, PA Consulting

The IoT is littered with security disasters. As the distinction from OT blurs how do we avoid repeating them? – Ken Munro, Partner, Pen Test Partners

Side Channel Attacks; an imminent threatVincent Lyles, CEO, Pugged Code Limited

IoT security from Risk of Inaction to Return on InvestmentOvidiu Ursachi, CEO, Quanto Masernet/ RobIoTic

Building the optimal level of IoT device security into a connected product – an OEMs guide – Andrew Frame, VP Business Development, Secure Thingz

Meeting the Industry 4.0 Security Challenges of IEC 62443 – Haydn Povey, CEO, Secure Thingz

IoT Security Reference Architecture – Professor Kwok-Yan LAM, Professor of Computer Science, Nanyang Technological University

A Brief Introduction to Vulnerability Disclosure from the Researcher Perspective – Jen Ellis, VP of community and public affairs, Rapid7

ETSI EN 303 645 – the ultimate IoT testing baseline. Lessons learned and way forward – Razvan Venter, Team Lead Security Compliance and Certifications, Secura B.V.

How eSIM technology can be used within the IoT – Zofia Domanska, Product Manager, G+D

IoT security, and it’s disturbing status – Pieter Meulenhoff, Quality control, internships & security training , Eurofins Cyber Security

Supply Chain Integrity – Amyas Phillips, Independent IoT Consultant and Security Scientist, Ambotec Ltd.

New Guidance and Best Practices on the security of Smart Built Environments, IoTSF – James Willison MA,
Founder, Unified Security

What is a Smart Built Environment, and why it matters? – Sarb Sembhi, Co-Chair of Smart Built Environment Group, CTO & CISO, Virtually Informed

The Geopolitics of Industrial IoT – Professor Madeline Carr, Professor of Global Politics and Cybersecurity, University College London