TALKS

While our speakers are preparing to educate, inform and perhaps, entertain,  with their presentations, take a look at their abstracts.

Jump to a speaker

¦   Sjadi Razak   ¦   Phil Day   ¦   Anna Maria Mandalari   ¦   Michael Richardson   ¦   Ian Pearson   ¦   Ken Metcalf ¦   Brian Contos   ¦   Naor Kalbo

Towards Continuous Assurance of IoT Cybersecurity

Paul Kearney

Birmingham City University

BIO
ABSTRACT

Securing Internet of Drones

Sjadi Razak

ANGOKA Limited

BIO
ABSTRACT

Secure by Design Configuration Interfaces

Phil Day

Configured Things

BIO
ABSTRACT

The keystone in Secure by Design and Business Risk Mitigation

Ian Pearson

Microchip Ltd

BIO
ABSTRACT

What spots should we light to assess an IoT security risk?

Naor Kalbo

Forescout

BIO
ABSTRACT

Confining Linux Applications with LibSeccomp

Simon Goda

Doulos Ltd

BIO
ABSTRACT

Patching and vulnerability managment. are a losing game for IoT security. What can we do differently?

Arthur Braunstein

Sternum

BIO
ABSTRACT

Best practice for building/engineering ‘secure by design’ products and/or systems

Anna Maria Mandalari

Imperial College London

BIO
ABSTRACT

The New Encryption Standards from NIST & RISC-V: What do IoT developers need to know?

Alan Grau

PQShield

BIO
ABSTRACT

Social and Technical metrics for Trust Anchor resilence

Michael Richardson

Sandelman Software Works Inc

BIO
ABSTRACT

Secure Boot – The keystone in Secure by Design and Business Risk Mitigation

Ian Pearson

Microchip Ltd.

BIO
ABSTRACT

How to win at playing the IIoT Security game

Ken Metcalf

Reslam Ltd

BIO
ABSTRACT

Xiaomi IoT Technology and Security Compliance

Natalia Ares

Xiaomi

BIO
ABSTRACT

Cameras, CACs & Clocks: Enterprise IoT Security Sucks – A Story of Two Million Interrogated Devices

Brian Contos

Phosphorus Cybersecurity

BIO
ABSTRACT

Lessons learned from building a Global federated IoT Security Certification and voluntary live Cybersecurity Labelling Scheme

Matt Tett

Enex P/L.

BIO
ABSTRACT