Internet of Things Cyber Security Conference – Talks Announced

Internet of Things Cyber Security

Secure IoT 2019 Speakers & Talks

Announcing the first set of talks for Secure IoT 2019, the 3rd annual Internet of Things Cyber Security conference, that will be held on 7th November at the Green Park Conference Centre, Reading, RG2 6GP. Speakers: Arm, AWS, Device Authority, IBM, NCC Group, Pen Test Partners, GSMA and Copper Horse.

At the Internet of Things Cyber Security conference, learn about the:

  • Cyber security issues, risks, threats and vulnerabilities associated with IoT systems and connected devices
  • Gain an understanding IoT security best practice
  • Meet Leading experts and companies offering security products, solutions and services.

For full details see:

Secure IoT 2019

Book Tickets

Special discounted ticketsare available for full time studentsand academics at a rate of £44.90(incl. fees & VAT)


“IoT. Engineer securely, don’t add security”
Ivan Reedman – Executive Principal, Technical Lead, NCC Group

All too often vendors offer products and solutions to secure your IoT device. Unfortunately, in reality there is no silver bullet. For an IoT device to be secure, it must be engineered securely.

This talk will cover some basic principles of secure engineering using publically available references and models whilst also explain why and how to implement these principles.

“Systemic fraud in IoT: the fraud no one know about”
Tony Gee – Associate Partner, Pen Test Partners

Systemic issues in IoT are becoming more and more prevalent, with millions of devices compromised by poor security on the API, but there is a more sinister abuse of this attack as yet unknown.

This talk will discuss this attack and the ways an attacker can abuse the flaw for massive systemic fraud. We will also discuss the current mitigations in place and other mitigations organisations and individuals can put in place. This talk will be an eye opener to a brand new type of abuse of IoT!

“The PSA Security Model: Important Security Goals and How They Impact Security”
Marcus Streets – Principal Security Architect, Arm

Security is constantly changing and evolving. With regulations always on the horizon and new threats being identified, businesses need a strategy to protect against future security threats. The Platform Security Architecture (PSA) offers a framework for securing connected devices. It provides a step-by-step guide to building in the right level of device security, reducing risk around data reliability, and allowing businesses to innovate on new ideas to reap the benefits of digital transformation.

Dave Walker – Solutions Architect, Amazon Web Services
Since the launch of the security-focussed AWS IoT Device Defender service last year, there’s been futher services and feature releases in the AWS IoT service family. We explore how these services fit together in some reference archiectures, and how they integrate with other AWS services for the purpose of enhancing security.

“IoT Security for Industrial and Smart Factory use cases”
Rob Dobson – Director, Device Authority

The presentation will take the audience through what some of the challenges are for securing industrial and Smart Factory deployments. Looking at several case study scenarios where customers have specific requirements around data security, privacy and how they can meet the Operation Technology (OT) needs for their businesses.

“Cybersecurity and the IoT”
Henrik Kiertzner, Principal Cybersecurity Consultant

The argument goes something like this – a huge number of nodes, all built by the lowest bidder and designed largely in jurisdictions where there is less-than-desirable attention paid to intellectual property rights, present a huge and appealing attack surface to the potential State actor aggressor, allowing for compromise of the confidentiality, integrity and availability of the devices and services they provide. IoT operators will need to find ways to maintain visibility of activity on their extended network and identify attacks and reconnaissance activity in order to move to mitigate impacts at the earliest possible time.

As with any modern issue, the key strands are people, process and technology. Where we are likely to fail is in process – the allocation of responsibility, the development of policy (and regulatory) architectures.

“Leveraging the SIM as a ‘Root of Trust’ to Secure IoT Applications”
Ian Smith, IoT Security Lead, GSMA

The GSMA has investigated how to leverage existing mobile operator assets to help secure IoT services – one of these key assets being the SIM. In his presentation, Ian Smith, IoT Security Lead at GSMA, will describe how cellular connected (GSM, LTE, NB-IoT) IoT devices can use the capabilities of the SIM to enhance the security of commonly used IoT security protocols such as Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS).

Ian will also talk about the work the GSMA is undertaking to create a ‘common implementation guide’ for this capability – to the benefit of the IoT developer community.

“The Digital Security by Design Challenge”
Robin Kennedy – Cyber Security, Knowledge Transfer Network

Robin will outline one of the latest programmes to be announced under the Industrial Strategy Challenge Fund (ISCF) which, through enhancements to processor architecture and software, aims to make digital systems inherently less vulnerable

Other Speakers at the Internet of Things Cyber Security conference include:

Dr Andrew Jones – System Architect, Arm

Adam Laurie – Global Lead Hardware Hacker, X-Force Red, IBM

Mark Neve – IoT Security Foundation Ambassador and Technical Lead at Copper Horse

Can you Trust your Smart Building? – Understand the cyber security issues

cyber security ‘smart’ building systems
In this digital age, what risks are posed to your tenants, staff, visitors and assets from vulnerabilities in Internet connected smart building systems and devices? This article aims to help you understand the cyber security issues associated with ‘smart’ building systems and Internet of Things (IoT) connected devices and why they are important – NB you can find out more at  the Secure IoT conference.
Buildings are becoming increasingly connected and ‘Smart’ with the deployment of sensors, IoT networks, analytics and their integration with building management systems (BMS), building automation systems (BAS) and other systems (e.g. security, fire detection and alarms, occupancy, environmental, parking.
Smart Buildings can generate a deluge of data however, predictive analytics, machine learning and other branches of artificial intelligence (AI) allow managers and Smart Buildings Systems to ‘intelligently’ optimise the use of assets, operations and the consumption of resources. This optimisation offers potential benefits to users, owners and managers of buildings including:
  • Savings in energy and water usage and the resulting reduction in costs and carbon footprint
  • Improved working conditions, safety and security for occupants
  • Improved customer service levels
  • Visibility and management of occupancy levels
  • Optimisation of resources (physical, space and human)
  • Reduced maintenance costs


As well as the benefits, it is important to consider the risks of introducing new technology and devices. IT Cyber Security risks are not new, however, the proliferation of connected IoT devices introduces new system elements and components that can be exposed to possible attacks (attack surface) and mechanisms by which the attack can take place (attack vectors).
The risk to an organisation or individual through poor security practice could impact:
  • Reputation
  • Share price
  • Costs (operational, replacement, sales, legal, fines etc.)
  • Health & Safety

Threats to Smart Buildings

Threats to Smart Buildings can come from a number of difference sources or ‘actors’ including financially motivated cyber criminals, states and state-sponsored groups, hacktivists and malicious insiders (employees).
In 2012, Hackers exploited vulnerabilities in industrial heating systems [ref 1] which were connected to the internet, and then changed the temperature inside the buildings. They utilised a flaw in the building management software.
Security research company, Pen Test Partners, have demonstrated [ref 2] how poor installation by electricians and HVAC engineers who don’t understand security can lead to BMS controllers being exposed on the public internet and vulnerable to attacks that, for instance, could sabotage: HVAC devices to close offices  or cause life threatening issues at healthcare facilities. A simple search on Shodan [ref 3], the search engine for Internet-connected devices can reveal thousands of insecure BMS systems across the globe.
Bring your own IoT Device or Network or Shadow IoT – the use of unauthorised Internet of Things devices and networks poses a new level of threats for enterprises. A 2018 Infoblox report[ref 4] found that:
  • A third of enterprise companies have more than 1,000 shadow-IoT devices connected to their networks on a typical day
  • A quarter of US employees are unclear as to whether their organization has an IoT security policy
  • 20 percent of UK employees rarely or never follow security policy for personal and IoT devices
In 2017, it was revealed that criminals had managed to steal 10GB of data from a North American casino high-roller database via an internet connected thermometer in a lobby aquarium [ref 5]. The internet connected fish tank allowed it to be remotely monitored, automatically adjust temperature and salinity, and automate feedings.
Your building could become part of Botnet to launch Distributed Denial of Service (DDoS) attacks. In 2016, Mirai malware infected CCTV video cameras and digital video recorders and was used to launch a DDoS attack [ref 6] that caused a massive Internet outage affecting Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix. Mirai scours the Web for IoT devices protected by little more than factory-default usernames and passwords, and then enlists the devices in attacks that hurl junk traffic at an online target until it can no longer accommodate legitimate visitors or users

Cybersecurity Best Practice

It is not feasible to eliminate all risks from Smart Buildings. Protecting your investments requires a structured approach to implementing and maintaining security best practice, policies and procedures. This approach is well illustrated and documented by the US National Institute of Standards and Technology (NIST), “Framework for Improving Critical Infrastructure Cybersecurity” [ref 7] which:
“Provides a common language for understanding, managing, and expressing cybersecurity risk to internal and external stakeholders. It can be used to help identify and prioritize actions for reducing cybersecurity risk, and it is a tool for aligning policy, business, and technological approaches to managing that risk. It can be used to manage cybersecurity risk across entire organizations, or it can be focused on the delivery of critical services within an organization.”
The NIST Framework Core provides a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes. The main Core Functions are Identify, Protect, Detect, Respond, and Recover. The Functions should be performed concurrently and continuously to form an operational culture that addresses dynamic cybersecurity risk. Core activities include:
  • Management Governance
  • Risk Assessment
  • Threat Modelling
  • Security by Design (throughout the enterprise and system of systems) and leveraging Defence in Depth
  • Procurement (specifying security requirements for products)
  • Supply Chain processes (ensuring security is maintained throughout and at source)
  • Secure Implementation processes
  • Testing and Validation
  • Secure Maintenance and Lifecycle Management (including security software updates)
  • Training for system administrators and an enterprise monitoring plan to watch for suspicious events within the building network
  • Detection of Anomalies and Events
  • Continuous Security Monitoring
  • Incident response plan to effectively respond to cyber security incidents as they occur
  • Vulnerability disclosure
  • Recovery and Resilience processes and plans to restore services in the event of a security event
  • Physical access controls to provide wider visibility across the physical and electronic space
Security investments should be balanced against the effect of undesirable outcomes. Balancing should be grounded in a realistic assessment of the threats, the risks they pose and how they might prevent the system from fulfilling its intended functions. Costs should be evaluated, and a rational selection of implementation choices made to deliver an acceptable return on investment. In preparing for your risk assessment you might like to consider e.g.:
  • Have you identified your critical digital assets? Not all systems and data are created equal.
  • Have you identified which systems are critical for health and safety reasons and therefore must be fail-safe?
  • Do you have and maintain lists of all your assets (devices, software, and any sensitive information/data)? If so, do you know who has access to them and where the data resides?
  • Are you able to detect unusual behaviour/activity on your network/do you use real time monitoring solutions?
  • Would you know if a rogue device came on to the system?
  • If the building systems are attacked do you have processes and policies in place and are your staff familiar with these?
These and other questions are important for a Smart Building’s stakeholders to carefully weigh up throughout its lifecycle from design to decommissioning especially given the legal and health and safety requirements which relate to data protection and duty of care.

IoT SF Smart Buildings Working Group

The IoT Security Foundation[ref 8] recently published a White Paper ‘Can you Trust your Smart Building?’ [ref 9] and is seeking to encourage people from Smart Building stakeholder groups to engage with their Smart Buildings Work Group and provide input as they develop best practice security guidance in this area. To find out how you can be involved with the Smart Buildings Working Group, please contact:

Secure IoT 2019, Internet of Things Cybersecurity Conference

If you would like to:
  • Learn about the security issues, risks, threats and vulnerabilities associated with IoT systems and connected devices
  • Gain an understanding IoT security best practice
  • Meet leading cyber security experts and companies offering security products, solutions and services
I encourage you to come along to Secure IoT 2019, Internet of Things Cybersecurity conference, on 7th November at the Green Park Conference Centre, Reading, RG2 6GP, UK.

Buy Tickets

The following organisations, publications and/or standards have been used for the source of references in this document:
1. Fast Company, April 2013, “Cybercriminals Hack Into Factory”
2. Pen Test Partners, “Too cold to work? School closed? Sure your BMS hasn’t been hacked?”
3. Shodan, “search engine for Internet-connected devices”
4. Infoblox, May 2018, “Infoblox research finds explosion of personal and IoT devices on enterprise networks introduces immense security risk”
5. Forbes, July, 2017, ” Criminals Hacked A Fish Tank To Steal Data From A Casino
6. KrebsonSecurity, October 2016 “Hacked cameras, DVRs Powered Todays Massive Internet Outage:
7. National Institute of Standards and Technology, “Framework for Improving Critical Infrastructure Cybersecurity”
8. Internet of Things Security Foundation
9 Internet of Things Security Foundation, June 2019, “Can you trust your Smart Building?”

Internet of Things Cybersecurity Conference | Secure IoT 2019

Internet of Things Cybersecurity Conference

The 3rd Annual Internet of Things Cybersecurity Conference will be held at the Green Park Conference Centre, 100 Longwater Avenue, Green Park, Reading, Berkshire, RG2 6GP, on Thursday, 7th November, 2019.

The objective of the conference is for attendees to:

  • Learn about he potential risks and vulnerabilities associated with IoT systems and connected devices
  • Gain an understanding of IoT security best practice and guidelines
  • Hear from leading experts and organisations providing guidance and best practice
  • Meet companies offering security products, solutions and services

To book tickets:

Secure IoT 2019 Tickets

Speakers from:

  • Amazon Web Services
  • Arm
  • Department for Digital, Culture, Media and Sport
  • Device Authority
  • GSMA
  • IBM
  • IoT Security Foundation
  • Microsoft
  • NCC Group
  • Pen Test Partners
  • SAS

For more information visit:

Secure IoT 2019 | Internet of Things Cybersecurity Conference

Internet of Things Thames Valley Meetup | Photos and Presentations

Photos from the Internet of Things Thames Valley Meetup on 19th June 2019


You can view/download the IoT Thames Valley Meetup photos on SmugMug.

You can find links to view and download the presentations from this and past Meetups by logging in and visiting the IoT Thames Valley Community website Resources page.

To see and register (free to attend) for future Internet of Things Thames Valley Meetups see

Internet of Things Thames Valley

Reading, GB
1,758 Members

This group is open (free) for business, academic, public sector and technical professionals interested in the ‘Internet of Things’ who wish network, share knowledge, experienc…

Next Meetup

IoT Thames Valley Meetup #27

Wednesday, Sep 11, 2019, 6:00 PM
40 Attending

Check out this Meetup Group →

IoT Thames Valley Meetup #24 Speakers

We have a great set of presentations lined up for the IoT Thames Valley Meetup #24 on 13th February:

  • Adam Armer, Vodafone, talking about Digital Buildings & IoT, a move from passive to active where the building becomes an agile platform for the delivery of a range of different services
  • Andy Clark, Oracle, will talk about how the World’s first AI smart hives network helps conserve declining global honey bee populations
  • Rob McDonald, Peter Brett Associates, will provide an update on forthcoming Thames Valley Berkshire Smart City Cluster £1.73m Challenge Fund calls
  • Richard Kinder, Wirepas, will be showcasing a number of sensor devices powered by Wirepas Mesh designed for commercial and industrial IoT applications such as smart building and factory systems. Also a live demo of indoor location capabilities and how to build from sensor to cloud using Node-RED and AWS will be shown.
  • Atul Wahi, JT International, will talk about euicc/esims enabling OEMs in the connected world
  • Jonathan Hilliard, Newbury Innovation, will talk about their extensive experience in adding connectivity to new and existing products, allowing them to communicate with smartphones, smart home hubs and other IOT devices
  • Robin Kennedy, Knowledge Transfer Network, will talk about the Cyber Security Academic Start-up Accelerator Programme
  • Lia Richards, IoT Tech Expo, will explain why you need to attend IoT Tech Expo Global 2019 and offer IoT Thames Valley Meetup members a special discount to attend the conference.

IoT Thames Valley Meetup #23 Speakers

We have a great line up of speakers for the IoT Thames Valley  Meetup on 21st November and you will see below details of the talks that will be given by the University of Sheffield’s Advanced Manufacturing Research Centre, OCF Data, Cisco, and Anglia. There are also details about a new MSc IoT with Entrepreneurship from City, University of London.


1.  Advanced Manufacturing Research Centre : the journey towards the digitization of Engineering and Manufacturing
Richard Lanyon-Hogg, Director of Informatics, AMRC

2. Industry 4.0 – A plain English translation for Manufacturers
Prof. Cliff Brereton, Director, OCF DATA
The UK manufacturing sector has a productivity gap with most of its competitors. A lack of adoption of Industry 4.0 methods and technologies is partly responsible for this, but primarily it is the longstanding issues such as down-time, yield and throughput that are the real culprits of underperformance. Yet these traditional manufacturing challenges and the deployment of Industry 4.0 are linked together in so much as one is the answer to the other. During this brief presentation, we will look at these productivity challenges and how using Industry 4.0 techniques can make a positive difference to manufacturing productivity for all, from large enterprises to privately owned SME’s.

3.  Evolution of factory security for Industry 4.0
Stuart Traynor, Solutions Architect, Cisco

Industry 4.0, is driving manufacturing organisations to rapidly adopt new technologies including, Robotics, Industrial IoT, Mobility, Collaboration and Analytics to help drive efficiences. Unfortunately, more devices and connections also open the door to new cyber-security risks, and previous generations of industrial control systems were not conceived with security or the IP connectivity needed in mind.

Traditional guidance to create air gapped and siloed networks is no longer relevant in today’s world which needs to make use of the data generated on the factory floor and cloud services. This session looks to explore how standards and technology are evolving in order to allow organisations to effectively adopt Industry 4.0 whilst maintaining the required level of security. Within this session we will discuss two examples (enterprise and SMB) to explore the different challenges and approaches required to evolve security in the manufacturing environment.

Stuart is Solutions Architect within Cisco UKI Technology Office with a focus on working with manufacturing customers as they look move towards Industry 4.0

4. Securing and monetizing data in the cloud
Andrew Pockson, Marketing Manager, Anglia

Andrew will discuss solutions for securing the data from the IoT ‘thing’ out via various connectivity options. Included will also be how to monetize the service, to get on-going revenue from the hardware solution.

5. MSc IoT with Entrepreneurship
The Engineering School at City, University of London is offering a new Msc IoT with Entrepreneurship programme:

This programme is unique in a couple of ways: it is centred around student design projects that are industry-oriented; and a substantial entrepreneurship component is delivered by our highly rated Cass Business School.

Modules include: IoT Security; IoT Technologies; Data Analytics; Entrepreneurship; Communication Networks.

Researcher Successfully Hacked In-Flight Airplanes – From the Ground

From DarkReading Article:

IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be ‘weaponized’

It’s been four years since researcher Ruben Santamarta rocked the security world with his chilling discovery of major vulnerabilitiesin satellite equipment that could be abused to hijack and disrupt communications links to airplanes, ships, military operations, and industrial facilities.

Santamarta has now proven out those findings and taken his research to the level of terrifying, by successfully hacking into in-flight airplane WiFi networks and satcom equipment from the ground. “As far as I know I will be the first researcher that will demonstrate that it’s possible to hack into communications devices on an in-flight aircraft … from the ground,” he says.

He accessed on-board WiFi networks including passengers’ Internet activity, and also was able to reach the planes’ satcom equipment, he says, all of which in his previous research he had concluded – but not proven – was possible. And there’s more: “In this new research, we also managed to get access to important communications devices in the aircraft,” Santamarta, principal security consultant with IO/Active, says.

Internet of Things Thames Valley Meetup – 2017 Highlights

Internet of Things Thames Valley Meetup highlights for 2017 include: our 3rd Anniversary in May; a growth in membership to 1,300 people and excellent presentations from startups to large enterprises right across the IoT ecosystem including:

  • Ocado Technologies
  • Schneider Electric
  • Dashboard
  • Marks & Clerk
  • Vodafone
  • KTN
  • Logi Analytics
  • Honeywell
  • Review Displays
  • Rescon
  • BSI
  • Dell EMC
  • Imagination Technologies
  • Device Authority
  • Sixis
  • BCS
  • Amazon Web Services (AWS)
  • Surrey University
  • GSMA
  • Abacode
  • Sony
  • Wirepas
  • Voytech Systems
  • T&VS
  • Adaptive Wireless Solutions
  • Think Engineer

A special thank you to our 2017 Sponsors:

  • Green Park
  • KTN (Innovate UK)
  • Marks & Clerk
  • Logi Analytics
  • Anderson Young
  • LynxPro
  • Review Display Systems
  • BCS (Berkshire Branch)
  • Device Authority
  • Surrey University
  • Kemuri

In 2018, I plan to hold another 5 events spread across the year.

The next Meetup is on the evening of 7th February 2018.