Don't panic about IoT Security, new technology will sort it out

Brought to you by The Security, Privacy, Identity & Trust (SPIT) Group

The Internet of Things (IoT) brings together large amounts of data about people. The IoT could become a hackers playground with big, valuable data sets available in one place.

Registration for this event is now closed.

About the event

This half day conference hosted by Olswang will explore the ways in which new technologies can be applied to manage the risks inherent in any data collection project. We will explore the potential dystopian outcomes of the IoT, and look at ways in which technologies like artificial intelligence, block chains, quantum key distribution will keep our future safe.

Our SIG champions will set the scene on a variety of tension points within the IoT sector and speakers will be invited to share their expertise surrounding IoT security. From hacking scandals, IoT privacy to new technology and government regulation, this event will encourage lively discussion with audience members.

You can follow @cambwireless on Twitter and tweet about this event using #CWSecurity.

Hosted by CMS

CMS is a pioneering firm with a distinctive approach to business law.

View profile

Agenda

Expand all

The information supplied below may be subject to change before the event.

13:30

Registration, Networking & Refreshments (Lunch will not be provided)

14:00

Introduction to Security & Defence SIG from Paul Tindall, Sepura

14:05

Welcome from our host, Anthony Waller, Partner at Olswang LLP

14:10

Scene Setting by Tim Phipps, Solarflare

14:20

Three approaches for resolution by Paul Tindall, Sepura

14:20

What could possibly go wrong?; Adrian Winkles, ARU

We hear of hacking scandals in the news all the time, but what are the implications and what should we be looking out for? Let’s explore some potential scenarios.

14:45

Q&A

14:50

The business case for security; Laurence Kalman, Olswang

Legal liability and insurance costs will provide a business case for the right amount of security to be added to IoT data. There are some specific questions that we’d like to explore. Who owns "information"? What right is there to IoT privacy? Is consent really freely given when a big corporate offers the user a "yes/no" decision on 62 pages of T&Cs? Can a small, sacrificial company carry such large liabilities?

15:05

Q&A

15:10

Refreshment break

15:40

New technology will solve all of our problems; Max Heinemeyer, Darktrace

Signature and rule based security controls are inherently reactive and do not keep up with today’s threat landscape. Neither does this traditional approach work nor is it very resource-efficient because of true-positives often getting drowned in false-positives resulting in alert fatigue for analysts. The advent of the IoT adds challenges and complexity on top of this by introducing an unpreceded amount of connected devices and new technologies resulting in an even bigger attack surface. Machine learning and anomaly detection identify attacks and threats by detecting deviations from learned patterns of life for a network rather than relying on known indicators of compromise. Darktrace is used as an example to illustrate how ‘smart’ solutions protect enterprises against modern threat actors regardless of if the tools, techniques & procedures used by the attackers are known or unknown.

15:55

Q&A

15:55

The role of government and regulation;Derek McAuley, University of Nottingham

What is the role of the regulator? For a start which regulator has control? (ofcom, information commissioner, health service commissioners). What level of regulation will benefit the whole industry in protecting us from both hackers and poor corporate behaviour?

16:15

Q&A

16:20

Insight from Government - Professor Anthony Finkelstein, Chief Scientific Adviser for National Security

16:35

Q&A

16:40

Various scenarios and questions will be posed to the audience and speakers. Questions and interaction from the audience is encouraged!

17:00

Closing Remarks from Paul Tindall

17:05

Complete Feedback and Event Closes

Speakers

Anthony Finkelstein

Max Heinemeyer - Director of Threat Hunting, Darktrace

Max is a cyber security expert with over eight years’ experience in the field specializing in network monitoring and offensive security. At Darktrace, Max works with strategic customers to help them investigate and respond to threats as well as overseeing the cyber security analyst team in the Cambridge UK headquarters. Prior to his current role, Max led the Threat and Vulnerability Management department for Hewlett-Packard in Central Europe. He was a member of the German Chaos Computer Club, working as a white hat hacker in penetration testing and red teaming engagements. Max holds a MSc from the University of Duisburg-Essen and a BSc from the Cooperative State University Stuttgart in International Business Information Systems.

Laurence Kalman - Partner, CMS

Laurence is a partner in the CMS Commercial / Technology team.

Laurence works on a wide range of commercial and technology-related transactions, including outsourcing deals, licensing / franchising arrangements and services agreements. He acts for buyers and sellers on IP-rich, cross-border M&A transactions, with a focus on resolving complicated business separation issues. Laurence also advises on exploiting IP rights and data / cyber security matters.

Laurence acts for clients across a range of industries, including TMT, retail, infrastructure, energy, and financial services. He is particularly focused on connective technologies and the “internet of things”, and is co-head of CMS’s automotive technology group.

Derek McAuley - Professor or Digital Economy in the School of Computer Science, Nottingham University

Adrian Winckles - Course Leader, Anglia Ruskin University

SIG Champions

Zahid Ghadialy - Principal Analyst & Consultant, 3G4G

Zahid is a technologist with a deep understanding of architecting world-class mobile products and solutions. With over 20 years of experience in the telecom industry in various roles, he has been an evangelist for mobile and wireless technologies. Over the years he has accumulated a vast following on his blogs and social networks with simple explainer posts and videos.

His 3G4G blogs are widely read where he looks at different aspects of mobile technology and especially 5G and 6G nowadays, including the architecture, deployments, use cases, applications, etc. His YouTube channel is also very popular where he explains many new features expected as part of 5G in the future. While his style and content is unique, he also references many industry publications and provides slides that are very useful to view online.

He is also very active on Twitter under his @3G4GUK brand helping disseminate the benefits of 5G and why 5G will be needed in the long run. He covers a very wide portfolio of 5G related information that is hard to find otherwise.

Until recently, Zahid was a Senior Director looking at Technology & Innovation Strategy in Parallel Wireless. As a brand ambassador, he represented the company in various Open RAN discussions and also created tutorials on Open RAN and O-RAN which are being used as reference for new starters on the topic.

Richard Jacklin - Business Development - Commercial Lead, Plextek

Richard is the Commercial Lead for Plextek Services, helping customers design and produce highly innovative electronic, radar and radio communications enabled solutions. His career, now over 30 years, has included sales management, product management and engineering leadership in companies including Ericsson, Samsung, UL, Keysight, PPM and NI. He has presented and contributed to many forums including Cambridge Wireless, GSMA working groups, and Satellite Innovation Group. Richard graduated from the University of Portsmouth with a degree in Electronic Engineering, he was also awarded Chartered Engineer status and Fellow of the Institute of Engineering and Technology (IET).

Bob Oates - Associate Director, Cambridge Consultants

Bob Oates is a specialist in the interaction between safety and security for operational technology, critical infrastructure, and IoT devices. He works within the Engineering Assurance Team at Cambridge Consultants, ensuring that intelligent, AI-enabled systems are safe and secure. In addition to his academic background, Bob has over a decade of industrial experience working in the critical national infrastructure, defence, aerospace, nuclear, and maritime domains, including acting as the head of security for the development of the world’s first commercial remotely operated ship. He holds an Honorary Professorship in Safety and Security at De Montfort University.

Yiru Zhong - None

Yiru is an M2M/IoT market veteran with an industry research background and practical deployment experience. She understands the complexity of new service launches and the investigative nature of enterprise adoption trends. In her analyst past, she has launched two successful M2M/IoT research programmes, changed leadership minds on focussing on security, and managed an IoT platform validation programme. Her current role utilises her industry and IoT technology knowledge to accelerate enterprise adoption. She represents Soracom in the UK to lead conversations with start-ups, SMBs and enterprises on how to use IoT for their business. She is passionate about resolving commercial practicalities of IoT deployment and mostly building a positive conversation around IoT security.

Event Location

Open in google maps

Location info

Olswang LLP, 90 High Holborn, London W1V 6XX

Related resources

Related events

  • Cambridge Wireless

    Backhauling the Rural Mobile Broadband Service

    Register now
  • Cambridge Wireless

    Risk, perception, management and mitigation in RF Safety

    Register now
  • Cambridge Wireless

    Member Networking 2024

    Register now

Subscribe to the CW newsletter

This site uses cookies.

We use cookies to help us to improve our site and they enable us to deliver the best possible service and customer experience. By clicking accept or continuing to use this site you are agreeing to our cookies policy. Learn more

Reserve your place

Join the CW network

CW is a leading and vibrant community with a rapidly expanding network of nearly 400 companies across the globe interested in the development and application of wireless and mobile technologies to solve business problems.

Sign in to your account

Please sign in to your CW account to reserve a place at this event and to qualify for any member discounts.

Start typing and press enter or the magnifying glass to search

Sign up to our newsletter
Stay in touch with CW

Choosing to join an existing organisation means that you'll need to be approved before your registration is complete. You'll be notified by email when your request has been accepted.

i
Your password must be at least 8 characters long and contain at least 1 uppercase character, 1 lowercase character and at least 1 number.

I would like to subscribe to

Select at least one option*