SlideShare a Scribd company logo
1 of 12
Download to read offline
Internet of Things - how secure
is it?
28th January, De Montfort University
Welcome
• Overview of Cyber Security at DMU
• East Midlands Chamber (Derbys, Notts, Leics)
• Institute of Information Security Professionals (IISP)
• UK Cyber Security Forum
• Programme for the event
East Midlands Chamber
• c4000 members across Derbys, Notts & Leics
–Largest business support organisation in East Midlands
–2nd largest Chamber UK
• A voice for business
• Supporting business
–Events & Networking
–International Trade
–Training & Recruitment
–HR/Legal Advice
East Midlands Chamber
Business Security
• Bringing businesses together to
–help themselves
–share best practice
• Source of Security Advice
• Seminars, Workshops and Conferences
Institute of Information Security Professionals (IISP)
• Professional body for those working in the
cyber security sector
• Individual and company membership
• Offers career progression, access to
resources, events and publications
• East Midlands branch run by Nexor
• Run a series of events – presentations and
networking
UK Cyber Security Forum
• Represents small companies who are
actively working in cyber security across
the UK
• Completely free to join
• Has over 400 members across the
country
• East Midlands branch hosted by Nexor
Programme for tonight
• Overview of the challenges and issues of the IoT and its security
Colin Robbins, Managing Consultant at Qonex
• Self-defending IoT devices and gateways: solutions for consideration
Matt Aldridge, Solutions Architect at Webroot
• Raising finance for IoT projects
Dave Cowe, Senior Account Manager and Chris Ward, Technical
Consultant at Econocom
• Practical steps to overcoming the challenges of IoT security
Mike Gillespie, Managing Director at Advent IM
See separate presentations
Cyber related news
• New IoT security report
• Major cyber-crime research scheme launched
• New cyber platforms
1. Cyber Growth Partnership have launched CGP Exchange
2. UK Cyber Security Forum launching Cyber Collaborate
portal soon
Upcoming events
• Internet of Things Security Foundation - Open Plenary
Session 2
• Monday 1st February
• London
• http://nxr.co/1PhK4DJ
• IISP AGM
• Thursday 4th February
• London
• http://nxr.co/1S8qEE0
Next East Midlands Cyber Security Forum event
Tuesday 10th May
University of Nottingham
Impact of the new General Data
Protection Regulations (GDPR)
Cyber Security conference
Monday 11th July
National Space Centre, Leicester
• Exhibition & Conference, featuring:
–Keynote presentations from industry leaders
–Product Showcases
–Training sessions
Internet of Things - how secure
is it?
28th January, De Montfort University

More Related Content

What's hot

Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Denitsa Gospodinova
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergNapier University
 
About European Open Science Cloud
About European Open Science CloudAbout European Open Science Cloud
About European Open Science CloudJisc
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI Network
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteAllen Woods
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityTheFuseBox
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Ben Proctor
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking eventsDuncan Purves
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorHeather-Fiona Egan
 
Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016Jisc
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIGLorna Campbell
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Jaba Gvelebiani
 
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-CollinsStakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-CollinsJisc
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonCreative Economy Programme
 
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn HarrowStakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn HarrowJisc
 

What's hot (20)

Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
PrivacyOS
PrivacyOSPrivacyOS
PrivacyOS
 
About European Open Science Cloud
About European Open Science CloudAbout European Open Science Cloud
About European Open Science Cloud
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
 
An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web site
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainability
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
 
Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIG
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
 
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-CollinsStakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
 
18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network
 
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn HarrowStakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
 

Viewers also liked

Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for successIISPEastMids
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything IISPEastMids
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoTIISPEastMids
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways IISPEastMids
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark ChimelyIISPEastMids
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISPEastMids
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveIISPEastMids
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the BoardQonex
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case studyIISPEastMids
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials Qonex
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy SoftwareQonex
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareIISPEastMids
 

Viewers also liked (17)

Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 

Similar to Internet of Things - how secure is it?

SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for freeCyber Security Partners
 
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu grahamhitchen
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkQuEST Forum
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceDale Butler
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Invest Northern Ireland
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...DATA SECURITY SOLUTIONS
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414Stewart Benger
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceDale Butler
 
It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...David Terrar
 
Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017CodeMill digital skills
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber securityIT Governance Ltd
 
IPnett Company Presentation 2015 Standard
IPnett Company Presentation 2015 StandardIPnett Company Presentation 2015 Standard
IPnett Company Presentation 2015 StandardBobo S
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 

Similar to Internet of Things - how secure is it? (20)

SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
 
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu Io t roadmapping   11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
Io t roadmapping 11-12 july 2012 - welcome pres by tsb v1 maurizio pilu
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
CD Winter 2017 - Main Slides
CD Winter 2017 - Main SlidesCD Winter 2017 - Main Slides
CD Winter 2017 - Main Slides
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
Brochure EBRC 2016
Brochure EBRC 2016Brochure EBRC 2016
Brochure EBRC 2016
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...North European Cybersecurity Cluster - an example of the regional trust platf...
North European Cybersecurity Cluster - an example of the regional trust platf...
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
SMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conferenceSMi Group's Smart Grid Cyber Security 2019 conference
SMi Group's Smart Grid Cyber Security 2019 conference
 
It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
 
Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017Intro to CodeMill digital skills - September 2017
Intro to CodeMill digital skills - September 2017
 
Using international standards to improve EU cyber security
Using international standards to improve EU cyber securityUsing international standards to improve EU cyber security
Using international standards to improve EU cyber security
 
IPnett Company Presentation 2015 Standard
IPnett Company Presentation 2015 StandardIPnett Company Presentation 2015 Standard
IPnett Company Presentation 2015 Standard
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Internet of Things - how secure is it?

  • 1. Internet of Things - how secure is it? 28th January, De Montfort University
  • 2. Welcome • Overview of Cyber Security at DMU • East Midlands Chamber (Derbys, Notts, Leics) • Institute of Information Security Professionals (IISP) • UK Cyber Security Forum • Programme for the event
  • 3. East Midlands Chamber • c4000 members across Derbys, Notts & Leics –Largest business support organisation in East Midlands –2nd largest Chamber UK • A voice for business • Supporting business –Events & Networking –International Trade –Training & Recruitment –HR/Legal Advice
  • 4. East Midlands Chamber Business Security • Bringing businesses together to –help themselves –share best practice • Source of Security Advice • Seminars, Workshops and Conferences
  • 5. Institute of Information Security Professionals (IISP) • Professional body for those working in the cyber security sector • Individual and company membership • Offers career progression, access to resources, events and publications • East Midlands branch run by Nexor • Run a series of events – presentations and networking
  • 6. UK Cyber Security Forum • Represents small companies who are actively working in cyber security across the UK • Completely free to join • Has over 400 members across the country • East Midlands branch hosted by Nexor
  • 7. Programme for tonight • Overview of the challenges and issues of the IoT and its security Colin Robbins, Managing Consultant at Qonex • Self-defending IoT devices and gateways: solutions for consideration Matt Aldridge, Solutions Architect at Webroot • Raising finance for IoT projects Dave Cowe, Senior Account Manager and Chris Ward, Technical Consultant at Econocom • Practical steps to overcoming the challenges of IoT security Mike Gillespie, Managing Director at Advent IM See separate presentations
  • 8. Cyber related news • New IoT security report • Major cyber-crime research scheme launched • New cyber platforms 1. Cyber Growth Partnership have launched CGP Exchange 2. UK Cyber Security Forum launching Cyber Collaborate portal soon
  • 9. Upcoming events • Internet of Things Security Foundation - Open Plenary Session 2 • Monday 1st February • London • http://nxr.co/1PhK4DJ • IISP AGM • Thursday 4th February • London • http://nxr.co/1S8qEE0
  • 10. Next East Midlands Cyber Security Forum event Tuesday 10th May University of Nottingham Impact of the new General Data Protection Regulations (GDPR)
  • 11. Cyber Security conference Monday 11th July National Space Centre, Leicester • Exhibition & Conference, featuring: –Keynote presentations from industry leaders –Product Showcases –Training sessions
  • 12. Internet of Things - how secure is it? 28th January, De Montfort University