The Security of Things™ Forum 2016 (SECoT 2016) is soliciting submissions for the third annual Forum to be held at the Sheraton Commander Hotel in Cambridge, MA September 22, 2016. Use the form provided to submit your talk, presentation or research for inclusion in our fall event.
The Security of Things Forum distinguishes itself with superb technical and strategic content focused on emerging security problems and solutions related to the Internet of Things. In our first two years, the SECoT Forum has presented leading security figures including Dan Geer, the Chief Information Security Officer of In-Q-Tel, Chris Valasek of Uber, a noted expert in connected vehicle security and FTC Commissioner Julie Brill. We’re looking for great speakers for our third annual event, to be held September 22, 2016 in Cambridge, Massachusetts.
- April 11, 2016 – Call for Submissions opens
- July 22, 2016 – Cambridge Call for Submissions closes
- July 29, 2016 – Cambridge Notifications sent
- August 22, 2016 – DC Call for Submissions closes
- September 2, 2016 – DC Notifications sent
- September 22, 2016 – SECoT Forum-Cambridge
- October 27, 2016 – SECoT Forum-DC
Terms are subject to change.
ABOUT SECoT FORUM HOSTS
|The Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Founded in 2012 by Editor in Chief Paul Roberts, Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.|
|The Christian Science Monitor Passcode produces smart, groundbreaking journalism focused on digital security and privacy. With a global network of reporters, columnists, and contributors, Passcode delivers news, analysis, and opinion on the Web, via its monthly Cybersecurity Podcast, and at events around the country.|
WHO SHOULD SUBMIT
The Security of Things Forum presents a broad spectrum of issues and discussion relevant to security and The Internet of Things. Our dual-track format creates opportunities for both high-level discussions and technical deep dives. Past events have featured senior executives including CEO, CTO and CISO), security researchers, principal engineers, attorneys and academics.
We are, of course, most interested in new and unique content. However, updates to- or expansions on existing work or new insights into current topics relevant to the IoT security discussion are very welcome.
The Security of Things Forum offers content on two tracks to satisfy a wide range of attendees, from executives, investors and entrepreneurs to researchers and information security practitioners.
Leaders Track – presents a variety of sessions on practical issues facing information security professionals, executives, entrepreneurs and investors. This track features a morning and lunchtime keynote presentation, panel discussions, fast-paced “turbo talks,” as well as fireside chats with leading executives on the front lines of the Internet of Things.
Hackers Track – features hands-on demonstrations, capture-the-flag sessions, small-group learning, and deep-dive, technical discussions. Subject experts lead discussions
with multiple conversations taking place simultaneously and throughout the day. Topics will include embedded device hacking, secure application design, patching and enterprise device management, IoT forensics, and reverse engineering.
The Security of Things Forum is focused on discussion, original research, presentations as well as user and implementation stories that address pressing security and privacy issues engendered by the rapid expansion of the Internet of Things.
If you feel you have a presentation that would be appropriate, feel free to submit it. One great way to understand the types of presentations that are a good fit for the Forum is to look at our past events. You can view the program from our 2015 Forum here.
Among the topics that are of particular interest to us:
- Securing Internet of Things technologies in enterprise and government environments
- Securing connected infrastructure
- Identity and trust management in IoT deployments
- Cyber risk assessment and management in IoT environments
- Connected vehicle security & privacy including topics related to telematics, intra-vehicle and inter-vehicle communications, vehicle to infrastructure communications
- Supply chain security including topics related to software and hardware supply chain, open source software security, software “BOM” (build of materials), firmware security, secure software update
- Medical device security including topics related to vulnerabilities or other security/integrity issues in connected medical devices, embedded medical devices, the security of pre- and post market medical devices, topics related to securing modern healthcare environments including connected health devices
- Regulatory frameworks for connected devices
- Endpoint monitoring and management in IoT environments
What we really like:
Our 2016 Forum in Cambridge takes, as its theme, “Internet of Things Security Gets Real.” As a result, we are particularly interested in submissions that address practical implementations that might properly fall under the heading of “Internet of Things” and in which security and privacy issues have been identified and addressed.
One good way to get a handle on what types of presentations might work for the Security of Things Forum is to look at previous years’ agendas. You can view our program from last year’s event here.
What we don’t like:
Presentations that are merely marketing vendor pitches for existing products and services, presentations that are rehashes of old talks or that focus on known technologies.
GROUP & PANEL SUBMISSIONS
Submissions with two or more speakers and proposals for panel discussions are welcome at Security of Things Forum.
Visit the Submission form page to complete your submission.