For the best user experience please upgrade your browser

Cyber Re:coded 2018

Tobacco Dock Wapping Lane, St Katharine's & Wapping, London, United Kingdom

Andy Gill will be presenting. Register here https://registration.n200.com/survey/1wzgnm7s9r563

Ping IDENTIFY London 2018

Tobacco Dock Wapping Lane, St Katharine's & Wapping, London, United Kingdom

Photos courtesy of @pingidentity Ken Munro will be presenting: IoTdentity Management A fridge is no longer just a fridge, it’s now “smart”. Kettles are now wirelessly app-enabled, and even boardroom […]

Engineering Design Show 2018

Ricoh Arena Judds Lane, Coventry, United Kingdom

Ken Munro will be presenting: Securing our planes, trains and automobiles Register here: https://eds-2018.reg.buzz/

2nd Europol-ENISA IoT Security Conference

Europol Headquarters Eisenhowerlaan 73, The Hague, Netherlands

Photo courtesy of @EC3Europol For the second year in a row, Europol and ENISA are co-organising a conference to raise awareness on the security implications of the Internet of Things […]

CSX Europe 2018

InterContinental London - The O2 1 Waterview Drive, London, United Kingdom

Tony Gee and Luke Turvey will be presenting: So Apparently the Blockchain Fixes Everything … Hacking the Blockchain Blockchain tends to be perceived as secure by default but is this […]

ICCC 2018

Hilton Amsterdam Apollolaan 138, Amsterdam, Netherlands

Ken Munro will be presenting with John Boggie and Eric Vetillard from NXP. iccconference.org/?session=live-demonstration-of-iot-device-hacking-presentation

Scottish SCL Event: Ethical Hacking: the Internet of Things

Burness Paull LLP 50 Lothian Road, Edinburgh, United Kingdom

Tim Luck will be presenting: Ethical Hacking. The Internet of Things Best security practices (e.g. passwords, social media), cyber security awareness, and securing the IoT in your home. To register […]

CIPS UK Conference 2018

Queen Elizabeth II Conference Centre Broad Sanctuary, London, United Kingdom

Ken Munro will be presenting: Hear from a hacker on how to prevent a cyber attack nightmare damaging your business * How hackers can access data through your smart technology […]