For the best user experience please upgrade your browser

ENISA 4th IoT Security Conference

The Internet The Internet, United Kingdom

Ken Munro will be presenting the Operational IoT keynote: The IoT is littered with security disasters. As the distinction from OT blurs how do we avoid repeating them? Register here […]

BBC Tech Meetup

The Internet The Internet, United Kingdom

Andrew Tierney will be presenting. Topic, title, date & time TBC www.meetup.com/BBC-Tech-Meetup/

CS3Sthlm 2020 Virtual Conference

The Internet The Internet, United Kingdom

Andrew Tierney is presenting: Smarter Shipping. Hacking floating ICS for fun and profit  

PCI SSC Europe Community Meeting 2020

The Internet The Internet, United Kingdom

Ken Munro will be presenting the Keynote: The Perils of IoT When Working From Home Register here https://events.pcisecuritystandards.org/europe/register/

ISACA’s EuroCACS 2020

The Internet The Internet, United Kingdom

Tony Gee will be presenting: How we hacked one of the largest IoT tracking platforms in the world. Register here.

MTS ISAC 2020 Maritime Cybersecurity Summit

The Internet The Internet, United Kingdom

About the Summit The Maritime Cybersecurity Summit supports focused discussions on maritime cybersecurity challenges. During the Summit, owners, operators, suppliers, service providers, and the public sector share information on their […]

CREST Intelligence-led Penetration Testing webinar

The Internet The Internet, United Kingdom

Andy Gill and Ali G will be opening the day with: Nijushio - A Year Targeting Nippon  Andy and Ali have spent the good part of a year on Intelligence […]

Police Information Assurance Forum 2020

The Internet The Internet, United Kingdom

This a closed community event. Ken Munro will be presenting: Smart Stalking: how both victims and law enforcement are exposed to the lack of security in smart home tech What […]

TU-Automotive Europe

The Internet The Internet, United Kingdom

Ken Munro will be presenting: Case Study: Inside the Mind of a Hacker: Putting the Brakes on Cyberattacks Targeting Connected Cars Discover and understand how hackers can exploit vulnerabilities in […]