Unless your current threat management program is fully capable of securing securing internet of things (IoT) devices, you could likely benefit from attending an IoT security summit to learn what other industry leaders are doing to discover, analyze and protect unmanaged devices.

As a chief information security officer (CISO) or other security leader, you may be accustomed to attending traditional security conferences while other members of your security team venture off to one of the many IoT events. However, if you’re looking for a focused IoT security conference that cuts through the hype, you’ll want to seek out an event where you can quickly absorb information and recommendations to help address IoT security in your threat management program.

Let’s take a closer look at what five of 2019’s most anticipated IoT security conferences have to offer.

1. IoT Security Summit

Thursday, Oct. 31–Friday, Nov. 1

Sheraton Hotel, Atlanta, Georgia

Produced by Informa in conjunction with its “Future of IoT Security in Action Report,” the IoT Security Summit boasts an impressive lineup of speakers and exhibitors. Zach Butler, portfolio manager for Informa Tech’s IoT World Series, told SecurityIntelligence, “This year’s conference provides a unique opportunity for the security community to take a seat at the table alongside two critical verticals in IoT and alongside an audience of IT, innovation, R&D and IoT technology users.”

If you can’t make the live IoT Security Summit, informative content is curated on Informa’s online community.

2. Black Hat USA

Saturday, Aug. 3–Thursday, Aug. 8

Mandalay Bay, Las Vegas, Nevada

While not a focused IoT security conference, Black Hat USA will feature an important industry announcement and session by Armis Security, a pioneer in agentless security for unmanaged and IoT devices. You won’t want to miss the Armis presentation, titled “Critical Zero Days Remotely Compromise the Most Popular Real-Time OS,” in which Vice President of Research Ben Seri and fellow researcher Dor Zusman will demonstrate the exploitation of vulnerabilities on several devices and show how they can be used to bypass traditional security measures.

3. ENISA-Europol Internet of Things Security Conference

Thursday, Oct. 24–Friday, Oct. 25

Divani Palace Acropolis Hotel, Athens, Greece

If you want to attend the ENISA-Europol IoT Security Conference, you’ll need to get on the invitation list. However, it would be well worth a CISO’s time and effort to reach out for a chance to experience the high-caliber presentations and discussions. IBM Security’s program director of emerging technology, Ryan Dougherty, will lead a discussion in the IoT Security and Artificial Intelligence (AI) track.

4. IoT Security Foundation Conference

Thursday, Nov. 26

ILEC Conference Centre, London, U.K.

Described as the longest-running IoT security summit, the IoT Security Foundation Conference is an intense one-day learning event featuring three tracks. The event’s strategic track for business leaders will attract CISOs who need to understand both contemporary enterprise IoT issues as well as the methods used to secure IoT devices. According to John Moor, managing director of the IoT Security Foundation, the conference will include “best practice sessions and briefings on the development of international regulation and policy.”

5. Symposium on Securing the IoT

Monday, Oct. 7–Wednesday, Oct. 9

Crown Plaza Hotel, Natick, Massachusetts

The IoT Security Summit is a past association sponsor of the three-day Symposium on Securing the IoT. Event organizers promise to feature speakers from leading companies who are currently solving IoT security problems in their organizations, offering CISOs an intimate setting in which to learn how their peers are securing IoT devices in their enterprise.

Don’t Wait to Register for Your Favorite IoT Security Conference

Within your enterprise buildings, there are hundreds if not thousands of unmanaged assets and IoT devices that need to be secured. Attending an IoT security summit will help you better understand what these devices are, the most common threats and vulnerabilities associated with them, and how security leaders can successfully extend a threat management program to secure IoT devices. Most of these IoT security events are right around the corner, so register yourself and your team today.

More from CISO

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

Do You Really Need a CISO?

2 min read - Cybersecurity has never been more challenging or vital. Every organization needs strong leadership on cybersecurity policy, procurement and execution — such as a CISO, or chief information security officer. A CISO is a senior executive in charge of an organization’s information, cyber and technology security. CISOs need a complete understanding of cybersecurity as well as the business, the board, the C-suite and how to speak in the language of senior leadership. It’s a changing role in a changing world. But…

2 min read

What “Beginner” Skills do Security Leaders Need to Refresh?

4 min read - The chief information security officer (CISO) was once a highly technical role primarily focused on security. But now, the role is evolving. Modern security leaders must work across divisions to secure technology and help meet business objectives. To stay relevant, the CISO must have a broad range of skills to maintain adequate security and collaborate with teams of varying technical expertise. Learning is essential to simply keep pace in security. In a CISO Series podcast, Skillsoft CISO Okey Obudulu recently said,…

4 min read