• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Events
  • Home
  • / ...
  • /Tech News
  • /Events

DVP-SYP Virtual Conference on Hot Topics in Cybersecurity

Learn to secure cyber-physical systems, deal with a cyber-attack, and access control in a touchless society

The IEEE Computer Society Distinguished Visitors Program and Student and Young Professional Activities Committees bring you a virtual conference on hot topics in Cybersecurity to support the technical development of the computer engineering and computer science community. We’ll provide technical knowledge to people working at all levels in the field. Our speakers will focus on various aspects of cybersecurity including the security of cyber-physical systems, information security algorithms, dealing with a cyber-attack and access control in a touch-less society. This all-day event will leave you walking away with insights that are actionable for any cybersecurity professional.

Register today for our virtual conference on Hot Topics in CyberSecurity.


Sessions include: Security of Cyber-Physical Systems This session focuses on tools, techniques, methods, and architectures employed in security and privacy-aware design of Cyber-Physical Systems (CPS) with the emphasis on connected things (IoT) and embedded intelligent systems design in general. Constrained resources, long missions, event-driven communication and interaction with a physical process often characterize such systems. Examples of such embedded platforms are automotive ECUs, industrial PLCs, or (consumer) IoT nodes. Given the nature of these platforms, RAMS (Reliability, Availability, Maintainability, and Safety and Security) parameters are highly important in the field. This session emphasizes in particular the security aspects of design, manufacturing, deployment, operation and maintenance on Cyber-Physical Systems and their components. Advancements in Information Security Algorithms Cybersecurity is only as strong as its algorithms. As cyberattacks become more sophisticated, algorithms require advancements to keep up. This session will focus on advancements in various information security methods, such as cryptography, steganography, watermarking etc. Dealing with a Cyberattack Cyberattacks can happen suddenly and without warning, which is why organizations need to be prepared at all times with how to cope with such events. Planning not just for the event itself, but also determining ways to return to normal after the attack. This session will cover aspects of a cybersecurity life-cycle supporting the resilience, continuity of operations through the spectrum of the attack, and Return To Normal Operations of the enterprise. In addition, we include a discussion of the use of cyber forensics processes, procedures and tools to enhance our lessons learned and maintain preparedness. Access Control in a Touchless Society During the Covid-19 pandemic, concern increased about the ability to pass the virus through touching infected objects. Even after treatment improves and a vaccine is developed the concern that the passing of illness through touch will persist. As access control becomes more important to ensure cybersecurity, the issue will begin to affect the way we verify identities. This session will cover the challenges of rigorous access control in the post-Covid-19 era, with regard moving toward a touchless society. Biometrics metrics will need to evolve to deal with facemasks, and there will be a move to gait analysis, iris recognition, voice recognition etc. Plus, a keynote speech by: Stefano Zanero on “Crouching hacker, killer robot? Removing fear from cyber-physical security” This session consists of a welcome message from the IEEE Computer Society President and a keynote address “Crouching hacker, killer robot? Removing fear from cyber-physical security” by Stefano Zanero. Cyber-physical systems are attracting a lot of attention: attacks on connected cars received a lot of media exposure, as did attacks on industrial control systems, airplanes or medical devices. A lot of this interest is driven by vulnerability research (often in the form of “stunt hacking”). While engaging and attractive, does this research really help to answer the fundamental question of how to embed security analysis in design? Why are we failing? What are the root causes? How do we do better and move beyond instilling fear?

You don’t want to miss this - join us!


LATEST NEWS
How to Stand Out in Today's Competitive Software Engineering Job Market
How to Stand Out in Today's Competitive Software Engineering Job Market
In Memoriam: Remembering Mike Flynn
In Memoriam: Remembering Mike Flynn
Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale
Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale
2026: 80th Anniversary
2026: 80th Anniversary
The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators
The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators
Read Next

How to Stand Out in Today's Competitive Software Engineering Job Market

In Memoriam: Remembering Mike Flynn

Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale

2026: 80th Anniversary

The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators

Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization

The Road Ahead: Preparing for 2030’s Digital Oil & Gas

Celebrating Innovation at TechX Florida 2025

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter