DVP-SYP Virtual Conference on Hot Topics in Cybersecurity

Learn to secure cyber-physical systems, deal with a cyber-attack, and access control in a touchless society
Published 08/24/2020
Share this on:

The IEEE Computer Society Distinguished Visitors Program and Student and Young Professional Activities Committees bring you a virtual conference on hot topics in Cybersecurity to support the technical development of the computer engineering and computer science community.

We’ll provide technical knowledge to people working at all levels in the field. Our speakers will focus on various aspects of cybersecurity including the security of cyber-physical systems, information security algorithms, dealing with a cyber-attack and access control in a touch-less society.

This all-day event will leave you walking away with insights that are actionable for any cybersecurity professional.



Register today for our virtual conference on Hot Topics in CyberSecurity.



Sessions include:

Security of Cyber-Physical Systems

This session focuses on tools, techniques, methods, and architectures employed in security and privacy-aware design of Cyber-Physical Systems (CPS) with the emphasis on connected things (IoT) and embedded intelligent systems design in general.

Constrained resources, long missions, event-driven communication and interaction with a physical process often characterize such systems. Examples of such embedded platforms are automotive ECUs, industrial PLCs, or (consumer) IoT nodes. Given the nature of these platforms, RAMS (Reliability, Availability, Maintainability, and Safety and Security) parameters are highly important in the field. This session emphasizes in particular the security aspects of design, manufacturing, deployment, operation and maintenance on Cyber-Physical Systems and their components.

Advancements in Information Security Algorithms

Cybersecurity is only as strong as its algorithms. As cyberattacks become more sophisticated, algorithms require advancements to keep up. This session will focus on advancements in various information security methods, such as cryptography, steganography, watermarking etc.

Dealing with a Cyberattack

Cyberattacks can happen suddenly and without warning, which is why organizations need to be prepared at all times with how to cope with such events. Planning not just for the event itself, but also determining ways to return to normal after the attack.

This session will cover aspects of a cybersecurity life-cycle supporting the resilience, continuity of operations through the spectrum of the attack, and Return To Normal Operations of the enterprise. In addition, we include a discussion of the use of cyber forensics processes, procedures and tools to enhance our lessons learned and maintain preparedness.

Access Control in a Touchless Society

During the Covid-19 pandemic, concern increased about the ability to pass the virus through touching infected objects. Even after treatment improves and a vaccine is developed the concern that the passing of illness through touch will persist. As access control becomes more important to ensure cybersecurity, the issue will begin to affect the way we verify identities.

This session will cover the challenges of rigorous access control in the post-Covid-19 era, with regard moving toward a touchless society. Biometrics metrics will need to evolve to deal with facemasks, and there will be a move to gait analysis, iris recognition, voice recognition etc.


Plus, a keynote speech by:

Stefano Zanero on “Crouching hacker, killer robot? Removing fear from cyber-physical security”

This session consists of a welcome message from the IEEE Computer Society President and a keynote address “Crouching hacker, killer robot? Removing fear from cyber-physical security” by Stefano Zanero.

Cyber-physical systems are attracting a lot of attention: attacks on connected cars received a lot of media exposure, as did attacks on industrial control systems, airplanes or medical devices.

A lot of this interest is driven by vulnerability research (often in the form of “stunt hacking”). While engaging and attractive, does this research really help to answer the fundamental question of how to embed security analysis in design?

Why are we failing? What are the root causes? How do we do better and move beyond instilling fear?



You don’t want to miss this – join us!