• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Events
  • Home
  • / ...
  • /Tech News
  • /Events

DVP-SYP Virtual Conference on Hot Topics in Cybersecurity

Learn to secure cyber-physical systems, deal with a cyber-attack, and access control in a touchless society

The IEEE Computer Society Distinguished Visitors Program and Student and Young Professional Activities Committees bring you a virtual conference on hot topics in Cybersecurity to support the technical development of the computer engineering and computer science community. We’ll provide technical knowledge to people working at all levels in the field. Our speakers will focus on various aspects of cybersecurity including the security of cyber-physical systems, information security algorithms, dealing with a cyber-attack and access control in a touch-less society. This all-day event will leave you walking away with insights that are actionable for any cybersecurity professional.

Register today for our virtual conference on Hot Topics in CyberSecurity.


Sessions include: Security of Cyber-Physical Systems This session focuses on tools, techniques, methods, and architectures employed in security and privacy-aware design of Cyber-Physical Systems (CPS) with the emphasis on connected things (IoT) and embedded intelligent systems design in general. Constrained resources, long missions, event-driven communication and interaction with a physical process often characterize such systems. Examples of such embedded platforms are automotive ECUs, industrial PLCs, or (consumer) IoT nodes. Given the nature of these platforms, RAMS (Reliability, Availability, Maintainability, and Safety and Security) parameters are highly important in the field. This session emphasizes in particular the security aspects of design, manufacturing, deployment, operation and maintenance on Cyber-Physical Systems and their components. Advancements in Information Security Algorithms Cybersecurity is only as strong as its algorithms. As cyberattacks become more sophisticated, algorithms require advancements to keep up. This session will focus on advancements in various information security methods, such as cryptography, steganography, watermarking etc. Dealing with a Cyberattack Cyberattacks can happen suddenly and without warning, which is why organizations need to be prepared at all times with how to cope with such events. Planning not just for the event itself, but also determining ways to return to normal after the attack. This session will cover aspects of a cybersecurity life-cycle supporting the resilience, continuity of operations through the spectrum of the attack, and Return To Normal Operations of the enterprise. In addition, we include a discussion of the use of cyber forensics processes, procedures and tools to enhance our lessons learned and maintain preparedness. Access Control in a Touchless Society During the Covid-19 pandemic, concern increased about the ability to pass the virus through touching infected objects. Even after treatment improves and a vaccine is developed the concern that the passing of illness through touch will persist. As access control becomes more important to ensure cybersecurity, the issue will begin to affect the way we verify identities. This session will cover the challenges of rigorous access control in the post-Covid-19 era, with regard moving toward a touchless society. Biometrics metrics will need to evolve to deal with facemasks, and there will be a move to gait analysis, iris recognition, voice recognition etc. Plus, a keynote speech by: Stefano Zanero on “Crouching hacker, killer robot? Removing fear from cyber-physical security” This session consists of a welcome message from the IEEE Computer Society President and a keynote address “Crouching hacker, killer robot? Removing fear from cyber-physical security” by Stefano Zanero. Cyber-physical systems are attracting a lot of attention: attacks on connected cars received a lot of media exposure, as did attacks on industrial control systems, airplanes or medical devices. A lot of this interest is driven by vulnerability research (often in the form of “stunt hacking”). While engaging and attractive, does this research really help to answer the fundamental question of how to embed security analysis in design? Why are we failing? What are the root causes? How do we do better and move beyond instilling fear?

You don’t want to miss this - join us!


LATEST NEWS
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Computing’s Top 30: Tejas Padliya
Computing’s Top 30: Tejas Padliya
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Read Next

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development

IEEE Std 3158.1-2025 — Verifying Trust in Data Sharing: Standard for Testing and Performance of a Trusted Data Matrix System

IEEE Std 3220.01-2025: Standard for Consensus Framework for Blockchain System

Mapping the $85B AI Processor Landscape: Global Startup Surge, Market Consolidation Coming?

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter