TRU Privacy and Security Conference
10th Annual Conference Announced
TRU Privacy and Security Conference 2026
Connected and Vulnerable: The Internet of Everything
We hope you will join us!
The week of January 19, 2026 (exact dates to be determined)
SCOPE
This year we explores the broad topic of IoT/OT. This scope includes (but is not limited to):
- Securing the Unseen: Cybersecurity in IoT and OT Ecosystems
- Exploring the unique vulnerabilities of IoT and OT devices.
- Understanding attack vectors and defense mechanisms.
- Case studies on real-world cyber incidents involving IoT/OT.
- Privacy in a Connected World: Managing Data Risks in IoT and OT
- How IoT devices collect and transmit personal and sensitive data.
- Regulatory frameworks for IoT data protection (e.g., FIPPA, GDPR, CPPA).
- Balancing convenience with privacy in smart technologies.
- Supply Chain Security: Protecting IoT and OT from End to End
- Risks from third-party vendors in IoT and OT networks.
- Strategies for building resilient and secure supply chains.
- Emerging standards and best practices for securing interconnected devices.
- AI, Automation, and Security: The Role of AI in IoT and OT Threat Detection
- How AI and machine learning enhance cybersecurity in IoT/OT environments.
- The risks of AI-powered cyber threats targeting IoT and OT.
- Case studies of AI-driven security solutions in critical industries.
- The Future of Smart Cities: IoT and OT Security Challenges
- Securing smart infrastructure (traffic systems, utilities, public safety).
- Risks and safeguards for interconnected municipal networks.
- Ethical and privacy concerns in city-wide data collection.
- Regulatory Compliance and Legal Considerations for IoT & OT
- How global and Canadian regulations affect IoT and OT security.
- The role of policy and governance in securing smart technologies.
- Legal liabilities for businesses using IoT and OT.
- Cyber Resilience in Critical Infrastructure: Protecting Energy, Healthcare, and Manufacturing
- Threats and solutions for industrial control systems (ICS).
- Case studies of cyberattacks on energy grids, hospitals, and factories.
- Espionage, Sabotage and State-sponsored threats.
- Strategies for improving incident response and recovery.
- Zero Trust and Beyond: Redefining Security for IoT and OT Networks
- Implementing zero-trust models for IoT and OT environments.
- Authentication, encryption, and segmentation strategies.
- The role of blockchain in securing IoT transactions.
- The Human Factor: Training and Awareness in IoT and OT Security
- Addressing insider threats and human error in connected environments.
- Building a security-first culture in organizations.
- Best practices for educating employees and stakeholders.
- Emerging Threats and Innovations in IoT and OT Security
- Predicting the next wave of cyber threats targeting IoT and OT.
- The impact of quantum computing on IoT security.
- Innovations in hardware and software security solutions.
- From Toasters to Turbines: The Expanding Reach of IoT/OT
- Uncovering IoT/OT in unexpected places, from kitchen appliances to industrial machinery.
- The security risks of everyday smart devices that users overlook.
- How connectivity is transforming legacy systems into digital assets.
- Case studies of unconventional IoT/OT implementations and their impact.
- The future of hyper-connected ecosystems—where does it end?
- Demonstrations and Workshops: Hacking IoT and OT in Action
- IoT Glitching – Using fault injection techniques to manipulate IoT devices.
- Extracting Firmware & Hardcoded Credentials – Hands-on demonstration of analyzing firmware dumps for security weaknesses.
- Brute-Forcing IoT Devices – Exploring weak authentication mechanisms and how attackers gain unauthorized access.
- Ethical Hacking of IoT Vulnerabilities – Live demonstrations of real-world security flaws in smart home and industrial IoT.
- Breaking into Operational Technology (OT) Systems – Simulating cyberattacks on industrial control systems (ICS) and SCADA networks.
- Wi-Fi and Bluetooth Attacks on IoT – Exploiting common wireless vulnerabilities in smart devices.