TRU Privacy and Security Conference

10th Annual TRU Privacy and Security Conference 2026

Topic: Connected and Vulnerable: The Internet of Everything

Theme: BACK TO TRU > > >

Scope: 12 categories (listed below)

Important Dates:

    • Friday, November 21, 2025 - Deadline for calls for proposal submissions
    • Friday, November 28, 2025 - Notification of proposal acceptance
    • Wednesday, January 21, 2026 - Pre-conference Leadership Dinner & Social
    • Thursday, January 22, 2026 - 10th Annual Conference Main Event
    • Friday, January 23, 2026 - Post-conference Demonstrations & Workshops

Keynotes:

Michael Harvey - OIPC Hugh Burley

Presenters: 

 John Cuzzola
Join us at the tenth annual TRU Privacy and Security Conference. This year's theme, brings together VPs and senior officials, Chief Information/Security Officers (CIOs/CISOs), IT Directors/Managers, Compliance Auditors, Security/Network Specialists, Legal Counsel, Policing, Privacy Protection Officers, Researchers, Faculty, students, ethical hackers, and the curious. This conference offers an unparalleled blend of learning, engagement, and networking opportunities. Whether you're protecting corporate data or tackling complex privacy issues, this conference is essential for staying ahead in the rapidly evolving landscape of privacy and security. Join us to collaborate with industry leaders, gain cutting-edge insights, and shape the future of privacy and security in our digital age.

SCOPE

♦ ♦ ♦ (Vendors - thinking of sponsoring but not sure how? Use our custom chatGPT assistant to help you decide. CLICK HERE)

This year we explores the broad topic of IoT/OT. This scope includes (but is not limited to):

  1. Securing the Unseen: Cybersecurity in IoT and OT Ecosystems
  • Exploring the unique vulnerabilities of IoT and OT devices.
  • Understanding attack vectors and defense mechanisms.
  • Case studies on real-world cyber incidents involving IoT/OT.
  1. Privacy in a Connected World: Managing Data Risks in IoT and OT
  • How IoT devices collect and transmit personal and sensitive data.
  • Regulatory frameworks for IoT data protection (e.g., FIPPA, GDPR, CPPA).
  • Balancing convenience with privacy in smart technologies.
  1. Supply Chain Security: Protecting IoT and OT from End to End
  • Risks from third-party vendors in IoT and OT networks.
  • Strategies for building resilient and secure supply chains.
  • Emerging standards and best practices for securing interconnected devices.
  1. AI, Automation, and Security: The Role of AI in IoT and OT Threat Detection
  • How AI and machine learning enhance cybersecurity in IoT/OT environments.
  • The risks of AI-powered cyber threats targeting IoT and OT.
  • Case studies of AI-driven security solutions in critical industries.
  1. The Future of Smart Cities: IoT and OT Security Challenges
  • Securing smart infrastructure (traffic systems, utilities, public safety).
  • Risks and safeguards for interconnected municipal networks.
  • Ethical and privacy concerns in city-wide data collection.
  1. Regulatory Compliance and Legal Considerations for IoT & OT
  • How global and Canadian regulations affect IoT and OT security.
  • The role of policy and governance in securing smart technologies.
  • Legal liabilities for businesses using IoT and OT.
  1. Cyber Resilience in Critical Infrastructure: Protecting Energy, Healthcare, and Manufacturing
  • Threats and solutions for industrial control systems (ICS).
  • Case studies of cyberattacks on energy grids, hospitals, and factories.
  • Espionage, Sabotage and State-sponsored threats.
  • Strategies for improving incident response and recovery.
  1. Zero Trust and Beyond: Redefining Security for IoT and OT Networks
  • Implementing zero-trust models for IoT and OT environments.
  • Authentication, encryption, and segmentation strategies.
  • The role of blockchain in securing IoT transactions.
  1. The Human Factor: Training and Awareness in IoT and OT Security
  • Addressing insider threats and human error in connected environments.
  • Building a security-first culture in organizations.
  • Best practices for educating employees and stakeholders.
  1. Emerging Threats and Innovations in IoT and OT Security
  • Predicting the next wave of cyber threats targeting IoT and OT.
  • The impact of quantum computing on IoT security.
  • Innovations in hardware and software security solutions.
  1. From Toasters to Turbines: The Expanding Reach of IoT/OT
  • Uncovering IoT/OT in unexpected places, from kitchen appliances to industrial machinery.
  • The security risks of everyday smart devices that users overlook.
  • How connectivity is transforming legacy systems into digital assets.
  • Case studies of unconventional IoT/OT implementations and their impact.
  • The future of hyper-connected ecosystems—where does it end?
  1. Demonstrations and Workshops: Hacking IoT and OT in Action
  • IoT Glitching – Using fault injection techniques to manipulate IoT devices.
  • Extracting Firmware & Hardcoded Credentials – Hands-on demonstration of analyzing firmware dumps for security weaknesses.
  • Brute-Forcing IoT Devices – Exploring weak authentication mechanisms and how attackers gain unauthorized access.
  • Ethical Hacking of IoT Vulnerabilities – Live demonstrations of real-world security flaws in smart home and industrial IoT.
  • Breaking into Operational Technology (OT) Systems – Simulating cyberattacks on industrial control systems (ICS) and SCADA networks.
  • Wi-Fi and Bluetooth Attacks on IoT – Exploiting common wireless vulnerabilities in smart devices.