TRU Privacy and Security Conference
10th Annual TRU Privacy and Security Conference 2026
Topic: Connected and Vulnerable: The Internet of Everything
Theme: BACK TO TRU > > >
Scope: 12 categories (listed below)
Important Dates:
-
- Friday, November 21, 2025 - Deadline for calls for proposal submissions
- Friday, November 28, 2025 - Notification of proposal acceptance
- ⇓
- Wednesday, January 21, 2026 - Pre-conference Leadership Dinner & Social
- Thursday, January 22, 2026 - 10th Annual Conference Main Event
- Friday, January 23, 2026 - Post-conference Demonstrations & Workshops
Keynotes:


Presenters:

SCOPE
♦ ♦ ♦ (Vendors - thinking of sponsoring but not sure how? Use our custom chatGPT assistant to help you decide. CLICK HERE)This year we explores the broad topic of IoT/OT. This scope includes (but is not limited to):
- Securing the Unseen: Cybersecurity in IoT and OT Ecosystems
- Exploring the unique vulnerabilities of IoT and OT devices.
- Understanding attack vectors and defense mechanisms.
- Case studies on real-world cyber incidents involving IoT/OT.
- Privacy in a Connected World: Managing Data Risks in IoT and OT
- How IoT devices collect and transmit personal and sensitive data.
- Regulatory frameworks for IoT data protection (e.g., FIPPA, GDPR, CPPA).
- Balancing convenience with privacy in smart technologies.
- Supply Chain Security: Protecting IoT and OT from End to End
- Risks from third-party vendors in IoT and OT networks.
- Strategies for building resilient and secure supply chains.
- Emerging standards and best practices for securing interconnected devices.
- AI, Automation, and Security: The Role of AI in IoT and OT Threat Detection
- How AI and machine learning enhance cybersecurity in IoT/OT environments.
- The risks of AI-powered cyber threats targeting IoT and OT.
- Case studies of AI-driven security solutions in critical industries.
- The Future of Smart Cities: IoT and OT Security Challenges
- Securing smart infrastructure (traffic systems, utilities, public safety).
- Risks and safeguards for interconnected municipal networks.
- Ethical and privacy concerns in city-wide data collection.
- Regulatory Compliance and Legal Considerations for IoT & OT
- How global and Canadian regulations affect IoT and OT security.
- The role of policy and governance in securing smart technologies.
- Legal liabilities for businesses using IoT and OT.
- Cyber Resilience in Critical Infrastructure: Protecting Energy, Healthcare, and Manufacturing
- Threats and solutions for industrial control systems (ICS).
- Case studies of cyberattacks on energy grids, hospitals, and factories.
- Espionage, Sabotage and State-sponsored threats.
- Strategies for improving incident response and recovery.
- Zero Trust and Beyond: Redefining Security for IoT and OT Networks
- Implementing zero-trust models for IoT and OT environments.
- Authentication, encryption, and segmentation strategies.
- The role of blockchain in securing IoT transactions.
- The Human Factor: Training and Awareness in IoT and OT Security
- Addressing insider threats and human error in connected environments.
- Building a security-first culture in organizations.
- Best practices for educating employees and stakeholders.
- Emerging Threats and Innovations in IoT and OT Security
- Predicting the next wave of cyber threats targeting IoT and OT.
- The impact of quantum computing on IoT security.
- Innovations in hardware and software security solutions.
- From Toasters to Turbines: The Expanding Reach of IoT/OT
- Uncovering IoT/OT in unexpected places, from kitchen appliances to industrial machinery.
- The security risks of everyday smart devices that users overlook.
- How connectivity is transforming legacy systems into digital assets.
- Case studies of unconventional IoT/OT implementations and their impact.
- The future of hyper-connected ecosystems—where does it end?
- Demonstrations and Workshops: Hacking IoT and OT in Action
- IoT Glitching – Using fault injection techniques to manipulate IoT devices.
- Extracting Firmware & Hardcoded Credentials – Hands-on demonstration of analyzing firmware dumps for security weaknesses.
- Brute-Forcing IoT Devices – Exploring weak authentication mechanisms and how attackers gain unauthorized access.
- Ethical Hacking of IoT Vulnerabilities – Live demonstrations of real-world security flaws in smart home and industrial IoT.
- Breaking into Operational Technology (OT) Systems – Simulating cyberattacks on industrial control systems (ICS) and SCADA networks.
- Wi-Fi and Bluetooth Attacks on IoT – Exploiting common wireless vulnerabilities in smart devices.