Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

IoT Cybersecurity Colloquium

Note: Captioning will be available by 10/29/17.

The National Institute of Standards and Technology (NIST) Cybersecurity for IoT Program supports the development and application of standards, guidelines, and related tools to improve the cybersecurity of connected devices and the environments in which they are deployed. By collaborating with stakeholders across government, industry, international bodies, and academia, the program aims to cultivate trust and promote U.S. leadership in IoT.

Given stakeholder concerns and ongoing security incidents, there has been interest in NIST providing guidance for federal agencies on how to secure their IoT within their Federal Information Security Modernization Act (FISMA) responsibilities. While agencies are aware that IoT introduces security and privacy risks, there is confusion regarding how to address and mitigate these risks.

Having observed the broadened threat landscape and processed stakeholder feedback, the NIST Cybersecurity for IoT Program is interested in the prospect of providing guidance for federal agencies on common high-level security and privacy risks. The Program is hosting this colloquium to hear from the community about these concerns, better understand the threat landscape, gauge stakeholder interest in such guidance, and determine next steps.


Internet of Things (IoT) Cybersecurity Colloquium: A NIST Workshop Proceedings


"Security and Privacy Considerations for IoT" Pre-Read Essay 

Speakers include:

Speaker presentations are linked below (PDF)

Agenda (Printable PDF)



8:00 AM

Registrant Check-in

9:00 AM

Opening Session

  • James St. Pierre Deputy Director, Information Technology Laboratory
  • Kat Megas Program Lead, NIST Cybersecurity for IoT Program

    Safety Overview

9:30 AM

  • Andrew Sullivan Fellow, Oracle Dyn

Topic:  DDoS

10:00 AM

  • Yasser Shoukry Assistant Professor, University of Maryland

Topic: Sensor Security

10:30 AM

  • Joe Jarzombek Global Manager, Software Supply Chain Solutions, Synopsys Software Integrity Group

Topic: Supply Chain

11:00 AM

  • Jeremy Grant Managing Director of Technology Business Strategy, Venable

Topic: Identity for IoT

11:30 AM

  • Carlos Bosch Head of Technology, GSMA North America

Topic: End-to-end Security

12:00 PM

  • Matthew Eggers Executive Director, Cybersecurity Policy, U.S. Chamber of Commerce

Topic: IoT Policy

12:30 PM


1:30 PM 

  • Gilad Rosner Founder, Internet of Things Privacy Forum

Topic: Privacy for IoT

2:00 PM

  • Andrea AriasBureau of Consumer Protection, FTC

Topic: Consumer Landscape

2:30 PM

  • Arabella Hallaway Senior Director, Advanced Threat, Arbor Networks

Topic: Fax Fights Back




If you are not registered, you will not be allowed on site. Registered attendees will receive security and campus instructions prior to the workshop.

NON U.S. CITIZENS PLEASE NOTE: All foreign national visitors who do not have permanent resident status and who wish to register for the above meeting must supply additional information. Failure to provide this information prior to arrival will result, at a minimum, in significant delays (up to 24 hours) in entering the facility. Authority to gather this information is derived from United States Department of Commerce Department Administrative Order (DAO) number 207-12. When registration is open, the required NIST-1260 form will be available as well. *New Visitor Access Requirement: Effective July 21, 2014, Under the REAL ID Act of 2005, agencies, including NIST, can only accept a state-issued driver's license or identification card for access to federal facilities if issued by states that are REAL ID compliant or have an extension.Click here for a list of alternative identification and further details>>

Created September 25, 2017, Updated January 2, 2018