TIA M2M & Cybersecurity Workshop

Cost: TIA Member: $45 | Non-member: $75

TIA has a special discount rate at the Hilton Garden Inn located across the street at 1333 N. Courthouse Road, Arlington VA 22201. Reserve your room today!

Join an expert group of influential thinkers in machine-to-machine (M2M) and cybersecurity at this two-day workshop at TIA headquarters and Conference Center in Arlington, Va. It’s an opportunity to shape the future of the M2M industry together with the business leaders, policy makers and industry experts at the forefront of M2M technologies. During this highly interactive event, we’ll explore the importance of cybersecurity in the adoption of M2M and the realization of the Internet of Things.

Understand the current state of affairs in Washington, DC regarding data privacy and Internet security and its impact on M2M. Take the opportunity to influence the future by sharing your expertise in open discussion, and engage more deeply with your peers in breakout brainstorming sessions designed to define a “to do” list of action items for both industry and government to secure the machine network and foster its growth. Space is limited, so don't waitRegister today.

**Registrants will receive a complimentary whitepaper, "Towards Right-Sizing Security for M2M Solutions: A Practical approach" -- published by Beecham Research Ltd.**


  • Identify the weak links and challenges in M2M cybersecurity.
  • Review the available solutions and standards for secure network architectures.
  • Examine the state of policies on data privacy and Internet security and their impact on M2M.
  • Define a “To Do” list of action items for both industry and government to secure the machine network and foster its growth.

 Who will attend ? 

  • Executive-level decision makers at leading M2M companies and their key customers.
  • Leading industry experts and analysts focused on M2M and cybersecurity.
  • Policy makers across the executive and legislative branches of the U.S. government.
  • Leading M2M technologists and standards evangelists.

TIA Headquarters & Conference Center
1320 N. Courthouse Rd., Suite 200
Arlington, VA 22201



8:30 amContinental Breakfast & TIA NOW Studio Tour
9:00 amWelcome: Grant Seiffert, President, TIA
9:15 amRight-Sizing Security for M2M
End-to-end security is the number one priority among M2M providers and adopters today. What are the critical elements that make up a secure M2M solution? How can vendors ensure security while retaining  the economic viability of their offerings?
Jon Howes, Technology Director, Beecham Research

10:15 amBreak
10:30 am

M2M Cybersecurity Policy Roundtable
What impact will the Cyber Intelligence Sharing and Protection Act (CISPA) and recent executive order on cybersecurity have on M2M solutions? What steps will solution providers need to take to ensure compliance?
John Banghart, Cybersecurity Program and Policy Analyst, National Institute of Standards and Technology (NIST)
Bob Dix, VP - Government Affairs & Critical Infrastructure Protection, Juniper
Cora Han, Division of Privacy and Identity Protection, Federal Trade Commission (FTC)

11:30 am

Securing the Machine Network: What’s our Role?
How can M2M and security providers collaborate to develop and deliver secure solutions? What does the value chain look like today and how can we work together to simplify the process for corporate adopters?
Dan McDuffie, CEO, Wyless
Thomas Springer, IT-Security & Smart Home, TÜV SÜD AG
Patrick Sweeney, Director Strategic Sales, Solutions and Services, Sierra Wireless

12:30 pmNetworking Lunch
1:30 pm

Success as an Industry: What Does it Look Like?
Define a cohesive vision for a secure, reliable and economically viable machine network. What are the key objectives and what level of risk can be tolerated?
Richard Hawley, Principal, Industry Solutions Practice-Manufacturing, AT&T
Andrew Jaquith, CTO, Silversky
AJ Shipley, Sr. Director, Security Solutions; Chief Security Architect at Wind River Systems

2:30 pm Break
2:45 pmBreakout Brainstorming Sessions: Defining Action Items.
What steps need to be taken to achieve this vision? Each group will identify  three top priorities to share with an eye toward:
  • Addressing known security issues,
  • Defining the appropriate balance of investment vs. end solution cost, and
  • Communicating an industry perspective on cybersecurity in M2M.
4:15 pmEnd of Day Roundup with all participants
5:00 pmCocktails & Networking


9:00 am Continental Breakfast & TIA NOW Studio Tour
9:30 amM2M Standards and Security
What is the role of standardization in security for M2M solutions? How are TIA and other M2M standards bodies addressing the issue today? What can we expect relative to cybersecurity as standards are defined and adopted?
 Mihai Voicu, CIO/CSO, ILS Technology
10:30 am Break
10:45 amWhat’s Next?: Group Presentations of Findings and Proposed Action Items
Breakout groups will share their top three “To dos” followed by a discussion to identify priorities and define how the larger group can partner to make them happen.
12:00 pmNetworking Lunch
The discussion continues as attendees have the opportunity to forge relationships in an informal setting.

  MWC 2013: M2M's Tipping Point                                               M2M & The Internet of Things: Brace for Impact


  Executive Order: Cybersecurity Framework                         TIA 2013: The Future Of The Network