Mobile Phone Security
Mobile Phone Consultancy
Mobile Phone Security
Mobile Security Leaflet



Copper Horse, in conjunction with the IoT Security Foundation are proud to announce that the company will be offering IoT security training. Space is limited on this course, so we advise you to book early.

Click here to register and pay by credit card

Click here to register and pay by invoice


An Extraordinary Training Course…

The next course will be held over 2 days on Wednesday 29th and Thursday 30th November 2017 in Royal Windsor with residential delegates staying 2 nights at the central location of the luxurious Macdonald hotel. From dinner on arrival on the evening of the 29th of November, delegates will be treated to a 5 star experience throughout the training course both in the quality of the training and the setting itself. Generous breaks will allow you to meet your course peers and network with other companies looking at how to implement IoT security in their products and services. The course dinner on the first night will give you a further opportunity meet and discuss your fellow course attendees. On the second day, delegates will be able to experience the world famous changing of the guard and a delicious cream tea in the afternoon. In the mood for some sightseeing? The training venue is in the vibrant centre of Windsor and is just a short walk from the castle and many other sights.

Course Objectives

By the end of the course, attendees will:

  • Be able to secure a connected IoT product from scratch
  • Be able to discuss the main threats and attacks on IoT products and services
  • Know how to research and assess IoT threats and risks as they arise
  • Be able to implement a security reporting scheme in their organisation
  • Be able to work effectively with security researchers on reported IoT security issues and concerns
  • Have the knowledge to be able to develop a security patching strategy and product update life-cycle
  • Have a good working understanding of the best practices laid down by the IoT Security Foundation

What’s Included

  • 2-day Course
  • Course certificate
  • 2 nights accommodation for residential attendees and parking
  • Lunch on both days
  • Evening meal on the arrival night (residential attendees)
  • Course dinner on the 2nd night
  • Visit to see the “Changing of the Guard”
  • Refreshments, including an English afternoon tea on the 2nd day

Who Should Attend This Course?

This course is aimed at IoT practitioners, startups and those who wish to understand how to practically implement security into IoT products and services.

The trainers will take attendees through the basics where necessary and will adapt to the skill range of the attendees, providing individual assistance throughout. The course is therefore suitable for all levels of experience and skill.

Course Pre-Requisites

There are no course pre-requisites but it is advised that you familiarise yourself with the IoT Security Foundations publications on which the course is based.

Course Detail

Day 1

Session 1: Introduction to IoT and the Security Landscape

An introductory system-wide overview of the technologies that make up multitude of IoT services, from hardware through to software as well as the potential vulnerabilities that this world may bring. Attendees will understand why security matters.

Session 2: Practical Attacks, Threats and Risks

Practical Attacks, Threats and Risks to IoT products and services Real-world stories and breakdowns of attacks that have occurred, the impact they had and what measures could or should have been taken to mitigate or avoid them in the first place. This session aims to show the value of security by design and also practical security and business management techniques for managing security.

Session 3: Best Practices for IoT Security

Understand the background and rationale for the principles and how to apply them in a real world context.
Understanding and utilising the IoT Security Foundation User Best Practice Mark.

Session 4: Securing Connected Products.

This session gives and end-to-end tutorial on how to secure connected consumer products, from mobile application security to IoT device security, through to cloud services.

Day 2

Session 5: Practical hacking session

This session will allow attendees to witness real-world hacking of IoT, but also to use some hacking tools in order to experience how hacks can take place and the impact they can have. Equipment and software will be provided.

Session 6: Software updates and security update life-cycle

Practically implementing a software and hardware update and product lifecycle strategy that works and keeps users secure. Understand the issues and solutions around constrained devices and how to manage them.

Session 7: Vulnerability Disclosure

Understand the background, mechanics and psychology of coordinated vulnerability disclosure and how it is beneficial to your business. This topic will also cover bug bounties and other aspects of working with security researchers.

Session 8: IoT Security Self-Certification

How to use the IoT Security Foundation’s self-certification scheme, assess and make your product or service secure, ready for certification.

Course Certificate Presentations

Each attendee will be presented with a framed certificate of attendance at the end of the course.

Course Fees

The course is run across 2 days and we encourage attendees to take full advantage of the additional benefit that comes with the residential option.

Prices are exclusive of sales tax (VAT).

Non-IoTSF Member rate IoTSF Member rate
Full Residential £1595 £1395
Non Residential £1495 £1295

Meet The Trainers

Professor David Rogers

David  is a Visiting Professor in Cyber Security and Digital Forensics at York St John University and teaches Mobile Systems Security at the University of Oxford. He has worked in the mobile industry for many years in security and engineering roles. Prior to this he worked in the semiconductor industry. He has extensive experience in standardising and developing IoT products and security. His book ‘Mobile Security: A Guide for Users’ was published in 2013.


Mark Neve

Mark has extensive software experience from embedded development for IoT through to commercial software and test automation for millions of mobile phones. He has been involved in research projects for automotive, IoT, security and smart cities. Mark has 15 years’ experience working in the mobile manufacturing environment for Vertu and Panasonic Mobile. He previously worked in the automotive sector as a software engineer working on Just-in-Time systems for suppliers to Nissan.


Location and Accommodation

The Macdonald Windsor is a luxury hotel situated just two minutes walk from Windsor Castle, you’ll find 120 luxury bedrooms at Macdonald Windsor Hotel in the heart of this historic town.

The Royal Borough of Windsor is home to some of the most well-known attractions in England.

The Windsor hotel is ideal for business meetings and conferences, as it’s close to Heathrow Airport and various motorway and train links too.

Additional Things To Do In Windsor
Windsor is most famous for the stunning Windsor Castle, one of the official residences of the Royal family. Macdonald Windsor Hotel sits directly opposite Windsor Castle, the perfect location for watching the Change of Guards. One of the more appealing places to live thanks to its heritage, Windsor boasts a range of attractions and historic sites. A great spot for tourists, Windsor is home to Legoland and only a short journey to London city centre.

  • Contemporary townhouse
  • In heart of historic Windsor
  • Shopping on your doorstep
  • Unrivalled views of the changing of the guards
  • Landmark attractions including Windsor castle nearby
  • 120 individually-designed luxury rooms
  • 20 minutes from Heathrow Airport
  • Free WiFi access throughout
  • Award-winning restaurant

Click here to register and pay by credit card

Click here to register and pay by invoice


Welcome to the home of Copper Horse Solutions Ltd on the web. We specialise in mobile phone solutions for businesses large and small, along with consultancy in a number of different areas of the mobile phone industry. We have a particular interest in mobile phone security.

If you are looking for the blog of our Director, David Rogers, head over to

You can also follow him on twitter by clicking the button below:

Copper Horse Tweets

Follow @copperhorseuk on twitter.

GSMA Associate Member

GSMA Associate Member

Copper Horse is an Associate Member of the GSM Association

IoT Security Foundation

IoT Security Foundation

Copper Horse are Founding and Executive Board member of the IoT Security Foundation.

W3C Member

W3C Member

Copper Horse is a member of the Worldwide Web Consortium, the W3C.

Cyber Essentials Certified

Cyber Essentials Certified