Learn and exchange with the security experts that build trust in today's and future digital services.


Welcome to Connect Security World!

The Connect Security World conference, previously "Chip-to-Cloud Security Forum", provides an independent collaboration and information-sharing platform dedicated to strong security for today’s globally connected society.

This 4th edition will welcome 300 IT security professionals around the latest trusted technologies in Mobile, IoT and Cloud environments. Ranging from the foundations such as cryptography up to virtualization in the Cloud, the agenda will highlight the ever-challenging implementation of strong and convenient security for m-Payment, BYOD, Industry 4.0, Wearables, Connected Cars, etc.

NEW! The co-located SMART INNOVATION SHOW provides the attendees an extensive set of learning, networking and business development opportunities. More on its dedicated website.

What's in for 2015?
60+ speakers
300 IT security professionals
►3 days of conference plus Smart Innovation Show
Be Part of the Agenda!
Call for speakers
Read and apply
Program Committee
34 IT security experts select the presentations in tune with the Government and industry needs.
View the PC members
3-DAY CONFERENCE (Sept. 15-17)

During 3 days, along 10+ sessions, over 60 eminent speakers will share their digital security expertise, unveil the latest R&D outcomes, discuss standardization & regulation advances.
After the Grand Opening on "Innovation for Connected Life ", two parallel tracks will address the huge challenges of securing connected devices and online transactions. Driven by its end-to-end security approach, the focus will be on achieving user-centric security for sensitive applications and services.
Some key features:
• Quality contents thanks to a Call for papers process led by the eminent Program Committee
• Designed to foster interactions between information security professionals from applied research & industry and the digital service providers/implementers
• Workshops and tutorials held within the Smart Innovation Show complement the two conference tracks
• Multiple bridges with the co-located conferences on contactless, Internet of Things, mobile ID and authentication technologies
• A lot more than a conference thanks to the Show hands-on, labs visits, demos as well as multiple social events, networking tool…

• Discover • Understand • Meet • Participate in Digital Transformation
The conference delegate pass includes full access to the Smart innovation Show activities.
►Full details at Smart innovation Show

Already oriented toward innovation and next generation technologies, the conference will particularly benefit from this innovation hub dedicated to connected digital transformation:
- A 50-booth international exhibition featuring numerous live demos
- Enriched live experiences of contactless on-site and downtown
Business meetings to efficiently connect suppliers and contractors, innovators and R&D
- Workshops and tutorials to update knowledge and get support from Industry leaders
- Investment Forum Day:  40 innovators to pitch their project in front of VC, incubators, local partners...
- World Smart Week Awards: spotlight on the best applications  in contactless and other connected technologies.

Located in the old Port of Marseille, the France's second largest city, the Pharo Palace has proven both attractive and convenient while offering impressive views.
► More:  Travel & Venue
within World Smart Week
The Connected Innovation Summer Forum
Conferences & Innovation Show - Sept. 15-17, 2015 – Marseille, France

In addition to the 300 conference delegates, meet the professionals attending the Smart Innovation Show and the attendees of the 3 co-located conferences dedicated to contactless, M2M/IoT and digital security:
• Smart Contactless World -  Proximity Services for Connected Consumers
• M2M Innovation World -  Driving growth through M2M/IoT services
• World e-ID & Cybersecurity  - Identity & Protection Services for Government, Mobility and Enterprise
► Learn more about World Smart Week

2015 Hot Topics

Cutting-edge technologies and methodologies for end-to-end, user-centric security implementations and effective threat intelligence will be presented. Among the multiple hot topics to be addressed:
- Strong authentication: pivotal to secure connections, technologies and approaches flourish
- m-payment & apps security: embedded versus cloud-based security remains a hot debate
- Cloud security: end-to-end security requires addressing the Cloud platforms virtualization challenges
- IoT security: from "wearables" to Industry 4.0, Smart Homes to e-Health, a wide range of new threats to address

► Full list of 2015 topics in the Call for Speakers
2014 Edition
2014 conference figures:
220 participants
75 speakers
12 thematic sessions
2.5 days of conference & exhibition
1480 World Smart Week participants
Missed 2014 conference? Get the slides!
60+ presentations by M2M market leaders
2014 proceedings
"Thinking Forward Digital Security"

The 2014 Edition (Chip-to-Cloud Forum Forum) confirmed the relevance of its transversal approach of digital security technologies. Combining the latest advances of end-to-end security in embedded, mobile, M2M/IoT and Cloud environments, the conference has gathered 220 high-level participants over 3 days: researchers from Academia and Industry, technology experts, standardization bodies and government reps.
The 75 speakers and panellists shared original ideas, groundbreaking results, new techniques, new methodologies  to increase the security along 12 thematic sessions. Among the 2014 topics to be highlighted:
- Impact of virtualization technologies for Cloud services and mobile transactions security (including the hot strategic topic of HCE)
- Creating trust in the Cloud with end-to-end interoperable infrastructures and based on secure chip technology, TPM, etc.
- Raising the level of mobile platform security: the latest advances of embedded mobile security technologies (eUICC, eSE, TEE, TPM), their deployment and management
- M2M and IoT security: the security mechanisms to provide large scale secure deployment and end-to-end secured communications
- Embedded Devices Security to defeat the latest attacks: relay attacks, side channel analysis, fault injection, locking phenomenon, etc.
- Workshops and focus sessions:

2014 speakers and keynotes included:
Relive the conference on World Smart Week.TV

80 free videos shot at the four conferences Take a tour!
Joerg Borchert
President & Chairman, 
Trusted Computing Group (TCG)
Jovan Golic
Action Line Leader for Privacy Security & Trust, EIT ICT Labs
Walid Negm
CTO, Accenture Security R&D, Accenture Technology Labs
Michael Osborne 
Head of Cloud Solutions and Security Group, IBM Research
Janne Uusilehto
Head of Product Security & Privacy for Smart Devices, Microsoft
Co-Chair Mobile Platform Working Group, TCG 
Vincent Barnaud
General Manager, 
Ahmad-Reza Sadeghi
Director System Security Lab, Director Intel Collaborative Research Institute for Secure Computing, Cased Darmstadt
Olivier Tessier
Project Director, Digital Commerce Programme, GSMA
Detlef Hühnlein
CEO, ecsec
Pr.Serge Vaudenay, Head of Security and Cryptography Laboratory (LASEC), EPFL
Abdella Battou, Division Chief, Advanced Network, NIST
David Bernstein
VP, Cloudscaling; Managing Director, Cloud Strategy Partners; Senior Scientist, NIST Cloud Computing Project
Robert Bohn
NIST Cloud Computing Technical Program Manager, NIST
Aljosa Pasic
Technology Transfer Director, Atos
Chris Edwards
Chief Technology Officer, Intercede
Daniele Catteddu
Managing Director, EMEA, Cloud Security Alliance
Steve Diamond
GM, Industry Standards Office, and Global Standards Officer, Office of the CTO , EMC, USA ; IEEE Cloud Computing Initiative Chair
Sal Francomacaro
IT Specialist, NIST
Rajiv Dholakia,
VP Products, Nok Nok Labs
See the 2014
list of speakers
2014 Agenda Overview
Cloud and Virtualization Security
Contactless & m-Payment Security:
SE-Based or Not?
Cloud Services Security
Creating Trust on Mobile Platforms
Special Track:
Intersection of Cloud & Mobility (
M2M & IoT Security Special Track:
Intersection of Cloud & Mobility (2/2)
The Role of the Root of Trust in Today & Tomorrow's Cybersecurity
Security Evaluation Techniques
Strong Identification & Authentication
in the Cloud
Conference main themes:

Connect Security World in Pictures
View the Album
Do you have questions or suggestions?
We'll be happy to hear from you





World Bank



More about World Smart Week