IEEE International Communications Quality and Reliability Workshop
9–12 September 2024 // Seattle, WA, USA

Webinar

This event concluded on June 27th, 2024. Registrants can view the webinar here

 

Join us for a Global Technology Webinar on Thursday June 27, 2024 at 9 AM EST

Register here to attend this informative event

 

Topic #1: Building a Sovereign Network

Shakthivelu Janardhanan, Technical University of Munich, Germany

Abstract: 

Sovereignty, traditionally defined as a state's ability to self-sufficiently govern itself independently, has gained significance in the realm of technology amid ongoing trade wars, sanctions, and economic crises. In this context, technology sovereignty is a state's ability to provide a technology to its citizens self-sufficiently without any inherent dependencies on manufacturers. This technology can be developed within the state or outsourced to a vendor from another state. However, outsourcing makes the state dependent on this external vendor, and hence, its sovereignty decreases. This talk focuses on network sovereignty, the ability to operate a network without dependencies on a particular network vendor. This talk (i) identifies key challenges in establishing a sovereign network, (ii) reviews relevant literature and (iii) proposes potential directions of research towards building a sovereign network.

Topic #2: Mitigating Cybersecurity Challenges in Industry 5.0

Eddison Jaggernauth, University of the West Indies, Trinidad & Tobago

Abstract: 

As we transition towards Industry 5.0, which emphasizes the collaboration between humans and machines, the importance of robust cybersecurity measures becomes increasingly critical, particularly within Industrial Automation and Control Systems (IACSs). This presentation explores the cybersecurity challenges posed by the interconnected and intelligent systems characteristic of Industry 5.0, focusing specifically on IACSs. It highlights the unique challenges of integrating corporate networks with IACSs, the complexity of diverse IACS environments, real-time operational requirements, and resource constraints. AI-driven anomaly detection is introduced as a critical component of cybersecurity in IACSs. Such systems enhance the ability to identify and respond to atypical patterns and potential security threats in real-time, mitigating risks associated with cyberattacks. Sample case studies employed  within the Republic of Trinidad and Tobago will also be presented.

 

Register here to attend this informative event.

Patrons