This event concluded on June 27th, 2024. Registrants can view the webinar here.
Join us for a Global Technology Webinar on Thursday June 27, 2024 at 9 AM EST
Register here to attend this informative event
Topic #1: Building a Sovereign Network
Shakthivelu Janardhanan, Technical University of Munich, Germany
Abstract:
Sovereignty, traditionally defined as a state's ability to self-sufficiently govern itself independently, has gained significance in the realm of technology amid ongoing trade wars, sanctions, and economic crises. In this context, technology sovereignty is a state's ability to provide a technology to its citizens self-sufficiently without any inherent dependencies on manufacturers. This technology can be developed within the state or outsourced to a vendor from another state. However, outsourcing makes the state dependent on this external vendor, and hence, its sovereignty decreases. This talk focuses on network sovereignty, the ability to operate a network without dependencies on a particular network vendor. This talk (i) identifies key challenges in establishing a sovereign network, (ii) reviews relevant literature and (iii) proposes potential directions of research towards building a sovereign network.
Topic #2: Mitigating Cybersecurity Challenges in Industry 5.0
Eddison Jaggernauth, University of the West Indies, Trinidad & Tobago
Abstract:
As we transition towards Industry 5.0, which emphasizes the collaboration between humans and machines, the importance of robust cybersecurity measures becomes increasingly critical, particularly within Industrial Automation and Control Systems (IACSs). This presentation explores the cybersecurity challenges posed by the interconnected and intelligent systems characteristic of Industry 5.0, focusing specifically on IACSs. It highlights the unique challenges of integrating corporate networks with IACSs, the complexity of diverse IACS environments, real-time operational requirements, and resource constraints. AI-driven anomaly detection is introduced as a critical component of cybersecurity in IACSs. Such systems enhance the ability to identify and respond to atypical patterns and potential security threats in real-time, mitigating risks associated with cyberattacks. Sample case studies employed within the Republic of Trinidad and Tobago will also be presented.