Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • IoT cyber strategy
  • Integrity of software updates
  • Integrity of online connection to cloud
  • Monitoring connected machines for cyber attacks
  • Operator and service personnel secure logging
  • Firewalls between intelligent machine connections.
  • Completeness of data modelling
  • Product liability
  • Wireless connectivity (denial of service)
  • DOS attacks in WSNs (wireless sensor networks)

vs.

What is more interesting? Small vs. big?

...

  • CyberSec in industrial companies
  • CyberSec assessment
  • Digital identity
  • bility to control increasing intelligence
  • IoT ecosystem solutions
  • Cyber security of a whole value network
  • Business cases?
  • Risk vs business?
  • How to ensure accessibility of data also from remote sites and from machines of subcontractors and suppliers?
  • International dimension!

Industrial partners

OrganizationContact personRole & contribution
AIKO cluster

Glaston

Annitech

Pyroll

Insta Defsec

Missing Link

Satron Instruments

Ponsse / EPEC

Gofore

Research partners

OrganizationContact personRole & contribution
TAMK