In this video, published by the National Cybersecurity Training and Education (NCyTE) Center, Shaya Wolf from the Idaho National Laboratory discusses research on integrating zero trust practices into Industrial Internet of Things (IIoT) architectures. Wolf goes into the process of proving system validation and security assurance with anti trust, discussing aspects of research such as data collection, research measures, and research results. Covered throughout the lecture is the Zero Trust Maturity Model, edge AI (artificial intelligence), vulnerabilities of edge devices, and more.

This video runs 49:41 minutes in length.

Add Comment

Comments

(no comments available yet)