In this video, published by the National Cybersecurity Training and Education (NCyTE) Center, Shaya Wolf from the Idaho National Laboratory discusses research on integrating zero trust practices into Industrial Internet of Things (IIoT) architectures. Wolf goes into the process of proving system validation and security assurance with anti trust, discussing aspects of research such as data collection, research measures, and research results. Covered throughout the lecture is the Zero Trust Maturity Model, edge AI (artificial intelligence), vulnerabilities of edge devices, and more.
This video runs 49:41 minutes in length.
About this Resource
Creator
Publisher
Date Issued
May 30th, 2024
Audience
Education Level
Language
Subject
GEM Subject
Relation
Series
ATE Contributor
Associated Files
Archived
Rights
Access Rights
STEMLink
Available in STEMLink

Comments