Cyber threats in mobile networks are spreading like a silent pandemic, posing severe challenges to Industrial IoT security. This session will analyze cybersecurity risks in distributed IIoT environments, including lack of device visibility, insufficient traffic management, delayed firmware updates, and weak attack isolation. Focusing on three critical cybersecurity defense strategies, the session will leverage real cases and technical demonstrations to showcase innovative security solutions against mobile network attacks, fortifying IIoT resilience.
1. IIoT Content Security Defense: Enhancing device visibility with high-performance Deep Packet Inspection (DPI), network micro-segmentation, and automated threat response to effectively block malicious activities and limit attack scope.
2. IIoT Zero Trust Architecture: Implementing Network Access Control (NAC) for device authentication and compliance checks to mitigate internal security risks.
3. IIoT Device Security Design: Centering on "secure-by-design" principles, integrating international security certification standards and policy frameworks to strengthen IIoT device protection.
TOPIC / TRACK
AIoT & Hardware Security Summit
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F AIoT & Hardware Security Zone
LEVEL
Advanced Advanced sessions explore
cybersecurity topics, including
architecture, tools, practical experiences, and strategy
comparisons. Content often features code explanations,
protocol analysis, reverse engineering, live demos, and is
suitable for experienced cybersecurity
professionals.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Content Security
Zero Trust Architecture
Endpoint Security
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。