Jason Huang

CTOne Inc. / CEO

Jason is the CEO of CTOne, with over 20 years of experience in network communications and information security. During his time at Trend Micro, the IT Cybersecurity solution provider, in the past ten years, Jason led a group of communications, IoT, and related security experts as a business unit dedicated to researching new-generation communication technologies and relevant cyber risks. The business unit was transformed into a professional company in January 2023 that focuses on providing tailor-made cybersecurity solutions for new-generation communication technologies (CT), including 5G and O-RAN, to help enterprises accelerate the digital transformation progress through adopting the new-generation wireless communication technologies.

SPEECH
4/15 (Tue.) 14:30 - 15:15 4F AIoT & Hardware Security Zone AIoT & Hardware Security Summit
The Silent Pandemic Strikes: A Triple Approach to Defending Against Mobile Network Vulnerabilities in IIoT

Cyber threats in mobile networks are spreading like a silent pandemic, posing severe challenges to Industrial IoT security. This session will analyze cybersecurity risks in distributed IIoT environments, including lack of device visibility, insufficient traffic management, delayed firmware updates, and weak attack isolation. Focusing on three critical cybersecurity defense strategies, the session will leverage real cases and technical demonstrations to showcase innovative security solutions against mobile network attacks, fortifying IIoT resilience.

1. IIoT Content Security Defense: Enhancing device visibility with high-performance Deep Packet Inspection (DPI), network micro-segmentation, and automated threat response to effectively block malicious activities and limit attack scope.

2. IIoT Zero Trust Architecture: Implementing Network Access Control (NAC) for device authentication and compliance checks to mitigate internal security risks.

3. IIoT Device Security Design: Centering on "secure-by-design" principles, integrating international security certification standards and policy frameworks to strengthen IIoT device protection.