FOG and Edge Computing as a Security Strategy

Stage 2

This session will go over the increasingly important FOG and Edge Computing concepts being developed and deployed for Industrial IoT applications, and how these new data collection and analytic architectures can be leveraged as part of a larger security strategy.

FOG and Edge computing is typically leveraged to reduce the amount of data that needs to be sent to Cloud applications, when decisions need to be made in real time, or in remote locations where connectivity is limited. The idea is that by being able to collect, analyze, or normalize the data as close to the end devices as possible, the amount and frequency of that data that is being sent to higher level systems can be reduced.

In this session, we will look at the possibility of additional benefits, such as the ability to reduce the number of protocols and the domain in which insecure protocols are allowed to communicate. For example, in manufacturing this could mean limiting what protocols need to communicate from the plant floor up, or possibly from the zone or even the cell depending on the overall topology. Another benefit could be the ability to remove any private information before sending to third party vendors for support.

IoT / Industrie 4.0 Secure Design & Dev