Network Security for IoT & IIoT Environments
In this course, Bruce will discuss cyber security references, standards and architectures regarding the network security of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT). Given the constraints of things, security often relies on the underlying security of the transport network, but this can be challenging with different network deployment models and different architectural approaches. This course will share ideas and suggestions for network operators to consider when securing networks that support things.
This course will cover the following topics:
- Overview of Internet of things (IoT) & Industrial internet of things (IIoT) Architectures
- Overview of Security Standards and References for Internet of things (IoT) Network Security
- Different Network Deployment Models and security requirements
Bruce is the Principal Operational Technology (OT) Cyber Security Architect at CyberCX and he has 14 years of experience working with IT and OT in network and system engineering roles. Bruce has worked in Electricity Generation, Railway, Aviation, Emergency Services and Consulting industries.
Bruce is a Foundation Chartered SABSA Architect (SCF), holds the GIAC Response and Industrial Defense (GRID) certificate and has attended Industrial Control Systems (ICS) Cyber Security training at QUT. He also graduated with a Bachelor of Engineering (Telecommunications) First Class Honours and a Master of Business (Applied Finance) with Distinction from QUT.
Having worked in Information Technology for over a decade, Richard has provided security consulting services throughout Australia to state and local government agencies and to large enterprise organisations. He has been responsible for assessing and guiding remediation on critical infrastructure. He has extensive experience across many areas of Cyber Security, including delivering web, API and infrastructure penetration testing, cloud and on-premise security architecture reviews, security operation centre maturity gap analysis and process mapping, information security management system gap analysis, threat risk assessments for business process software and system architecture implementations, and business mapping and modelling of managed service providers.