Agreement Cybersecurity Research Center IoT - IIoT, National Cyber Defense Research Center
Agreement Cybersecurity Research Center IoT - IIoT (CIC IoT - IIoT)
By: Cybersecurity Research Center IoT - IIoT
Cybersecurity Research Center IoT - IIoT (CIC IoT - IIoT)
National Cyber Defense Research Center (NCDRC) of India.
Santiago, December 09, 2020 - Freddy Macho, president of the IoT Cybersecurity Research Center - IIoT describes the signing of the agreement as a space to develop educational and research initiatives in the field of cybersecurity in Internet of Things environments (IoT) and the industrial internet of things (IIoT).
"This agreement is a sample of the importance of developing research work in hyper-convergent environments such as IoT and IIoT, as well as promoting the safe growth of both the various verticals that comprise these environments as well as the enablers that facilitate and enhance them".
This new synergy will significantly drive the creation of new Cybersecurity solutions as well as cover the increasingly present need for spaces that provide training and knowledge to all citizens in the Asian Indian and Latin American regions, the organizations indicated.
Cyberspace has become an integral part of modern society, impacting all facets of our lives, from the electrical grids that power millions of homes to the transportation and telecommunications networks that mobilize and connect people.
Currently, cyberspace is considered a haven of opportunities to stimulate innovation, create competitiveness and have an impact on the development of societies. However, with the multitude of benefits, it also harbors challenges that could undermine security and privacy.
Given the type of unprecedented threats facing the world, it is imperative that researchers and policy makers are prepared to meet the challenges of the digitally connected world at the social, political, economic and technical levels for peace, stability and resilience, affirmed Freddy.
The agreement will promote the analysis and investigation of the IoT and IIoT environments, supporting the identification of possible threats of cyberattacks, promoting the timely exchange of information between both organizations.