Co-Organized
by
i.
Manufacturing
& Industrial Division
ii.
Hong Kong Computer Society
Programme Highlights
The application of
the Internet of Things (IoT) to the manufacturing industry is called the IIoT
(or Industry 4.0). The IIoT will revolutionize manufacturing by enabling the
acquisition and accessibility of far greater amounts of data, at far greater
speeds, and far more efficiently than before. Combining this with the enormous
computing processing power of the Cloud and the extreme speed of communication
technologies such as 5G, there will be unlimited potential and business
opportunities for the industry. In this seminar, our speaker will share with us
how a 3-tier architecture can help design and implement an effective IIoT
solution and why a proper security framework is essential to achieve the
benefits.
Language: Cantonese with English Terminology
Speaker
Mr Ted Suen, President of Hong Kong Computer Society.
Ted Suen has 30 years of solid experiences in Information Technology with strong expertise knowledge in IT outsourcing services and large scale system integration projects. Ted is the Chief Information Officer of MTR Corporation. In this capacity, he is responsible to formulate the corporate IT strategy, manages the overall MTR corporate IT function, directs the establishment of a stable, reliable and highly effective IT environment to support the business operation and to ensure Information Systems solutions are in-line with corporate business strategies.
Prior to this position, Ted had held various senior regional management positions in different multi-national corporations, including Managing Director of EDS Hong Kong, Regional Director of Greater China and Korea of IT Outsourcing services of EDS, Regional Director of Asia Pacific Global Best Shore Services of Hewlett Packard.
Ted graduated from the Australian National University with double degrees in Economics and Science. He also holds a Master Degree in Accountancy and Graduate Diploma in Banking & Finance. Ted is a Fellow member and President of the Hong Kong Computer Society, and a Fellow member of the Hong Kong Institution of Engineers.
Ted was recipient of several prestigious IT awards in the last few years including the 2012 China Top 5 CIO Award, the 2013 China Best Value CIO Award, the 2013 Hong Kong Outstanding Performance IT Award Excellence, the 2013 Hong Kong CIO Award for Large Enterprise, and the 2014 Asia CIO Award.
Registration &
Enquiries
This Forum is free of charge but prior registration is
required. The number of participants is limited to 80 and applications
will be accepted on a first-come first-served basis. For registration, please
enroll online via MI website at
http://mi.hkie.org.hk. Only successful applicants
will be notified by email on or before 15 August 2019.
For enquiries, please contact Ir Dr Ritz Lau (ritzlau@hku.hk).
ReportA joint technical seminar on IIoT (Industrial Internet of
Things) Architecture and Security was organized on 17 Aug 2019 by Hong Kong
Computer Society and the MI Division. The speaker, Ir Ted Suen, President of
Hong Kong Computer Society, inspired the audience with the benefits of IIoT
applications, and shared his experience what the IIoT architecture should be
and how to set up the security framework.
The latest enabling technologies such as mobile/cloud
computing, IoT sensing, machine learning, robotics and automation merge
information and operational technologies together and form a new IIoT industrial
platform that improves production and process efficiency, product development, innovation
and business decision making. Such IIoT platform has to meet the higher design
and operational requirements. Three tiers of IIoT architecture, namely edge
tier, platform tier and enterprise tier are required to form an efficient
network.
Data security is generally one of the major concerns that
most industrialists do not have a good handle. IIoT security threats must be
properly contained to guarantee smooth and safe industrial operations. Many IoT
apps may leave intrusion points for malware, man-in-the-middle, unauthorized
access and data theft to infringe the data security. An improper communication
network between IIoT devices and backend applications may be subjected to
hijacking and spoofing. A comprehensive secure IIoT system should be started
with endpoint protection framework. The next security layer, IIoT platform and
enterprise service security covers five categories, namely identify, protect,
detect, response and recover. Each of these categories contains many building
elements per NIST cybersecurity framework.
Industry 4.0 defines a cyber-physical system that takes a
long way to achieve. It requires an extensive integration of robotics and data interconnectivity
to form fundamental building blocks. The seminar is definitely eye-opening and
let the general industrialists understand more about IIoT security importance
and architecture required.
By Ir Dr Ritz Lau