Intro/Outro (00:03):
Welcome to supply chain. Now the voice of global supply chain supply chain now focuses on the best in the business for our worldwide audience, the people, the technologies, the best practices, and today’s critical issues. The challenges and opportunities stay tuned to hear from those making global business happen right here on supply chain now,
Kevin L. Jackson (00:33):
Hello, my name is Kevin L. Jackson host of digital transformers. Today. I would like to share with you some new insights I’ve recently gained on cyber security on the edge edge. Computing has become an important component of digital transformation. Its advantages include improved speed and reduced network latency, improved security and privacy protections reduced operational cost, improved liability and resiliency and enhanced scalability. Although all of these improvements would be important in any industry vertical. The manufacturing industry is the surprising leader in edge computing adoption. This is just one of the important trends I learned from a conversation last month with at and T cyber security head of evangelism, Teresa Leitz during our talk, she told me about a recent at and T cyber security insights report on manufacturing for the report at and T surveyed 1,520 business executives from around the world. Although manufacturing is often cited as a laggard when it comes to adopting new technology report, data revealed that 78% of manufacturing respondents are currently implementing an edge computing use case.
Kevin L. Jackson (02:11):
When these companies move to the edge, they move through at least three identifiable stages. The first is an ideation phase when they are just thinking about moving to the edge. The second we refer to as proof of concept, the company tries out a business idea for delivering value through edge. The final or mature stage involves either a partial or full implementation of the new edge process manufacturing and retail were the two leading industries adopting edge use cases. The top retail use for edge computing, according to the report was lost prevention for manufacturing. The leading use case is visual quality inspection on assembly lines. The transformation is obvious if you have ever seen a modern shop floor, fully assembled products are no longer being manually pulled off the line and stuck into a box. The lines themselves are fully automated with the last station being composed of multiple cameras and telemetry sensors.
Kevin L. Jackson (03:40):
Manufacturing has really advanced their digital transformation and has become far more sophisticated in their internal processes. In fact, those assembly line, computer vision based quality inspections really help pinpoint the root cause of any defect. Since these defects are detected in Neo real time, inspectors can go backwards on the assembly line to really flush out causes effects and desired solutions. This very tactical use of edge computing results in a greatly reduced recall potential a very important business outcome. This is a true example of a digital transformation use case that delivers better business outcomes and a better customer experience. These changes can also help improve the assembly line working environment by shifting humans away from repetitive low value activities. With this model, humans are reserved for the important task of determining the reasons for mistakes or failures coming up with new solutions and maybe even improving the whole business process edge computing can also reduce the historic friction between operational technology, OT and information technology.
Kevin L. Jackson (05:21):
It, according to Theresa, this is rapidly turning into a sort of urban myth due to technology convergence. Although it is very business oriented and OT is really oriented towards the industrial processes. Both teams are interacting with and leveraging data and information. Recent observations have shown that the it teams are learning from the OT teams and the OT teams are learning from the it teams as technology convergence accelerates with the internet of things, adoption, both OT and it security teams buying themselves, working together to improve device security across the organization. This is even more crucial to the use in SCADA, also known as supervisory control and data acquisition devices. The operational team uses SCADA to gather data and perform near real time analysis. Since these now represent network ingress and egress points, the it team needs to implement security controls like intrusion detection systems, the joint OT it team will also need to focus on the cyber security controls that reside inside of those individual skater devices.
Kevin L. Jackson (07:04):
Technology convergence has also driven the idea of zero trust with this concept. Nothing on the network is trusted. Zero trust requires verification of every entity, persons, machines or software since every industry is currently experiencing a proliferation of IOT devices controls on the edge will need to be operated with a zero trust mindset, philosophy, strategy, and architecture. Thank you for supporting digital transformers and for being a part of our global supply chain. Now community, please check out all of our programming@supplychainnow.com. Make sure you subscribe to digital transformers anywhere you listen to or view the show and follow us on Facebook, LinkedIn, Twitter and Instagram on behalf of the entire team here at supply chain. Now this is Kevin L. Jackson wishing all of you, a bright and transformational future. We’ll see you next time on digital transformers.
Intro/Outro (08:30):
Thanks For being a part of our supply chain. Now community check out all of our programming@supplychainnow.com and make sure you subscribe to supply chain. Now anywhere you listen to podcasts and follow us on Facebook, LinkedIn, Twitter, and Instagram. See you next time on supply chain. Now.