Table of Contents
- An Unprecedented Opportunity at Stake
- Industrial Data Pipeline and Security Architecture
- IIoT Identity and Access Management
- Endpoint Security and Trustworthiness
- Securing Connectivity and Communications
- Securing IIoT Edge, Cloud and Apps
- Secure Processes and Governance
- IIoT Security using Emerging Technologies
- IIoT Security: Real World Case Studies
- The Road Ahead
- Appendix I
- Appendix II

