________________________________________________________________________________________________________________________
“ I ran a startup company straight from school that focused on human error in manufacturing . We centered on workplace safety and used data analytics to help manufacturers reduce workplace injuries . I did that for years until I sold the business when I had my first child , going on to branch out into nuclear engineering . I worked in main control room design for about five years , which really helped to cement my understanding of risk in industrial systems . It was from this sector that I ended up migrating back to the university world where I ran a risk engineering center , which connected me to my current role with CyManII .
“ I supported what we call the capture team for the CyManII proposal and was one of a core group of individuals to help define and propose the institute . I ’ m an ex-researcher as well , and my role today really focuses on how we can sustain CyManII and how we can leverage the institute ’ s research to fundamentally shift how manufacturers think about and approach cybersecurity ,” Paris explains .
“ That involves translating research into technologies , products , and services that can find their way to the plant floor . So , what we call tech transfer . It ’ s all about keeping this research engine going and not letting it dissolve after the initial funding from our parent organization . I ’ m a geek , so if you put me in the room with our researchers , I ’ ll dive right in . I love the research element of my job , unpicking problem areas , and identifying the intersection between manufacturers ’ understanding of their business needs and the possible solutions that can bridge that gap . I also enjoy working with our manufacturers to understand their perspectives and challenges .”
With a focus on the US , CyManII ’ s members include recognized leaders in smart manufacturing in connected environments and cybersecurity from academia , national laboratories , and industry . Collectively , they hold advanced capabilities in testing and evaluation of critical technologies and are the nation ’ s leaders in threat identification , cyber exploitation , and attack detection in manufacturing environments .
12