SlideShare a Scribd company logo
1 of 1
Download to read offline
© GSMA Intelligence@forestinteractive
IOT SECURITY CHALLENGES
Survey done by the GSMA intelligence Enterprise IoT Survey
Primary Security Challenge when Deploying IoT
Limited
Budget
Lack of In-House
Security Skills
Envolving
Regulations
Lack of Appropriate
Security Tools
Difficulty to Encrypt
and Authenticate Data
Changing
Processes
0% 10% 20% 30% 40%
Advisory services to help enterprises
identify risks
Security metrics for monitoring and
responding to risks
Operators have an opportunity to help enterprises become resilient
by offering:
expect security investment and
security-based SLAs to be important
to long-term revenue success.
2 out of 3 Operators

More Related Content

What's hot

Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 

What's hot (20)

Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
IoT security
IoT securityIoT security
IoT security
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 

More from Forest Interactive

Top 10 5G Countries in Asia by 2021
Top 10 5G Countries in Asia by 2021Top 10 5G Countries in Asia by 2021
Top 10 5G Countries in Asia by 2021Forest Interactive
 
Consumer Insight: New 5G Use Cases
Consumer Insight: New 5G Use CasesConsumer Insight: New 5G Use Cases
Consumer Insight: New 5G Use CasesForest Interactive
 
Asia Pacific Consumer Insight: Mobile Phones & Entertainment
Asia Pacific Consumer Insight: Mobile Phones & EntertainmentAsia Pacific Consumer Insight: Mobile Phones & Entertainment
Asia Pacific Consumer Insight: Mobile Phones & EntertainmentForest Interactive
 
Internet of Things (IoT) Impact and Challenges for Enterprises
Internet of Things (IoT) Impact and Challenges for EnterprisesInternet of Things (IoT) Impact and Challenges for Enterprises
Internet of Things (IoT) Impact and Challenges for EnterprisesForest Interactive
 
Digital Consumer Behavior Trends in 2021
Digital Consumer Behavior Trends in 2021Digital Consumer Behavior Trends in 2021
Digital Consumer Behavior Trends in 2021Forest Interactive
 
2020 Telecommunications Industry Roundup
2020 Telecommunications Industry Roundup2020 Telecommunications Industry Roundup
2020 Telecommunications Industry RoundupForest Interactive
 
The Mobile Technology Revolution
The Mobile Technology RevolutionThe Mobile Technology Revolution
The Mobile Technology RevolutionForest Interactive
 
5G World Map 2020: Connected Countries
5G World Map 2020: Connected Countries 5G World Map 2020: Connected Countries
5G World Map 2020: Connected Countries Forest Interactive
 
Industry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent ConnectivityIndustry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent ConnectivityForest Interactive
 
COVID-19 Impact on 5G Adoption in North America
COVID-19 Impact on 5G Adoption in North AmericaCOVID-19 Impact on 5G Adoption in North America
COVID-19 Impact on 5G Adoption in North AmericaForest Interactive
 
Top 10 Biggest Mobile Operator in 2020
Top 10 Biggest Mobile Operator in 2020Top 10 Biggest Mobile Operator in 2020
Top 10 Biggest Mobile Operator in 2020Forest Interactive
 
Mobile internet connectivity 2020
Mobile internet connectivity 2020Mobile internet connectivity 2020
Mobile internet connectivity 2020Forest Interactive
 
Mobile in Sub-Saharan Africa: Estimated subscribers by 2025
Mobile in Sub-Saharan Africa: Estimated subscribers by 2025Mobile in Sub-Saharan Africa: Estimated subscribers by 2025
Mobile in Sub-Saharan Africa: Estimated subscribers by 2025Forest Interactive
 
Mobile Connections Growth 2025 | GSMA Intelligence
Mobile Connections Growth 2025 | GSMA IntelligenceMobile Connections Growth 2025 | GSMA Intelligence
Mobile Connections Growth 2025 | GSMA IntelligenceForest Interactive
 
Top 10 IoT Connected Mobile Operators Worldwide
Top 10 IoT Connected Mobile Operators WorldwideTop 10 IoT Connected Mobile Operators Worldwide
Top 10 IoT Connected Mobile Operators WorldwideForest Interactive
 
COVID-19 Impact on Internet of Things (IoT) Market
COVID-19 Impact on Internet of Things (IoT) MarketCOVID-19 Impact on Internet of Things (IoT) Market
COVID-19 Impact on Internet of Things (IoT) MarketForest Interactive
 
IoT in Manufacturing - Solutions for the Industry
IoT in Manufacturing - Solutions for the IndustryIoT in Manufacturing - Solutions for the Industry
IoT in Manufacturing - Solutions for the IndustryForest Interactive
 

More from Forest Interactive (20)

FISB Infographic Long Form
FISB Infographic Long Form FISB Infographic Long Form
FISB Infographic Long Form
 
Mobile network connection map
Mobile network connection mapMobile network connection map
Mobile network connection map
 
Top 10 5G Countries in Asia by 2021
Top 10 5G Countries in Asia by 2021Top 10 5G Countries in Asia by 2021
Top 10 5G Countries in Asia by 2021
 
Consumer Insight: New 5G Use Cases
Consumer Insight: New 5G Use CasesConsumer Insight: New 5G Use Cases
Consumer Insight: New 5G Use Cases
 
Asia Pacific Consumer Insight: Mobile Phones & Entertainment
Asia Pacific Consumer Insight: Mobile Phones & EntertainmentAsia Pacific Consumer Insight: Mobile Phones & Entertainment
Asia Pacific Consumer Insight: Mobile Phones & Entertainment
 
Internet of Things (IoT) Impact and Challenges for Enterprises
Internet of Things (IoT) Impact and Challenges for EnterprisesInternet of Things (IoT) Impact and Challenges for Enterprises
Internet of Things (IoT) Impact and Challenges for Enterprises
 
Digital Consumer Behavior Trends in 2021
Digital Consumer Behavior Trends in 2021Digital Consumer Behavior Trends in 2021
Digital Consumer Behavior Trends in 2021
 
2020 Telecommunications Industry Roundup
2020 Telecommunications Industry Roundup2020 Telecommunications Industry Roundup
2020 Telecommunications Industry Roundup
 
The Mobile Technology Revolution
The Mobile Technology RevolutionThe Mobile Technology Revolution
The Mobile Technology Revolution
 
5G World Map 2020: Connected Countries
5G World Map 2020: Connected Countries 5G World Map 2020: Connected Countries
5G World Map 2020: Connected Countries
 
Industry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent ConnectivityIndustry 4.0 - Enabling Intelligent Connectivity
Industry 4.0 - Enabling Intelligent Connectivity
 
COVID-19 Impact on 5G Adoption in North America
COVID-19 Impact on 5G Adoption in North AmericaCOVID-19 Impact on 5G Adoption in North America
COVID-19 Impact on 5G Adoption in North America
 
Top 10 Biggest Mobile Operator in 2020
Top 10 Biggest Mobile Operator in 2020Top 10 Biggest Mobile Operator in 2020
Top 10 Biggest Mobile Operator in 2020
 
Mobile internet connectivity 2020
Mobile internet connectivity 2020Mobile internet connectivity 2020
Mobile internet connectivity 2020
 
Mobile in Sub-Saharan Africa: Estimated subscribers by 2025
Mobile in Sub-Saharan Africa: Estimated subscribers by 2025Mobile in Sub-Saharan Africa: Estimated subscribers by 2025
Mobile in Sub-Saharan Africa: Estimated subscribers by 2025
 
5G in Europe 2020
5G in Europe 20205G in Europe 2020
5G in Europe 2020
 
Mobile Connections Growth 2025 | GSMA Intelligence
Mobile Connections Growth 2025 | GSMA IntelligenceMobile Connections Growth 2025 | GSMA Intelligence
Mobile Connections Growth 2025 | GSMA Intelligence
 
Top 10 IoT Connected Mobile Operators Worldwide
Top 10 IoT Connected Mobile Operators WorldwideTop 10 IoT Connected Mobile Operators Worldwide
Top 10 IoT Connected Mobile Operators Worldwide
 
COVID-19 Impact on Internet of Things (IoT) Market
COVID-19 Impact on Internet of Things (IoT) MarketCOVID-19 Impact on Internet of Things (IoT) Market
COVID-19 Impact on Internet of Things (IoT) Market
 
IoT in Manufacturing - Solutions for the Industry
IoT in Manufacturing - Solutions for the IndustryIoT in Manufacturing - Solutions for the Industry
IoT in Manufacturing - Solutions for the Industry
 

Recently uploaded

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 

Recently uploaded (11)

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 

IoT Security Challenges

  • 1. © GSMA Intelligence@forestinteractive IOT SECURITY CHALLENGES Survey done by the GSMA intelligence Enterprise IoT Survey Primary Security Challenge when Deploying IoT Limited Budget Lack of In-House Security Skills Envolving Regulations Lack of Appropriate Security Tools Difficulty to Encrypt and Authenticate Data Changing Processes 0% 10% 20% 30% 40% Advisory services to help enterprises identify risks Security metrics for monitoring and responding to risks Operators have an opportunity to help enterprises become resilient by offering: expect security investment and security-based SLAs to be important to long-term revenue success. 2 out of 3 Operators