SlideShare a Scribd company logo
1 of 3
Download to read offline
IoT security requirements will reshape enterprise IT security
programs
The power of objects in the Internet of Things (IoT) to change the state of environments
— in addition to generating information — will cause chief information security officers
(CISOs) to redefine the scope of their security efforts beyond present responsibilities,
according to Gartner.
Gartner predicts that IoT security requirements will reshape and expand over half of all
global enterprise IT security programs by 2020 due to changes in supported platform and
service scale, diversity and function.
"The IoT is redrawing the lines of IT responsibilities for the enterprise," said Earl Perkins,
research vice president at Gartner. "IoT objects possess the ability to change the state of
the environment around them, or even their own state; for example, by raising the
temperature of a room automatically once a sensor has determined it is too cold or by
adjusting the flow of fluids to a patient in a hospital bed based on information about the
patient's medical records. Securing the IoT expands the responsibility of the traditional IT
security practice with every new identifying, sensing and communicating device that is
added for each new business use case."
Traditional "information" technology is now being supplemented by purpose-built,
industry-specific technologies that are tailored by where and how that technology is used
and what function it delivers. Information remains a key deliverable and is the fuel for IoT
devices. The device's ability to identify itself (such as RFID tags that identify cargo),
sense the environment (such as temperature and pressure sensors) or communicate
(such as devices in ocean buoys that transmit environmental changes to the areas
around them) requires information to be generated, communicated and/or used.
Although traditional IT infrastructure is capable of many of these tasks, functions that are
delivered as purpose-built platforms using embedded technology, sensors and machine-
to-machine (M2M) communications for specific business use cases signal a change in
the traditional concept of IT and the concept of securing IT.
"This is an inflection point for security. CISOs will need to deconstruct current principles
of IT security in the enterprise by re-evaluating practices and processes in light of the IoT
impact," said Mr. Perkins. "Real-time, event-driven applications and nonstandard
protocols will require changes to application testing, vulnerability, identity and access
management (IAM) — the list goes on. Handling network scale, data transfer methods
and memory usage differences will also require changes. Governance, management and
operations of security functions will need to change to accommodate expanded
responsibilities, similar to the ways that bring your own device (BYOD), mobile and cloud
computing delivery have required changes — but on a much larger scale and in greater
breadth."
Although the business use cases being identified daily are indeed innovative and new,
the technologies and services that deliver them are seldom new as well — they are also
seldom uniform in architecture and design. Each use case risk profile has specific
requirements that may result in the use of old platform and service architecture with a
new technology "overlay" to improve performance and control.
"This represents an interesting challenge for CISOs when delivering secure services for
the IoT," said Mr. Perkins. "In some cases, it may be a 'past is future' exercise in
evaluating mainframe, client/server, Web, cloud and mobile security options as part of an
overall IoT business use case. Even out-of-maintenance systems such as Windows XP
may still play a critical role for some industry infrastructure as part of an IoT security
system. Security planners should not throw away their old security technology manuals
just yet."
CISOs should not automatically assume that existing security technologies and services
must be replaced; instead, they should evaluate the potential of integrating new security
solutions with old. Many traditional security product and service providers are already
expanding their existing portfolios to incorporate basic support for embedded systems
and M2M communications, including support for communications protocols, application
security and IAM requirements that are specific to the IoT.
"At this time, there is no 'guide to securing IoT' available that provides CISOs with a
framework for incorporating IoT principles across all industries and use cases," said Mr.
Perkins. "Another unique characteristic of the IoT is the sheer number of possible
combinations of device technologies and services that can be applied to those use
cases. What constitutes an IoT object is still up for argument, so securing the IoT is a
'moving target.' However, it is possible for CISOs to establish an interim planning
strategy, one that takes advantage of the 'bottom-up' approach available today for
securing the IoT."
CISOs should resist the temptation to overthink security planning while patterns and
solutions are still emerging. They should start small and develop initial security projects
based on specific IoT interactions within specific business use cases. CISOs can build
on these use case experiences to develop common security deployment scenarios, core
architectural foundations and competency centers for the future.
"The requirements for securing the IoT will be complex, forcing CISOs to use a blend of
approaches from mobile and cloud architectures, combined with industrial control,
automation and physical security," said Mr. Perkins. "Fortunately, many of the security
requirements for the IoT will look familiar to the CISO. The technologies and services
that have been used for decades to secure different eras of computing are still applicable
in most cases.
	
  

More Related Content

What's hot

IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AIAhmed Banafa
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTStylight
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Draft NISTIR 8202
Draft NISTIR 8202Draft NISTIR 8202
Draft NISTIR 8202i-SCOOP
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CityPeter Waher
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalNETSCOUT
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeAhmed Banafa
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?IndSightsResearchSG
 

What's hot (20)

IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoT
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Draft NISTIR 8202
Draft NISTIR 8202Draft NISTIR 8202
Draft NISTIR 8202
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Adopting Emerging Technologies
Adopting Emerging TechnologiesAdopting Emerging Technologies
Adopting Emerging Technologies
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 

Similar to Iot security requirements will reshape enterprise it security programs

151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoTAhmed Banafa
 
Connecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoTConnecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoTCognizant
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemCognizant
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistancePhD Assistance
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016David Rubal, CISSP
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?GENIANS, INC.
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613domenico di mola
 
Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Cognizant
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 

Similar to Iot security requirements will reshape enterprise it security programs (20)

151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoT
 
Connecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoTConnecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoT
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613
 
Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 

More from Market Engel SAS

MODI Vision Health Station
MODI Vision Health StationMODI Vision Health Station
MODI Vision Health StationMarket Engel SAS
 
About aevatar french version
About aevatar french versionAbout aevatar french version
About aevatar french versionMarket Engel SAS
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...Market Engel SAS
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptMarket Engel SAS
 
Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-programMarket Engel SAS
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014Market Engel SAS
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZMarket Engel SAS
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyMarket Engel SAS
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Market Engel SAS
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux Market Engel SAS
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...Market Engel SAS
 

More from Market Engel SAS (20)

MODI Vision Health Station
MODI Vision Health StationMODI Vision Health Station
MODI Vision Health Station
 
About aevatar french version
About aevatar french versionAbout aevatar french version
About aevatar french version
 
About Aevatar
About Aevatar About Aevatar
About Aevatar
 
_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese
 
Happy new year mmxvi
Happy new year mmxviHappy new year mmxvi
Happy new year mmxvi
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
 
Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-program
 
Happy new year 2015 !
Happy new year 2015 !Happy new year 2015 !
Happy new year 2015 !
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
AuditMyApps_English
AuditMyApps_EnglishAuditMyApps_English
AuditMyApps_English
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZ
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's survey
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
 
Gamers in the UK
Gamers in the UKGamers in the UK
Gamers in the UK
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
 

Recently uploaded

Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 

Recently uploaded (20)

Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 

Iot security requirements will reshape enterprise it security programs

  • 1. IoT security requirements will reshape enterprise IT security programs The power of objects in the Internet of Things (IoT) to change the state of environments — in addition to generating information — will cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities, according to Gartner. Gartner predicts that IoT security requirements will reshape and expand over half of all global enterprise IT security programs by 2020 due to changes in supported platform and service scale, diversity and function. "The IoT is redrawing the lines of IT responsibilities for the enterprise," said Earl Perkins, research vice president at Gartner. "IoT objects possess the ability to change the state of the environment around them, or even their own state; for example, by raising the temperature of a room automatically once a sensor has determined it is too cold or by adjusting the flow of fluids to a patient in a hospital bed based on information about the patient's medical records. Securing the IoT expands the responsibility of the traditional IT security practice with every new identifying, sensing and communicating device that is added for each new business use case." Traditional "information" technology is now being supplemented by purpose-built, industry-specific technologies that are tailored by where and how that technology is used and what function it delivers. Information remains a key deliverable and is the fuel for IoT devices. The device's ability to identify itself (such as RFID tags that identify cargo), sense the environment (such as temperature and pressure sensors) or communicate (such as devices in ocean buoys that transmit environmental changes to the areas
  • 2. around them) requires information to be generated, communicated and/or used. Although traditional IT infrastructure is capable of many of these tasks, functions that are delivered as purpose-built platforms using embedded technology, sensors and machine- to-machine (M2M) communications for specific business use cases signal a change in the traditional concept of IT and the concept of securing IT. "This is an inflection point for security. CISOs will need to deconstruct current principles of IT security in the enterprise by re-evaluating practices and processes in light of the IoT impact," said Mr. Perkins. "Real-time, event-driven applications and nonstandard protocols will require changes to application testing, vulnerability, identity and access management (IAM) — the list goes on. Handling network scale, data transfer methods and memory usage differences will also require changes. Governance, management and operations of security functions will need to change to accommodate expanded responsibilities, similar to the ways that bring your own device (BYOD), mobile and cloud computing delivery have required changes — but on a much larger scale and in greater breadth." Although the business use cases being identified daily are indeed innovative and new, the technologies and services that deliver them are seldom new as well — they are also seldom uniform in architecture and design. Each use case risk profile has specific requirements that may result in the use of old platform and service architecture with a new technology "overlay" to improve performance and control. "This represents an interesting challenge for CISOs when delivering secure services for the IoT," said Mr. Perkins. "In some cases, it may be a 'past is future' exercise in evaluating mainframe, client/server, Web, cloud and mobile security options as part of an overall IoT business use case. Even out-of-maintenance systems such as Windows XP may still play a critical role for some industry infrastructure as part of an IoT security system. Security planners should not throw away their old security technology manuals just yet." CISOs should not automatically assume that existing security technologies and services must be replaced; instead, they should evaluate the potential of integrating new security solutions with old. Many traditional security product and service providers are already expanding their existing portfolios to incorporate basic support for embedded systems and M2M communications, including support for communications protocols, application security and IAM requirements that are specific to the IoT. "At this time, there is no 'guide to securing IoT' available that provides CISOs with a framework for incorporating IoT principles across all industries and use cases," said Mr. Perkins. "Another unique characteristic of the IoT is the sheer number of possible combinations of device technologies and services that can be applied to those use cases. What constitutes an IoT object is still up for argument, so securing the IoT is a 'moving target.' However, it is possible for CISOs to establish an interim planning strategy, one that takes advantage of the 'bottom-up' approach available today for securing the IoT." CISOs should resist the temptation to overthink security planning while patterns and solutions are still emerging. They should start small and develop initial security projects based on specific IoT interactions within specific business use cases. CISOs can build on these use case experiences to develop common security deployment scenarios, core
  • 3. architectural foundations and competency centers for the future. "The requirements for securing the IoT will be complex, forcing CISOs to use a blend of approaches from mobile and cloud architectures, combined with industrial control, automation and physical security," said Mr. Perkins. "Fortunately, many of the security requirements for the IoT will look familiar to the CISO. The technologies and services that have been used for decades to secure different eras of computing are still applicable in most cases.