Mark Benson discusses understanding and mitigating security hazards in the IoT. He outlines that IoT poses both great threats and opportunities over the next 10 years. There are three main challenges to IoT security: resource constraints of devices, novel deployment topologies across networks, and new usage modes as devices are deployed, updated and retired. Security must be designed into products from the beginning and continuously improved over time as the landscape changes. Benson advocates for establishing secure processes throughout the product lifecycle to develop secure products and maintain brand integrity.