How will security practices for internet of things (IoT) devices evolve?

2.2k views1 Upvote8 Comments
Sort By:
Oldest
SVP, Chief Information Security Officer in Education2 years ago
When we start to get native, protocol-level attacks on industrial internet of things (IIoT) and IoT devices, it will be interesting to see how the players in this space will react. They're going to realize that their products cannot stop those attacks. Even if you have a traditional next generation firewall (NGFW), for instance, someone could create a denial-of-service attack using native, valid, DNP3 functions. I wrote a lot of the offensive code when we were designing security for the products at Bayshore Networks, so I know that can happen. Those NGFWs would see this DNP3 traffic and just let it through. While there are architectural dynamics involved, and it's not a black and white situation, native protection of these environments is going to be critical.

Director of Information Security in Services (non-Government)2 years ago
IOT devices is a challenge to manage and protect. Some (if not most) of these are in critical infrastructure / applications and also remote unmanageable locations, very challenging to remediate vulnerabilities at a short notice. IOT vendors will definitely make advances to a certain extent, but its always going to be a challenge.
1
HEAD IT in Consumer Goods2 years ago
Cyber security is a big challange for IoT applications . IOT device and device related data contain both personal data along with  connected devices data too. So proper planning of security and education about securtiy across  the organization is very essential. It should be top driven and give immense priority in all process and program of organization. 
So maintaining data lifecycle, variable encryption process, protocol level policy, device recycling policy after data erase etc must be in place.  
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Director, Information Technology in Transportation2 years ago
I think the security tools currently in use for commercial entities like CarbonBlack, Darktrace and managed EDR will move into the consumer space to protect household networks.  Perhaps similar to how alarm companies migrated from the commercial to consumer space 25 years ago.

Home networks are not going to become simpler or less critical and cyber criminals are not going to become less creative or persistent; so, the natural response will be more robust protection for consumer grade networks and endpoints.
Senior Information Security Manager in Software2 years ago
Too many firms don’t focus on the core security issues to secure their IoT infrastructure.

It’s not about evolving threats. It is dealing with current threats.

With that, security is almost always behind the curve as attackers have the advantage of, and the security teams have to defend against it.

Content you might like

VP of IT in Retail3 days ago
My previous organization implemented a strict one-strike policy for lost or damaged devices. While the first incident was considered an accident, repeat offenders were required to reimburse the company for the lost or damaged ...read more
82 views1 Comment

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
IT Manager in Constructiona month ago
Hello,
the topic is so broad, what are you focused on?
Read More Comments
4.8k views2 Upvotes5 Comments
Sr. Director, Enterprise Applications and IT Services6 days ago
These worked for us:

Stakeholder Engagement - Engage all relevant stakeholders early and continuously throughout the procurement process. 

Adaptible Contracting - Use contracting methods that allow for adjustments ...read more
1
724 views1 Comment

Human Factors (fears, mental health, physical spacing)85%

Technical / IT Factors (on-premise tools, pivoting back away from remote)14%

3.7k views3 Upvotes2 Comments