Purchase this Document
Price: $195.00 USD (PAGES: 7)
To purchase this document, you will need to register or sign in above.
The Internet of Things redefines security by expanding the scope of responsibility into new platforms, services and directions. CISOs should focus existing security resources on specific use cases to identify new patterns for Internet of Things security solutions.
Table of Contents
Impacts and Recommendations
The power of an IoT object to change the state of environments — in addition to generating information — will cause CISOs to redefine the scope of their security efforts beyond present responsibilities
Most IoT devices and services may be Nexus of Forces-based, but CISOs will be dealing simultaneously with all past eras of technology to secure the necessary scale and complexity that an IoT world demands
IoT security needs will be driven by specific business uses cases that are resistant to categorization, compelling CISOs to prioritize security implementations of IoT scenarios by tactical risk
The requirements for securing the IoT will be complex, forcing CISOs to use a blend of approaches from mobile and cloud architectures, combined with industrial control, automation and physical security
- The power of an IoT object to change the state of environments — in addition to generating information — will cause CISOs to redefine the scope of their security efforts beyond present responsibilities
Gartner Recommended Reading