What’s the biggest threat to the industrial internet of things (IIoT) space?
Director of Information Security Operations in Consumer Goods, 1,001 - 5,000 employees
Inherently insecure OT networks: Complex and widely distributed architecture, limited OT visibility, and inadequate security controls gave attackers hundreds of possible entry points into companies OT networks. As a result, small-scale attacks usually can go unnoticed despite aggregating substantial damage—and posing substantial risks to OT availability, safety, and reliability—over time. Head of IT and Security in Finance (non-banking), 51 - 200 employees
Basically the impact mostly depends on the type of industry but I would assume device hijacking would definetly be a serious threat.CIO/CISO in Healthcare and Biotech, 11 - 50 employees
Lack of security control standards around IoT. Multiple operating systems and firmware types make it difficult to prescribe one single standard coverage strategy for most of these devices.Director, Information Security Engineering and Operations in Manufacturing, 5,001 - 10,000 employees
Probably the mindset that they are not as exposed as they really are.Content you might like
Increased55%
Decreased25%
No change20%
249 PARTICIPANTS
Head of Information Security in Services (non-Government), 1,001 - 5,000 employees
You need to tell people what to expect and what not to expect from IT. We’ve tried to train people to expect that IT will do certain things or make requests which are okay to comply with, but IT will never call you out of ...read moreCTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.Head of Information Security in Services (non-Government), 1,001 - 5,000 employees
It depends on how good the solution is at addressing your security needs. I lean towards simplifying the security stack, but in some cases existing solutions just don't provide the level of security that you need. If ...read moreYes, all employees31%
Yes, but only for some employees53%
No15%
I’m not sure…1%
85 PARTICIPANTS
The challenge is that native-level protection is difficult. It requires an in-depth understanding of the network, protocols, devices and the settings of those devices. If you consider Stuxnet, the fanciest part of that attack, from the ICS perspective, was a settings change on the centrifuge controllers. That change took the target out of its normal range of operation in terms of a numerical value. There was nothing on the network that could prevent that numerical value from surpassing an acceptable threshold. And that led to physical damage.