From the Blogosphere
Invest in IoT Without Insecurity | @ThingsExpo #IoT #M2M #API #Cloud
Successful IoT strategies are built on a digital foundation that rethinks security
By: Maria C. Horton
Jul. 12, 2016 04:25 PM
Recently, I attended Cloud Expo and @ThingsExpo in NYC (June 7-9) and I found the content to be interesting and thoughtful for companies that are planning their future success.
Like most conferences, there was a lot of chatter about IoT app development, consumer trends, and security with a smattering of privacy concerns and thoughts. More interesting to me were the sessions on identifying how to develop and bring to fruition new lines of business and how non-IT businesses may actually benefit the most from IoT. For instance, the majority of the work today in IoT is occurring in transportation, infrastructure, and environmental scenarios. Second, the marketing aspects of IoT are an important "pillar" to the success of IoT in a "Big Data" way.
With all of the Internet-connected devices, sensors and appliances establishing new or more real-time benefits, many industries like healthcare, energy, transportation, and citizen services need to address serious concerns about privacy and intellectual property protection. According to the latest public statements, the FTC believes that general authorities used to protect data privacy can cover IoT without specific new laws. Information security compliance programs such as FedRAMP and the NIST Cybersecurity Framework can help. Other known FTC regulatory findings such as the Wyndham case can offer partial guidance for the IoT and cloud markets.
Although it is still too early for any additional regulations, it is important for organizations to balance their IoT strategy with existing security and privacy standards - otherwise they risks losing their return on investment (ROI).
IoT in Focus
IoT Could Change the Security Paradigm
Due diligence suggests that the C-suite should review privacy protection claims by partners and providers to minimize liability risk. Whether physical tools, marketing dashboards or streaming data analytics, Corporate Executives and IT leaders will need to consider which streams of information result in new Intellectual Property (IP) and which can be sold as a revenue stream to partners. The likely results with IoT in use will be new information protection practices related to non-centralized computing at the "fog" and "cloud" locations.
As a result, there will be a need for creative pre-engineered defenses (NIST SP 800-160), liability mitigation awareness (NIST SP 800-171), and isolation techniques for meeting early-stage IoT business strategies and successful return on investment.
Meeting compliance standards even with guidance such as NIST and ISO will require security architecture decisions that focus on the planned and discovered revenue generators.
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week