Internet of Threats — IoT Risk Landscape
Description
The explosive growth of the Internet of Things has led to a proliferation of low-cost, networked devices in industrial, corporate, medical, and home settings. While these systems offer convenience and ease of deployment, they often impose long-term burdens on IT security programs. Sophisticated attackers exploit IoT vulnerabilities to steal sensitive data, disrupt operations, or gain a foothold for targeting other systems. The risk is not limited to malicious behavior either; well-intentioned users who utilize these devices in the wrong context can inadvertently capture and mishandle sensitive data and cause serious compliance and regulatory issues.Because IoT risk cannot be fully eliminated, it must be managed through assessment work, security baselines and system hardening, vulnerability management, and detection and response. This paper examines emerging threats, common issues that exacerbate them, and the specific areas of IT security programs most challenged by IoT adoption. We also highlight the importance of vendor vetting within third-party risk management, and the role of market pressures in shaping product quality.Our discussion is informed by breaches that have occurred in the last two years. Recent developments include large-scale supply chain attacks and abuse of physical controls in OT systems. Organizations considering adoption of this technology will gain key assessment tools to vet these products and systems and integrate them securely into their enterprises. Teams already supporting or inheriting these devices will find actionable guidance to assess and treat the risks involved."Abuse of the monitoring and physical control capabilities of IoT solutions can expose organizations beyond utilities and manufacturing to risks that IT security programs have not previously had to contend with. To ensure safe deployment and use, it is essential to understand potential failure modes, hold vendors accountable, and implement security controls that are at least as strong as those protecting other IT assets." — Joel Sandin, adjunct research advisor, IT Executive Programs, IDC
Table of Contents
11 Pages
Executive Snapshot
Situation Overview
Trends Driving Growing Risk Associated with IoT and OT
Factors That Increase the Likelihood of Success for Attackers
Factors That Increase the Severity of Impact
What This Means for Larger Organizations
Advice for the Technology Buyer
Perform Augmented Threat Modeling and Risk Assessment
Assess Vendor Maturity
Vendor Litmus Test
Shore Up Critical Security Programs That Support the Deployment and Management of These Systems
Address Gaps in Governance and Organizational Awareness
Learn More
Related Research
Synopsis
Search Inside Report
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.
