Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1912158

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1912158

Internet of Threats - IoT Risk Landscape

PUBLISHED:
PAGES: 11 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

The explosive growth of the Internet of Things has led to a proliferation of low-cost, networked devices in industrial, corporate, medical, and home settings. While these systems offer convenience and ease of deployment, they often impose long-term burdens on IT security programs. Sophisticated attackers exploit IoT vulnerabilities to steal sensitive data, disrupt operations, or gain a foothold for targeting other systems. The risk is not limited to malicious behavior either; well-intentioned users who utilize these devices in the wrong context can inadvertently capture and mishandle sensitive data and cause serious compliance and regulatory issues.Because IoT risk cannot be fully eliminated, it must be managed through assessment work, security baselines and system hardening, vulnerability management, and detection and response. This paper examines emerging threats, common issues that exacerbate them, and the specific areas of IT security programs most challenged by IoT adoption. We also highlight the importance of vendor vetting within third-party risk management, and the role of market pressures in shaping product quality.Our discussion is informed by breaches that have occurred in the last two years. Recent developments include large-scale supply chain attacks and abuse of physical controls in OT systems. Organizations considering adoption of this technology will gain key assessment tools to vet these products and systems and integrate them securely into their enterprises. Teams already supporting or inheriting these devices will find actionable guidance to assess and treat the risks involved."Abuse of the monitoring and physical control capabilities of IoT solutions can expose organizations beyond utilities and manufacturing to risks that IT security programs have not previously had to contend with. To ensure safe deployment and use, it is essential to understand potential failure modes, hold vendors accountable, and implement security controls that are at least as strong as those protecting other IT assets." - Joel Sandin, adjunct research advisor, IT Executive Programs, IDC

Product Code: US54199426

Executive Snapshot

Situation Overview

  • Trends Driving Growing Risk Associated with IoT and OT
    • Factors That Increase the Likelihood of Success for Attackers
    • Factors That Increase the Severity of Impact
    • What This Means for Larger Organizations

Advice for the Technology Buyer

  • Perform Augmented Threat Modeling and Risk Assessment
  • Assess Vendor Maturity
  • Vendor Litmus Test
  • Shore Up Critical Security Programs That Support the Deployment and Management of These Systems
  • Address Gaps in Governance and Organizational Awareness

Learn More

  • Related Research
  • Synopsis
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!