Interop ITX 2017 Schedule Viewer

Five Ways To Prepare Your Organization to Address The Security of the Internet of Things

Interop ITX 2017 Schedule Viewer

Use this interactive agenda to get an overview of our ever-growing conference program and to sort sessions by pass type, track, day/time, and speaker. Many more sessions will be added in the weeks to come.

All SessionsSpeakersMy Schedule
View Sessions As:
  
  • Five Ways To Prepare Your Organization to Address The Security of the Internet of Things

    Speaker:
    Location:  TBD
    Format: Conference Session
    Track: Security
    Pass Type: All Access, Conference, Wednesday Conference - Get your pass now!
    Vault Recording: TBD

    The Internet of Things (IoT) exponentially expands the threat and vulnerability landscape that an organization or individual who uses them must contend with. The notion of "You are only as strong as your weakest link" takes new meaning with the introduction of IoT devices. Risk and security professionals now must include devices and items that were once considered out scope such as door locks, thermostats, digital video recorders, and appliances in their high likelihood of attack source and probable targets of attack as they perform threat their threat and vulnerability analysis activities. As with any risk and security conversation, with their will be tradeoffs that may risk based decisions at every step of development, deployment, operation, monitoring, and response for the emerging IoT world. This session will discuss five ways to prepare your organization to address this new and evolving threat vector.

    Agenda
    • What is the Internet of Things (IoT)?
    • How IoT increases the risk and security challenge
    • Five key risk and security considerations for IoT
    • Final Thoughts


    Key Takeaways
    • Why information IoT presents new risk and security challenges
    • Five Information Risk Management and Security considerations that should be accounted for when incorporating IoT solutions into a business and/or IT environment
    • Insights from case studies and operational experiences on how these capabilities greatly enhance the capabilities of organizations without enhancing their budget requirements or technology spend.

    Who Should Attend
    • Individuals who would like to understand how to effectively develop and implement information security and risk management capabilities for IoT enabled environments
    • Individuals who are seeking new approaches to information security and risk management for their IoT strategy.
    • Business leaders who are responsible for information Security and Risk Management within their organizations.
    • Information security auditors and professionals who are responsible for providing oversight to Information Risk Management and Security solutions within an organization.
    • IT Governance professionals who are developing and maturing their organizations capabilities to account for cloud computing implementations.