The road to industrial IoT security

FABIEN MAISL | February 25, 2020

article image
One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

OTHER ARTICLES

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Article | March 11, 2020

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as financial services and healthcare, the IoT is fraught with security vulnerabilities. For retail security, the risks of deploying IoT devices are no less dire. As organizations rely more on the IoT to enable internet connection at every stage of the retail process, protecting IoT infrastructure is critical. Getting on board with the right mindset can go a long way toward achieving a win-win for retail security.

Read More

IoT Security Flaws Are Putting Your Business at Risk

Article | March 11, 2020

As industries invest in the next generation of technology, the internet of things is at the top of the list. Once a novelty best known in residential settings, IoT technology has become mainstream in business and industry. Some even predict that having a Google Home or Amazon Echo in the conference room will become the norm. Now, you will find connected devices in Amazon’s warehouse robotics system Kiva, Airbus’ Factory of the Future and the augmented reality used by Caterpillar in its Cat Connect system. The number of IoT devices in use by 2025 could reach 22 billion, according to an IoT Analytics report. They will transform manufacturing, warehouse and logistics, health care, agriculture, shipping, energy and aviation. IoT security can’t be done as an afterthought; it must be integrated into operations from Day One because connected devices and systems use cryptographic keys that transmit data. Cybercriminals can gain access through these keys, allowing them to infect devices and systems with malware, steal data or shut down systems. Sometimes, the vulnerability has gone undetected for months.

Read More

5 Ways the Internet of Things is Changing the Game for Education and Learning

Article | March 11, 2020

There’s been so much buzz about the Internet of Things (IoT) in the past couple of years. For today’s youngsters, the day will come when a computer is no longer seen as a separate object or device. With technology very much entwined in the basic fabric of everyday living, our children might feel offended if their obedient room lamp doesn’t immediately acknowledge their presence by switching itself on. Over time, IoT will be a mindset rather than a steady stream of technology. Even though every other device in our homes, workplaces, or surrounding environments will be intelligent enough to connect and talk to each other, people will inevitably focus on the transformational possibilities for our world.

Read More

IoT Security: Inherent Risks Require Robust Solutions

Article | March 11, 2020

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

Events