The expanding network of consumer-driven technology and the Internet of Things (IoT), which allows devices, buildings, vehicles, and other physical objects equipped with software and connectivity capabilities to work together to collect and share data, is creating greater risk for companies. An AT&T survey revealed that close to 60 percent of businesses polled reported a lack of confidence in connected-device security. And, according to Verizon’s 2017 Data Breach Digest compromised cybersecurity is becoming more complex and can affect every department within a business. As connectivity grows, so should questions about how organizations can identify threats and guard against vulnerabilities that could lead to legal risks related to privacy, encryption, and data breaches. The IoT Cybersecurity Alliance, a new group including representatives from AT&T, IBM, Nokia, Palo Alto Networks, Symantec, and Trustonic, is currently exploring how to manage this growing concern. Consider, too, that WikiLeaks has said the Central Intelligence Agency’s (CIA) hacking abilities allow it to tap into smartphones, smart TVs, and other every day gadgets. If the CIA can do it, who else can? This session will focus on what cybersecurity thought leaders are doing to assist companies with protecting their cyber assets amid the IoT superhighway.
- Recommended multi-layer approaches for minimizing IoT-related data security risks
- Why businesses struggle to lock down end-point security and what legally can be done about it
- Common ways security issues may arise as a result of data/application, cloud, and connectivity layers
- The latest types of threat analytics being used to evaluate IoT security
- Strategies for developing a legal, “bottom up” approach to device- or node-based security
- How to evaluate how much “control” you really have over a device
- How penetration-test and threat-modeling exercises work for engaging in proactive cybersecurity testing
- Best practices for working with IT to develop and implement policies and employee training on how security vulnerabilities arise
Learn more about the Advanced Employment Issues Symposium.