Intelligent CIO Middle East Issue 06 | Page 84

EDITOR ’ S QUESTION

Raj Samani

VP & CTO , EMEA , Intel Security
The Internet of Things . A term which conjures up images of everything from cars to medical equipment being compromised by nefarious actors for criminal gain . Certainly , the inclusion of IP connectivity of everything with power does represent a risk , but the reporting of vulnerabilities does create a level of fear that one can argue as somewhat overstated .
Every system will have vulnerabilities , the question is whether these vulnerabilities will be exploited causing the loss of confidentiality , integrity or disruption for the enterprise . In the past , basic risk assessments would consider the capability of actor groups to determine the probability of a risk being realized . This model however is very much outdated , particularly as attacks are now outsourced , from particular modules to the entire attack itself .
For enterprises looking to integrate IoT into their environment , the fundamental question to ask is what business benefit are you trying to derive , and whether the risk ( and there will always be a risk ) can be managed to a level that is acceptable . Consider the Oil and Gas industry , a recent IoT implementation into the world of digital oilfields has increased production by 150 % for a company within the region . This does introduce a risk of potentially allowing more malicious actors to target this infrastructure , but can be managed to reduce the likelihood by considering integrated security solutions that protect , detect and correct , into the design of both greenfield and brownfield installations . Not only is security by design imperative , so too is continuous analysis of the threat landscape to keep ahead of malicious actors .
For CIOs considering the deployment of IoT within their environment , the biggest concern will be the concept of shadow- IoT . We have seen shadow-IT already cause significant disruption within many organizations , but IoT will introduce many more devices inside the corporate network . These devices will be capturing data and sending it , well , everywhere !
Managing risk for IoT devices can be done , but managing risk demands knowing what is inside the environment , what data will be collected , and where ( and how ) it will be transmitted . Understanding this component is the first step for every CIO .
84 INTELLIGENTCIO www . intelligentcio . com