Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec

IoT risk management guidelines

ISACA : 29 January, 2015  (Technical Article)
ISACA issues a set of guidelines on how to manage risk associated with connected devices in the Internet of Things
IoT risk management guidelines

As connected devices infiltrate the workplace, some with the IT department’s knowledge and some without, both value and risk can increase significantly. Global IT association ISACA has released new guidance urging companies to ask nine critical questions as they grapple with the Internet of Things (IoT).

ISACA recommends companies address:

* How will the device be used from a business perspective, and what business value is expected?
* What threats are anticipated, and how will they be mitigated?
* Who will have access to the device, and how will their identities be established and proven?
* What is the process for updating the device in the event of an attack or vulnerability?
* Who is responsible for monitoring new attacks or vulnerabilities pertaining to the device?
* Have risk scenarios been evaluated and compared to anticipated business value?
* What personal information is collected, stored and/or processed by the IoT device?
* Do the individuals whose information is being collected know that it is being collected and used, and have they given consent?
* With whom will the data be shared?

These questions are particularly critical given that 43 percent of enterprises are using IoT already, or have plans to do so in 2015, according to ISACA’s IT Risk/Reward Barometer survey.

“Connected devices are everywhere—from obvious ones, like smart watches and Internet-enabled cars, to ones most people may not even be aware of, such as smoke detectors,” said Robert Stroud, CGEIT, CRISC, international president of ISACA and vice president of strategy and innovation at CA Technologies. “Often, organizations can be using IoT without even realizing it—which means their risk management stakeholders are not involved and potential attack vectors are going unmonitored.”

ISACA’s free “Internet of Things:  Risk and Value Considerations” guide is available as a free download. The paper includes dos and don’ts for the IoT, and outlines the types of risks organizations must consider. The guide is the first in a series of IoT papers that will address security, privacy, compliance and assurance issues.

Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo