Gartner Blog Network


On Demand | Securing IoT An Architectural and Risk-Driven Approach

by Erik T. Heidt  |  December 27, 2017  |  Comments Off on On Demand | Securing IoT An Architectural and Risk-Driven Approach

Thanks to everyone who participated the Webinar. “Securing the Internet of Things: An Architectural and Risk-Driven Approach” is now available on-demand, here is the link.

Security is a top concern and significant inhibitor to Internet of Things (IoT) adoption. In this Webinar, we identified the major architectural components of IoT architecture and perform risk analysis of each. We will focus on examining security within the Edge. A model of breaking down Edge systems into architectural components that are suited for security analysis will be provided.

Specific subjects we discussed:

  • The role of threat modeling and threat panels in the risk assessment processes
  • The architecture of IoT using the Edge-Platform-Enterprise Gartner model
  • Approaches to securing Edge, Platform and Enterprise components

During the Webinar we had three polls:

Polls

 

The first two polls where at the beginning. Organic adoption of IoT is a major challenge, so it is not surprising that 22% of the participants are adopters vs. developers. The webinar is primarily focused at teams that are developing solutions, but can provide a baseline expectation for adopters. (Anticipate some GTP research for adopters in the first half of 2018.)

Note that the final question was at the end, and based on the concerns that were raised during the presentation and these results reflect the issues we focused on.

Thanks,
Erik

https://www.gartner.com/webinar/3824265

Category: internet-of-things  real-world-information-security  risk-management  security  

Erik T. Heidt
IoT Agenda Manager, Research VP
5 years at Gartner
26 years IT Industry

Erik Heidt is the IoT Research Agenda Manager for Gartner for Technical Professionals (GTP). Mr. Heidt covers Internet of Things (IoT) architecture, strategy and execution as well as security and risk management within the IoT context. Mr. Heidt focuses on developing and delivering research related to the architecture, development and operation of IoT for both users and suppliers. Mr. Heidt has more than 26 years of industry experience, with a significant focus on information security and risk management. Read Full Bio




Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.