by Erik T. Heidt | December 27, 2017 | Comments Off on On Demand | Securing IoT An Architectural and Risk-Driven Approach
Thanks to everyone who participated the Webinar. “Securing the Internet of Things: An Architectural and Risk-Driven Approach” is now available on-demand, here is the link.
Security is a top concern and significant inhibitor to Internet of Things (IoT) adoption. In this Webinar, we identified the major architectural components of IoT architecture and perform risk analysis of each. We will focus on examining security within the Edge. A model of breaking down Edge systems into architectural components that are suited for security analysis will be provided.
Specific subjects we discussed:
- The role of threat modeling and threat panels in the risk assessment processes
- The architecture of IoT using the Edge-Platform-Enterprise Gartner model
- Approaches to securing Edge, Platform and Enterprise components
During the Webinar we had three polls:
The first two polls where at the beginning. Organic adoption of IoT is a major challenge, so it is not surprising that 22% of the participants are adopters vs. developers. The webinar is primarily focused at teams that are developing solutions, but can provide a baseline expectation for adopters. (Anticipate some GTP research for adopters in the first half of 2018.)
Note that the final question was at the end, and based on the concerns that were raised during the presentation and these results reflect the issues we focused on.
Read Complimentary Relevant Research
Securing the Internet of Things
IoT creates a pervasive digital presence connecting organizations and society as a whole. New actors include data scientists; external...
View Relevant Webinars
Top Predictions 2017 and Beyond: Surviving the Storm Winds of Digital Disruption
The evolution of technologies in the era of digital is supporting three business movements that are reshaping the way people and businesses...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.