Enterprise IoT protocols for security: Share your thoughts on Twitter

As the Internet of Things gains traction, is your organization prepared? Discuss enterprise IoT protocols for security in #CIOChat Jan. 28 at 3 p.m. EST.

2015 could be the year of the Internet of Things (IoT), if the buzz at the recent International Consumer Electronics...

Show (CES) in Las Vegas is to be believed. IoT took center stage at this year's CES, in the form of cross-collaborating technology such as self-driving cars, a smart pill box and the newest batch of wearables.

With this boom in applications and touch points, are enterprises prepared to deal with the hefty IoT security implications? Market research firm IDC isn't so confident, predicting that within two years, 90% of all IT networks will have an IoT-based security breach. So how can CIOs develop IoT security policies to protect sensitive data traversing to and from millions of sensors?

Join SearchCIO Wednesday, Jan. 28, at 3 p.m. EST to talk about enterprise IoT security protocols and the challenges around creating connected technology architectures while ensuring information privacy. Discussion may include whether the enterprise is ready to face the capacity challenges that accompany this surge of data streaming from sensorized devices, and how mesh and fog computing figure into security protocols.

SearchCIO editors will lead the event from the site's Twitter handle, @SearchCIO, joined by other TechTarget editors, writers, experts and followers. Follow the discussion hashtag, #CIOChat, to chime in.

Details:

Date: Wednesday, Jan. 28, 2015
Time: 3 p.m. EST
Host: @SearchCIO
Hashtag: Use and follow #CIOChat

Tweet chat newbies (and #CIOChat vets, too!), please review this list of tips before participating in the chat:

  • To follow the conversation, type "#CIOChat" into Twitter's search bar. From this page, select "All" to view tweets in real time.
  • Your first #CIOChat tweet should be introductory, including your name, title and organization.
  • @SearchCIO will ask a series of questions related to enterprise IoT security protocols starting at 3 p.m. EST (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#CIOChat." Include this hashtag in every tweet during the chat.
  • Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
  • Throughout the discussion, retweet (RT) and favorite tweets you concur with and reply to those you disagree with.

Please direct questions, RSVPs or other concerns to our editors. Talk to you on Twitter!

Next Steps:

Check out IDC's predictions regarding IoT cloud, security and capacity in this TotalCIO blog post

Then learn 10 ways CIOs can prepare for the IoT, according to SearchCIO Expert Harvey Koeppel.

Finally, read our recent CES 2015 coverage, focusing on the predominance of IoT.

Dig Deeper on Internet of Things (IoT) Security Strategy

Join the conversation

5 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How should companies manage IoT security protocols?
Cancel
We manage our IoT in three basic steps;
  1. Content-aware retention – We use intelligence about data including; type of data, where the data is stored, and the last time of access to index and classify the data.
  2. Secure consolidation – We securely consolidate data regardless of the sources, backing-up such data, and then making it securely accessible.
  3. Innovative access – Currently we allow access through mobile apps and file sync to name just a few.
Cancel
Abby479, question about retention: Do you practice data minimization (aka limiting the amount of data your company collects/retains and getting rid of it after a certain time period)? If so, how do you balance between that sort of practice (for security purposes) and deciding that that tossed data could potentially have benefits for your business?
Cancel
Yes, we have always limited the data we retain and how long we retain it. And yes, balancing security and data value has been a big challenge for us. We mainly address this challenge through data immutability.
In typical databases, only certain columns (keys) are protected. Data immutability requires that all critical data is stored in a single write-only system where it cannot be modified and is only deleted at a predetermined end-of-life date.
Cancel
the could data  is a security for entreprise ,the goal   have to get accees  with data  and to such  data?
Cancel

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close