Sergey Nivens - Fotolia

Enterprise IoT protocols for security: Share your thoughts on Twitter

As the Internet of Things gains traction, is your organization prepared? Discuss enterprise IoT protocols for security in #CIOChat Jan. 28 at 3 p.m. EST.

2015 could be the year of the Internet of Things (IoT), if the buzz at the recent International Consumer Electronics Show (CES) in Las Vegas is to be believed. IoT took center stage at this year's CES, in the form of cross-collaborating technology such as self-driving cars, a smart pill box and the newest batch of wearables.

With this boom in applications and touch points, are enterprises prepared to deal with the hefty IoT security implications? Market research firm IDC isn't so confident, predicting that within two years, 90% of all IT networks will have an IoT-based security breach. So how can CIOs develop IoT security policies to protect sensitive data traversing to and from millions of sensors?

Join SearchCIO Wednesday, Jan. 28, at 3 p.m. EST to talk about enterprise IoT security protocols and the challenges around creating connected technology architectures while ensuring information privacy. Discussion may include whether the enterprise is ready to face the capacity challenges that accompany this surge of data streaming from sensorized devices, and how mesh and fog computing figure into security protocols.

SearchCIO editors will lead the event from the site's Twitter handle, @SearchCIO, joined by other TechTarget editors, writers, experts and followers. Follow the discussion hashtag, #CIOChat, to chime in.


Date: Wednesday, Jan. 28, 2015
Time: 3 p.m. EST
Host: @SearchCIO
Hashtag: Use and follow #CIOChat

Tweet chat newbies (and #CIOChat vets, too!), please review this list of tips before participating in the chat:

  • To follow the conversation, type "#CIOChat" into Twitter's search bar. From this page, select "All" to view tweets in real time.
  • Your first #CIOChat tweet should be introductory, including your name, title and organization.
  • @SearchCIO will ask a series of questions related to enterprise IoT security protocols starting at 3 p.m. EST (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#CIOChat." Include this hashtag in every tweet during the chat.
  • Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
  • Throughout the discussion, retweet (RT) and favorite tweets you concur with and reply to those you disagree with.

Please direct questions, RSVPs or other concerns to our editors. Talk to you on Twitter!

Next Steps:

Check out IDC's predictions regarding IoT cloud, security and capacity in this TotalCIO blog post

Then learn 10 ways CIOs can prepare for the IoT, according to SearchCIO Expert Harvey Koeppel.

Finally, read our recent CES 2015 coverage, focusing on the predominance of IoT.

Dig Deeper on Internet of Things (IoT) Security Strategy