Professional Documents
Culture Documents
13
1
Implement a
BYOD policy.
Source
2
It all starts with the
manufacturers.
Source
3
Dont be
in a rush.
Source
4
Add on layers
of security.
Source
5
Integrate security into
your development
lifecycle.
Companies that
produce IoT devices
need to ensure that
they have a solid
software development
lifecycle that is inclusive
of security testing.
Source
6
Automation
is key.
Source
7
Integration of cyber
threat intelligence.
Source
8
Security starts with
proper training.
Enterprises need to
approach IoT security
bottoms up by re-training
software developers:
their own and their
supply chain, ecosystem
stakeholders.
Source
9
Stop the
negligence.
Source
10
Oceans of
the internet.
Asking how to
theft-proof electronic
information in the
Internet of things is like
asking how to protect
your ships against Pirates
and Vikings during the
11th and 12th century.
Source