IoT Threat Intelligence

Add bookmark

True threat intelligence involved collaboration with peers in industry, cross industry, with law enforcement and with regulatory bodies. It is understood that to call it “intelligence,” TI has to be a public/private community effort. TI also has to be a human/machine community effort. 

Gopal shares how IoT Threat Intelligence is evolving.

Gopal Padinjaruveetil, Chief Information Security Officer, The AAA Auto Club shares how IoT Threat Intelligence is evolving. Here’s the baseline of where the conversation will launch from:

  • What is the Internet of Things (IoT)

Gopal first provides a definition of IoT that showcases connectivity. Whereas heretofore, connectivity has brought humans together with information and other humans- the Internet of Things provides connectivity of humans to machines and vice versa.

  • Providing intelligence to non-living things comes with a cost

That connectivity leads to information. And with the assistance of cognitive technologies- a machine can distill insights and even potentially act on those insights. That activity can be construed as intelligence. 

  • Ascertaining the implications of the explosion of devices coming online

Earth already boasts 50 billion connected devices. That number increases exponentially as 5G becomes a reality.

  • Understanding the unintended consequences of granting access to IoT ‘users’

Identity is the new perimeter. And many cyber security organizations have PAM, IAM and a basic layer of Zero Trust in place. But nearly all organizations that have solved for the identity perimeter have done so only for humans. Machines have their own identity and need to be treated as users as well.

  • Grappling with the implications of the totality of the four dimensions of IoT

The four dimensions: Sensors/devices; Connectivity; Data processing; User interface

  • Continuing to evolve with IoT developments 

Gopal shares his knowledge on each piece above as well as how fellow CISOs can think about IOT threat intelligence in a different way than human threat intelligence.

Join him at the Cyber Security Hub Threat Intelligence Summit March 16-17.

Leave a Reply