Enterprise CISOs are used to worrying about corporate data leaks via typical mobile, remote locations, IoT and Shadow IT. But what about the vehicles used by so many people who have access to the systems and data you are paid to protect? Although those vehicles technically fall into many of those categories (mobile, remote and IoT in particular), depending on the vehicle's make and model, it could be housing phone call logs, precise history of geolocation, contacts, records of chats and email transmissions along with likely identities of people getting in and out of the vehicle, and timestamps for all of the above.
As more semi-autonomous vehicles gain popularity -- and especially as truly autonomous vehicles start to materialize in a few years -- the volume of data that these vehicles will retain will grow sharply.
There are three categories of these vehicles for CISOs to worry about:
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.