Mounting IIoT cyber risks must be addressed now to prevent catastrophe: report | SC Media

Mounting IIoT cyber risks must be addressed now to prevent catastrophe: report

July 7, 2020
  • Always consider harm consequences when planning how to manage risks
  • Consider how security controls may fail as you increase use of IoT devices
  • Use techniques that can provide you with a continuous assessment of your position (near real-time) as opposed to periodic assessments
  • Consider how your supply-chains are using IoT: consider their failure to maintain cyber security as risk to your security risk management plans
  • Invest in forensic readiness processes
  • Include a consideration of future scenarios in your risk assessments
  • Invest in training for staff on IoT standards and good practice
  • Collaborate to establish a device interface protocol for sharing security monitoring information
prestitial ad