Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Drop the IT-Centric mindset: Securing IoT networks requires new thinking

Sugiarto Koh, Director for Cisco’s Security business in ASEAN | Feb. 5, 2015
Securing IoT networks must go beyond today's thinking. Rather than focusing on the individual security devices, they need to be networked, so that they can work together to produce comprehensive, actionable security intelligence.

Securing IoT networks must go beyond today's thinking. Rather than focusing on the individual security devices, they need to be networked, so that they can work together to produce comprehensive, actionable security intelligence. By combining numerous systems, including cyber and physical security solutions, IoT-enabled security can improve employee safety and protect the entire system from the outside, as well as the inside. As a best practice, IT should maintain centralised management over the entire security solution, but with a high level of understanding of the specific needs of OT. Based on that understanding, they need to enforce differentiated security policies to meet those specific needs and provide localised control over critical OT systems.

Singapore recognises that in order to secure our nation's connected future, different stakeholders who will be impacted by the implementation of IoT will need to participate in the formulation and execution of security initiatives. This is why one of the key areas of development in Singapore's National Cyber Security Masterplan 2018[2] is to enhance the security and resilience of its critical infrastructure as a whole by improving cross-sector response to cyber threats. Singapore is also exploring new channels to educate the wider audience on cyber security as the unprecedented level of connectivity brought about by IoT will expose employees, regardless of their roles, to cyber threats. With IT, OT and other stakeholders working together to secure IoTapplications, organisations will be able to drive truly pervasive, customised security across the extended network.


[1]http://www.ida.gov.sg/blog/insg/featured/2014-building-a-smart-nation/

[2]http://www.ida.gov.sg/~/media/Files/Collaboration%20Initiatives/Initiatives/2014/ncsm2018/NationalCyberSecurityMasterplan%202018.pdf

 

Previous Page  1  2 

Sign up for Computerworld eNewsletters.