• Whitepaper in Education

An overview of the IoT threat landscape with risk-based security program recommendations

Whitepaper Courtsey of CISCO

Business and operational teams are responding to security and compliance challenges as networks evolve from closed systems to Internet-enabled operational technology (OT) connectivity. Facilities continue to be networked and Internet of Things (IoT) endpoints proliferate as the technology opens new opportunities for increased efficiency and operational effectiveness. Yet extensive legacy hardware and software that are not designed to address security dominate existing systems. These legacy systems were often deployed before security requirements were a mainstream issue and often cannot be readily patched or upgraded to support modern
security controls. Meanwhile, with this backdrop, energy, manufacturing, smart cities, and transportation are facing ever more sophisticated, widespread and persistent threats, and the potential for significant economic damage and real world physical impact such as process shutdown, power grid interruption and physical injury.