- Take note of every network endpoint added. Every endpoint added to your network creates more areas through which cybercriminals can attack. Deloitte advises organizations to bring as much of their endpoint footprint as possible under their security management. Spending on IoT endpoint security is expected to rise to more than $630 million in 2021, according to Gartner analysts. Once more of these connected devices are properly managed, integrating security tools can become a more effective process.
- Align operational technology, IT, and security. In addition to deploying IoT devices, organizations are managing digital transformation projects at the same time. But less than 10% of cyber budgets are allocated to these efforts, according to a "Deloitte Future of Cyber" study. To successfully achieve their goals with their IoT initiatives, companies need to understand the enterprise and cyber risks, create a plan to prioritize and mitigate those risks, and then align the process across all the major stakeholders, including operational technology, IT, and cybersecurity. "IoT spans operational environments as much as it includes wearables, connected cars, and products." Peasley said. "Organizations should proactively plan for how to identify, track, patch, and remediate around how it all could impact their organizations and ecosystems."
- Know the players in your ecosystem. The interconnectivity of third-party hardware, software, or services could be the source of a security breach. Therefore, organizations need to consider how a connected device interacts with these third parties. Contracts with third, fourth, and fifth parties should address security updates and concerns. Organizations should also set up a third-party risk management program to evaluate the cyber risks of their third-party and supply chain partners
- Employ artificial intelligence and machine learning to detect anomalies that humans cannot. Artificial intelligence for IT operations (AIOps) has grown from an emerging category into a necessity for IT. AIOps platforms are uniquely suited for establishing a baseline for normal behavior and for detecting subtle deviations, anomalies, and trends. Organizations should take a secure by design approach in tandem with an AIOps approach to prevent and identify cyber attacks.
- Conduct vulnerability assessments on devices. As cyberattacks continue to grow, organizations should ensure that their connected devices — and the environment in which they're deployed — have been designed, built, and implemented with security in mind. Whether through basic testing or a bug bounty program, testing can provide assurance of the security protections in place for connected devices.