The Role of IoT in IT Risk Management
The market leader for governance, risk and compliance (GRC) applications—MetricStream—recently conducted a survey to assess the maturity of IT risk management processes, in which over 120 global companies from over 20 different industrial domains participated. Roughly 44 percent of the enterprises opined that IoT had the potential to be a game-changer in combating the top five IT threats namely, malware infections, security breaches, compliance violations and regulatory actions, account phishing, and spoofing of company employees. Participants viewed IoT, followed by cloud, BYOD, fintech, and blockchain as the technologies having the greatest potential in securing the enterprise IT environment. However, it is worth noting that IoT itself is being used for destructive purposes by the cybercriminals. The Mirai botnet that caused extensive damage to the website of American journalist Brian Krebs, or the IoTroop that shares a code base with Mirai are IoT-based. Therefore, the key to safeguarding enterprise environments lies in implementing the best practices for cyber security.
French Caldwell, chief evangelist from MetricStream, opined that an IT-powered GRC solution could provide risk intelligence on a timely basis, besides automating the workflows. Enterprises have largely moved on to software-based GRC solutions as indicated by the survey, wherein 75 percent of the respondents reported a CMMI maturity level of 3 or higher. However, among the participants from the banking sector, 52 percent admitted to having an IT risk management maturity of level 1 or level 2. This proves to be an area of concern as employees with inadequate training could unintentionally open doors for cyber threats in the banking ecosystem. The fact that account phishing and spoofing feature in the list of threats indicates a need for companies to invest more in training the employees in best practices with regard to combating cyber attacks.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....