
The Role of IoT in IT Risk Management
The market leader for governance, risk and compliance (GRC) applications—MetricStream—recently conducted a survey to assess the maturity of IT risk management processes, in which over 120 global companies from over 20 different industrial domains participated. Roughly 44 percent of the enterprises opined that IoT had the potential to be a game-changer in combating the top five IT threats namely, malware infections, security breaches, compliance violations and regulatory actions, account phishing, and spoofing of company employees. Participants viewed IoT, followed by cloud, BYOD, fintech, and blockchain as the technologies having the greatest potential in securing the enterprise IT environment. However, it is worth noting that IoT itself is being used for destructive purposes by the cybercriminals. The Mirai botnet that caused extensive damage to the website of American journalist Brian Krebs, or the IoTroop that shares a code base with Mirai are IoT-based. Therefore, the key to safeguarding enterprise environments lies in implementing the best practices for cyber security.
CheckThis Out: Top Risk Management Companies
French Caldwell, chief evangelist from MetricStream, opined that an IT-powered GRC solution could provide risk intelligence on a timely basis, besides automating the workflows. Enterprises have largely moved on to software-based GRC solutions as indicated by the survey, wherein 75 percent of the respondents reported a CMMI maturity level of 3 or higher. However, among the participants from the banking sector, 52 percent admitted to having an IT risk management maturity of level 1 or level 2. This proves to be an area of concern as employees with inadequate training could unintentionally open doors for cyber threats in the banking ecosystem. The fact that account phishing and spoofing feature in the list of threats indicates a need for companies to invest more in training the employees in best practices with regard to combating cyber attacks.
Featured Vendors
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
