Today's enterprise networks are supporting devices that were never meant to have Internet or wireless connections. Printers, entertainment units, HVAC and building alarms, medical instruments (some of those implanted in humans), power control systems, refrigeration units, even cars--all are getting smarter with embedded chips and Internet or wireless connections. The Internet of Things includes software, firmware or hardware used to control, manage or monitor the performance of these and other connected Things. The effectiveness and efficiency of these systems is being greatly multiplied by both client/server and peer-to peer-connectivity, enabled by advances in new forms of connectivity, inexpensive controllers and Internet-standard protocols.
Increasingly, researchers are revealing the weaknesses in the communications channels and chip-embedded systems that support these Things--weaknesses that could be used to take advantage of these devices and cause harm. Meanwhile the IP addresses to embedded devices are also turning up in honeypot sensors collecting information on malware. The concern is worrisome enough for former Vice President Dick Cheney to ask his doctor to turn off the wireless communications to his embedded heart defibrillator, as reported on 60 Minutes in October.
What awareness do IT organizations have around what connected devices are being deployed, used, connected or supported in their businesses? Are those devices coming under the management of IT security professionals? And if so, how they are managing them?
Attend this webcast and learn how others are managing the risks introduced by an increasing array of "smart" things with wireless or Internet connections. Register for the Live! webcast and receive a link to an advanced copy of the full report.
Click here to view the associated whitepaper.""