CIO Magazine recently distributed an email promoting its “FutureEdge 50 Awards” with a playfully sinister line: I know what you did last summer... in IT... during the pandemic. Now get rewarded for your work. The plug is a reference to the campy late-‘90s slasher...
Internet of Things (IoT)
Is the New Federal IoT Law a Sign?
During the three years it took for the IoT Cyber Security Improvement Act of 2020 to complete its legislative journey, more than 11.8 billion devices were connected to the Internet. That’s a decidedly conservative estimate of IoT device growth, one based on former...
Third Party Risks – A Cascading Convergence – 2021 Perspectives
In a recent report on the future of cybersecurity risks, The Wall Street Journal published a Top 10 list of systems and devices that hackers will attack in the coming decade. Santa Fe Group Senior Advisor Charlie Miller has been talking about most of these targets for...
Risk Questions for IoT Products and Services
October is Cybersecurity Awareness Month – in step with this first week’s focus on internet-connected devices and “empowering users to own their role in security by taking steps to reduce risks,” this blogpost examines what enterprise organizations need to understand...
IoT Risk Due Diligence Questions
We’ve been fielding many IoT (Internet of Things) questions this summer. Organizations who already use the SIG tool in their TPRM programs and organizations evaluating the SIG tool have asked us about the proper lines of inquiry around IoT. What questions do we need...
2020 Perspectives on IoT Risks, Insurance and More
As a PBS FRONTLINE documentary on artificial intelligence (AI) recounts, the technology started capturing widespread attention when AI systems began trouncing human competitors in complex games like Go. This year, says Santa Fe Group Senior Advisor Charlie Miller, AI...
Going Back 2 Cali: The Golden State Passes Two New Data Privacy/Security Laws
The California State Legislature recently completed a data privacy/data security two-step by passing two new laws with significant third party risk management implications for a broad collection of companies. In late September, California enacted what some are...
5 Steps to Take Now to Protect Against Emerging IoT Threats
Shared Assessment’s just published Ponemon research report The Internet of Things (IoT): A new Era of Third Party Risk provides a great snapshot of current IoT Risk management both within an organization’s four walls and with the third parties that so often support...
Internet of Things (IoT) and Third-Party Risk
In our digital age, everything is connected. Cars can drive themselves, Planes can fly themselves, and your Refrigerator can use the internet to tell you if you are out of milk and eggs when you are at the grocery store. The era of connectivity and immediacy of data...
Third Party IoT Security: Interpreting Survey Results in the Context of a Shifting Security Paradigm
Shared Assessment’s just published Ponemon research report The Internet of Things (IoT): A new Era of Third Party Risk provides a great snapshot of current IoT Risk management both within an organization’s four walls and with the third parties that so often support...