https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Arlette Hart, CISO, FBI at TechXLR8

FBI Cybersecurity Chief: How to Stop IoT Getting Out of Hand

Arlette Hart, chief information security officer for the FBI, took the stage at TechXLR8 in London last week to share her main cybersecurity concerns as the world gets evermore connected.
  • Written by Jeremy Coward
  • 22nd June 2017

When companies design and develop IoT products, they often think and act in a microcosm. The eventual impact on the world at large is a secondary concern—and that’s the root of many of the world’s biggest cybersecurity issues today, FBI CISO Arlette Hart told her audience on the IoT World Europe stage at TechXLR8 last week.

“Connections are myriad and unexpected,” she explained. “They mirror how we think, not how we plan.” Every company might start with the best intentions of making their inventions and connected networks impenetrable—until this priority conflicts with achieving return on investment or beating a competitor to market. By the time these devices join the wider budding IoT ecosystem, keeping the desired level of security is easier said than done.

Three Cybersecurity Mantras, Relevant Worldwide

The FBI cybersecurity chief’s presentation broke down conveniently into three sections that aptly explain where the world is falling short at cybersecurity right now. As with most great keynote talks, each section was summarised into a concise, pithy statement.

“Cool trumps safe. Every single time.“

It’s hardly breaking news that cybersecurity is often an afterthought, particularly with technology products aimed at everyday consumers. Their makers prioritize “coolness” over safety, even more so since flashy IoT devices started making headlines. And despite several high-profile cyberattacks on devices like this in 2016, attitudes are changing at a glacial pace.

Hart noted that, while far from flawless, the U.S. federal government is more cautious with its data and technology, as are most other government bodies and industrial enterprises. She encouraged her audience to follow suit. “Technology doesn’t care” whether it’s being used by the correct people or for its original purpose, she said. Therefore, this responsibility lies with the technology’s makers and owners.

“Unintended consequences lead to intentional compromises.”

Next, Hart pointed to the bizarre reality we live in, where Furbys join mobile phones, computers and radios on the list of devices that can be compromised and used to illegally obtain data. In 1999, the National Security Agency allegedly banned Furbys from its offices, labeling them a threat to national security. This concern appears even more relevant today, as the smart toys market alone is a multibillion-dollar industry, churning out connected products capable of gathering way more information than the average consumer might expect. 

Smart features might give the products in question a nice unique selling proposition, but the addition of unnecessary capabilities is rarely justified once the full scale of potential ramifications is considered. Target’s infamous breach occurred when hackers found a back door into its key corporate systems—via an Internet-connected air conditioner. Hart gave this as a prime example of how connectivity can be taken too far, at great cost.

She said cybersecurity personnel need to wholly own every part of their company’s network and make the final call on which devices need to be connected and which do not. “The capabilities should do what they are intended to do, and nothing else,” she summarized.

“If you don’t hear about incidents, that doesn’t mean they aren’t happening.”

This topped Hart’s list of widespread cybersecurity myths. Even people who read about hacks and attacks in the news seem unlikely to apply the lessons learned until they themselves or their companies are directly targeted by hackers.

“If I don’t see security, it’s working well” is another misconception many companies suffer from, Hart said. Too many decision makers assume their cybersecurity is being sufficiently maintained and updated when it isn’t, and that when a product or system is cutting-edge, that means it’s breach-proof.

Once a company has recognized it may be vulnerable, there’s one final myth that plenty fall back on: “We’ll figure it all out.” Gartner’s claim that between now and 2020, 99% of exploited vulnerabilities will be ones previously known to security and IT professionals, refutes that myth. Identifying vulnerabilities is the initial step in a continuous, cautious process of education that the whole organization needs to buy into.

What the Future Holds

Hart closed with suggestions for what companies using IoT should do next. “Five years in federal government might be a million years in the world of IoT,” the FBI cybersecurity head said. The agency and other government bodies understand the threat an insecure Internet of Things poses, but imposing legislation and standards globally will be a long and difficult process. Industry moves at a pace that government can’t keep up with; industry players must take matters into their own hands and not turn a blind eye to the growing severity of this problem, she said.

Self-regulation is paramount, Hart continued, and is just now starting to take place. Those involved could become pioneers of an international culture of cyber-education and cyber-hygiene, where security maintenance is constant, everyone is vigilant, and buy-in is universal. This vision could be achievable, even if it currently feels lightyears away.

“Incidents will happen,” Hart said, “so prepare and practice.” As if it were a fire drill, every company needs to be thoroughly schooled in its incident response plan so that it’s not found wanting if, or rather when, a cyberattack happens.

Finally, collaboration is key. Transparency and cooperation across sectors and between would-be competitors is the secret ingredient that might just make cyber-competency achievable across the board.

“This is a team sport,” Hart’s final slide yelled in giant blue letters. “Get everyone involved!”

Tags: Article Security Strategy Technologies

Related


  • IoT Security Firm to Acquire Medical Security Startup
    Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things
  • Ransomware Attack Could Impact Paychecks
    The Kronos ransomware attack affected the company’s private cloud service over the weekend, knocking it offline just before the holidays
  • Image shows an abstract digital big data concept.
    BotenaGo Malware Targets Millions of IoT Devices
    AT&T Alien Labs identified the malware that has left millions of IoT devices exposed.
  • IoT Startup Raises $10M
    Platform aims to bolster network security with automated device configurations and visibility.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • DevSecOps Brings Payoffs through Security by Design
  • NIST’s Quantum Security Protocols Near the Finish Line
  • Securing an Open Source OS for IoT
  • IoT Device Security at the Edge Poses Unique Challenges

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Swiss-startup Airyacht is developing an eponymously named vehicle that it says will take the luxury-yacht experienc… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

@Tesla’s #Autopilot being investigated once again following fatal crash in Newport Beach, California. iotworldtoday.com/2022/05/23/tes…

23rd May 2022
IoTWorldToday, IoTWorldSeries

A new Kansas law will enable #driverless deliveries from @Walmart and its partner @Gatik_AI. #AVs… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

Access a world of opportunity in 2022 with @IoTWorldToday ➡️ Now is time to unlock ROI, by accessing a global com… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

3D Home Printer to Build 72 Residences for National Homebuilder dlvr.it/SQhWSF https://t.co/XJOs70DqzH

19th May 2022
IoTWorldToday, IoTWorldSeries

Microsoft Ramping up Cybersecurity Service Offerings dlvr.it/SQhPR0 https://t.co/nYzaDRnyVY

19th May 2022
IoTWorldToday, IoTWorldSeries

IoT Product Roundup: PTC, Nokia, Arm and More dlvr.it/SQhNNF https://t.co/ZApdw3RHdu

19th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X