The Internet of Things (IoT) has exploded into the connected world and promises much: from enabling the digital organisation, to making domestic life richer and easier. With those promises come the inevitable risks: the rush to adoption has highlighted serious deficiencies in both the security design of IoT devices and their implementation. Coupled with increasing governmental concerns around the societal, commercial and critical infrastructure impacts of this technology, the emerging world of the IoT has attracted significant attention.

The IoT can be broken down into consumer-orientated products and industrial-orientated products; however, Member organisations can face risks from both these aspects of the IoT as it enters the workplace by design and also by stealth. It is important that information security functions take a proactive approach to this potentially poorly secured world and ensure that the IoT does not represent a weak spot in organisational defences.

This ISF briefing paper explores:

  • definitions of IoT
  • technical characteristics
  • fundamental security issues
  • emerging security practice
  • legal and regulatory landscapes

Briefing Paper & Press Release

Securing the IoT: Taming the Connected World

Please fill out the form below to download a complimentary Briefing Paper & Press Release.

Please provide your details to download this document:

The Information Security Forum (ISF) is a data controller for the personal data collected on this website.

For information on how we collect and use your personal data, please read our Privacy Notice.

From time to time, the ISF would like to contact you regarding our latest products, services and events.

By ticking the relevant boxes below, please indicate your preferences on how you want to be contacted:

You can update your preferences at any time, or withdraw consent after submission by going to the ‘Already Registered’ tab.

Please check this box to confirm that you have read and agree with our Privacy Policy and Terms Of Use

Please enter the email address you previously registered with to access the download:

You have previously downloaded from our website. For more information on how we use your personal information, please see our Privacy Notice.

Please refamiliarise yourself with our Terms Of Use.

To update your preferences on how you would like to be contacted by the ISF, please indicate below:

To unsubscribe from all ISF communications. Click here: