
Navigating IoT Challenges in an Increasingly Complex World


Vennard Wright, CIO, WSSC (Washington Suburban Sanitary Commission)
As CIO for WSSC, which is a century-old public water utility serving Montgomery and Prince George’s Counties in Maryland, I realize more and more that it is critical for me to become a nimbler leader who is expected to constantly evolve, improve and communicate with my business partners more effectively to understand their needs and to be responsive in my service delivery. This evolution has challenged me to find new ways for the central IT organization to complement the business and enhance operations while balancing against the need to support and modernize existing infrastructure and systems.
It is reminiscent of the famous Bruce Lee quote, “Empty your mind, be formless, shapeless, like water. If you put water into a cup, it becomes the cup. You put water into a bottle and it becomes the bottle. You put it in a teapot it becomes the teapot.”
The role of CIO, as it exists today, must take on formlessness. Our roles are not what they were ten years ago and certainly not what they will be a decade from now, which means, if we want to remain relevant and effective as technology leaders, we must embrace the fact that technology change is constant, and that the level of business complexity will only continue to increase. This also means we must observe, learn, adapt, and take actions that match the level of technical complexity we’re responsible for governing.
One of the advancements that increases complexity is the maturation of internet of things (IoT) devices onto the computing network. Although IoT is not all that new, our understanding and willingness to embrace the advent of technologies that are beyond our full control, as a strategic priority, is.
In addition to policies and governance, solid IoT device security must also be at the forefront of planning
IoT is loosely defined as a network of end points that could include devices ranging from vehicles to thermostats and other appliances, which contain electronics, software, actuators, and connectivity allowing those end points to communicate, interact and exchange data.
The introduction of these devices means our plans must now extend beyond standard computing devices such as desktops, laptops, smartphones, and tablets, to a wide range of technologies that are able to communicate and interact over the internet.
Gartner estimates that by the year 2020, there will be over 20 billion commercial IoT devices to account for, which does not include smartphones, tablets, and computers. Cisco expects these 20 billion IoT end points to generate more than 500 zettabytes per year in data, which will only increase exponentially, year over year. These same devices are also expected to have an economic impact of almost $ 9 billion yearly.
This explosion of technology means we must work aggressively to be prepared for an increased realm of responsibility. Obvious considerations such as cybersecurity, data aggregation, asset management, governance, and legal concerns are foundational considerations to account for when carefully formulating plans for introducing IoT devices onto a production network.
Failure to do so is likely to result in increased liability and negative exposure for organizations that are otherwise already constrained from a financial and human capital perspective.
One visible example of the reputational damage that can be brought on by the blurring of the network edge, caused by IoT, is the Target breach, which occurred in 2013. According to multiple published reports, the initial intrusion into its systems was traced back to network credentials that were stolen from a third-party vendor.
The vendor in question was a refrigeration, heating and air-conditioning subcontractor, working in multiple Target locations and with other top retailers. They supported Target by monitoring energy consumption and temperatures in stores through IoT devices, to save on costs and to alert store managers if temperatures in the stores fluctuated outside of an acceptable range, which could prevent customers from shopping at the store. To support this solution, the vendor was able to remote into the system to perform maintenance activities such as updates, patches, and software troubleshooting.
This arrangement eventually resulted in a group of attackers using the credentials stolen from the subcontractor to push their malware to the majority of Target’s point-of-sale devices, allowing them to actively collect card records from live customer transactions. Once the event concluded, the breach had exposed approximately 40 million debit and credit card accounts between November. 27 and December. 15, 2013, leading to a significant reputational and financial hit that took Target years to recover from.
The Target example is only one of many possible examples but highlights the need for strong policies and governance that actively restrict access to network resources by third party vendors. It also highlights the express need for network segmentation, which would limit the ability for an attack to propagate fully throughout the entire enterprise, reducing overall exposure and liability.
In addition to policies and governance, solid IoT device security must also be at the forefront of planning. This means devices must be hardened against known vulnerabilities, in accordance with industry best practices, and should be deploying via a layered approach, which requires would-be intruders to account for and circumvent multiple network obstacles designed to protect the device and its data from unauthorized access and use.
As previously mentioned, IoT devices generate a staggering amount of data. To protect this data, we as technology leaders must ensure strong security operations policies are in place, which should be complemented by comprehensive, recurring training programs for all end users and individuals with access to the computing network. Granular audit trails, endpoint anomaly detection, and a responsive forensic security capability are also critical elements to ensure that any breach is detected, and effective and timely remedial steps are taken before contagion spreads.
Lastly, to complement device security and data protection, organizations must also ensure that the networks they rely on for IoT communications are secure. This includes the use of robust user authentication and access control mechanisms to make sure only authorized users are permitted access to networks and data.
These are not guarantees that a breach will not occur, but it does reduce the overall level of exposure we face. With the convergence of all these considerations, and with our continued evolution as technology leaders, we will be positioned to effectively meet the complexity of an IoT powered world, head on.
See Also:
Featured Vendors
Seebo: Modeling the Production Line with Machine Learning for Accurate and Actionable Predictive Insights
Seebo: Modeling the Production Line with Machine Learning for Accurate and Actionable Predictive Insights
Smart Connect Technologies, Inc.: Capturing Data from the Edge -Enabling the Industrial Internet of Things (IIoT)
Titan Cloud Software: Fueling Profits in the Petroleum Industry with IoT Device Monitoring, Advanced
Stream Technologies: Disrupting the Connectivity Space with an Industry Leading Connectivity Platfor
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
Digital Tack
Step In, Step Up, Or Step Off!
The Art of Digitalization
Bridging the Generational Gap in E-Governance
The State of K12 Student Data Privacy in the Cloud
THE ROAD TO DIGITAL TRANSFORMATION FOR PUBLIC UTILITIE
