CISOs must also resist the temptation to overthink security planning while patterns and solutions are still emerging. They should start small and develop initial security projects based on specific IoT interactions within specific business use cases.
CISOs can build on these use case experiences to develop common security deployment scenarios, core architectural foundations and competency centers for the future.
"Many of the security requirements for the IoT will look familiar to the CISO,” said Perkins. “The technologies and services that have been used for decades to secure different eras of computing are still applicable in most cases.”