This resource is no longer available
The soaring number of IoT devices that can provide access to sensitive organizational data conspire to make IoT risk management a highly convoluted undertaking.
In addition, the availability of an increasing number of IoT devices to exacerbate distributed denial of service attacks adds even greater urgency to the risk mitigation timeline.
Take a look at this Ponemon survey of 630 individuals who are familiar with the use of IoT devices in their organizations. In it, they share the perceived readiness of their organizations for third party IoT and the risks that come with it.