Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk

Similar documents
Building Your DLP Strategy & Process. Whitepaper

How to Categorize Risk in IoT

DELL: POWERFUL FLEXIBILITY FOR THE IOT EDGE

Growing the Digital Business: Spotlight on the Internet of Things. Accenture Mobility Research 2015

F5 Network Security for IoT

The Importance of Connectivity in the IoT Roadmap End-User Sentiment Towards IoT Connectivity. An IDC InfoBrief, Sponsored by February 2018

What you need to know about IoT platforms. How platforms stack up in IoT

Internet of Things (IoT) Vikram Raval GSMA

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

Why Connecting to the Internet of Things Project List

IOT TECHNOLOGY AND ITS IMPACT

Mirth Solutions. Powering Healthcare Transformation.

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

INTERNET OF THINGS WINNING FORMULA. Rami Avidan Managing Director, Tele2 IoT

IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director. Mobile IoT: 3GPP standard per reti LPWA e IoT security

IoT Strategy Roadmap

THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO

INTERNET OF THINGS THE GSMA GUIDE TO THE R A G E C A P A B I L C O V E I T Y T Y U R I E C R S B E C Y. gsma.com/iot

The BIGGEST. The 2 nd Saudi International Exhibition & Conference for Internet of Things February 2019

DRIVING REVENUE FROM THE INTERNET OF THINGS

Moving Beyond Interaction Analytics to an Omnichannel World

ITU-T Y Functional framework and capabilities of the Internet of things

DATA LOSS PREVENTION: A HOLISTIC APPROACH

Internet of Things: Cross-cutting Integration Platforms Across Sectors

Redefining the Connected Conversation

Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission

IERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis)

Internet of Things ( IoT) Luigi Battezzati PhD.

IoT in Port of the Future

OMNICHANNEL MARKETING AUTOMATION AUTOMATE OMNICHANNEL MARKETING STRATEGIES TO IMPROVE THE CUSTOMER JOURNEY

Omnichannel Is No Longer Optional. Connecting the Contact Center Customer Experience

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl

IoT beyond platforms. Enabling innovation at scale

Securing IoT in the Enterprise

Four steps to IoT success

Internet of Things (IoT)

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS

A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective

Alcatel-Lucent 5620 Service Aware Manager. Unified management of IP/MPLS and Carrier Ethernet networks and the services they deliver

PoE: Adding Power to (IoT)

PoLTE: The GPS Alternative for IoT Location Services

WHITEPAPER. Customer Insights: A European Pay-TV Operator s Transition to Test Automation

The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance

FOR IOT-DRIVEN & BUSINESS

A Bird s Eye View on Internet of Things

DM Scheduling Architecture

Images for life. Nexxis for video integration in the operating room

EdgeX Foundry. Facilitating IoT Interoperability by Extending Cloud Native Principles to the Edge GLOBAL SPONSORS

Machina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016

IoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize

Chapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1

The Internet of Things Will You Be Ready to Support a Device-Driven Future? Manish Nathwani SVP, Product Development

ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE

MOBILE DIGITAL TELEVISION. never miss a minute

Mobile IoT for Smart Cities: Open for Business. Svetlana Grant Future IoT Networks Director Connected Living Programme 17 November 2016

Your partner in testing the Internet of Things

T : Internet Technologies for Mobile Computing

ITU-T Y Reference architecture for Internet of things network capability exposure

CASE STUDY. Smart Motorways Project. Temporary CCTV Monitoring Systems for England s Motorway network.

HOW TO DELIVER OMNICHANNEL CUSTOMER ENGAGEMENT, TODAY! , Genesys Telecommunications Laboratories, Inc. All rights reserved.

IoT Egypt Forum A Catalyst for IoT Ecosystem in Egypt

The Art of Low-Cost IoT Solutions

Standard for an Architectural Framework for the Internet of Things

The Omnichannel Dilemma: Everyone Wants It, But How Do You Start?

Broadband Changes Everything

Intelsat Maritime Solutions

Securing the Internet of Things Survey

SAP Edge Services Edge Services Overview Guide Version 1711

IOT. Internet of Transformation. Whitepaper.

Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT

Via

Digital Signage in Healthcare

REALITY IS A MATTER OF PERCEPTION

Innovation. Industrial Market Trend: Investing in the Internet of Things (IoT) RTLS beacon technology connects assets & people

COURSE DESCRIPTION INTERNET OF THINGS- BUSINESS AND TECHNOLOGIES. Format: Classroom. Duration: 2 Days

IoT trends in the Americas and considerations on the importance of National IoT plans

Milestone Leverages Intel Processors with Intel Quick Sync Video to Create Breakthrough Capabilities for Video Surveillance and Monitoring

73% Contents. of companies have yet to make any concrete investments in the Internet of Things. 1. Foreword 4. Key findings 5

Institutes of Technology: Frequently Asked Questions

Kolding June 12, 2018

The IoT and the Technical Information Challenge. Stuart Mendelsohn

ITU-T Y Specific requirements and capabilities of the Internet of things for big data

SPECIALIST TASK FORCE 505 IOT STANDARDS LANDSCAPING & IOT LSP GAP ANALYSIS

FOSS PLATFORM FOR CLOUD BASED IOT SOLUTIONS

SURVEY All brands and products are the trademarks of their respective holder/s. Copyright Decisive Media Limited. All rights reserved.

THE CRITICAL CONSIDERATIONS OF OMNICHANNEL SUPPORT

Online community dialogue conducted in March Summary: evolving TV distribution models

Maximize Your Enterprise's Potential Through IoT:

Security of the Internet of Things

Internet Of Things Meets Digital Signage. Deriving more business value from your displays

ANALYST REPORT MANUFACTURING. Is IoT delivering factory floor efficiency? Analyst Report Prepared by Strategy Analytics.

KPN and the Internet of Things

Genomics Institute of the Novartis Research Foundation ( GNF )

Case Study: The Workforce Strategy Was Key to Indiana's IT Consolidation

AMPHENOL RF ENABLES THE INTERNET OF THINGS

Internet of Things Telecommunication operator perspective

Bringing an all-in-one solution to IoT prototype developers

Bridging the Trust Gap for Mobile BYOD Deployments. Ojas Rege, VP Strategy, MobileIron Professional Techniques D12

The Rise of the Internet of Things

Finnish perspectives for the IOT

Transcription:

Enduring the IoT storm to unlock new paths to value How a governance model protects you from a blizzard of IoT risk

Contents In the eye of the IoT storm 2 IoT governance basics 5 Navigating through the flurry of strategic, delivery, and operational risks 8 Seeking shelter 14 About KPMG s Emerging Technology Risk services 15 About the authors 16 Enduring the IoT storm to unlock new paths to value 1

In the eye of the IoT storm Manufacturing facilities taken offline by malware. 1 Children s toys spying on people in the safety of their own homes. 2 Hospitals refusing patients because critical medical equipment is rendered useless. 3 Thousands of homes left powerless after a cyber attack on a local utility. 4 Hollywood action movie plots? No. These are real news stories from communities just like yours. The underlying culprit of all of these alarming scenarios is the failure to govern and manage the risks of the Internet of Things (IoT), the billions 5 of consumer and industrial devices that are now online your cell phone, your refrigerator, your car, your heart monitor, the electrical grid that powers your neighborhood, and much more. As companies seek competitive advantages through deeper data insights, consumers demand smart technology in everyday products, and organizations continue to increase reliance on interconnected technology, the IoT is poised for exponential growth in nearly every industry and marketplace. By 2020, Gartner expects to see 20 billion internet-connected things and predicts 65 percent of enterprises will have adopted IoT products. 6 However, you cannot realize the business opportunities of the IoT without managing the risks inherent in such a complex and connected ecosystem. As such, the need to govern connected products, while incorporating risk management, is incredibly high. Failure to secure IoT devices while incorporating risk management could prevent you from delivering services, protecting sensitive data, or even keeping customers safe. A single exploit can tarnish your reputation and damage consumer trust. But although 32 percent of IT leaders surveyed by Gartner cited security as a top barrier to IoT success, 7 KPMG research found that 46 percent of companies are adopting IoT technologies without even assessing the associated risk. 8 How can an agile risk and governance drive program value, enabling companies to tap into the tremendous market opportunity for connected products? In the following pages, our KPMG team of experienced technology risk specialists detail a leading practice IoT governance approach featuring specific, risk-focused measures around the strategy, delivery, and operations of a connected device program. We are confident this approach which has been tested in major organizations around the world can help your company design, develop and deploy connected products in a more efficient, cost-effective, responsible and sustainable manner. 1 Ransomware cyberattack halts production at Honda plant in Saitama (The Japan Time, June 21, 2017) 2 FBI Warns Parents of Privacy Risks With Internet-Connected Toys (NBC News, July 18, 2017) 3 Global cyberattack strikes dozens of countries, cripples U.K. hospitals (CBS News, May 12, 2017) 4 Inside Cunning Unprecedented Hack of Ukraine s Power Grid, (Wired, March 3, 2017) 5 Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (Statista, 2017) 6 Leading the IoT (Gartner, 2017) 7 IoT Backbone Survey (Gartner, 2016) 8 Disruption is the new norm: Emerging tech risk survey report (KPMG LLP, 2017) 2 Enduring the IoT storm to unlock new paths to value

There simply isn t much guidance for organizations to follow about protecting the IoT. While certain trade and sector groups have published best practice guides or created security frameworks, most business leaders find these recommendations difficult to apply in their own companies especially those in highly regulated industries like healthcare. Effective program governance can help fill this void and tailor to the specific needs of an organization. A strong and responsive governance foundation allows organizations to responsibly harness and unleash innovation, such IoT products, to create new paths to value. Martin Sokalski U.S. Digital Risk Solution Leader, Emerging Technology Risk Services Enduring the IoT storm to unlock new paths to value 3

Who s responsible for protecting the IoT? The sheer number of stakeholders who are part of the connected world each with different views of the threats posed by connected devices often leads to a lack of comprehensive oversight, transparency, and accountability of IoT risk management. Stakeholder Examples Business focus Risk focus Digital consumer products Product functionality Fostering digital trust with consumers Creators: Product designers and manufacturers Connected vehicles Connected medical devices Design and consumer engagement Product and platform adoption Controls integration by design Balancing security with usability Telematics providers System architecture Service availability and reliability Enablers: Technology builders and supporters Cloud hosting Sensor manufacturers Connectivity and usability Cost-focused service offerings and infrastructure management Serving the needs of the Creators Software developers General public Product reliability and usability Managing devices and data Consumers: End users Organizations and enterprises Dynamic user experience Integrating devices within existing enterprise ecosystem Transit and fleet operators Privacy of personal information Hospitals Brand loyalty and trust 4 Enduring the IoT storm to unlock new paths to value

IoT governance basics Most organizations today recognize the need for a robust, comprehensive IoT governance program that standardizes the initial development and ongoing operation of connected products and establishes guardrails to mitigate risks along the way. However, few know how to get started. Of course, IoT governance does not follow an exact formula. The program should be malleable to the needs of an organization, and this begins with involving the right people and functions. IoT programs typically require involvement from various teams, including engineering, information technology, and operations. Selected members from these teams should then be aligned to promote and enable IoT program governance. For example, they could operate as a formal centralized function with dedicated resources, as a center of excellence (CoE) that defines and promotes best practices, or as a steering committee made up of various stakeholders. What works best will differ not only by industry, but by where the organization plays in the IoT ecosystem. IoT security table stakes The IoT ecosystem creates many unique risks and challenges for security professionals. However, best practices commonly deployed for enterprise security can be applied to IoT as well. KPMG views the following considerations as expected, baseline table stakes for a responsibly managed IoT program: Threat and vulnerability management Network segmentation Identity access management Asset and configuration management Secure application development practices Patch management Data governance Employee training and awareness Industry collaboration and information sharing. Enduring the IoT storm to unlock new paths to value 5

6 Enduring the IoT storm to unlock new paths to value

But the need for customization certainly doesn t mean IoT governance is a free-for-all. In our experience, we have learned that all effective IoT governance functions regardless of how they are established play an instrumental role in critical activities focused around building consumer trust and driving desired business outcomes. Successful IoT governance functions: Are strategic. They shape the overall direction and goals of the IoT program. Empower collaboration. They enable cooperation and teamwork between cross-functional stakeholders. Drive consistency. They promote process standardization and reliability to increase ROI. Provide guidance. They share best practices for IoT development and implementation. Mitigate risk. They establish controls and define key metrics and indicators to monitor and optimize business outcomes. These activities should be embedded throughout an IoT program, and we believe that successful governance programs support the full lifecycle of an IoT program, from the initial strategy, to program delivery and ongoing operations. For the remainder of this paper, we will explore example risk exposures and governance techniques throughout this lifecycle. Program roadmap Training, tools, and enablement Risk profile Solution design & & tolerance operating model Strategic risk Key risk indicators and controls enhancement Risk management CONSUMER TRUST Progra m governance Operational risk Data analytics & behavioral analysis Delivery risk Security, privacy & compliance Controls integration in produce lifecycle and managed services Third-party integration Enduring the IoT storm to unlock new paths to value 7

Navigating through the flurry of strategic, delivery, and operational risks Unforeseen risk exposure. Redundant costs. Conflicting priorities. There are many issues that can bring an IoT program grinding to a halt, even before it really gets moving. That s where the IoT governance function comes in. Its guidance and oversight will be integral in ensuring risk is considered in the IoT strategy right from the get-go so the program can stay on track and deliver long-term value. Consider how governance can support two critical areas of the IoT program, even as organizations are just beginning to consider adding connectivity to their products. Driving business value The risk: Strategic misalignment is an all-too-common problem in IoT programs. Recent KPMG research found that in the vast majority of companies the technology risk function is not viewed as proactively managing risk for the organization (87 percent) and is engaged only after issues arise (72 percent). 9 Connected device deployments that occur in isolation or on a one-off basis are usually incapable of realizing the expected benefits. Rather, deployments should be aligned with the organization s long-term vision and goals as well as its risk profile and risk tolerance. Where governance comes in: Governance needs to be considered from the beginning to maximize impact. By facilitating collaboration between various IoT stakeholders (including engineering, operations, security, privacy and legal) as well as upper management, the IoT governance function can help your organization develop a unified vision for the IoT program including a future-state operating model, program roadmap and guiding principles and policies that is aligned to your company s risk tolerance and overall business objectives. This will enable you to deploy connectivity strategically targeting the products, sectors and consumers that present the biggest market opportunities while realizing operational efficiencies and cost-savings. It will also enable you to manage the risks of connected device programs proactively. Protecting data The risk: If your approach to identify and mitigate the information-related risks introduced by connected products is inadequate, it can result in sensitive consumer data, business data, employee data or intellectual property being stolen, compromised, misused or exposed. Just look at recent headlines to see the numerous examples of corporations being hacked and the damage it can do to their brand reputations and customer relationships. 10 Where governance comes in: Building and maintaining consumer trust in an IoT program can be a strategic differentiator. At the foundation of consumer trust is data protection and privacy, and embedding strong data protection guiding principles into your IoT strategy is critical to success. While there are too many variables in the IoT ecosystem for a one-size-fits-all solution, the IoT governance function can develop foundational policies to ensure security and privacy controls are incorporated by design at the very beginning of the connected device program. 9 Disruption is the new norm: Emerging tech risk survey report (KPMG LLP, 2017) 10 The Decade of Security and Privacy (The Huffington Post, Nov. 6, 2017) 8 Enduring the IoT storm to unlock new paths to value

Security and privacy by design: Guiding principles Proactive and preventative Protection begins at inception. A formal process stops unintended actions and malicious behavior from occurring in the first place. Authentication and encryption are critical. Not optional Security and privacy are ready out-of-the-box and do not depend on detailed configurations or customizations. Embedded Controls are part of the functional design. They don t inconvenience users or introduce new safety concerns. Full cycle The full lifecycle of data including creation, processing by vendors, and storage is well-understood, and data classification, ownership and encryption are key priorities. Visible Audits and vulnerability assessments are standard and independent certifications (e.g., SOC2, ISO 27001, PCI) are obtained as necessary. User-centric Controls are intuitive and user-friendly designed with the consumer in mind. Consumers are educated about their responsibilities for using their connected devices. 2018 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 740863 Enduring the IoT storm to unlock new paths to value 9

As the organization designs, develops, tests and ultimately delivers connected devices to the end user, the IoT governance function should help the organization deliver its strategy in a responsible, trusted manner. We have highlighted three key areas of focus for governing delivery risk. The return on investment of an IoT program is largely tied to how well the collected data is utilized to enhance decision making, including direct benefits to the organization, creating value for the end user, improving future actions, and providing a feedback loop to the product engineering teams. Mike Krajecki, Director, Emerging Technology Risk Services Security by design controls integration The risk: Research has shown that the cost to fix a security issue found during the post-production phase is up to 100 times more costly than addressing the issue during the requirements phase. 11 Companies can see IoT programs costs soar or even get sidetracked, stall or fail when risk management actions are applied only in late-stage development, or worse, after the product is already released. Where governance comes in: The IoT governance function should help embed security controls at every phase of development across the entire product lifecycle. Start by applying the guiding principles for security and privacy by design, including comprehensive secure development practices including security validation testing. Managing third-party relationships The risk: Third-party risks are a significant challenge for the delivery of IoT programs. Whenever there is a security breach or a hack on a product, the manufacturer typically isn t the one who has failed. Threat actors can target the weakest link in the connected ecosystem to get right to your network, even if it s well-protected. Where governance comes in: The IoT governance function should establish strong risk mitigation measures that aren t dependent on third parties. One powerful defense mechanism for third party risk is a layered security model, which creates defense in depth and protective measures to ensure there is no single point of failure for a connected device, including critical components owned by a third party (i.e. sensitive data, firmware, user credentials, etc.). Another approach is smart contracting building specific security, privacy and compliance requirements into vendor selection and contracting processes. Finally, the IoT governance function should establish a formal process to periodically review and monitor vendor reports, as required by technology industry standards (i.e. ISO and SOC 1/2/3). 11 Estimating Benefits from Investing in Secure Software Development (United States Computer Emergency Readiness Team, July 31, 2013) 10 Enduring the IoT storm to unlock new paths to value

Empowering the organization The risk: As organizations continue to embark on digital transformation through the deployment of IoT and other emerging technologies, employees may not have the tools and resources necessary to identify and manage the risks of the connected device ecosystem. There is also often a lack of transparency to effectively identify these risks, as well as unclear authority and accountability to promote and maintain risk-mitigation practices throughout the connected device lifecycle. Where governance comes in: The IoT governance function can help ensure the appropriate tools, enabling technologies, policies, and training programs are available to the various functional teams supporting the IoT program. By providing a consistent toolkit along with supporting guidance, an organization s IoT strategy can be delivered in a safe, efficient and cost-effective manner that generates business value. When relationships go bad It is estimated that more than 60 percent of data breaches are linked to third parties, 12 including the following real-life examples. Security researchers hack a moving car by exploiting weaknesses in its supporting cellular network. 13 Cyber criminals hold customer data from a toy product for ransom after breaking into the unprotected public cloud where it was stored. 15 Cyber attackers engineer one of the biggest cyber-attacks ever by compromising a major retailer s HVAC vendor to ultimately breach its customer payment card data. 14 12 Third Party Access Is A Major Source of Data Breaches, Yet Not An IT Priority (Soha Systems, 2016) 13 Hackers Remotely Kill a Jeep on the Highway With Me in It (Wired.com, July 21, 2015) 14 Target Hackers Broke in Via HVAC Company (Krebs on Security, February 5, 2014) 15 Data from connected CloudPets teddy bears leaked and ransomed, exposing kids voice messages, (Troyhunt.com, February 28, 2017 Enduring the IoT storm to unlock new paths to value 11

Once you build an IoT device, the hard work is done. Right? Wrong. Organizations often underestimate the ongoing operating impact of deploying connected products, as the journey for protecting a product is just beginning when it exits the assembly line. Sound practices for software maintenance (e.g., remote patching) and data protection are now standard consumer expectations, and new challenges are emerging with handling product end-of-life and ongoing compliance requirements (e.g., the European Union s General Data Protection Regulation). The IoT governance function must support the business in keeping the IoT program continually operational, even as disruptive changes occur in the external environment that could impact security, privacy, compliance, or customer experience. Strong governance gives both manufacturers and end-users confidence that the product will be safe to use for the life of the product and also eliminates potential business disruptions, ensuring IoT products are growth drivers not just upon initial sale, but over the long-term. Here are some key operational risk areas where the IoT governance function can make an impact. Managing the compliance burden The risk: Connected devices especially those that handle sensitive data or perform critical activities are likely to be subject to stringent regulatory requirements related to both data security and privacy. Compliance and reporting already take up a lot of time and energy, but they are likely to continue to evolve and become more burdensome. Recently, formal, cross-industry regulations specifically targeting the IoT are beginning to emerge, including a recent legislative initiative to enforce minimum cybersecurity standards for connected devices used by the U.S. government. 16 Regional data privacy laws, such as in the European Union and China, place strict provisions on the usability, protection, and portability of personal data. Where governance comes in: Understanding regulatory, compliance, and customer audit requirements is an ongoing part of IoT risk management. Having a centralized means of addressing these requirements through an IoT control framework and periodic risk assessments can help efficiently manage your IoT program risks before they emerge. Also, collaboration with industry groups and regulatory agencies can help an IoT program stay ahead of new requirements. Driving value from data The risk: Why are companies jumping on the IoT bandwagon? Arguably the most important driver is the access to the exponentially growing volumes of invaluable data created and collected by connected devices. However, data from IoT programs can quickly become overwhelming. To truly understand the impact, consider that some analysts estimate that autonomous vehicles will generate four terabytes of data in approximately 90 minutes, the average time a person spends driving on a daily basis 17. It s no surprise all of this data comes with storage and maintenance costs, but there are also hidden costs to be aware of related to how the data is classified, analyzed and modeled. Where governance comes in: The IoT governance function should support the mission-critical data management and analytics activities of the connected device program. The starting point is the development of a robust data strategy that should outline when and how to utilize data to help satisfy business needs, user goals, and consumer expectations. To get the most out of connected data, the IoT governance function should also develop strong capabilities in three key areas: data classification, including protection and retention requirements; data use cases, to determine what data to collect; and data analytics, to both spot risks and to extract insights. 16 Senators introduce bipartisan legislation to improve cybersecurity of Internet-of-Things devices (www.warner.senate.gov, Aug. 1, 2017) 17 For self-driving cars, there s big meaning behind one big number: 4 terabytes (Intel Newsroom, April 14, 2017) 12 Enduring the IoT storm to unlock new paths to value

Mitigating cyber risk The risk: Have the device s login credentials been updated lately? Are the latest software updates installed? Is there any unusual behavior happening? It s hard enough to spot a problem in a single connected device, let alone 10,000 devices. By its very nature, implementing an IoT program will increase your organization s cyber-attack surface. And cyber risk only intensifies when organizations push connected products to market at speed, without foundational controls in place. Where governance comes in: Today s organizations recognize that cyber security supported by robust governance is essential for companies to harness digital capabilities like the IoT to fuel innovation and growth. Best-in-class IoT governance functions establish robust key risk indicators (KRIs), metrics that are used to alert the organization to potential threats. They also implement security operation centers to track changes in KRIs as well as user behavior. Designed to mitigate cyber risk up front and respond faster and more effectively when threats arise, these centers enable remote and real-time device monitoring, vulnerability testing, threat identification, and software updating and patching. Security by design principles provide a strong foundation for IoT security. But cyber security risk rapidly evolves and the ability to quickly detect and respond to emerging threats is integral to the longevity of an IoT program. Danny Le Enterprise IoT Leader, Cyber Security Services Enduring the IoT storm to unlock new paths to value 13

Seeking shelter The market opportunities of the IoT are immense. If you choose to do business in the connected world, you could score windfalls of data, containing the insights you need to drive continued innovation and improvement in your business. But for each organization that achieves success with IoT, there will be others that have their investment constrained by inefficient technology governance, intellectual property stolen or compromised, or customer data exposed. Many organizations have already faced reputational, financial, and legal harm when adopting disruptive technologies, and we must learn from these experiences to responsibly manage an IoT program. A responsive IoT governance model is at its heart a growth enabler and a source of competitive advantage. It will enable you to secure connected products and data while sustaining long-term product quality. It will build trust, increase speed of deployment, and enable you to generate desired business value from your IoT investment. 1. Empower an IoT governance model. While bottom-up security measures and data management are important, the connected ecosystem is too vast and growing too quickly for a decentralized model. A formal and integrated governance model can set strategic direction for the IoT program and establish controls, standards and policies to minimize and mitigate security, privacy and compliance risks. 2. Don t overlook security and privacy table stakes. The functional teams managing the IoT program often fall within engineering or operations, outside the jurisdiction of IT. This may cause your organization to overlook or inconsistently apply traditional enterprise security best practices. Leverage your IoT governance team to define guiding risk management principles, including security and privacy, to help protect your IoT program throughout the life cycle. 3. Manage risks at every stage. In the connected world, data is currency. Connected devices provide access to a nearly limitless amount of valuable data. But this data windfall also creates innumerable technology risks. Leveraging the core governance techniques highlighted in this paper embracing security and privacy by design principles, integrating controls across the product lifecycle, managing the risks posed by third parties, mastering data management and analytics, and establishing security operations centers will help you identify and manage the strategic, delivery and operational risks of connected devices. 14 Enduring the IoT storm to unlock new paths to value

About KPMG s Emerging Technology Risk services Technology s influence on business is undeniable. Cloud, connectivity, mobile, intelligent automation, cybersecurity, and the IoT are evolving and quickly infiltrating and transforming the workplace. This is forcing organizations to think faster, become more flexible, and figure out how technology aligns with business. KPMG s Emerging Technology Risk Services team made up of highly experienced technology specialists and risk management professionals assists organizations in responsibly navigating this new digital world, receiving the benefit of emerging technologies without the disruptive forces hindering their goals. Governing your IoT program and managing the associated risks requires a flexible approach customized to your unique business needs. We can help your organization govern risks across the strategy, delivery and operations of your IoT program. Strategy Establishing an IoT governance function and operating model Evaluating risk identification and mitigation activities in the IoT program Developing tools and processes for continuous risk monitoring of connected devices Assisting management with defining their IoT risk and governance program roadmap Delivery Defining and evaluating "security and privacy by design" principles Incorporating testing into the connected product quality assurance process Developing a connected device identification and classification schema Delivering training and awareness programs with common tools and enablers Operations Monitoring and protecting connectivity, transmission and storage of connected data Executing a formal data governance and data protection program Conducting ongoing vulnerability management and threat detection activities Managing, retaining, and analyzing data for continuous improvement and risk mitigation Enduring the IoT storm to unlock new paths to value 15

About the authors Martin Sokalski is a principal and U.S. Digital Risk Solution Leader for KPMG s Technology Risk network. He has more than 18 years of advisory experience helping organizations design new (and responsible) digital operating and governance models enabled by innovation and emerging technologies. Martin has advised clients on technology driven innovation and transformation, risk management, governance, compliance, and IT audit and controls integration. Danny Le is a principal in KPMG s Cyber Security practice, leading the automotive and new mobility agenda. He is one of the founding partners of KPMG s Cyber practice in the United States. Danny previously spent 10 years building KPMG China s consulting business as well as serving as the head of KPMG China s Automotive practice and a member of KPMG s Global Automotive Steering Committee. Mike Krajecki is a director in KPMG s Emerging Technology Risk Services practice. He has more than 10 years of experience helping organizations balance the risk and reward of disruptive technologies, including leading the development of KPMG s Internet of Things (IoT) Risk and Governance services offering and supporting framework. Mike has executed extensive engagements helping organizations identify, assess and manage risks related to connected, digital products, devices, and programs. 16 Enduring the IoT storm to unlock new paths to value

Contact us Phil Lageschulte Global Lead Partner Emerging Technology Risk Services T: 312-665-5380 E: pjlageschulte@kpmg.com Martin Sokalski U.S. Digital Risk Solution Leader Emerging Technology Risk Services T: 312-665-4937 E: msokalski@kpmg.com Danny Le Enterprise IoT Leader Cyber Security Services T: 213-430-2139 E: dqle@kpmg.com Mike Krajecki IoT Risk and Governance Director Emerging Technology Risk Services T: 312-665-2919 E: mkrajecki@kpmg.com Some or all of the services described herein may not be permissible for KPMG audit clients and their affiliates. kpmg.com/socialmedia The information contained herein is of a general nature and is not intended to address the specific circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particular situation. firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. Printed in the U.S.A. NDPPS 740863