It is a pleasure to have Yiru Zhong, Principal Analyst at Beecham Research, writing for ETPO. Long experience in the sector, analytical thinking, Yiru always brings insightful perspectives and food for thought.


Richard Thaler’s win of the Nobel Economic Prize last month for his behaviour economics theory reminds us of the important role of psychology in everyday decision making.  He states that individuals make decisions not solely based on hard evidence but a combination of evidence and “irrational” inputs.  This theory and his pop-culture book on Nudge theory have been applied successfully in several public policies; the creation of Nudge Units around the world reflects the widespread belief in the theory’s efficacy to influence an outcome.  However, this has limited applicability to embed security and privacy by design practices in IoT deployments.  This is because unlike other nudge outcomes such as a ban on public smoking or the opt-in nature of organ donations, the shape of a desired outcome for security and privacy protection in IoT systems is ever shifting.  There is no such thing as the optimal security and privacy posture at a single point in time; the journey to get there differs from organisation to organisation, and most importantly, there are such vast differences in the value of security and privacy among individuals that stronger-arm tactics are required.

This week, ARM releases Platform Security Architecture in open source to address the challenges of adding security features at scale that befits the needs of the IoT vision of “more than a trillion devices”.  This is only one of several similar news in the last 2 months.  In August, the US Senate proposes a bill, “IoT Cybersecurity Improvement Act 2017 “, to ensure that government entities only purchase internet connected devices that meet a baseline security standard.  In September, the EU proposes a regulation to create a Cybersecurity Certification Framework to certify ICT products in the union.  Early October, the IIC showcased several joint projects at the IoT Solutions World Congress to demonstrate the positive cases that operations can perform as usual even after implementing IIC’s security recommendations from their Industrial Internet Security Framework.  These recommendations or frameworks are only a few of recent ones.  The upcoming General Data Protection Regulation (GDPR) looms over enterprises to prepare for compliance on both data protection and privacy come 25th May 2018.  This can be considered the most strong-arm of all regulation; penalties for non-compliance are much higher at up to €20m or 4% of global annual revenue.  In comparison, the maximum penalty in the UK currently is £500,000 and TalkTalk’s breach only incurred a £400,000 fine.

The disparity in the types of top down tactics to encourage security and privacy best practices reflects the range of perceived value of security.  Spending on security is often considered as something to be tolerated, an expense to be made and at times begrudgingly, or something to be done because of heightened fear.  Already, enterprises face a shifting landscape of external and internal security risks and have a finite budget to build their arsenal of tools and skills to mitigate the risks as best as they can. With IoT deployments, many enterprises have started experiments without involving security professionals to provide the necessary framework to ensure deployments are also secure.  Checkpoint reported last week that another strain of IoT botnet (IoTroop) has been discovered and infected an estimated 1million organisations.  They also worried that IoTroop will have even more widespread impact than the Mirai-infected Botnets that brought down Dyn and subsequently cloud infrastructure provider AWS, among others.  Despite the reliance on fear to push security products, the more sustainable act is to spread the positive case of security investment, particularly in IoT deployments.  Beecham Research, together with Internet of Business, is conducting a survey to track IoT adopters’ attitudes towards security and privacy in their IoT systems, particularly to uncover perception of business value in security investments.  We would love it if you would participate in this survey.  In return, we would be happy to share with you the results of the findings.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s