APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • VMware
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    EnterpriseCloud: All Things Reconsidered

    Justin Giardina, Chief Technology Officer, iland Internet Solutions

    Are You a Change Management CIO

    Bask Iyer, CIO, White Case

    When Deploying to the Cloud Goes Horribly Wrong

    Bryan Soltis, Technical Evangelist, Kentico Software

    Sanjeev Gupta, CIO, HCF Australia

    Internet of Things

    Dale Rankine, CEO & Co-founder, Reekoh

    Serialisation: How to Turn a Burden into a Benefit?

    Robert Jan van der Horst, IT Director, DSM Sinochem Pharmaceuticals

    Bringing Complex Cloud Solutions to Market Using Third- Party IaaS Vendors

    Eyal Waldman, CEO, Mellanox Technologies

    Is Your Corporation Suffering From 'Data Spraw'?

    Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

    right

    How to Deal with the Future of IoT?

    Aloysius Cheang, Executive Vice President - APAC and Chief Standards Officer, Cloud Security Alliance

    Tweet
    content-image

    Aloysius Cheang, Executive Vice President - APAC and Chief Standards Officer, Cloud Security Alliance

    The Internet of Things is already impacting the daily lives of millions of people through the adoption of health and fitness monitors, home security devices, connected cars and household appliances, among other applications. Such devices offer the potential for improved health monitoring, safer highways, and more efficient home energy use, among other potential benefits. However, it may be noted that connected devices raise numerous privacy and security concerns that could undermine consumer confidence. If it is on the Internet, it has to be secured in the same way as you secure your computers connected to the Internet. We believe that by adopting the best practices we’ve laid out, businesses will be better able to provide consumers the protections they want and allow the benefits of the Internet of Things to be fully realized.

    Research is needed to allow organizations to design a trusted IoT ecosystem in their enterprise that securely utilizes the cloud for control and data connectivity. Investments in research & development are required to allow organizations to design, without research & development organizations would not have innovation edge to leverage on new emerging technologies for business requirements. Organizations will have to adapt strategies and react in the face of technologies otherwise, in

    the absence of this, organizations will be forced to make substantial architectural decisions without sufficient data to understand the risks and identify appropriate mitigations

    The IoT also helps to understand the need to manage exponentially more identities than existing Identity Access Management systems that are required to support. The security industry is seeing a paradigm shift whereby Identity Access Management is no longer solely concerned with managing people but also managing the hundreds of thousands of ‘things’ that may be connected to a network. The document “New Guidance for Identity and Access Management for the Internet of Things” is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged with securely implementing and deploying IoT solutions. With this guidance document, we can provide prescriptive guidance to stakeholders detailing an easy-to-follow set of recommendations for establishing an Identity Access Management for IoT program within their organization. Managing Identity Access Management can be bigger in building smart cities. Cloud Security Alliance with Securing Smart Cities worked on an initiative addressing guidelines for the cyber security challenges of smart cities. The guide provides organizations with an overview of the key elements needed in order to implement the best technological solutions with a lower risk and exposure to cyber threats.

    We see the increased interest in the vehicle security which has seen the most cooperation between the security community and the original equipment manufacturers (i.e. carmakers) as the latter move into new technological sectors with the expansion of the connected car market. Many of the other applications are working with the U.S. Federal Highway Administration on providing the feedback on Connected Vehicle Security strategy which will offer the opportunity to reduce collisions and save lives. Under this strategy vehicles will be designed to communicate with one another, their environment and even pedestrians and messages will be provided with integrity, authenticity and in some cases with confidentiality protections.

    The next journey in supporting the industry is by decomposing the common devices types, markets and architectures of the IoT, and subsequently analyzing and recommending appropriate security mitigations across these commonalities.

    Founded in 2008, Cloud Security Alliance is a company headquartered in Seattle, United States, which provides security assurance within cloud computing and offers education on the uses of cloud computing

    tag

    IoT

    Cloud Computing

    Information Technology

    Cyber Threats

    Connected Car

    Identity and Access Management

    Weekly Brief

    loading
    25 Most Promising VMware Solution Providers
    ON THE DECK

    VMware 2016

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Advancing the Chemical Industry through Digital Transformation

    Advancing the Chemical Industry through Digital Transformation

    Jan Mandrup Olesen, Global Head of Digital Business, Indorama Ventures
    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Digital Transformation: A Journey Beyond Technology

    Digital Transformation: A Journey Beyond Technology

    John Ang, Group CTO, EtonHouse International Education Group
    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Richa Arora, Senior Director Of Data Governance, Cbre
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://vmware.apacciooutlook.com/cxoinsights/how-to-deal-with-the-future-of-iot--nwid-3866.html?utm_source=google&utm_campaign=apacciooutlook_topslider