Save or Share this Report

For Security & Risk Professionals

Prepare Your Security Organization For The Internet Of Things

Why The Next Internet Revolution Is Much More Alarming Than The Last

October 23, 2012

Primary author headshot


  • By Andrew Rose
  • with Christopher McClean,
  • Miroslaw Lisserman

Why Read This Report

There is a revolution happening right now; innovative organizations are planning how they can merge the physical and digital worlds to bring new products and experiences to their customers. At the heart of this trend sits the Internet of Things (IoT), a broad concept plotting to make vast amounts of our physical world interactive, IP-enabled, and "smart." As billions of devices connect via the Internet, exchanging information and taking autonomous actions based on continuous input, we will face a paradigm change that will transform our personal lives and revolutionize business. These radical transformations will pose unprecedented data privacy and security challenges to security and risk (S&R) professionals. This Q&A report explains the core concepts, technologies, and issues that you should understand to ensure that your organization doesn't walk blindly into this wave of opportunity and risk.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).


Table of Contents

  • 1. When can we expect to see a widespread implementation of the IoT?
  • 2. What are the most significant data security and privacy concerns of the IoT?
  • 3. What legislation and governmental policies can we expect?
  • 4. What standards play a role in the adoption of the IoT?
  • 5. What intermediate measures must CISOs take to prepare for the impending revolution?