Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Great CSO & CISO Challenge

By Kevin Coleman
June 13, 2016

There is said to be an ancient Chinese curse that goes, “May you live in interesting times.” Well, we have all been cursed. According to the Spiceworks 2016 IoT Trends, about 90 percent of those in corporate IT positions asked said, IoT would result in security and privacy issues in the workplace. In addition, the study found that 84 percent believed new network entry points were the most concerning issue related to all of the IoT connected devices. Some 70 percent also believed that some IoT manufacturers were not taking security seriously enough when developing hardware. That paints a very clear and troubling picture of what every CSO and CISO is about to experience and have to deal with.

Given all that current information, CSOs and CISOs must discover the plethora of devices that are connecting to their networks and quickly move to assess the proper level of security needed to protect the device as well as the data the device generates. Now for the difficult part. While that should be done before the device connects, that probably won’t happen. So that means the detection, assessment and security action must take place in near-real time. Every second that device and the data it generates is not properly protected increases the risk of compromise. We are all too familiar with what happens at that point.

Stop and think for a moment about the big picture. That picture includes 50 to 200 billion devices in the next 4 to 7 years. One CSO put it well, “Today, I have a total of 1763 doors (aka direct connections) to the Internet. Based on what I am told our IoT strategy is and what it includes, that is likely to need a zero added to the end (17,630).” Yes, that is a ten-fold increase in that organization’s cyberattack surface area. Substantial implications are sure to accompany that kind of an increase.

Now, let’s look at the data that all those IoT devices are likely to generate. I am told that it is nearly impossible to estimate the average amount of data all those devices will generate, but many say that it will be a substantial part of the “zettabytes” (1 000 000 000 000 000 000 000 bytes) or “yettabytes” (1 000 000 000 000 000 000 bytes) of internet data expected in the same 4 to 7 years. The issue does not stop there. What about all the new equipment (storage and processing) and people that will be needed to design, develop, test, implement, operate, analyze and maintain all those resources.

I am sure now you get a feel for the size of the challenge that awaits all of us. Looking at that challenge we must begin immediately to look at this and analyze how our organizations are likely to be impacted by all of this and put together our strategies to deal with it. There are those that firmly believe we are already too late or at lease behind the curve. I would go out on a limb and suggest that the vast majority of us do not have ANY of this in our budget projections for the next couple of years. Now for the real shocking stat. Gartner has stated that they believe to address the new security challenges related to the Internet of Things will increase security costs from less than 1 per cent today of annual security budgets to 20 per cent by 2020. This has to be concerning to every CSO and CISO. By all accounts, budgets are already tight. Going to management and asking for an increase of this magnitude will surely be met with significant resistance. I would recommend the following three steps to help ease the shock.

  1. Team with technology and business strategy groups and brief management at all levels you can about what IoT is all about and the number of opportunities it will create for your organization.
  2. Regularly update them on critical IoT metrics so they get a firm feel for the rapid growth and advancement.
  3. Team with technology and business strategy groups and create a map that graphically depicts an incremental approach to IoT within your organization.

Once they understand the IoT movement, what it means to their organization, at that point you can deliver the security costs. So My recommendation is to include the proposed security estimate along with step 3 or shortly thereafter. Clearly this is something you need to prepare your organization for!

 

KEYWORDS: cyber security Internet of Things (IoT)

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing