SUBSCRIBE

Organizations still not ready for Internet of Things, says Intel Security exec

Despite warnings from a number of industry analysts and vendors organizations still arenโ€™t prepared for the security problems that the Internet of Things is bringing, says a senior Intel official.

โ€œI think people are failing to plan or accommodate just how pervasive it will be,โ€ Scott Montgomery, vice-president and chief technical strategist of Intel Security, said in an interview Tuesday. โ€Itโ€™s going to create new attack vectors for adversaries.โ€

Scott Montgomery of Intel Security
Scott Montgomery

For example, he pointed out, in the U.S. alone the remote cardiac monitoring market will be worth US$1 billion this year, raising the spectre of an attacker holding a person wearing a pacemaker hostage. โ€œItโ€™s a scary implication,โ€ he said, in part because health care practitioners arenโ€™t concerned about the safety of approved devices, just about their patientโ€™s care.

Similarly, he added, there was an attack by an unknown adversary that temporarily knocked out a power system in the Ukraine.

โ€œI think organizations are failing to encompass in their planning just how many devices will wind up with an IP address,โ€ he said.

The comments were part of a wide-ranging interview Montgomery gave to ITWorldCanada.com from Toronto, where heโ€™s on a three-city roadshow (the others are Montreal and Ottawa) where officials from his division are speaking to partners and customers.

Intel Security is the McAfee products branch, responsible for endpoint, data leakage/classification tools, SIEM, network malware detection tools and intrusion prevention products. In fact Montgomery came to Intel when it bought McAfee in 2011.

As sales of PCs are slowing, Intel is shifting to focus on powering data centre infrastructure and the Internet of Things following a restructuring and the layoff of 12,000 announced last month. Although the data centre division pulled in US$4 billion in the first quarter compared to Intel Securityโ€™s US$537 million, the company has high hopes for security: Sales were up 5 per cent over the previous quarter and up 12 percent year-over-year.

Still that was after some pruning: Last fall Intel said it was ditching some products that werenโ€™t selling well (including email security solutions) and sold its next-generation and enterprise firewall products to Ratheon/Websense.

The IoT is often on Montgomeryโ€™s mind, particularly in the context of the vulnerability of essential industrial infrastructure. Often news reports of attacks point fingers at foreign countries. But Montgomery says the focus is better spent on what went wrong rather that who allegedly did it. help unify IoT standards, including guidance for best practices in creating secure APIs. Intel itself is also creating toolkits and frameworks for those who its chips in IoT devices.

Montgomery also insists that large industrial device makers such as Honeywell and Siemens are taking IoT security seriously. When Exxon Mobile recently put out an RFI for modernizing its physical infrastructure, he added, it included requirements for device safety, privacy and data visibility.

Ultimately, he said, โ€œit will be dollars and centsโ€ and not a sense that security is a good idea, that will drive manufacturers to improve IoT security.

The IP-enabelment of everything is one of two vulnerabilities he worries about. The other is what he broadly calls โ€œdata challenges,โ€ meaning the failure of organizations to properly protect sensitive information.

โ€œOrganizations are a little bit lax in protecting the most valuable data assets with the most scrutiny. They kind of use a rollerbrush technique and try apply a one-size fits all.โ€ Data classification โ€œwill allow them to be a little bit better prepared.โ€

Lines of business owners have to tell infosec teams what is real value in the data so IT knows where to marshal its resources, he says. After all, he argues, itโ€™s unlikely CISOs can prevent breaches, so they have to best protect the corporate jewels.

Failure to do so is one of the two pre-breach mistakes infosec teams make, he says.

The biggest post-breach mistake failing to create a containment plan. โ€œMost organizations spend all of their time on pre-breach planning and have nothing documented on post-breach โ€ฆAnd what this leads to is timing chaos and organizational chaos.โ€

Tech Jobs

Categories