{"id":3868,"date":"2022-10-26T11:17:12","date_gmt":"2022-10-26T11:17:12","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3868"},"modified":"2023-02-10T14:01:46","modified_gmt":"2023-02-10T14:01:46","slug":"atlantic-council-recommendations-to-better-secure-the-iot-ecosystem","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/","title":{"rendered":"Atlantic Council Recommendations to Better Secure the IoT Ecosystem"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><strong>Summary:<\/strong> <em>The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing and the connectivity of humans, buildings, vehicles, and physical machines to the global internet. Cybersecurity threats to personal information, business networks, national infrastructure, and the internet have all been magnified because of this increased dependency and connectivity. The Atlantic Council issued a report which looks at existing security initiatives in the US, UK, Australia, and Singapore while recommending changes and introducing more cohesion and coordination to regulatory approaches to IoT cybersecurity.<\/em><\/p>\n<p>The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing and the connectivity of humans, buildings, vehicles, and physical machines to the global internet. Each year, more Internet of Things (IoT) items are introduced, indicating that IoT goods form a considerable proportion of all internet-connected devices. <a href=\"https:\/\/iot-analytics.com\/state-of-the-iot-2020-12-billion-iot-connections-surpassing-non-iot-for-the-first-time\/\" target=\"_blank\" rel=\"noopener\">IoT Analytics believes<\/a> that IoT products surpassed traditional internet-connected devices in 2019 and forecasts that by 2025, the ratio will be approximately 3:1.<\/p>\n<p>Cybersecurity threats to personal information, business networks, <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/iot-threats-to-the-us-power-grid\/\" target=\"_blank\" rel=\"noopener\">national infrastructure<\/a>, and the internet have all been magnified because of this increased dependency and connectivity. The report illustrates how securing IoT gadgets is essential because they permeate more and more areas of daily life. Poorly secured devices, such as those with simple passwords or with known and unfixed security weaknesses, might allow attackers to get footholds in corporate or otherwise sensitive environments, allowing them to steal data or create disruption.<\/p>\n<p>Considering these cyber threats, many governmental and industry frameworks for IoT security have been developed, with specific attention paid to various stages of the product life cycle, including but not limited to device design, development, sale and setup, maintenance, and decommissioning. On the bright side, several nations and industry entities have recognized a single standard, European Norm (EN) 303 645, from the European Telecommunication Standards Institute (ETSI), as a consensus approach, showing how some baseline security recommendations can help promote genuine, coordinated change.<\/p>\n<p>The <a href=\"https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/security-in-the-billions\/\" target=\"_blank\" rel=\"noopener\">Atlantic Council issued a report<\/a> which looks at existing security initiatives in the US, UK, Australia, and Singapore while recommending changes and introducing more cohesion and coordination to regulatory approaches to IoT cybersecurity. The report describes a synthesized IoT security architecture and goes over the current risk in the ecosystem, as well as the difficulties with the current regulatory approach. The report then provides nine recommendations for government and industry actors to improve IoT security, divided into three groups:<\/p>\n<ul>\n<li>Establishing a minimum level of acceptable security (&#8220;Tier 1&#8221;)<\/li>\n<li>Providing incentives to go above and beyond the baseline (&#8220;Tier 2&#8221; and above)<\/li>\n<li>Seeking international alignment on standards and implementation throughout the entire IoT product lifecycle<\/li>\n<\/ul>\n<h2>IoT security challenges<\/h2>\n<p>The authors of the Atlantic Council report, Patrick Mitchell, Liv Rowley, and Justin Sherman, summarize the existing IoT security challenges in four domains: state, industry, private sector, and consumer.<\/p>\n<p>It&#8217;s clear that there are significant problems with the way governments are currently approaching the security of IoT devices. The United States, Singapore, Australia, the United Kingdom, and many other nations are all affected since the industry has not invested sufficiently in IoT security, necessitating action from governments. While some countries are taking the initiative to ensure the safety of IoT, others appear content to defer to the private sector (or not act at all). For instance, Australia has proposed an IoT security framework, but it has taken a long time to publish any actual recommendations.<\/p>\n<p>Labeling, certification, minimum standards, and best practices are just some of the IoT security mechanisms adopted by industry groups. However, different sectors have different norms in this regard. For example, when it comes to regulations, embedded IoT healthcare devices have much stricter standards than smart speakers. In total, these endeavors constitute a considerable amount of work and the culmination of many years of effort by members of the security community. However, there is still space for improvement in terms of how cohesively security activities are tied to specific stages of the product lifecycle.<\/p>\n<p>Private sector initiatives to improve IoT security are hampered by, among other things, unclear objectives and policy goals, inconsistent processes, and regulatory requirements across jurisdictions, and overlapping certification schemes.<\/p>\n<p>Consumers, however, must contend with a dearth of reliable information about which items to buy, the resulting poor security, and the far-reaching consequences of IoT instability.<\/p>\n<h2>A synthesized IoT security framework<\/h2>\n<p>The paper proposes a unified framework that incorporates the preexisting security rules, standards, and guidelines of all four jurisdictions of relevance (the United States, the United Kingdom, Australia, and Singapore).<\/p>\n<p>First and foremost, the framework intends to emphasize the benefits and drawbacks of various policy options to eliminate fragmentation. Companies that operate in multiple jurisdictions that have varying IoT security regimes may face higher product development and legal compliance costs, reduced incentives to invest in security, and the possibility of having to locally adapt their IoT offerings to compete on the global market.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-medium wp-image-3870 lazyload\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-600x359.jpg\" alt=\"Report\" width=\"600\" height=\"359\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-200x120.jpg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-400x239.jpg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-600x359.jpg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-768x459.jpg 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-800x478.jpg 800w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-1200x717.jpg 1200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-1536x918.jpg 1536w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture1-1920x1148.jpg 1920w\" data-sizes=\"(max-width: 600px) 100vw, 600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/359;\" \/><\/p>\n<p>These financial concerns are resolved when fragmentation is lessened. As a bonus, it gives businesses and people more control over the security of their IoT products by providing a more streamlined set of tradeoffs and information. Finally, lessening the amount of disjointed information makes it easier for policymakers to work together on an international level and to protect all aspects of the domestic IoT security landscape.<\/p>\n<p>The second purpose of the framework is to integrate technical and process guidance more properly into cybersecurity policy. Higher-level IoT security goals can be operationalized by the private sector, particularly by enterprises with little cybersecurity knowledge and capacity, with the support of government policy that integrates technological and process elements. The government&#8217;s own IoT security measures could also benefit from this framework.<\/p>\n<h2>Considerations for a better IoT future<\/h2>\n<p>When discussing what the future of IoT could be, one <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/internet-of-things-blog\/solving-iot-device-security-at-scale-through-standards\/ba-p\/1686066\" target=\"_blank\" rel=\"noopener\">opinion is<\/a> \u201ca world in which every IoT ecosystem stakeholder\u2019s choices and actions contribute to the overall security of IoT where consumers and benefactors are simply secured by default.\u201d<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-medium wp-image-3871 lazyload\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-600x497.jpg\" alt=\"Report\" width=\"600\" height=\"497\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-200x166.jpg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-400x331.jpg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-600x497.jpg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-768x636.jpg 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-800x662.jpg 800w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-1200x993.jpg 1200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-1536x1271.jpg 1536w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Picture2-1547x1280.jpg 1547w\" data-sizes=\"(max-width: 600px) 100vw, 600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/497;\" \/><\/p>\n<p>When assessing any proposal for the future of IoT, the Atlantic Council report suggests the following considerations:<\/p>\n<ul>\n<li>Do away with the most obvious security flaws in consumer IoT products, making it more difficult and sophisticated for attackers to break into them.<\/li>\n<li>To ease manufacturer adoption, it is important to work toward harmonization across jurisdictions and eliminate unnecessary divergence and duplication.<\/li>\n<li>Improve the financial incentives for manufacturers to go above and beyond the required minimum of security measures.<\/li>\n<li>Raise consumers&#8217; consciousness of the dangers posed by unsafe items and stimulate their interest in security as a practical and approachable purchasing factor.<\/li>\n<li>Offer a short-term, tangible effect on user security outcomes while retaining the ability to integrate new controls via consensus methods as technology advances.<\/li>\n<\/ul>\n<p>The authors suggest a multitiered IoT device labeling and certification framework with basic, simply comprehensible labels for consumers to drive the aforementioned results and closer alignment in policy across these four states.<\/p>\n<h2>Recommendations for securing the IoT ecosystem<\/h2>\n<p>Finally, the authors of the Atlantic Council report suggest nine recommendations, grouped by the proposed tiers of the IoT security framework.<\/p>\n<h3>Tier 1 recommendations<\/h3>\n<ol>\n<li>Governments should implement regulatory measures to enforce a mandatory baseline on manufacturers selling in their markets<\/li>\n<li>Governments should follow the \u201creversing the cascade\u201d philosophy, where instead of trying to influence manufacturers based abroad, governments put pressure on domestic suppliers and retailers\u2014who may, in turn, put their own pressure on manufacturers to improve security<\/li>\n<\/ol>\n<h3>Tier 2 recommendations<\/h3>\n<ol start=\"3\">\n<li>Governments should support the creation of a voluntary, higher tier of security requirements, indicated via labeling programs in their markets<\/li>\n<li>Governments should include Tier 2 requirements as part of government procurement contracts<\/li>\n<li>In the short term, governments should reach agreements to mutually recognize each other\u2019s labels<\/li>\n<li>Over the longer term, governments should compare the results of their national labeling programs and move towards a single global model for communicating the security characteristics of an IoT product<\/li>\n<\/ol>\n<h3>Pursue international alignment recommendations<\/h3>\n<ol start=\"7\">\n<li>Governments should pursue outcomes-based approaches to consumer IoT security rooted in agreed-upon basic security principles and maintain similar definitions for products considered \u201cin-scope\u201d<\/li>\n<li>Governments and industry should review and, if necessary, update their respective tiers of standards every two years<\/li>\n<li>Governments should develop additional guidance around the sunsetting phase of the IoT product lifecycle<\/li>\n<\/ol>\n<h2>Concluding thoughts<\/h2>\n<p>The lack of proper security for consumer IoT goods is just one of many complex new technological concerns that call for worldwide collaboration between public and private sector actors. The impact on customers is significant, and the hazards grow as the number of connected devices does, from botnets that threaten internet infrastructure to universal default passwords that allow hackers to compromise user privacy.<\/p>\n<p>When compared to more conventional appliances, which wear down and quit performing on their schedules, &#8220;<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2018\/10\/security_in_a_w.html\" target=\"_blank\" rel=\"noopener\">computers fail differently<\/a>.&#8221; Everything is great up until the day a vulnerability is found, at which point all products based on that model will need to be patched. More and more things will eventually become computers, and thus more and more things will fail in the same predictable ways that computers do. There must be adjustments made to global systems, norms, and standards to account for this new reality.<\/p>\n<p>Do you want to discuss this topic with one of our experts? Please visit our <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">Contact Us<\/a> page to request more information or connect with a Subject Matter Expert (SME).<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":3953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[2188,2193],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Atlantic Council Recommendations to Better Secure the IoT Ecosystem<\/title>\n<meta name=\"description\" content=\"The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atlantic Council Recommendations to Better Secure the IoT Ecosystem\" \/>\n<meta property=\"og:description\" content=\"The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-26T11:17:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-10T14:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Atlantic Council Recommendations to Better Secure the IoT Ecosystem\",\"datePublished\":\"2022-10-26T11:17:12+00:00\",\"dateModified\":\"2023-02-10T14:01:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/\"},\"wordCount\":2302,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/\",\"name\":\"Atlantic Council Recommendations to Better Secure the IoT Ecosystem\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png\",\"datePublished\":\"2022-10-26T11:17:12+00:00\",\"dateModified\":\"2023-02-10T14:01:46+00:00\",\"description\":\"The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Atlantic Council Recommendations to Better Secure the IoT Ecosystem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Atlantic Council Recommendations to Better Secure the IoT Ecosystem","description":"The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/","og_locale":"en_US","og_type":"article","og_title":"Atlantic Council Recommendations to Better Secure the IoT Ecosystem","og_description":"The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-10-26T11:17:12+00:00","article_modified_time":"2023-02-10T14:01:46+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png","type":"image\/png"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Atlantic Council Recommendations to Better Secure the IoT Ecosystem","datePublished":"2022-10-26T11:17:12+00:00","dateModified":"2023-02-10T14:01:46+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/"},"wordCount":2302,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png","keywords":["Cybersecurity","Energy Sector"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/","name":"Atlantic Council Recommendations to Better Secure the IoT Ecosystem","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png","datePublished":"2022-10-26T11:17:12+00:00","dateModified":"2023-02-10T14:01:46+00:00","description":"The global deployment of billions of Internet of Things (IoT) devices has contributed to an explosion in data processing.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/10\/Atlantic-Coucnil-Report.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/atlantic-council-recommendations-to-better-secure-the-iot-ecosystem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Atlantic Council Recommendations to Better Secure the IoT Ecosystem"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3868"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3868"}],"version-history":[{"count":4,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3868\/revisions"}],"predecessor-version":[{"id":3873,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3868\/revisions\/3873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3953"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}