What is measured can be managed and monetized, “The Internet of Things” promises to enable companies to see, measure, control and benefit from the actions that are carried out in their businesses. It promises to automate activities that were previously manual, control the unimaginable and save information that was previously ephemeral.
The far-reaching possibilities of the “Internet of Things” have captured the attention and imagination of decision makers at all levels of the organization, from the operational line to the general direction. As a result, IOT implementations are now perhaps the most anticipated, but least understood, initiatives in today’s IT departments.
This union of anticipation and misunderstandings has produced a great division in the business world between what business says and what it does.
As the IOT continues its rapid expansion, countless organizations will attempt IOT implementation projects. These are high-pressure projects; organizations that fail will be a step back at best and at worst they could succeed in implementing a solution that undermines network security, overloads the company’s resources and does not deliver the return on investment.
Because ROI and security are the two most important factors driving the adoption of IOT and the two biggest associated risks, it is crucial that the leaders driving IOT adoption involve all stakeholders, including IT staff and expectations are discussed.
Use the following questions as a guide for your strategic risk assessment.
1. What is the business case for the implementation of this IOT initiative?
2. Exactly what metrics and reference points should the system deliver to be considered a success?
3. Can the network support the highest level of traffic and computing that will occur outside the network when this IOT system is implemented?
4. Is the network structured so as to allow efficient and low latency traffic flow from the IOT devices to other applications, data centers and devices that make up the IOT system?
5. Will this IOT implementation be within the corporate network? If so, what are the network security strategies that should be documented and implemented? If not, will a parallel network or a perimeter application defined by software be implemented?
6. How important is the availability of the network for the proper functioning and utility of this system?
7. What is the acceptable level for which the network is down?
8. Can the network guarantee the necessary availability with the current infrastructure? Otherwise, how will the company expand the network?