Encryption & Key Management , Endpoint Security , Governance & Risk Management

IoT Devices: A Security-By-Design Approach

Reliance Unlimit's CEO Juergen Hase Describes Esssential Steps
IoT Devices: A Security-By-Design Approach

As the explosive growth of the internet of things continues, it's essential to take a structured approach to implement security-by-design with secure coding and end-to-end encryption of data, says Mumbai-based Juergen Hase, CEO of Unlimit, the IoT business unit of the Reliance Group.

Because IoT devices generate huge amounts of data - and protecting data privacy is critical - it's crucial to secure the originating source of the data, Hase says in an interview with Information Security Media Group. Developing a security and risk architecture is essential, he adds.

"The security blueprint of the IoT project should devise the architecture to enable security at the SIEM layer and build in security into the hardware/chip level for use in IoT devices that addresses every touch point in the network and all elements at the device level," Hase says. "Securing codes from the design stage and end-to-end encryption of all touch points will enable the team to identify the vulnerabilities of the data in real time."

In this interview (see audio player link below image), Hase offers insights on:

  • The effectiveness of team integration as a strategic approach to the IoT project ecosystem;
  • Adhering to regulatory compliance for data privacy and management;
  • A sustainable approach to securing IoT infrastructure from the get-go.
  • The role of block chain technology and data brokers in improving security.

Hase is a telecommunications industry veteran, having worked for 30 years to develop, implement and execute new businesses in different global markets. He has 10 years of experience in the IoT arena. Since last year, he's been CEO of Unlimit, an IoT business unit of the Reliance Group based in Mumbai. Previously, he was the director of IoT at the Ooredoo Group, based in Qatar, and was the founder and vice president of the M2M Competence Center based at the headquarters of Deutsche Telekom in Bonn.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.