IOT CATEGORIES
MOST POPULAR TAGS

IoT Regulations and the Information Security Program

IoT Regulations and the Information Security Program

iot regulations and the information security program image

Episode 44

Consider the IoT products of our sponsors by clicking on their logos:

IoT Sponsor 1

If your company is collecting data, and every IoT company collects data, it needs a formal “Information Security Program”. We’ve talked risk assessment in the past, that is the process of assigning liability to each potential security breach, but that’s only part of the program. In this episode of the IoT Business Show I speak with John Ansbach about the rest of the “Information Security Program”, impending regulation and privacy concerns.

In this episode of the IoT Business Show, I speak with John Ansbach about the rest of the “Information Security Program”, impending regulation and privacy concerns.

John is currently the General Counsel at General Datatech. He has over 20 years experience practicing law – half of that time leading in-house legal departments. At GDT, he leads teams that are responsible for information security, internal IT infrastructure, global operations and audit.

After the risk is assessed, the enterprise must plan on how to mitigate that risk if or when a breach occurs. Obviously security tech is developed with the effort at each attack vulnerability commensurate to the calculated risk, but beyond that we need information management policies and training as well as an incidence response plan to be practiced and followed.

Here’s What We’ll Cover in this Episode

  • The basic legal issues surrounding IoT and more specifically the data of IoT.
  • The importance of understanding the regulatory regime in your vertical.
  • The Wild, Wild, West of U.S. regulations and predictions on how they are going to change.
  • How you can use trade groups to represent you in shaping data laws and regulations.
  • Valuable tips for IoT buyer and seller contracts and how American Airline’s lawyers saved them a bundle.
  • The information Security Program and what it entails.

Mentioned in this Episode and Other Useful Links

Support this Podcast

If you have been enjoying this podcast, there are a few ways you can support it:

  1. Share it on social by clicking on the widget on the left or bottom of the page.
  2. Click here to open iTunes and leave a one-click review or write your thoughts.
  3. Consider becoming a Certified IoT Professional by enrolling in the ICIP online training program.

DOWNLOAD TRANSCRIPT

Ways to Subscribe to the IoT Business Show

Like what you hear?  Subscribe to get each episode delivered to your device via iTunes, SpotifyGoogle PlayStitcher Radio or RSS (non-iTunes feed).

Have an opinion? Join the discussion in our LinkedIn group

Do you have an Information Security Program in place?

Related Posts

Tags:
, ,