RIoT Control

1st Edition

Understanding and Managing Risks and the Internet of Things


RIoT Control

Print book


 Not Yet Available

Pre Order


RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.

Key Features

  • Explains sources of risk across IoT architectures and performance metrics at the enterprise level
  • Understands risk and security concerns in the next-generation of connected devices beyond computers and mobile consumer devices to everyday objects, tools, and devices
  • Offers insight from industry insiders about emerging tools and techniques for real-world IoT systems


IT architects or operational decision-makers and managers tasked with specifying or designing IoT systems

Table of Contents

  1. Introduction – The Internet of Things
  2. The Anatomy of the Internet of Things
  3. Understanding IOT requirements and use-cases
  4. Business and Organizational requirements in the IOT
  5. Operational and Process requirements in the IOT
  6. Threats in the IOT
  7. Where are the soft spots? Vulnerabilities of the IOT.Risks, metrics and Key Performance Indicators for IOT RIOT Control


No. of pages:
© 2017
Morgan Kaufmann
Electronic ISBN:
Print ISBN:

About the author

Tyson Macaulay

Tyson Macaulay is a Chief Technology Officer and Chief Security Strategist with over 20 years in the security industry and experience at firms such as Fortinet, Intel and Bell Canada. Tyson is also a researcher with lectureship, books, periodical publications and patents dating from 1993. Tyson supports the development of engineering and security standards through the International Standards Organization (ISO), and Professional Engineers of Ontario. Specialties: Telecom-grade security design, Enterprise Risk Management, Technical Risk Management, Security Architecture, Security Methodology, Security Audit and Compliance, Security program development and Governance, International Standards development, Internet of Things (IoT), International Security Standards.