Booz Allen Commercial delivers advanced cyber defenses to the Fortune 500 and Global 2000. We are technical practitioners and cyber-focused management consultants with unparalleled experience – we know how cyber-attacks happen and how to defend against them.
Our strategy and technology consultants have empowered our international clients with the knowledge and experience they need to build their own local resources and capabilities.
In facing challenges of modernization, our Middle East and North Africa clients have complex requirements that benefit from our proven experience in guiding major programs and projects for governments and private-sector organizations. The services we offer in UAE, Qatar, Egypt, Turkey, Kuwait, Morocco, Jordan, and other regional countries build on our consulting legacy.
Our clients call upon us to work on their hardest problems—delivering effective health care, protecting warfighters and their families, keeping our national infrastructure secure, bringing into focus the traditional boundaries between consumer products and manufacturing as those boundaries blur.
Booz Allen was founded on the notion that we could help companies succeed by bringing them expert, candid advice and an outside perspective on their business. The analysis and perspective generated by that talent can be found in the case studies and thought leadership produced by our people.
Learn more about Booz Allen's diverse culture and environment of inclusion that fosters respect and opportunity for all employees.
We've come a long way delivering innovative solutions. But our next chapter is still being written.
Our 22,600 engineers, scientists, software developers, technologists, and consultants live to solve problems that matter. We’re proud of the diversity throughout our organization, from our most junior ranks to our board of directors and leadership team.
Booz Allen takes pride in a culture that encourages and rewards the many dimensions of leadership—innovative thinking, active collaboration, and personal service. We’re particularly proud of the diversity of our Leadership Team and Board of Directors, among the most diverse in corporate America today.
May 11, 2015
The Internet of Things (IoT) promises different value based on your industry and role within your organization. For you, it may be bringing your building’s existing climate control system online to conserve energy and save money. For someone else, it may be embedding a new networked medical device that improves health and increases quality of life. The IoT is made up of the convergence of two worlds—cyber-enabled legacy systems and connecting newly emerging smart devices. But along with the multitude of benefits, this IoT convergence creates attractive new targets for malicious threats.
Bringing Legacy Systems Online
In the past, standalone systems happily cranked along doing their programmed tasks. For example, spinning electric meters measured power usage, and railroad sensors monitored trains on the tracks. Over time, companies have started bringing these systems online to enable remote accessibility and advanced monitoring and control. Now, companies are beginning to integrate these systems with other IT infrastructure to create efficiencies and derive greater value—creating a “systems of systems” with an ever-expanding cyber attack surface. Are your cyber-enabled systems protected? Are they creating a bridge between vulnerable points of entry and critical assets?
Launching New IoT Solutions
On the other side, newly emerging smart devices are blurring the lines between our physical and virtual worlds. Automakers are building connected cars that enable drivers to stream music, get weather alerts and even find parking spots. The FAA approved the use of drones for oil and gas inspections. Are you integrating these devices into your enterprise systems? Have you built in adequate security to protect your networks?
Many organizations may be unaware of the security risks created by cyber-enabling legacy systems or integrating edge technologies. As an organization, it is important to understand the interconnections of IoT systems, whether legacy or emerging. Follow these steps to start addressing IoT security now:
Following a clear integration plan to incorporate legacy and new smart devices into your enterprise will help you better secure the converging IoT worlds.
ABOUT THE AUTHOR
Dr. Angela Orebaugh (@AngelaOrebaugh) is a cyber technology and security expert and fellow at Booz Allen Hamilton. Find out more about emerging trends connected to IoT, including changes in cyber risk, detention and incident response in an April 2015 report, IoT Creates Entirely New Set of Risks and Organizations Embrace Active Defense.