Visual Roadmap for cyber security for IoT

Visual Roadmap for cyber security for IoT

The visual roadmap represents a high-level 360-degree plan for implementing a systematic IoT cybersecurity process. The collaborative work anchors IoT cybersecurity in the company by establishing a common language and a visualisation of the plan. 

Visual Roadmap for cyber security for IoT

Visual Roadmap for cyber security for IoT

The visual roadmap represents a high-level 360-degree plan for implementing a systematic IoT cybersecurity process. The collaborative work anchors IoT cybersecurity in the company by establishing a common language and a visualisation of the plan. 

Visual Roadmap for cyber security for IoT

Visual Roadmap for cyber security for IoT

The visual roadmap represents a high-level 360-degree plan for implementing a systematic IoT cybersecurity process. The collaborative work anchors IoT cybersecurity in the company by establishing a common language and a visualisation of the plan. 

Visual Roadmap for cyber security for IoT

Visual Roadmap for cyber security for IoT

The visual roadmap represents a high-level 360-degree plan for implementing a systematic IoT cybersecurity process. The collaborative work anchors IoT cybersecurity in the company by establishing a common language and a visualisation of the plan. 

IoT Cyber Security Learning Module

September 27, 2023

The module – in brief 

The result of working with this tool is a plan in the form of a visual roadmap that fits the needs of the company regarding IoT cybersecurity. The roadmap is made through collaborative discussions focusing on the importance and timing of core tasks involved in cybersecurity for IoT.

The collaborative work anchors IoT cybersecurity in the company through a common language and a visual representation of the resulting planning-decisions that can be easily shared and used in meetings.

The core tasks are represented in the four building blocks for IoT cybersecurity.

Prerequisites for using the tool

This tool builds on knowledge of the four building blocks for IoT cybersecurity as acquired through the tool Building blocks for cybersecurity.  

Roadmap for IoT cybersecurity 

A roadmap provides peace of mind

Each of the four building blocks represents a task for furthering IoT security, and of course they interact and depend on each other.

In the perfect world, all building blocks would be developed in parallel, if needed. But this might not be possible in a busy day in the company. The rationale of the roadmap is that the building blocks need to be prioritized according to time and importance. 

By prioritizing time and importance, the company can address the most important aspects of IoT cybersecurity in the present situation, while at the same time ensuring that the other building blocks will be dealt with in their right time.

Visual Roadmap 

The roadmap is a grid with two axes where the building blocks get represented by the company.

Roadmap axes: importance and time

The roadmap template has two axes (see template below): 

  • The Y-axis represents the importance of the building block (low, medium, and high importance)
    • The wording of the building block's 'importance' on the Y-axis is intentionally qualitative to make it open for interpretation by the company. However, if this is too open to make sense of the building block’s importance, the following factors could be considered: 1) The tasks related to the building block: are they important for the company's business? and 2) Needed resource investments for developing the building block: can/should the investments be made now or later?
  • The X-axis describes the timing of the building block.
    • Here the company decides the scale. Each column in the roadmap can refer to one year (then the roadmap will be a 5-year plan), six months or two years depending on the actual planning horizon.

Drawing the building blocks

The roadmap template is divided into squares to invite the company to draw its own building block shapes by filling out connected squares. This might leave open spaces in the roadmap, but sometimes all squares will be filled out. 

Based on the building blocks' importance and timing for the company, the company will decide on the form of each of the four building blocks. This will be done by filling out squares in the template to visualize the importance and extension in time of each building block in the roadmap. See the example of the completed roadmap below.

Visual Roadmap for cyber security for IoT

“Roadmap” by CyPro under license CC BY-SA 4.0 

project logos
Roadmap
Printable version of the tool in large format

Example of a visual roadmap

Visual Roadmap for cyber security for IoT

“Example for roadmap” by CyPro under license CC BY-SA 4.0 

In the example, the building block ’Regulation and Standards’ has continued attention in the whole roadmap period, but this block also has low importance for the company. This is more like a continuous steady trickle.

In the first year, the focus is on developing the building block 'Alignment of business and security' and this block remains important as technologies keep on emerging and evolving.

In year 2 and onwards, there is also medium focus on 'Approach to security and risk' and in years 4 and 5 'Processes and organizational integration' becomes increasingly important.

Company profile in example

The roadmap profile of this example company is business oriented IoT cybersecurity where cybersecurity is seen as important for the business model, and IoT security is always developed as a part of each new IoT product or service (Integrated IoT cybersecurity). At the same time, the company has awareness of the need for compliance with regulations, while working steadily to improve IoT cybersecurity practices and organizational integration.

Practical information

Invite people whose knowledge represents as many aspects of the building blocks as possible, to avoid decisions being postponed to a later meeting. Plan for the meeting with a duration of approx. 2 hours, incl. a short break.

3-4 persons are the best group size for the initial roadmap discussions and planning. More people can be included later to verify, calibrate, and discuss the visual roadmap.

Preparations to the meeting:

  • Share the work the company did with Building blocks for cybersecurity with the participants in due time before the meeting.
  • Bring information on relevant plans and strategies that the IoT cybersecurity impacts as the roadmap may interact with these plans and strategies, for example business strategies, quality system, development of new IoT solutions and technologies.
  • Print out the empty roadmap template (preferable in A3), one for each participant plus extras.
  • Bring coloured pencils or markers for the drawing of the building blocks. Four colours are needed.

Step-by-step guide

This guide is divided into three parts: 

  1. Preparation of the template, 
  2. Drawing the building blocks, and 
  3. Assessment of the resulting visual roadmap. 

The whole group works collaboratively in the same roadmap during the meeting and uses their own copy for trials or notes or experimenting with the form of building blocks. 

Prepare the shared template
(15 minutes)

This entails deciding on the time horizon for the roadmap, incl. considerations of alignment with other planning horizons in the company such as strategy, customers, development projects etc. 

When ready, write the time intervals on the X axis of the shared roadmap.

Draw the building blocks 
(20 minutes per building block)

  1. Consider the content of the four building blocks for the company by consulting the work done in relation to Building blocks for cybersecurity. If needed, discuss the content in the group.
  2. Pick a building block and decide:
    1. How important is this building block for the company's IoT security? (Low, medium, high)
    2. Which period does the building block belong to? How extended in time is it? Are more building blocks needed at the same time because they interact?
    3. Draw the form of the building block in question by colouring squares in the template to reflect time and importance.
  3. Reality check of the building block just drawn:
    1. Does the company have resources and competences to work with the building block and create the foundation needed for the upcoming/interacting building blocks?
    2. Is the building block aligned with the remainder of the roadmap? (More important the more building blocks are included in the visual roadmap) Make appropriate adjustments if needed. Maybe start over on a new template to clear up mistakes.
    3. Who is accountable and responsible for driving the building block's development in the company?
  4. Repeat steps 2 and 3 with different drawing colours until all four building blocks are included in the roadmap.

Assess the resulting visual roadmap 
(15 minutes)

Based on the shared visual roadmap, assess the following points:

  1. Can all participants take responsibility for the plan for the company's IoT security as represented by the visual roadmap?
  2. Does the roadmap sustain the company's need for cybersecurity?
  3. Does everyone acknowledge accountabilities and responsibilities?
  4. What is the next step from here?

Outcome

The collaborative work anchors IoT cybersecurity in the company by establishing a common language and a visualization of the resulting planning-decisions that can be easily shared and used in meetings. The holistic nature of the roadmap guides the consideration of the company’s IoT cybersecurity situational context as a whole – making room also for considerations on how the building blocks interact.

The result is a shared plan that potentially spans functions and managerial levels. 

It becomes clear which building blocks to focus on as next steps, and the roadmap shows that everything does not have to happen at once.

Expert advice

While making the roadmap it becomes clear that the company 1) should not  invest in all building blocks all the time, but rather focus on creating a progessive sequence of building blocks, and 2) should not become over-committeed to one of the four building blocks but keep the development of all four building blocks in mind.

Also the roadmap represents the company's own, individual way of working with IoT cybersecurity.

The technologies in IoT solutions and services keep on evolving which implies that a building block can never truly be finished. Even though a building block is not in focus in the roadmap, the building block still needs ongoing attention and incremental adjustments along the way.

Explicit measurement of the progression with the building blocks might be a sound addition to the existing quality system in the company.

Next step

The next step is to go ahead with the process decided on in the new roadmap. Creating change in perceptions and behaviour towards IoT cybersecurity is a learning process closely connected to a company’s real-life context and a collaborative learning process for everyone involved in the company. 

The collaborative learning process can be structured and enlightened by the tailored collaborative change tool for IoT cybersecurity.

Visual Roadmap for cyber security for IoT

The contents described above have been developed in the project:

’CyPro – Cybersecure manufacturing in Denmark’ by Aarhus UniversityAlexandra InstitutDAMRCUGLA Insights and FORCE Technology funded by The Danish Industry Foundation. Material from the project is published under licence CC BY-SA 4.0

CyPro

bubble