Our Story

Business Partners from Day One
Concannon Business Consulting was founded to address the growing need for experienced project and program management teams across a variety of industries. Our team is comprised of experienced resources that deliver immediate project impact and value for our clients, with the mission of 100% customer satisfaction. Our company has grown from two business partners to dozens of consultants servicing clients in the automotive, financial, high-tech, hospitality, retail, and consumer packaged goods industries.

Locations

» Los Angeles
» Dallas
» Seattle

Latest News

info@concannonbc.com

+1 949 419 3801

Top
 

IoT Security

The internet of things is revolutionizing connectivity and also demanding new approaches to comprehensive security.

Connected Security

As more connected devices are added to the internet of things, maintaining strong security grows both more important and more difficult.  Integrating security thinking and management practices into new technology projects is imperative to preventing breaches.

An Exploding Market.

The last decade has seen an explosion in the types and number of devices connecting to the internet and to each other. Everything from cars and phones to lightbulbs and fridges is now both a customer experience upsell and a possible attach vector. The opportunities presented by the growing internet of things are hard to ignore, but many companies neglect to follow basic security practices when deploying new IoT projects, resulting in high-profile breaches costing millions of dollars. CBC has been working with connected devices for nearly a decade and understands the importance of taking security seriously, as well as how to integrate security products and services seamlessly into both existing and new project infrastructure.

Read More
50

Billion Internet Connected Devices by 2020

2

Trillion Dollars in IoT Spending by 2020

454

Known Corporate Data Breaches in 2016

4000000

Average Dollar Cost of a Data Breach

Key Considerations for IoT Security

Policies

Setting the right internal policies is imperative to ensure that devices are secure without impacting employee productivity

Partners

There are dozens of partners to choose from when selecting security products and services. Choosing the right ones is key to a comprehensive security approach

Entry Points

New devices means new entry points attackers could potentially use. Keeping track of these devices is critical to maintaining security awareness

Monitoring

Actively monitoring network access, permissions, and usage is required in order to flag potential threats and head off security weaknesses

Integration

Security-first thinking needs to be integrated into every new project to ensure that new weaknesses aren't introduced when launching products and services

Expenditure

Security spending on preventative measures needs to be evaluated as a core business expenditure instead of low-ROI invstment.

How We Can Help

Security Product Integration

We have experience working with major security vendors and integrating solutions into existing programs. We can help identify the right software, hardware, and service vendors to meet your needs and ensure successful integration of their offerings into your infrastructure.

Connected Experience Strategy

CBC has been building connected experiences for clients in the automotive and retail industries for close to a decade. We can help you understand the opportunities and challenges of creating connected experiences, as well as create a security-minded plan for entering this market.

Expert Program Management

Our highly skilled team has extensive experience with all aspects of program management, from managing roles and expectations to reviewing system requirements and implementation timelines. We can help bolster your security program and project management teams with on the ground resources to keep you moving in the right direction.

Ready to Tackle IoT Security?

We have extensive experience in making connected experiences engaging as well as secure.  From in-vehicle hardware to identity and access management SaaS solutions, we have the knowledge and processes to help you evaluate, secure, and expand IoT offerings.  Our team is ready to help yours tackle the challenges of IoT today.
Contact Us Today