27
1. The risk that a compromised IoT device poses depends on the type of product and how it is used. That is
one of the first security considerations when designing an IoT device.
2. An important part of developing secure products is ensuring that you have a secure supply chain
for components, which involves evaluating the cybersecurity practices of suppliers and testing their
components, particularly microcontrollers and sensors.
THOMAS MOSEL
Principal Product and Solution
Security Officer (Principal PSSO)
Smart Infrastructure, Siemens
KEY POINTS