Big Interview – Brian Bishop, OCF

Security Buyer sits down with Brian Bishop, President of the Open Connectivity Foundation to discover his view on the current security landscape 

What is the Open Connectivity Foundation’s (OCF) mission? 

As the number of internet protocol (IP) connected devices grows, so does the need for secure interoperability within the Internet of Things (IoT). Otherwise, the increasing amount of sensitive data flowing across the internet between devices and clouds can easily land in the wrong hands. IoT security must be a priority, and this is what drives the OCF. 

The OCF is a global, member-driven technical standards development organization comprised of over 500 members working across the enterprise layers of infrastructure, applications, and data. We aim to foster collaboration across the IoT ecosystem to ensure that IP-connected IoT devices and services are developed with interoperability, secure communication and trust in mind – and that they can communicate securely over IP, regardless of form factor, operating system, service provider, transport technology or ecosystem.  

We do this by encouraging adoption of the OCF’s freely available ISO/IEC specifications, including our Secure IP Device Framework, our open-source reference implementation, and an industry-recognized certification program. This enables new secure IoT use cases and user experiences, reduces development costs for IoT devices and services, reduces integration complexity and time to market, and simplifies regulatory compliance to IoT security and privacy baselines. 

 

Securing vital systems against cyberattacks is a key priority for the international security industry. How does the OCF’s framework mitigate security threats? 

As an ISO/IEC adopted standard, our Secure IP Device Framework has been internationally agreed upon by technical experts to essentially be used as a blueprint by developers and manufacturers for the creation of secure and interoperable IoT deployments. It integrates state-of-the-art cybersecurity technologies to enable device discovery, onboarding and application-layer security for device-to-device and device-to-cloud connectivity. The use of Public Key Infrastructure (PKI) backed by strong certificate protections helps to safeguard sensitive data.  

We’ve also done the legwork to benchmark our standard against all known IoT security requirement baselines – CTAC2 Conveners, UK IoT Requirements, ETSI, IASME, and NIST 8259D – comparing each paragraph of our specifications against the corresponding clause in the security baseline. Designed from the ground up, the OCF is compliant with forthcoming IoT security standards, such as the EU Radio Equipment Directive (RED). 

 

How important is the adoption of secure open standards globally for IoT? 

Standards are crucial for mass market adoption of technology as they ensure consistent quality, safety, interoperability, and compatibility of products and services. The need for secure open standards is particularly true for IoT security since developers and manufacturers are operating in a climate of increased awareness of the value of data. Users and consumers must have complete confidence that their privacy is being respected.  

For more news updates, check out our May issue here.

Media contact 

Rebecca Morpeth Spayne, 

Editor, Security Portfolio 

Tel: +44 (0) 1622 823 922

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Cloud, AI, and Integration: Rhombus on What’s Next in Physical Security

Garrett Larsson, Co-Founder and CEO of Rhombus Systems, explores how cloud, AI, and…
Image provided by Veeam

AI and Ransomware: Cutting Through the Hype

Rick Vanover, Vice President Product Strategy, Veeam discusses how It might be the great paradox: Artificial Intelligence (AI)….
Copyright: Security Buyer

AmiViz Partners with Titania

AmiViz announced a strategic distribution agreement with Titania. This collaboration underscores a shared commitment to enhancing…
Copyright: Security Buyer

Facial Recognition: Innovation vs. Accountability

Facial recognition technology is advancing with AI, IoT, and privacy-first security, but regulatory compliance, ethical AI, accountability…
Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures.
blackhat

Black Hat Europe Starts Soon

Black Hat Europe starts Monday and now is the perfect time to start planning your experience. With a full lineup of Keynotes…

VIVOTEK’s All-in-One Software Boosts Operational Efficiency for Enterprises

As demand for high-efficiency security systems rises among large enterprises, the global leading…
Assa Abloy website

WTC Amsterdam enhances security and efficiency with digital access solution

The World Trade Center (WTC) Amsterdam, home to over 300 companies, has upgraded its building security with a streamlined, digital access solution from ASSA ABLOY.
John Maddison website

Fortinet launches Lacework FortiCNAPP to enhance cloud-native security

In an advancement in cybersecurity, Fortinet has announced Lacework FortiCNAPP, providing organisations with visibility and security.
Scroll to Top