Nowadays, Internet is everywhere. For instance, if you take a look around you will realize that more devices than you were expecting are connected to the net: your phone, laptop, fridge, heating.
The process of securing an IoT involves different centers of expertise and many sub-activities such as:
Analysis of the security level of a hardware.
Analysis of the security level of a software.
Analysis of the product designs, architecture and code.
Analysis of the communication between the device and the network
Analysis of the product web portals
Analysis of the product hosts