Does your organization have a security strategy in place for new technologies such as wearables? Many measures used for endpoint protection and mobile security can be applied in this instance, but you should run risk assessments all the same.