For example, the device can be used to track people's physical locations, said Tripwire's Westin.
"This has both security and privacy implications," he said. "Not just from a malicious attackers perspective, but also overzealous marketing."
Will the Apple Watch make the iPhone more vulnerable?
Some security-conscious users will routinely turn off their phone's WiFi or Bluetooth services when in insecure locations or traveling.
But if the Apple Watch functionality relies on those services, then they may be tempted to leave them on.
"Connecting to untrusted WiFi points can lead to man-in-the-middle attacks," said Cigital's Boote. "And Bluetooth seems to get a vulnerability or exploit every other year."
The real issue, said RedSeal's Hultquist, is complexity.
"All of the comments about potential security issues are conjecture at this point, and more than anything point to the challenges of understanding the security of complex, interconnected systems," he said.
Those challenges include understanding what communication access is possible, what access might be possible under unexpected situations, and what the implications are of unanticipated access.
"These are the same questions every enterprise must answer about their enterprise network and its security architecture," he said.
Sign up for Computerworld eNewsletters.