How to secure an OT manufacturing environment that accounts for growing IIoT adoption.
By Stefan Keller, chief product officer, Open Systems
Manufacturers face a unique set of challenges. They need to be nimble and able to rapidly scale to meet supply chain demand and realize the promise of Industry 4.0, while also managing an increasingly distributed workforce. They need a competitive edge in a crowded global market, which means adopting innovations such as Industry Internet of Things (IIoT) technologies to optimize operations.
As a result, IIoT adoption is growing. The IoT market in the manufacturing sector is expected to grow from $209B in 2022 to $461B in 2027, according to a Research and Markets study. These IIoT devices, a subset of operational technology (OT) devices, need to be secured to ensure OT integrity. Organizations are already facing an increased number of attacks on OT environments, according to McKinsey. Consequently, manufacturers face risks of disruption due to subpar OT security.
Many manufacturers use the Purdue Model, which relies on air gaps for security, as an architecture for their OT security practices. Previously, there was no concern about IT threats in OT environments because both environments were air-gapped, but that is no longer the case.
IIoT devices directly connect to the internet, which in turn makes OT environments vulnerable to external threats and malware. With manufacturers’ employees and partners increasingly working remotely, the OT environment must be exposed to the internet to enable this remote migration and type of work style. This convergence of IT and OT requires an expansion of IT security systems to secure IIoT and OT networks.
Here are three best practices for improving OT security:
With the convergence of IT and OT, safeguarding the OT environment is a priority. Organizations might think they can put modern OT security practices on the backburner, but they will be breached, and it will happen more quickly and more often than most expect.
Cybersecurity expert Paul Bischoff noted in a recent Comparitech study that in the last three years, US businesses specializing in manufacturing and utilities experienced 562 data breaches, with almost 91 million records put at risk. Using IBM’s estimated average cost per breached record, he estimated those breaches could have cost businesses more than $14.7 billion. In 2022 alone, he estimated that 136 data breaches targeting manufacturing and utilities have cost more than $6 billion.
By embracing these simple best practices and adapting to the evolution of OT environments, manufacturers will not only mitigate their risk but also position their organization as a forward-thinking operation that’s poised for growth and ready for the challenges and opportunities of Industry 4.0.
Stefan Keller, Chief Product Officer for Open Systems, is responsible for all aspects of product development for Open Systems’ Secure Access-as-a-Service solution. Previously, as Vice President of SASE, Stefan extended the portfolio with ZTNA and drove the company’s innovations in operational technology (OT) and was instrumental in initiating several of the company’s strategic acquisitions. Keller earned his Master of Science degree in Information Technology and Electronics from the Swiss Federal Institute of Technology (ETH).
Tune in to hear from Chris Brown, Vice President of Sales at CADDi, a leading manufacturing solutions provider. We delve into Chris’ role of expanding the reach of CADDi Drawer which uses advanced AI to centralize and analyze essential production data to help manufacturers improve efficiency and quality.