OT organizations are still moving too slowly toward fully protecting their OT assets – but there are ways to address these challenges.
By Jim Richberg, Field CISO, Public Sector, Fortinet
Let’s start with the bad news first – operational technology (OT) organizations are still moving too slowly toward fully protecting their OT assets – even as industrial systems come under increased threat (with geopolitical events making attacks more likely). A major challenge is that as IT and OT have converged, it’s created new opportunities for bad actors – in other words, there are more vectors for potential attack. It’s no surprise, then, that 93% of OT organizations experienced an intrusion in the past 12 months, and 78% experienced more than three, according to the 2022 State of Operational Technology and Cybersecurity Report.
Here’s the good news – there are ways to address these challenges, including encryption, network segmentation and cybersecurity governance, among others.
The report referenced above finds that enterprises are still moving too slowly to ensure that their operational technology (OT) assets are fully protected. This comes at a time when industrial systems are becoming more essential to the well-being of many businesses, more OT systems are connecting to the internet, geopolitical events are increasing the likelihood of attacks and IP-based threats are getting more advanced and damaging. This confluence of variables is pushing OT security up the risk hierarchy in many enterprises.
While OT security has the attention of corporate leaders, it continues to be owned by relatively low-ranking workers, according to this year’s report. Though security is a factor in most survey respondents’ performance metrics, many are evaluated more on efficiency criteria, which may tempt leaders to cut corners on security.
Enterprises’ security outcomes haven’t changed much during the last year. Money or data loss, brand erosion, downtime, and even lower physical safety were all consequences. Most organizations, without a doubt, have more work to do. However, a small percentage of survey respondents reported experiencing no incursions last year, and the report outlines some best practices that are likely to be used by such organizations. These include implementing role-based network access control (NAC) and making security vulnerability response time one of their top success metrics.
OT networks used to be air-gapped, isolated environments. Availability and reliability have traditionally taken precedence over cybersecurity in critical infrastructure and production scenarios. However, the advent and proliferation of IT applications that monitor and manage real-time industrial environments has caused OT and IT networks to converge. Because of this convergence, OT is now vulnerable to the same cybersecurity dangers that IT has been dealing with for decades.
Machines and devices may connect and share data thanks to this convergence of IT and OT networks. However, the growing risks to critical infrastructure are significant. You can better protect your business from cyberattacks by understanding the ramifications of convergence.
Efficiency, productivity, and overall profitability have all improved due to the digitization of operational processes. Even though the convergence IT and OT has had a significant influence on enterprises, new cyber risks have emerged because malicious actors now have access to newly connected systems. Organizations require security solutions that bridge their IT and OT networks and meet the operational needs of both sides. Segmentation, encryption and the other best practices noted above will help meet the requirements of today’s converged organizations.
About the author:
Jim Richberg is a Fortinet Field CISO focused on the Public Sector working to bring cybersecurity solutions to industry and the public sector following a 30+ year career driving innovation in cyber intelligence, policy and strategy for the United States Government and international partners. He served as National Intelligence Manager for Cyber and the senior Federal Executive focused on cyber intelligence within the $80+ billion U.S. Intelligence Community (IC) annual operating budget. He was the Senior Advisor to the Director of National Intelligence (DNI) on cyber issues and set collection and analytic priorities for the IC’s 17 departments and agencies on cyber threats.
Magen Buterbaugh is the President & CEO at Greene Tweed. Listen to her insights on her ambition to be a lawyer and how her math teacher suggested she consider chemical engineering. Now with several accolades to her name including being honored as one of the 2020 Most Outstanding Engineering Alumnus of Penn State and a Board Member of National Association of Manufacturers (NAM) she has never looked back.