Connect with us

Hi, what are you looking for?

HEADLINES

OPINION | Resolving the challenges of IT-OT convergence

John Maddison, Senior Vice President-Products & Solutions, Fortinet

By John Maddison, Senior Vice President-Products & Solutions, Fortinet

For decades, computer and data networks – known as Information Technology (IT), and industrial control system (ICS) operations and process control groups – often labeled as Operations Technology (OT), have run as isolated and independent networks, with entirely different objectives and requirements. That is beginning to change.

At its most basic level, IT is responsible for the creation, transmission, storage, and securing of data. Network compromises can have an immediate financial impact on an organization, often resulting in such things as the loss of customer confidence, fines and penalties, and even lawsuits.

OT, on the other hand, is focused on establishing and maintaining control processes with physical impact, such as manufacturing floors and production environments, whether local or in the field. Recent developments, including the need to more effectively compete in the digital marketplace, are now causing these traditionally separate environments to converge. A growing number of industries have already begun integrating networking and digital communications into the OT space by deploying new Industrial IoT (IIoT) devices such as smart meters, automated asset distribution systems, and self-monitoring transformers.

OT Security Challenges

Advertisement. Scroll to continue reading.

These changes aren’t without risks. A cyber attack that successfully targets an OT ICS, supervisory control and data acquisition (SCADA) control system, or even connected devices such as valves, gauges, or switches, could result in devastating physical consequences to such things as critical infrastructure and services, the environment, and even human life.

Other concerns include the inability to properly identify, measure, and track risk, IT outages that impact customer-facing systems, and the interruption of business operations due to a catastrophic event. These challenges are being compounded by the lack of security expertise inside organizations, not only within their own in-house staff (reported by 40% of organizations), but also with the third party vendors they outsource their security services to (41%). This is not just due to the growing cybersecurity skills gap facing the entire computing industry, but also the fact that even available security professionals have little experience with OT environments.

As a result, nearly 90% of organizations with connected OT infrastructures have experienced a security breach within their Supervisory Control and Data Acquisition and Industrial Control Systems (SCADA/ICS) architectures, with more than half of those breaches occurring in just the last 12 months. Security concerns include viruses (77%), internal (73%) or external (70%) hackers, the leakage of sensitive or confidential information (72%), and the lack of device authentication (67%). And over a third are now concerned with the exploitation of backdoors built into connected IoT devices.

Overcoming Resistance

These and other challenges have resulted in strong internal resistance against bringing these two teams and infrastructures together, with mistrust coming from both sides. This is primarily due to these teams having fundamentally incompatible approaches to addressing cyber risk.

Advertisement. Scroll to continue reading.

IT’s top security priority is protecting data, including intellectual property, corporate financials, and employee or customer private data. To address these challenges, they tend to follow the traditional CIA hierarchy for security: confidentiality, integrity, and availability.

OT, on the other hand, uses an inverted CIA model, where availability comes first, and safety is typically the top priority of availability. OT teams need to ensure that such things as control processes and production yields are not put at risk due to network changes. As a result, infrastructure components in OT networks tend to have extended life cycles, and traditional IT best practices like patching and updating can potentially take a currently functional system offline, with significant and unintended consequences.

How to Get Started

These differences are not intractable. Careful planning and coordination, combined with open communications and effective listening are critical to converging these different environments and reaping the potential benefits. These include:

Strategic executive alignment: Team leaders need to all understand and agree to the business objectives and benefits of converging these resources. Common goals and clearly defined outcomes help all teams drive towards an effective solution.

Advertisement. Scroll to continue reading.

Establishing a joint task force: Once goals and outcomes are defined, few approaches are more effective than bringing representatives from all impacted teams together to voice concerns, debate strategies, scope out the project, and develop a common set of processes. The first objective should be to educate each other on the challenges such a project entails. This will help drive a solution that all parties can embrace. However, be prepared for this process to take some time.

Running pilot programs: This generally goes without saying, but every step of the process outlined by the joint task force needs to be run, sometimes repeatedly, in a controlled environment before turning it on in a production network. There is a lot at stake, so fine tuning operational controls, security measures, and contingency plans before applying them to a live environment is essential.

Convergence covers more than technology

Integrating IT and OT requires more than converging networking resources. It is critical that organizations avoid the pitfalls created by developing a parallel security team for the OT portion of their network. The duplication of staff, training, and resources is not only an expense that few organizations can sustain, but resulting organizational gaps can also raise governance, risk management, and compliance issues.

The Answer to Complexity is Simplicity

Advertisement. Scroll to continue reading.

Success in the new digital economy requires developing integrated networks that are able to seamlessly leverage all available resources, even those ICS/SCADA systems deep inside your OT network. While malicious cyber actors demonstrate their ability to exploit the expanding digital attack surface, organizations need to respond not by adding new isolated devices to their security wiring closet, but by deploying an integrated security framework which prioritizes critical functions such as speed, collaboration, advanced analytics, and risk-based decision making. Such an approach, built around a flexible fabric strategy, enables comprehensive protection at machine speed and scale, while integrating appropriate solutions across both IT and OT environments into a single, centralized, and automated security system.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Fortinet Secure SD-WAN transforms wide area networks (WANs) by enabling resilient architecture and flexible security deployments on-premises and in the cloud with digital experience monitoring...

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

HEADLINES

While only 21% of hackers believed that AI technologies enhance the value of hacking in 2023, 71% reported it to have value in 2024....

HEADLINES

Kaspersky has enhanced its Kaspersky Industrial CyberSecurity (KICS), a native XDR Platform for industrial enterprises, and streamlined Managed Detection and Response (MDR) for Industrial...

MOTORING

HATASU, your go-to brand for safe, sustainable, and value-for-money mobility solutions, is gearing up to make this season fang-tastic for everyone—young and old alike!

HEADLINES

When asked about how satisfied they were with their job, 85% of respondents shared a neutral or positive answer, which equals to an overall...

HEADLINES

Located in the Kaspersky office, the new facility will provide the company’s stakeholders with services ranging from an overview of Kaspersky’s practices, to a...

Advertisement