Mitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure
Mitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure
Operational technology (OT), buildings, and critical infrastructure are becoming smarter and more efficient with connected systems, controls, sensors, and more. With connected OT and IT systems, cybersecurity risks increase as vulnerabilities become more widely exposed. Cyberattacks bring financial, operational, and intellectual property risks, and studies show cybercrime could cost $5.2 trillion worldwide within the next five years.
Key Topics
In this webinar, representatives from Advantech and Veridify Security will discuss:
• The evolving cyber threat landscape
• Security implications of OT/IT convergence
• Elements of a Zero Trust security framework
• Real-time protection, device-level cybersecurity with Intel-based DOME™
Webinar: Mitigating Cyber Risks in OT, Buildings, and Critical Infrastructure
Webinar Summary
The “Mitigating Cyber Risks in Operations Technology” webinar delves into the pressing cyber security challenges faced by operations technology (OT) systems. As OT systems become smarter and more interconnected with IT systems, they also become more susceptible to cyber threats. Indeed, the convergence of IT and OT is touted as a driver of efficiency; however, it has inadvertently expanded the attack surface available to malicious actors. Carolyn Swann, representing Advantech, emphasizes the growing complexity of OT environments where legacy systems, proprietary technologies, and unique operational requirements pose significant challenges to cyber security. Louis Parks from Veridify Security elaborates on the limitations of current IT-based cyber security solutions when applied to the OT space. Veridify’s cybersecurity solution, DOME, is introduced as a method for device-level security. DOME provides real-time protection tailored specifically for OT networks, safeguarding devices at the edge of a network. Unique features include zero-touch onboarding, mutual authentication, and comprehensive encryption aimed at ensuring secure communication across OT devices. Ultimately, DOME stands out as a “cyber security solution in a box” that simplifies deployment and operation, equipping organizations to counter the escalating cyber threats in the OT domain.
Highlights
- Evolving Cyber Threat Landscape: Cyberattacks in OT networks are surging, significantly affecting operational and financial aspects.
- Legacy System Vulnerabilities: Many OT environments still rely on outdated infrastructure, making them more susceptible to attacks.
- Cyber Security Gaps: Unique challenges arise within OT due to lack of user interfaces on critical devices, hindering traditional security methods like two-factor authentication.
- Unique Solutions Required: The specificity and diversity of OT devices require tailored security measures that IT-focused solutions do not adequately address.
- DOME Technology Overview: DOME provides real-time protection and creates a secure environment for OT devices via a zero-trust security framework.
- Simplified Deployment: DOME’s zero-touch onboarding allows for rapid installation without the need for extensive IT resources.
- Future-Proofing Against Quantum Threats: DOME anticipates the need for resilience against future quantum computing threats, integrating advanced cryptographic methods.
Key Insights
- Diverse Cyber Threats in OT: The shift towards IT-OT convergence has massively increased the potential points of entry for cyberattacks. Organizations must recognize that OT systems can face vastly different types of cyber threats compared to traditional IT environments, which can have dire consequences, impacting not only finances but also human safety.
- Legacy Systems: Carolyn’s insights reveal a pressing need for modern cyber security measures in legacy OT systems. Many facilities operate on devices that may have been installed decades ago, underscoring the importance of retrofitting these systems with contemporary security measures.
- Device-Level Protection: Unlike traditional IT security, DOME focuses on protecting individual devices at the network’s edge rather than merely monitoring network traffic. This targeted approach mitigates risks that arise from the connections established between OT and IT systems.
- Zero Trust Principles: An effective zero-trust framework is fundamental for enhancing OT security. DOME constantly re-authenticates users, ensuring that unauthorized access attempts are thwarted, reinforcing the notion that one should not automatically trust any element within the network.
- Economic Factors: The financial burdens posed by cyberattacks are becoming more evident, creating pressure on organizations to invest in cost-effective security solutions. DOME’s model delivers robust cyber security measures without requiring extensive IT overhead.
- Simplicity in Deployment: DOME’s user-friendly implementation process represents a fundamental advantage in the cybersecurity market. The zero-touch onboarding allows for quick deployment, reducing the need for in-house IT expertise, thereby inviting a wider range of users to adopt modern security technologies.
- Addressing Future Threats: The webinar points towards potential future threats posed by advancements in quantum computing. By incorporating advanced security measures today, DOME positions itself as a future-proof solution in an increasingly complex cyber landscape.
Conclusion
Cyber security in operations technology is growing increasingly intricate as the convergence of IT and OT systems becomes commonplace. The webinar points out that while traditional IT-focused solutions are necessary, they are not sufficient for safeguarding OT environments. DOME’s device-level security tailored for OT networks is pivotal in enhancing security postures amidst rising cyber threats. The ease of deployment and adoption of DOME could represent a significant advantage for organizations looking to future-proof their operations against both present and emerging challenges, making it an invaluable asset in the ongoing fight against cyber risks.
This webinar was presented by Veridify Security and Advantech, and hosted by Automation World on Dec 6, 2022.
Learn more about DOME for:
Keywords: mitigating cyber risks in operational technology
Hashtags: #otsecurity #smartbuildings #buildingautomation