BrandPost: Adding the operation focus to OT security

BrandPost: Adding the operation focus to OT security

Much is happening in the OT/ICS world. Industry 4.0 is in full swing, with IT and OT systems becoming more connected, cloud and edge services being explored, and AI making moves to optimize maintenance and productivity. These, and many other developments, leave most organizations in one of two camps: they have either a sense of excitement to enhance and maximize their operations or an increasing fear that, without action, a cyber event is just around the corner. 

This is an exciting time full of opportunities, but the risks also expand, outpacing the current security options and jeopardizing potential gains. A growing number of examples in the last few years have shown that cyber-criminals are increasingly motivated to target OT/ICS operators’ IT and OT systems. In 2021, Darkside’s attack on Colonial Pipeline showed how IT-based attacks could indirectly impact the availability of the OT operation. Then, in 2022, Sandworm showed a renewed Industroyer2 attack targeted directly at a Ukrainian energy provider’s OT/ICS systems. With such varied motivations behind attacks, staying ahead is no simple task. 

To read this article in full, please click here



Support the originator by clicking the read the rest link below.