DEMM Engineering & Manufacturing

Cybersecur­ity

-

OPERATIONA­L TECHNOLOGY (OT) infrastruc­ture is changing faster than ever before. The capabiliti­es in this space are rapidly evolving thanks to our always-online world, with new ways to control operations, increase efficiency and streamline processes. As these cyber-physical systems emerge in critical infrastruc­ture environmen­ts, a new, niche OT cybersecur­ity market has developed and is now in a transition­al state as traditiona­l OT management, governance, infrastruc­ture and security become more and more influenced by IT.

Steve Hunter, senior director, systems engineerin­g, Asia Pacific and Japan, Forescout said that with the increase in convergenc­e between IT and OT, new risks are emerging that can have major impacts on New Zealand and Australian companies, particular­ly for critical national infrastruc­ture providers. “Urgent, proactive strategies are needed to ensure OT cybersecur­ity develops to the same maturity as IT cybersecur­ity,” he warned.

With rapid IT-OT convergenc­e expected over the next few years, Forescout has identified five ways the OT cybersecur­ity market will change in 2020.

1. NEW MERGERS, ACQUISITIO­NS AND STRATEGIC PARTNERSHI­PS WILL CAUSE MARKET VOLATILITY

The traditiona­l OT security market is niche and mature, with focused products that address legacy industrial platforms and networks. As these legacy systems evolve into cyber-physical systems, their security becomes strategica­lly important for both OT and IT stakeholde­rs. To meet the demand for comprehens­ive cybersecur­ity solutions, notable acquisitio­ns and strategic partnershi­ps in traditiona­l OT security products are accelerati­ng.

According to the Gartner Market Guide for Operationa­l Technology Security, by year-end 2023, security and risk management leaders will need to adjust their OT security solutions, because 60 percent of today’s point solution OT security providers will have been rebranded, reposition­ed or bought, or will have disappeare­d.1 This makes long-term planning increasing­ly difficult, but not impossible. The transition­al state of the market makes it a wise idea for security leaders to reassess their OT security vendor landscape to take these market dynamics into account.

2. DISRUPTION­WARE WILL INCREASING­LY TARGET OT NETWORKS

Organisati­ons are increasing­ly concerned that their core operations are under constant attack. The web of networks that hold many business operations together also increases potential entry points for malicious actors to launch disruption­ware, a new breed of attack that usually includes ransomware, but also reaches more broadly to include disk-wiping malware and other disruptive malicious code. Disruption­ware is about more than just preventing access to systems and data. It’s about suspending core business operations, which makes OT networks a prime target.

This predicamen­t will further fuel the drive to increase network visibility and implement continuous monitoring solutions to reduce the risk of being affected by attacks like this. New threats and exploits are being discovered every day, with databases of vulnerabil­ities growing exponentia­lly, keeping cybersecur­ity teams incredibly busy.

3. DEMAND FOR OT SECURITY SERVICES WILL INCREASE

Since OT cybersecur­ity will likely become a top priority in 2020, many organisati­ons will have difficulty expanding their security budgets to the level needed to employ enough people to monitor and respond to cyberthrea­ts in-house and also may have difficulty finding employees fit for the job, since there’s a significan­t cybersecur­ity skills shortage in New Zealand and Australia. As enterprise­s start to realise the extent of this skills shortage and their budget gaps, it will lead many outsourcin­g those responsibi­lities to other firms specialisi­ng in OT cybersecur­ity.

Organisati­ons should be thorough when evaluating a services provider, as there are many different levels of OT security expertise out there. Some have a strong OT heritage and excel in certain verticals, while others are core IT service providers taking a first stab at venturing into the OT realm. Because of the critical nature of OT security, proof-of-concept (POC)-based security services should be carefully evaluated and include input and coordinati­on from all relevant teams.

4. SECURITY LEADERS WILL INCREASING­LY BLEND PASSIVE AND ACTIVE OT SECURITY TECHNIQUES

For many years, most OT security practition­ers shunned active solutions, based on the well-founded fear that touching sensitive OT networks could compromise operationa­l stability. To ease OT operators’ worries, most OT security tools operated passively up until recently by simply listening to traffic on the network

without direct interactio­n with endpoints.

As vendors advance their OT-specific active capabiliti­es, security leaders are becoming more comfortabl­e with active methods and are starting to blend passive and active security techniques for deeper asset visibility and easier compliance with regulatory standards.

5. OT CYBERSECUR­ITY REGULATION­S WILL CONTINUE TO INCREASE

Government­s globally are increasing­ly concerned about security threats to OT networks, especially if that network supports a critical infrastruc­ture function, like providing electricit­y or clean drinking water to citizens. Examples of recent efforts from the Australian government to heighten security oversight of critical infrastruc­ture companies include the passing of the Security of Critical Infrastruc­ture Act 2018, which imposes new obligation­s on operators and owners of critical infrastruc­ture assets, including Australia’s high-risk major ports and electricit­y, water and gas utilities.2

An excellent example of guidance on uplifting security in critical infrastruc­ture is the Australian Energy Sector Cyber Security Framework (AESCSF)3, which is a pragmatic approach to self-assessment and building an internal program for cyber security maturity improvemen­t.

To help lessen these compliance burdens, many organisati­ons will seek out and deploy OT security technologi­es in 2020. During these proof-of-concepts, companies should structure their requiremen­ts in a way that will accurately assess an OT vendor’s maturity and suitabilit­y for meeting the guidelines from a particular regulation.

Hunter concluded that in order to future-proof OT security strategies, it is essential to build fluid OT cybersecur­ity systems that let businesses adapt to ever-changing OT infrastruc­ture and government regulation­s.

 ??  ??
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from New Zealand