In today’s interconnected world, the importance of securing critical infrastructure and industrial processes cannot be overstated. Operational Technology (OT) systems, which encompass the hardware and software that monitor and control physical devices and processes, have become prime targets for cyberattacks.
OT Security organisation Waterfall reported a 140 percent increase in the number of cyber-attacks, with over 150 industrial operations affected. To fortify these systems against evolving threats, we must emphasise the symbiotic relationship between OT engineering communities and cybersecurity professionals. OT systems are the backbone of industries such as energy, manufacturing, pharmaceuticals, transportation, and healthcare.
The International Data Corporation (IDC) estimates there will be 41.6 billion connected IoT devices by 2025. These devices ensure the smooth operation of power plants, manufacturing lines, and even critical global healthcare research equipment. However, their integration with digital networks, cloud services, and applications continue to expose them to cyber risks.
The collaboration between OT engineers and cybersecurity specialists holds the key to enhanced mitigation against these threats, and importantly unlocking numerous benefits:
- Holistic Risk Assessment: OT engineers understand the intricacies of industrial processes, making them vital in identifying vulnerabilities unique to their systems. To go beyond typical IT Security compliance, a holistic OT risk assessment would leverage the IEC 62443 standard, and the strengths of MITRE’s ATT&CK for ICS, plus the ISO 31010 standard. Collaborating ensures a more comprehensive risk assessment that accounts for both operational and security aspects.
- Customised Security Solutions: Cybersecurity professionals bring expertise in security risk mitigation techniques, for example adopting a zero-trust model, which is typically only considered in traditional IT environments. The World Economic Forum's Centre for Cybersecurity paper on zero trust for OT networks defines zero trust as a “principle-based model designed within a cybersecurity strategy that enforces a data-centric approach to continuously treat everything as an unknown – whether a human or a machine - to ensure trustworthy behaviour”. Implementation of an OT Zero Trust model with essential collaboration with OT engineers allows for the implementation of this solution, whilst safeguarding critical systems, without hindering operational safety or efficiency.
- Timely Threat Response: In the event of a cyber incident, a well-established collaboration ensures a swift response. There are useful OT and Industrial Control System (ICS) threat sharing resources and programmes available to enhance the depth of information available to make informed decisions on, for example CISA's Automated Indicator Sharing community, NCSC advisories, and the Cyber Threat Alliance. Securing digital manufacturing OT engineers can provide real-time insights into the operational impact, while cybersecurity experts can focus on containment and recovery strategies.
- Knowledge Sharing & Skills: Bridging the gap between these two communities promotes knowledge sharing. The recent Cyber-Informed Engineering (CIE) initiative introduced by the US Dept of Energy last year, is starting to have a positive impact, particularly in the areas of awareness and education which acknowledges these collaboration efforts. Simulation of attacks on OT networks, in collaborative live fire exercises can maximise defence skills. Cyber range platforms, like Cyberbit, provides a full-scale, emulated OT network, including HMIs, hardware controllers (PLCs), and physical devices, and provides end-to-end simulations of IT to OT attacks. OT engineers can learn cybersecurity best practices, and cybersecurity professionals can gain a deeper understanding of industrial processes. This cross-pollination of knowledge is invaluable in staying ahead of evolving threats.
- Regulatory Compliance: Many industries are subject to stringent regulations regarding cybersecurity and safety. The National Institute of Standards and Technology (NIST) highlights the importance of integrating OT and IT security to meet regulatory compliance requirements, such as NIST SP 800-82 Rev 3 released in September, for industrial control systems. Collaborative efforts make it easier to navigate compliance requirements, e.g. NIS 2, reducing the risk of penalties and downtime due to non-compliance.
- Cost-Efficiency: Collaborative efforts can lead to more efficient allocation of resources. Ponemon Institute’s research found that organisations that integrated IT and OT security functions saved an average of 1.5 million in cybersecurity costs. Instead of duplicating efforts, OT engineering and cybersecurity teams can work together to prioritise and address the most critical security challenges.
- Innovation: OT systems are evolving rapidly with advancements like the Industrial Internet of Things (IIoT) and automation. Recent study by AT&T shows the innovation benefits from OT & IT collaboration leading to effective and efficient convergence benefiting from the latest industry tech advancements. Collaboration enables the infusion of cybersecurity measures into these converged innovations from the outset, creating inherently more secure systems.
- Resilience: Ultimately, the collaboration between OT engineers and cybersecurity professionals enhances the overall resilience of critical infrastructure. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) emphasises the importance of integrating IT and OT security to enhance the resilience of critical infrastructure systems. It ensures that systems can withstand cyberattacks and continue to operate safely, even in adverse conditions.
Cyber threats frequently exploit the seams between IT and OT environments, and without integrated security, an organisation is less prepared to defend against these threats. To address these challenges and improve overall cybersecurity posture, organisations are increasingly recognising the need to break down the silos between OT and IT security teams. Collaborative efforts, shared responsibilities, and integrated security strategies are essential to mitigating the complex and evolving threats that target both operational and information technology.
In conclusion, the benefits of collaboration between OT engineering communities and cybersecurity professionals are undeniable. As the threat landscape continues to evolve, our ability to secure critical infrastructure and industrial processes hinges on this partnership. Together, these two communities can fortify our essential systems, safeguard our industries, and ensure a safer, more secure future. It’s not just a collaboration; it’s a necessity.
Richard Beck
Richard is an experienced security professional, turned educator, with over 15 years in operational security roles. He is driven by a commitment to helping address immediate and longer-term cyber skills shortages and bring a more diverse range of individuals and experiences into cyber through eco-system collaboration.More articles by Richard
Securing the Supply Chain: Embracing Zero Trust for Digital Trust
QA's Director of Cyber Security, Richard Beck, looks into the adoption of Zero Trust in the Cyber Security supply chain.
18 January 2024How AI-Powered Cyber Range Elevates Teamworking Success
QA's Director of Cyber Security, Richard Beck, takes a look at the benefits of utilising AI in Cyber Ranges, including collaboration and teamwork.
02 November 2023Guardians of the Future: Ensuring AI Safety
In this blog, QA's Director of Cyber Security, Richard Beck, delves into the latest developments behind AI safety and governance, and its impact for businesses.
31 October 2023Is Your Business Quantum Safe?
QA's Director of Cyber Security, Richard Beck, looks into the impact that quantum science and technologies will have on businesses.
06 October 2023The Future of Cyber-Enabled Fraud
Deepfake, biometrics and artificial intelligence, QA's Cyber Practice Director, Richard Beck, takes a look at the future of cyber-enabled fraud.
15 March 2023Cyber Pulse: Edition 144 | 5 February 2021
Read the latest edition of Cyber Pulse: Microsoft Office 365 attacks sparked from Google Firebase, Otorio releases open-source tool for hardening commonly used HMI/S…
05 February 2021Cyber Pulse: Edition 146 | 4 March 2021
Read the latest edition of Cyber Pulse: Ransomware gang hacks Ecuador's largest private bank, Ministry of Finance, Amazon dismisses claims Alexa "skills" can bypass…
04 March 2021Cyber Pulse: Edition 154 | 14 June 2021
In this edition of Cyber Pulse: Volkswagen discloses data breach impacting 3.3 million, nuclear weapons subcontractor hit by cyber attack, industrial automation gian…
14 June 2021Cyber Pulse: Edition 121 | 21 July 2020
Read the latest edition of Cyber Pulse: Critical ‘wormable’ vulnerability in Microsoft’s Windows DNS Server, Twitter breach: 130 high-profile accounts hacked, Cozy B…
14 July 2020Cyber Pulse: Edition 128 | 8 September 2020
Read the latest edition of Cyber Pulse: New White House principles to protect cyber assets in space, Newcastle University attacked, Cisco Jabber's security flaw, a c…
09 September 2020