Advancing Protection in OT Dependent Industries - Sobel Network Shipping Co., Inc.

Advancing Protection in OT Dependent Industries

The operational technology (OT) security has suffered decades of neglect but is now receiving attention from the Biden Administration. Many are struggling to improve cybersecurity and infrastructure, but they are encountering many roadblocks.

OT Attacks Increasing

In the U.S. essential services include water, power, and infrastructure. If a link in the chain breaks, then vital services become quickly disrupted. The Colonial Pipeline attack showed the urgent need for OT organizations to revamp their vulnerability management practices.

In 2020, reports showed that OT attacks increased by a staggering 30 percent. Utility companies are using IT networks to control operational technology security.

The use of sensors and robotics have their own security issues such as weak hardcodes and passwords.

Out-Dated Control Systems

Legacy technology in OT networks has old process control systems along with networking programs so cannot handle modern cybersecurity practices. As a result, many OT networks are in the dark. Often firewall management and path analysis are underused, and security teams have little understanding of their true vulnerabilities. Complete visibility is needed to truly understand the numerous problems.

Mitigation Efforts and Vulnerabilities

At present, CISOs and their teams have hit a loggerhead in their understanding of attack surfaces. Utilities and municipalities simply cannot afford the time consume disruption of their operations needed to replace legacy technology. Many remediation efforts happen only twice a year to limit downtime. If a security team cannot convince its stakeholders to implement mitigation efforts, then technology will remain vulnerable.

OT Security

In many situations, OT security lags years behind IT security measures. The effort to close the gap between the two is difficult and feels impossible. OT organizations must have apathy combined with denial.

Avoiding Attacks and Achieving Safety in OT Networks

Municipalities and utilities must implement a very proactive stand to avoid an attack. OT environments must become protected.  New models of detection and response have become a necessity.

To achieve safety OT networks, need to undertake the following:

 

  • Collect data from security and networking technology
  • Construct a network model
  • Launch a path analysis
  • Prioritize OT vulnerabilities and identify any patch avoidance options

If security leaders implement these practices, then they will be able to identify and remediate an attack before it occurs. In addition, they can expand existing security policy programs from hybrid and IT environments.

In the past, OT cybersecurity has been costly and sadly inefficient. It is imperative that organizations not delay updating and adopting an improved security platform. Safety should become the number one concern in OT environments.

Cyber-attacks are potentially devastating. OT-dependent industries must take the measures needed to avoid the threats immediately as the criminals become more skilled and aggressive.