CYBER IIoT IN THE ENERGY SECTOR
Marcos Semola
Managing Director @ Accenture US ? Security Consulting Lead ? Board and CISO Advisor ? GRC Expert ? MBA Professor ? STEM Mentor
The energy transition imposed on the sector suggests a solid digital transformation of the business model in search of operational efficiency, emissions reduction, and intelligence anchored in data. Cybersecurity in the industrial environment plays an essential role in managing new risks to unlock value, accelerate transformation, and protect investment (RODI*).
?
ENVIRONMENT IN TRANSITION
New opportunities in an expanding and transforming market are associated with renewable energy, carbon capture, use and storage, low-carbon hydrogen, and e-mobility, and these go far beyond the traditional value chain of the oil and gas sector.
There are naturally growing concerns about the confidentiality, integrity, and availability of information that supports these critical industrial environments.
?
TRANSITION RISKS
Scalability challenges to guarantee the Return on Digital Investments (ROID) are not small and involve the quality and availability of data; the agility of the operational model; the adaptability of workforce skills; and also due to financing restrictions that support so many changes.
The risk that most stands out to me is associated with the effects of the need to converge information technology (IT) and operational technology (OT) environments. There is evident value generation when we promote an integrated operation model, which is fundamental to achieving business efficiency objectives. However, it is necessary to understand and address the particularities of each of these environments to eliminate new unwanted risks.
?
TRANSITION IMPACTS
There is a notable difference in the potential impact of an information risk materialized in a corporate information technology environment compared to an industrial operating technology environment.
Despite some similarities, the magnitude and materiality of impacts tend to vary substantially. On the list, we have the potential slowdown in production-operational activities, the loss of revenue and market value, the loss of data that produces non-conformities and legal responsibilities, the theft of confidential data and intellectual property, environmental erosion in general, and also the risk of loss of human life.?
领英推荐
By definition, OT assets tend to be more critical precisely because they produce the potential for more extensive, severe, and lasting impact and damage to a wider range of physical, technological, and human assets.
The sector has been witnessing a volumetric increase in cyber attacks and a significant increase in the average financial cost resulting from a data incident that supports the operation, rising from 3.1 million dollars in 2015 to 4.6 million dollars in 2021. According to IBM's Cost of Data Breach Report 2022.
TRANSITION CHALLENGES
The energy sector needs new practices, models, and technologies to thrive. Information security risks are omnipresent and magnified in times of change. The sector needs to leave inherited and isolated organizational hierarchies in the past to embark on an integrated and convergent model between IT and OT that transforms it and allows its companies to be digital, agile, scalable, intelligent, safe, and resilient.
The challenges of digital transformation and sector convergence are complex in themselves and include: - automation toward IP
?
As a complicating factor, we have to take into account Brownfield environments that restrict the possibilities typically applicable to Greenfield environments, such as implementing the security-by-design model. We also have to seek creativity with defense-in-depth approaches such as layered security (FTH), which respects the limitations and technical specificities of the environment and, even so, provides additional and operational control within acceptable levels of information security.
?
CONCLUSION
The Industrial Internet of Things (IIoTs) is driving companies toward a fully integrated architecture with IT (information technology) and OT (operations technology) systems functioning as a unified entity. This new operating model must be surrounded by new controls and security standards that keep up with new levels of exposure and risk.
Credit: This keynote presentation was developed and delivered by Marcos Sêmola, serving as EY Cybersecurity Energy Leader LATAM during the Petrobras IIoT Congress in 2023. The entire video record can be seen at https://www.youtube.com/watch?v=rdOrTfE1mo8
Realtor/Model/Actress Owner/Managing Broker at Check Point Realty
8 个月Wonderful!
Driving Sales Excellence & Strategic Partnerships | Championing Cybersecurity Innovation | Empowering Growth at Bunny.net
8 个月With increased connectivity comes heightened exposure to cyber threats. It's imperative that businesses prioritise cybersecurity measures tailored to the unique challenges of IIOT environments to avoid any unnecessary fallout.
Managing Director @ Accenture US ? Security Consulting Lead ? Board and CISO Advisor ? GRC Expert ? MBA Professor ? STEM Mentor
9 个月RELEVANT NEWS 'CISA released seventeen Industrial Control Systems (ICS) advisories on February 15, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.' https://www.cisa.gov/news-events/alerts/2024/02/15/cisa-releases-seventeen-industrial-control-systems-advisories
Technology and Cybersecurity leader | Helping organizations address complex challenges and be resilient | CISSP, GICSP, CBCP, PMP
9 个月Marcos, I wish your presentation were in English. I enjoyed it more than the article (nothing wrong with it, I just enjoyed the video more). The opening remarks around the challenges associated with the technology "abundance", including in cybersecurity, was very good. Digital technologies have the potential to revolutionize the industry, but it will make the operations even more dependent of data and technologies that may be exploited. Also, the analysis on the lack of digital IP in the Energy industry, when compared to other industries is also intriguing. I wonder about the causes of that.
Senior Director Cyber Security UK | UAE | KSA IT/OT/IOT/AI/SOC
9 个月This is a good read. Thanks for sharing. With the IIOT gaining pace, it will be beneficial to use 62443-4-1, 4-2 & 3-3, compliant IOT devices.