OT Cybersecurity Checkup: 300 Leaders Weigh in on Progress
Author: Zane Blomgren
When an OT cybersecurity incident occurs, the consequences can be severe. Find out how industrial environments are doing with their cybersecurity initiatives.
Manufacturing plants and industrial environments rely heavily on operational technology ?(OT) to monitor and control production and processing, manage equipment and oversee logistics—all mission-critical components of an efficient, reliable operation.?
When an OT cybersecurity incident occurs, the consequences can be severe:
On top of this, organizations across industries are creating connections between their OT and IT systems to drive real-time visibility, cost reductions, scalability and uptime. This convergence of IT and OT connectivity means that more devices are connecting to networks, which expands the threat landscape.?
To better understand the cybersecurity views, postures and approaches of today’s OT and IT teams, we worked with Omdia to survey 300 IT and OT decision-makers around the world.
?
How decision-makers are managing OT cybersecurity
According to the survey, 92% of organizations have experienced some type of cybersecurity incident, and nearly half of those incidents (47%) were serious breaches that had an impact on business, whether in the form of reputation damage, financial loss or something else.?
To reduce the likelihood of a cybersecurity incident, and accelerate recovery if and when an event occurs, there are a few key initiatives that plant environments can pursue.
?
Cyber assessments
To identify vulnerabilities and reduce risk, cyber assessments are essential. They can help:
To better understand how respondents handle cyber assessments, we asked them how often these evaluations are performed in OT security. Nearly all say they conduct them in some form every year:
Assessments aren’t isolated events or mere checkpoints. Instead, they are dynamic evaluations that go beyond compliance to help organizations better understand their defenses so they can adapt and fortify their responses to remain protected in an ever-shifting threat landscape.?
The right partner can help you determine the proper frequency and adequate level of depth you should pursue for your cyber assessments.
领英推荐
?
Incident response plans
The aftermath of an incident lasts far beyond the breach itself. Once an event occurs, organizations don’t want to find themselves standing on uncertain ground, with doubt surrounding the steps required to properly navigate the aftermath of an OT breach.?
Robust incident response plans are a strong cyberattack-mitigation tactic. They minimize the mean time to response (MTTR) and prevent operational downtime in industrial settings .?
According to what decision-makers revealed in the survey about their incident response plans, there’s a need for more processes to be tailored to OT incident response. While 72% of organizations are adopting approaches to incident response that are unique to OT, almost one-third aren’t: 13% of respondents have no incident response processes in place, and 15% plan to create them in the future but haven’t started yet.
?
Products certified to IEC 62443
Globally recognized standards, such as IEC 62443, help organizations ensure that products and services are safer and better protected against attacks.?
When asked how important it is that the products they purchase are certified against standards like IEC 62443, 49% of respondents indicate that it’s “very important,” while 37% deem it as “important.” Only 2% don’t think it’s important; the remaining 12% feel neutral about it.
?Investing in products certified to IEC 62443 can improve security ?and compliance and reliability, with less probability of failure caused by a cybersecurity event.
?
OT cybersecurity is a journey, not a destination
Preventive controls are pivotal to address OT cybersecurity challenges.?
For example, Network Access Control (NAC) ?is a key protective technology that seamlessly and effortlessly integrates monitoring and control across critical segments to safeguard users and devices.?
It mitigates cybersecurity and operational risks while restricting network access, along with the potential impact of events like malware, ransomware and misconfigurations.?
Cybersecurity is an ongoing journey that is built on continuous improvement. This means that organizations must regularly assess the effectiveness of their controls and make adjustments accordingly to enhance resilience.?
Download the full report to explore our cybersecurity findings.
?