EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
How EY can help
-
Our EY teams can help your business transform your operational technology environment.
Read more
OT, the overlooked second cousin to IT
Effectively coming to terms with these new materiality requirements forces CISOs to focus more intently on OT than ever before. Everything that companies do within OT centers on the business mission, historically either producing and delivering a commodity (such as power, water or gas) or manufacturing a product. Each aspect therefore has materiality dimensions.
However, OT systems are unique from a cyber perspective in that they require different policies, processes, procedures and tools than IT. While similar security and risk management processes to IT can be leveraged, OT risks and active threats must be mitigated differently and require different knowledge. Yet, compared to IT, OT has always been seen as outside of the core mission of the business and is treated as less of a priority, overlooked when decisions are made and budgets are set.
IT typically “owns” the cyber budget, with visibility only into the limited number of systems in the OT space that also overlap with IT. This misses the entire Industrial Control System/SCADA architecture or automation systems. And KPIs in the plants, for example, compound the issue, as cyber implementations and security can be seen as hurdles preventing greater efficiencies. Historically, our clients purchase some technology to fix an issue — but it is a patchwork solution that isn’t integrated into a broader program that is more holistic, manageable and auditable.
As a result, CISOs face challenges in meeting the materiality demands presented by recent regulations. While commodities and products are easily correlated to their monetary value in a sales function, for example, that linkage is virtually nonexistent in cybersecurity, especially in OT. CISOs and CIOs may understand the “crown jewels” of their enterprises, but they are programmed for implementing controls and hardening defenses across the organization — to do as much as possible amid perennially strained budgets. They view the problem through the lens of technology, not business impact.