Young woman using digital tablet while standing by machinery in laboratory

Shifting operational technology cybersecurity from defensive to resilient

Unlocking the power of operational technology is crucial for safeguarding infrastructure. Discover how to enhance security today.


In brief
  • Operational technology (OT) is vital for critical infrastructure, yet often overlooked, posing significant risks to safety and operational continuity.
  • Cybersecurity leaders must prioritize OT vulnerabilities, driving visibility and robust security measures to prevent potentially catastrophic breaches.
  • A collaboration between IT and OT must focus on proactive security strategies and nonstop monitoring to protect critical systems.

Operational technology (OT) is essential to all critical infrastructure. These systems are foundational to the basic functions of factory assembly lines, transportation services buildings, electrical grids, nuclear power plants, water treatment facilities and many other complex physical facilities. 

Put simply, OT makes possible all the functions essential to society, business and our modern way of life. 

But for a chief information security officer (CISO), the priority is often IT, where innovation and rapid development bring new sleek tools and services that boost profits and increase efficiencies without addressing potential safety risks. Yet because all modern physical systems rely on OT software and hardware, a breach could cause widespread disruption to work and life.

1

Chapter 1

High stakes, real impact

Attacks on OT-based platforms can quickly cost lives, and the ensuing repairs present their own risks.

The interconnected nature of the core systems that run critical infrastructure means that failures caused by malicious attacks can be massively destabilizing, with results such as physical damage, production halts and even risks to human safety. For example, a compromised water treatment facility could result in a public health crisis, and an attack on an electrical grid could plunge cities into darkness and leave residents facing deadly temperatures.

 

Unlike back-end IT systems — mobile devices, personal computers and other digital tech — where cyber vulnerabilities can be patched with over-the-air updates, OT infrastructure may require complete overhauls. Power utilities, traffic light switches, military installations and building elevators can’t be stopped and rebooted without significant, even catastrophic, disruptions. 

 

The criticality of OT-based platforms and the severity of cyber threats against them has refocused CISOs’ and other cybersecurity leaders’ attention on OT vulnerabilities. Understanding these risks and the unique challenges they pose means gaining visibility into OT networks and deploying robust security measures that are more than an exercise in compliance. Rethinking OT security is about safeguarding operational and business resiliency and keeping employees safe from physical harm.

2

Chapter 2

From defensive to resilient

The best OT cyber defense exists where people, process and technology converge.

Getting OT security right starts with understanding the assets that are attached to your network. Many of the most significant outages due to a cyber event have come because an organization didn’t know that a tool, an access point or device was still attached to their network and had an exposed vulnerability or an insecure access process. Identifying system weaknesses, monitoring and responding to threats and prioritizing security measures based on potential business impact is key. In the real world, cybersecurity initiatives can improve any number of risk tolerance scenarios, from unplanned outages and undetected quality defects to safety incidents and waste. 

From there, an organization must align OT cyber risk with the business mission. The goal is to reduce the impact of cyber incidents on OT networks and to achieve optimum risk visibility into OT networks to heighten their resiliency. This is essential for the next step: continuous threat monitoring. Knowing what connected systems are in place and understanding the level of risk associated with each component is crucial to making informed decisions about where to allocate resources for the best safeguards. 

Continuous monitoring of the OT network enables organizations to detect potential threats early and to respond swiftly, long before risks escalate into major incidents. Having the right technology in place is critical. But tools are only as good as the people who use them. The highest standard of OT cyber defense is set at the nexus of people, process and technology. CISOs and cyber leaders are best served by teams that understand OT environments and are backed by leading-edge tech and reliable protocols to interpret the data, identify anomalies and heed the signals of potential threats.

3

Chapter 3

A holistic approach

A security plan that recognizes the differences in OT and IT security needs will safeguard OT systems.

High visibility into OT systems also empowers CISOs and plant or operations management to jointly devise a security roadmap that is a comprehensive multi-faceted strategy based on informed decisions. This is especially important because OT networks extend to third parties, exposing the networks to third-party risk. Today, the OT security boundaries include all those externally linked entities, including IT systems. 

This is why impact-dependent prioritization of security measures, asset and process segmentation, and trust taxonomies all feed into the decision-making matrix to reduce risk across a much wider network. And while OT and IT are not at odds, segregating the two can safeguard OT systems from risky IT environments. This calls for a basic recognition of structural differences between IT and OT security needs. Tasked with the same mission – to protect the business, people, and larger societal interests – IT and OT security and business leaders must establish a better exchange of challenges and limitations and collaborate to resolve them. 

In physical environments, safety is paramount. Gaining visibility into OT networks, aligning IT and OT priorities, and taking proactive security measures are essential to protecting these critical systems, core businesses, third parties and bottom lines. The greater the OT visibility, the higher the requirements to remediate risks. Security teams, operational and engineering teams, and business leaders need to work closely together to build on proactive measures and maintain a posture of response readiness across wider OT environments.

The views reflected in this article are the views of the author and do not necessarily reflect the views of Ernst & Young LLP or other members of the global EY organization.

Summary 

Regardless of the size and the industry sector, leaders who apply these methods to their OT operations will shift their cybersecurity posture from defensive to resilient.

About this article

Related articles

How to secure data centers from internal and external risks

Data center security is key; firms must tighten internal policies to shield sensitive info. Discover more.

21 Nov 2024 Bill Fryberger

How a consumer giant bridged the gap between cyber and business operations

Case study: how a conglomerate fortified its manufacturing operations against cyber threats through a comprehensive approach.

14 Oct 2024

How to navigate cybersecurity technology and help manage rising threats

Cybersecurity risks grow with digital expansion; AI/ML adoption invites advanced threats. Strategic defence and ecosystems are key. Learn more.

25 Sep 2024 Nicole Koopman
    You are visiting EY us (en)
    us en