{"id":17465,"date":"2020-01-16T11:00:18","date_gmt":"2020-01-16T19:00:18","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2020\/01\/16\/news-11201\/"},"modified":"2020-01-16T11:00:18","modified_gmt":"2020-01-16T19:00:18","slug":"news-11201","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/16\/news-11201\/","title":{"rendered":"Is OT security ready for the next wave of cybercrime?"},"content":{"rendered":"<p><strong>Credit to Author: Christophe Blassiau| Date: Thu, 16 Jan 2020 13:46:02 +0000<\/strong><\/p>\n<p>Forrester\u2019s <em>Predictions 2020: The Internet of Things<\/em> <a href=\"https:\/\/go.schneider-electric.com\/WW_202001_Prediction-IoT_EA-LP.html?source=Content&amp;sDetail=Prediction-IoT_WW\">report<\/a> has an eye-opening forecast on cybercrime for the coming year \u2013 an IoT prediction that demands that we collectively consider how to strengthen OT security.<\/p>\n<h2><span style=\"color: #3dcd58\">We cannot close the door on connectivity\u2019s many benefits. It\u2019s clear that connectivity across people, assets, and systems empowers us to make full use of extracted data to improve operations and processes.<\/span><\/h2>\n<p> <a href=\"https:\/\/twitter.com\/intent\/tweet?text=We%20cannot%20close%20the%20door%20on%20%23connectivity%E2%80%99s%20many%20benefits.%20It%E2%80%99s%20clear%20that%20connectivity%20across%20people,%20assets,%20and%20systems%20empowers%20us%20to%20make%20full%20use%20of%20extracted%20data%20to%20improve%20operations%20and%20processes.%20Read%20more%20here%20https%3A\/\/blog.se.com\/security-management\/2020\/01\/16\/is-ot-security-ready-for-the-next-wave-of-cybercrime%20%23IT%20%23OT%20%40SchneiderElec\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-52576 alignright\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2018\/11\/CTA-Twitter.png\" alt=\"\" width=\"200\" height=\"20\" \/><\/a> <\/p>\n<p>&nbsp;<\/p>\n<p>This is especially true as the line between IT and OT blurs as companies sync up operations to leverage real-time monitoring, <a href=\"https:\/\/blog.se.com\/energy-management-energy-efficiency\/2019\/09\/26\/the-data-economy-3-paths-to-value\/\">data-driven business models<\/a>, cloud-based and edge analytics, digital twins of industrial processes, a seamless digital ecosystem from shop floor to back-office business processes, and more.<\/p>\n<h3><span style=\"color: #3dcd58\"><strong>What are the common risks to OT security?<\/strong><\/span><\/h3>\n<p>According to the <a href=\"https:\/\/ics.kaspersky.com\/media\/2019_Kaspersky_ARC_ICS_report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">State of Industrial Cybersecurity 2019 report<\/a>, about \u201c70% of companies surveyed consider an attack on their OT\/ICS infrastructure likely.\u201d What are some of the inherent risks to address now before these attacks manifest?<\/p>\n<h4><span style=\"color: #626469\"><em>A wide attack landscape<\/em><\/span><\/h4>\n<p>Every connected device is associated with an endpoint that hackers could pinpoint to infiltrate and manipulate the entire digital ecosystem. Think about this: today\u2019s smart factories now have hundreds \u2014and even thousands \u2014 of connected sensors. A holistic approach to cybersecurity \u2014 from product security to supply chain protection \u2014 is imperative.<\/p>\n<h4><span style=\"color: #626469\"><strong><em>Legacy infrastructure with aging assets<\/em><\/strong><\/span><\/h4>\n<p>Many of the systems that control the world\u2019s most critical operations were installed and<\/p>\n<p>developed decades ago before the rise of the industrial IoT (IIoT), and they were intended for long-term use. As digitization proliferates rapidly, <a href=\"https:\/\/www.se.com\/ww\/en\/work\/services\/field-services\/industrial-automation\/industrial-cybersecurity\/industrial-cybersecurity.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">assessing the risk of legacy systems<\/a> is critical, and an end-to-end cybersecurity plan should address both new and aging systems.<\/p>\n<h4><span style=\"color: #626469\"><strong><em>Targeted attacks on unique weaknesses<\/em><\/strong><\/span><\/h4>\n<p>Unlike IT attacks, which typically aim for the biggest number of users, OT attacks tend to target a specific weakness within a single target. This approach requires specific paths of protection, as widespread defensive measures such as antiviruses are not commonly applicable or even could incapacitate the device itself. What\u2019s more, disconnecting the affected system often is too complex in factory environments.<\/p>\n<h4><span style=\"color: #626469\"><strong><em>Regular exposure to third-party access<\/em><\/strong><\/span><\/h4>\n<p>It\u2019s very common for external vendors\/field service engineers to be granted privileges to access OT devices through their own laptops and USB devices, the internet, or fully hosted environments with little control. This broader access poses risk even if there is no inherent malicious intent. The attack surface widens with each connected laptop or thumb drive.<\/p>\n<h3><span style=\"color: #3dcd58\"><strong>Securing the OT environment<\/strong><\/span><\/h3>\n<p>With such nuanced OT risks, it is essential to move from reaction to proactive planning and prevention specifically to strengthen industrial cybersecurity. The risk to uptime and availability and, more urgent, to worker and public safety, is too great to ignore.<\/p>\n<p>Some recommended steps include the following:<\/p>\n<ul>\n<li>Network segmentation;<\/li>\n<li>Policies for people and operating models;<\/li>\n<li>Plans and measures to avoid the cascading effect;<\/li>\n<li>Securing legacy infrastructure; and<\/li>\n<li>Adopting shared responsibility.<\/li>\n<\/ul>\n<p>According to <a href=\"https:\/\/www.accenture.com\/us-en\/insights\/cybersecurity\/reinventing-the-internet-digital-economy\" target=\"_blank\" rel=\"noopener noreferrer\">a recent Accenture survey<\/a>, 79% of CEOs say that their organization is \u201cadopting new and emerging technologies faster than they can address related security issues.\u201d Learn in Schneider\u2019s <a href=\"https:\/\/go.schneider-electric.com\/WW_202001_Cybersecurity-Whitepaper_EA-LP.html?source=Content&amp;sDetail=Cybersecurity-Whitepaper_WW\" target=\"_blank\" rel=\"noopener noreferrer\">OT security white paper<\/a> how to make sure your cybersecurity strategy can stay steps ahead.<\/p>\n<h3><span style=\"color: #3dcd58\"><strong>Protecting OT infrastructure via collaboration<\/strong><\/span><\/h3>\n<p>One of the key measures of prevention is response. What are the lessons learned from any and every attack and how can we fortify the digital ecosystem as a result? The Wannacry ransomware attack in 2017, for example, was startling well beyond the incident, as it ultimately revealed that all industrial players needed to work together to ensure a path to safety in the OT world across the entire digital ecosystem. The need for ardent collaboration prompted Schneider Electric to become a founding member of the <a href=\"https:\/\/www.isa.org\/news-and-press-releases\/isa-press-releases\/2019\/july\/isa-announces-first-founding-members-of-global-cybersecurity-alliance\/\" target=\"_blank\" rel=\"noopener noreferrer\">ISA Global Cybersecurity Alliance<\/a>, for example, as well the <a href=\"https:\/\/www.se.com\/ww\/en\/documents\/Press\/2019\/03\/04-release-cybersecurity-coalition-tcm50-463982.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Coalition<\/a>.<\/p>\n<h3><span style=\"color: #3dcd58\"><strong>Fortifying OT security <\/strong><\/span><\/h3>\n<p>Only together can we raise the bar on protecting industry at large and strengthening collective trust players in the digital economy as industrial players pursue the many benefits of the <a href=\"https:\/\/www.se.com\/ww\/en\/work\/campaign\/iiot\/\">IIoT<\/a>. For the coming year and beyond, commitment and collaboration are the foundation of a strong industrial security posture for business-critical infrastructure.<\/p>\n<p> <a href=\"https:\/\/go.schneider-electric.com\/WW_202001_Prediction-IoT_EA-LP.html?source=Content&amp;sDetail=Prediction-IoT_WW\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-63344 size-full\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2020\/01\/Download-the-OT-Security-Cybersecurity-White-Schneider-Electric_560x150.png\" alt=\"Download the OT Security -Cybersecurity White from Schneider Electric\" width=\"560\" height=\"150\" srcset=\"https:\/\/blog.se.com\/wp-content\/uploads\/2020\/01\/Download-the-OT-Security-Cybersecurity-White-Schneider-Electric_560x150.png 560w, https:\/\/blog.se.com\/wp-content\/uploads\/2020\/01\/Download-the-OT-Security-Cybersecurity-White-Schneider-Electric_560x150-300x80.png 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a> <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/security-management\/2020\/01\/16\/is-ot-security-ready-for-the-next-wave-of-cybercrime\/\">Is OT security ready for the next wave of cybercrime?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.se.com\/security-management\/2020\/01\/16\/is-ot-security-ready-for-the-next-wave-of-cybercrime\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christophe Blassiau| Date: Thu, 16 Jan 2020 13:46:02 +0000<\/strong><\/p>\n<p>Forrester\u2019s Predictions 2020: The Internet of Things report has an eye-opening forecast on cybercrime for the coming year \u2013 an IoT prediction that demands that we collectively consider how to&#8230;  <a href=\"https:\/\/blog.se.com\/security-management\/2020\/01\/16\/is-ot-security-ready-for-the-next-wave-of-cybercrime\/\" title=\"ReadIs OT security ready for the next wave of cybercrime?\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/security-management\/2020\/01\/16\/is-ot-security-ready-for-the-next-wave-of-cybercrime\/\">Is OT security ready for the next wave of cybercrime?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[12608,12512,10495,12982],"class_list":["post-17465","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-cyber-security","tag-iiot","tag-iot","tag-security-management"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17465"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17465\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17465"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}