Cybersecurity Crash Course, Pt 1 of 2: The Case for Investing in Cybersecurity
In an era of increased frequency and sophistication of cyber threats, any one defensive approach can be hacked. To be fully guarded, a secured network must incorporate several different components. A cyberattack on an exposed OT network is a looming security risk with potentially devastating consequences, including extended production downtime, system reformatting and possible hardware replacement. The costs of a cyberattack can be financially catastrophic, but can also hurt your reputation or cause compliance issues that result in hefty fines and even shutdowns. Part 1 of this 2-part blog series helps the reader to understand both the challenge of securing a network as well as the urgent need to do so. Part 2 of the series will discuss most of the OT network components and structuring strategies that collectively build a Zero Trust network architecture. Cyberattacks are a reality; no one can avoid them forever. The goal is to be sufficiently resilient to remain in operation in the midst of an attack. And to accomplish that, we must understand the whats, whys and hows of industrial security automation. Understanding the OT Network in an Automated Facility The Operational Technology (OT) space on a plant floor is a highly complex network environment with distinct characteristics from its Information Technology (IT) network cousin. The space has traditionally been used in a limited manner, connecting local devices that communicate with each other for production purposes and little else. While these devices may be of varying ages and vulnerabilities, as a group their network use patterns are similar, and distinct from typical IT network traffic. Devices on an OT network are generally setup to run all the time, requiring very reliable, and continuous communication as they control and coordinate the manufacturing process. The lifespan of OT devices is typically longer than IT devices, which means … Continued
