Page 32 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 32

Exploring the intersection of IT and OT security

            In  today's  interconnected  landscape,  the  intersection  of  IT  and  OT  security  has  become  critical  for
            organizations. Especially considering recent findings by Microsoft indicating unpatched, high-severity
            vulnerabilities in 75% of the most common industrial controllers in customer OT networks.

            The integration of IT and OT systems has undoubtedly enhanced operational efficiency and productivity
            across  various  industries.  However,  this  convergence  has  also  introduced  a  myriad  of  security
            challenges. Traditionally isolated and specialized systems are now interlinked, creating a complex web
            of  vulnerabilities  ripe  for  exploitation  by  cyber  attackers.  This  leads  to  85-90%  of  OT  cyber-attacks
            beginning in the IT environment.

            The volume of IoT devices is expected to exceed 41 billion by 2025 according to IDC. This highlights the
            urgent need for a more holistic approach to cybersecurity. While the security of traditional IT equipment
            has  seen  significant  improvements,  IoT  and  OT  security  has  lagged  behind,  leaving  organizations
            susceptible to a wide range of cyber threats.

            Establishing a more secure relationship between IT and OT environments requires the implementation
            of comprehensive control measures.



            How  do  most  organization's  structure  OT  security  operations?  Is  this  function  typically  in
            information security, IT, the OT engineering world itself, a combination?
            The debate over the ideal functional residence of OT security operations remains a consistent discussion
            throughout the industry. Organizations adopt varied approaches to structure their OT security operations
            and  there  is  no  one-size-fits-all  solution.  As  Chase  Applegate  notes,  “I  don’t  think  that  OT  or  plant
            operations should own security operations,” but acknowledges the need for diverse skill sets and many
            players in the OT space. Initially, IT security might lead OT security operations efforts with a potential for
            specialized teams later on.

            There’s  a  tendency  towards  third-party  management  for  OT  security  operations  at  least  for  tier-one
            incident triage. “Because of this complexity in a lot of use cases, it makes sense for companies to go with
            a third party MSSP’s to manage OT security operations,” Chase noted.

            Kirsten reflects on this collaborative approach seen in Canada, where both IT and OT express interest in
            fortifying cybersecurity measures. She explains, “We want to be where we can have these hybrid teams
            that come together…once a week they meet, and they go over the alerts…to better tune the system.”
            This  emerging  practice  showcases  the  desire  for  cross-functional  collaboration between  IT  and  OT,
            specifically citing networking as a critical crossover skill.



            This reflects the growing recognition of the interconnected nature of IT and OT and the need for holistic
            security  strategies.  However,  regardless  of  the  approach,  both  Chase  and  Kirsten  underscored  the
            importance of stringent access controls and approval processes within OT environments.







                                                                                                              32
   27   28   29   30   31   32   33   34   35   36   37