The year 2021 presented challenges for cyber security, specifically for operations technology (OT). There was a massive rise in the sheer number of cyberattacks on industrial targets, critical infrastructure, governments, and individuals.

Cyber Security

Cyberattacks on OT networks have impacted operations in large manufacturing plants, critical infrastructure sites, utilities like water treatment plants, fuel distributors, and even hospitals. And as attackers get more experienced in attacking OT networks, they’re managing to cause increasingly severe damage.

Yet, despite the growing prevalence of attacks against them, some persistent myths remain about OT networks themselves and the actual dangers these attacks pose. To dispel some of these OT myths, OTORIO and Arrow highlight a list of common OT misconceptions, and what you need to know about the evolving field of OT cybersecurity.

Top 5 OT Cyber Myths


MYTH #1

Attackers prefer targeting IT, not OT systems or infrastructures

Historically, attackers focused more on IT systems than OT systems.  Things have changed. Today attackers are specifically targeting OT networks that form the critical backbone of society, including power, water treatment, and industrial manufacturing facilities. As OTORIO’s CEO Daniel Bren highlighted in a recent blog post, we’re facing a ‘perfect cyber storm’ of legal, policy, production, and business risks for OT networks today. Critical infrastructure companies in general, and energy companies in particular, are consistently being targeted, meaning their OT networks – just like their IT networks – need a continuous risk assessment, monitoring, mitigation, and management.

 

MYTH #2

Air-gapped production floors are secure

Air-gapping solutions for the production floor and critical infrastructure were once considered effective against cyber threats to operational industrial processes, but this is no longer the case. Today’s production floor is connected – there’s no way around it. Connected systems streamline production management; however, they can expose OT systems to the outside world. Air gapping is a cybersecurity strategy that is no longer viable for industrial and critical infrastructure players.

 

MYTH #3

IT and OT security needs are separate

IT-OT convergence has created many new opportunities, but also many dangers. Industry 4.0 spelled the end of traditional OT-IT separation. When companies began implementing digital solutions in their OT networks to enhance automation, add smart devices, make data more available, and interconnect networks for convenience – the line between OT and IT networks blurred.  OT networks are not only themselves more exposed. They also serve as gateways, facilitating easier access to IT assets in interconnected networks and access to native cyber-physical assets in the OT network itself.

 

MYTH #4

Intrusion Detection Systems prevent OT attacks

Industrial Intrusion Detection Systems (IDS) automatically detect malicious attacks based on sensors that monitor network traffic, analyze protocols, and perform Deep Packet Inspection (DPI) and anomaly detection. By design, this technology alerts and reacts to activities in the network. However, an IDS does not block or prevent attacks against OT networks. They uncover them. An IDS needs to be part of a comprehensive OT network security plan that includes both security technology and experienced staff to run it.

 

MYTH #5

With OT Security, you can “set it and forget it”

Just like IT security, OT security is not a static domain. A single machine may consist of tens of different connected assets in a rapidly digitizing industry. Machine manufacturers need to ensure that every device they deliver is secured and meets regulatory and customer requirements. What’s more, machines must remain secure not only upon delivery and commissioning but throughout their entire lifecycle. OT security requires that machine manufacturers constantly verify that their equipment complies with ever-changing security policies and threats, notify their customers upon discovering new vulnerabilities, and provide clear remediation guidelines in real or near-real time.

 

How OTORIO and Arrow Can Help

To meet the challenges of OT cyber security, OTORIO offers its cutting-edge OT cybersecurity platform and solutions alongside Arrow’s comprehensive portfolio of Edge Cybersecurity Services offering OT cybersecurity risk assessment, penetration testing, and incident response services. Together, OTORIO and Arrow help industrial and critical infrastructure stakeholders ensure the safety, efficiency, throughput, quality, and uptime of the devices, control systems, and networks critical for running industrial processes.

 

Jay Gignac, OTORIO

OT/ICS/IoT SME + VP Global Sales at Otorio

Jay Gignac is a veteran of the Security industry, having worked for and with Vendors for the last 15 years with the likes of Fortinet, Websense, Sourcefire, Cisco and finally 2 Isreali Cybersecurity startups Claroty and Armis. In recent years, he started his own consultancy practice focused on the convergence of the IT and OT/ICS to assist organizations with the challenges that this presents.

Jay brings a clear understanding of the convergence dynamics, risks and opportunities that industry 4.0 brings. He is knowledgeable and built an expertise with emerging technologies in IoT, IIoT, IoMT, existing security practices surrounding them and the challenges to secure them in today’s organizations.

Adept at translating vendor speak, evaluating real-world capabilities of emerging technologies and their benefits or drawbacks he assists organizations in choosing the right technologies for their security plan, frameworks, requirements, objectives as well as industry specific solutions.

Arrow Intelligent Solutions Blog

Take a look at our blogs articles for all the latest news, views and industry knowledge.