Digital Transformation Exposes Operational Technology & Critical Infrastructure

Marc Wilczek Marc Wilczek
October 11, 2019 Big Data, Cloud & DevOps

The convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense.

Thanks to technology advances in operational technology (OT) and critical infrastructure, physical and cyber systems can now be combined and leveraged in new ways that were unimaginable just a decade ago. These new capabilities provide the ability to control and optimize a broad range of operational infrastructure based on changing demand or other requirements.
For example, the production line in a manufacturing plant can now be programmed remotely to manufacture component X one week and reprogrammed to manufacture component Y the next week. Likewise, goods held in warehouses can be shipped from one point to another the moment a consumer places an order, making real-time interaction and always-on IT nonnegotiable requirements.
These are significant advances that increase the efficiency of operations while lowering costs. There’s also a significant problem: The manufacturing plants and warehouses are now connected to broader computer networks, allowing distributed denial-of-service (DDoS) attacks and other forms of cyberattacks to penetrate these organizations in new ways. As a result, the production line or warehouse can be manipulated or completely shut down. And a modern factory or warehouse typically doesn’t have enough employees to fix the problem or continue operations manually. Moreover, in increasingly more cases, real-time becomes the de facto standard, not allowing any interruption or delay without putting reputation and revenue at risk.
Manufacturing plants and warehouses aren’t alone. These IT risks affect organizations across an array of use cases, including manufacturing, energy and utilities, transportation, building automation, and a variety of critical infrastructure required to maintain our quality of life. OT is undergoing digital transformation that will expose highly critical operational assets to potentially catastrophic security breaches.

A Perfect Storm

As OT becomes increasingly transformed digitally, connecting computer networks to systems such as conveyor belts, heating and cooling systems, and molding machines introduces security risks. Many devices and networks were not built with security in mind, and many rely on legacy technology requiring manual effort and human interaction to detect and mitigate cyber threats, resulting in downtimes or creating other unwanted consequences.
In the quest for higher operational efficiency, many organizations are running industrial control systems (ICSs) over IP-based IT networks, outsourcing support to third parties and allowing remote connectivity. Although the convergence of IT and OT improves operations, it eliminates the traditional gap between the two realms. The result is a broader attack surface, exposing OT to a multitude of DDoS attacks and other cyber-risks.
Together, these two forces have created new vulnerabilities that must be addressed, and organizations need to be consciously aware of both the business value and the associated risk.

Attacks Are Multiplying

The problem is particularly acute for organizations utilizing supervisory control and data acquisition (SCADA) and ICSs. According to a study conducted by Forrester Research on behalf of Fortinet, nearly 90% of these organizations have suffered a security breach in those systems. The stakes are high. Interruptions of manufacturing processes by cyberattacks can compromise quality control and result in severe productivity losses. For example, if a pharmaceutical company product run were interrupted, the maker likely would be obligated to destroy an entire batch of medication, since its quality could not be guaranteed. The same fate would befall many other entities, such as water treatment plants, food companies, oil refineries, and any other facility in which product quality control is intrinsic to production.
Cybercriminals recognize the potential for disruption posed by today’s IT landscapes. As a result, the sophistication and destructive capability of attacks are increasing. For example, in Germany, a steel mill was targeted by attackers. As a result, multiple components in the production line failed, and the blast furnace could not be brought to a control state. The heat subsequently caused severe physical damage to the plant.
In April 2014, hacktivist group Anonymous launched multiple DDoS attacks aimed at Boston’s Children’s Hospital, causing a major blackout by taking the website, portals for staff and patients, and other digital resources offline for a whole week.
Another DDoS attack unleashed in October 2015 targeting Liberia became so powerful that it knocked out the African country’s Internet the following year.

Conclusion

The financial losses and service interruptions caused by these attacks are having a subtler negative result as well. Knowledge of the breaches is discouraging some organizations from upgrading their operational technology systems with productivity-enhancing digital technology. Aware that installing sensors on industrial equipment might open them up to compromise, many would prefer to suffer inefficiency as the price they must pay for keeping their systems secure.
Bad actors — including well-funded nation-states with a deep knowledge of industrial systems and the willingness to inflict costly disruption — are gearing up. The frequency, sophistication, and severity of these threats is well known. The new and dangerous threats to OT and critical infrastructure require an innovative defensive strategy. With digital transformation implemented and the convergence of IT and OT networks, many organizations are not ready for the attacks and threats they are facing.
  • Experfy Insights

    Top articles, research, podcasts, webinars and more delivered to you monthly.

  • Marc Wilczek

    Tags
    Big Data & Technology
    © 2021, Experfy Inc. All rights reserved.
    Leave a Comment
    Next Post
    What is the AI brain drain?

    What is the AI brain drain?

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    More in Big Data, Cloud & DevOps
    Big Data, Cloud & DevOps
    Cognitive Load Of Being On Call: 6 Tips To Address It

    If you’ve ever been on call, you’ve probably experienced the pain of being woken up at 4 a.m., unactionable alerts, alerts going to the wrong team, and other unfortunate events. But, there’s an aspect of being on call that is less talked about, but even more ubiquitous – the cognitive load. “Cognitive load” has perhaps

    5 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    How To Refine 360 Customer View With Next Generation Data Matching

    Knowing your customer in the digital age Want to know more about your customers? About their demographics, personal choices, and preferable buying journey? Who do you think is the best source for such insights? You’re right. The customer. But, in a fast-paced world, it is almost impossible to extract all relevant information about a customer

    4 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    3 Ways Businesses Can Use Cloud Computing To The Fullest

    Cloud computing is the anytime, anywhere delivery of IT services like compute, storage, networking, and application software over the internet to end-users. The underlying physical resources, as well as processes, are masked to the end-user, who accesses only the files and apps they want. Companies (usually) pay for only the cloud computing services they use,

    7 MINUTES READ Continue Reading »

    About Us

    Incubated in Harvard Innovation Lab, Experfy specializes in pipelining and deploying the world's best AI and engineering talent at breakneck speed, with exceptional focus on quality and compliance. Enterprises and governments also leverage our award-winning SaaS platform to build their own customized future of work solutions such as talent clouds.

    Join Us At

    Contact Us

    1700 West Park Drive, Suite 190
    Westborough, MA 01581

    Email: [email protected]

    Toll Free: (844) EXPERFY or
    (844) 397-3739

    © 2025, Experfy Inc. All rights reserved.