{"id":2003,"date":"2019-10-11T05:10:12","date_gmt":"2019-10-11T05:10:12","guid":{"rendered":"http:\/\/kusuaks7\/?p=1608"},"modified":"2024-03-13T10:41:52","modified_gmt":"2024-03-13T10:41:52","slug":"digital-transformation-exposes-operational-technology-and-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/digital-transformation-exposes-operational-technology-and-critical-infrastructure\/","title":{"rendered":"Digital Transformation Exposes Operational Technology &amp; Critical Infrastructure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2003\" class=\"elementor elementor-2003\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-241e3f28 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"241e3f28\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-59b7d7a3\" data-id=\"59b7d7a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5587cb2 elementor-widget elementor-widget-heading\" data-id=\"5587cb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3 style=\"color: #aaa;font-style: italic\"><strong>The convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense.<\/strong><\/h3><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4aeb1 elementor-widget elementor-widget-text-editor\" data-id=\"4d4aeb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThanks to technology advances in operational technology (OT) and critical infrastructure, physical and cyber systems can now be combined and leveraged in new ways that were unimaginable just a decade ago. These new capabilities provide the ability to control and optimize a broad range of operational infrastructure based on changing demand or other requirements.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8055793 elementor-widget elementor-widget-text-editor\" data-id=\"8055793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor example, the production line in a manufacturing plant can now be programmed remotely to manufacture component X one week and reprogrammed to manufacture component Y the next week. Likewise, goods held in warehouses can be shipped from one point to another the moment a consumer places an order, making real-time interaction and always-on IT nonnegotiable requirements.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59cede3 elementor-widget elementor-widget-text-editor\" data-id=\"59cede3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThese are significant advances that increase the efficiency of operations while lowering costs. There&#8217;s also a significant problem: The manufacturing plants and warehouses are now connected to broader computer networks, allowing distributed denial-of-service (DDoS) attacks and other forms of cyberattacks to penetrate these organizations in new ways. As a result, the production line or warehouse can be manipulated or completely shut down. And a modern factory or warehouse typically doesn&#8217;t have enough employees to fix the problem or continue operations manually. Moreover, in increasingly more cases, real-time becomes the de facto standard, not allowing any interruption or delay without putting reputation and revenue at risk.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e77c04d elementor-widget elementor-widget-text-editor\" data-id=\"e77c04d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tManufacturing plants and warehouses aren&#8217;t alone. These IT risks affect organizations across an array of use cases, including manufacturing, energy and utilities, transportation, building automation, and a variety of critical infrastructure required to maintain our quality of life. OT is undergoing digital transformation that will expose highly critical operational assets to potentially catastrophic security breaches.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d8e7bf elementor-widget elementor-widget-heading\" data-id=\"9d8e7bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>A Perfect Storm<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd1c76 elementor-widget elementor-widget-text-editor\" data-id=\"ccd1c76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs OT becomes increasingly transformed digitally, connecting computer networks to systems such as conveyor belts, heating and cooling systems, and molding machines introduces security risks. Many devices and networks were not built with security in mind, and many rely on legacy technology requiring manual effort and human interaction to detect and mitigate cyber threats, resulting in downtimes or creating other unwanted consequences.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-131cdc8 elementor-widget elementor-widget-text-editor\" data-id=\"131cdc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn the quest for higher operational efficiency, many organizations are running industrial control systems (ICSs) over IP-based IT networks, outsourcing support to third parties and allowing remote connectivity. Although the convergence of IT and OT improves operations, it eliminates the traditional gap between the two realms. The result is a broader attack surface, exposing OT to a multitude of DDoS attacks and other cyber-risks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a2660a elementor-widget elementor-widget-text-editor\" data-id=\"8a2660a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nTogether, these two forces have created new vulnerabilities that must be addressed, and organizations need to be consciously aware of both the business value and the associated risk.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddec848 elementor-widget elementor-widget-heading\" data-id=\"ddec848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Attacks Are Multiplying<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b79383c elementor-widget elementor-widget-text-editor\" data-id=\"b79383c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe problem is particularly acute for organizations utilizing supervisory control and data acquisition (SCADA) and ICSs. According to a\u00a0<a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/white-papers\/WP-Independent-Study-Pinpoints-Significant-Scada-ICS-Cybersecurity-Risks.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">study<\/a>\u00a0conducted by Forrester Research on behalf of Fortinet, nearly 90% of these organizations have suffered a security breach in those systems. The stakes are high. Interruptions of manufacturing processes by cyberattacks can compromise quality control and result in severe productivity losses. For example, if a pharmaceutical company product run were interrupted, the maker likely would be obligated to destroy an entire batch of medication, since its quality could not be guaranteed. The same fate would befall many other entities, such as water treatment plants, food companies, oil refineries, and any other facility in which product quality control is intrinsic to production.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-035eecd elementor-widget elementor-widget-text-editor\" data-id=\"035eecd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCybercriminals recognize the potential for disruption posed by today&#8217;s IT landscapes. As a result, the sophistication and destructive capability of attacks are increasing. For example, in Germany, a\u00a0<a href=\"https:\/\/www.bbc.com\/news\/technology-30575104\" target=\"_blank\" rel=\"noopener noreferrer\">steel mill was targeted by attackers<\/a>. As a result, multiple components in the production line failed, and the blast furnace could not be brought to a control state. The heat subsequently caused severe physical damage to the plant.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08c9e77 elementor-widget elementor-widget-text-editor\" data-id=\"08c9e77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn April 2014, hacktivist group Anonymous launched multiple\u00a0<a href=\"https:\/\/www.cio.com\/article\/2682872\/healthcare\/how-boston-childrens-hospital-hit-back-at-anonymous.html\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">DDoS attacks<\/a>\u00a0aimed at Boston&#8217;s Children&#8217;s Hospital, causing a major blackout by taking the website, portals for staff and patients, and other digital resources offline for a whole week.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-873fb22 elementor-widget elementor-widget-text-editor\" data-id=\"873fb22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnother\u00a0<a href=\"https:\/\/edition.cnn.com\/2019\/01\/12\/uk\/hacker-liberia-cyber-attack-jailed-gbr-intl\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS attack<\/a>\u00a0unleashed in October 2015 targeting Liberia became so powerful that it knocked out the African country&#8217;s Internet the following year.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-182f408 elementor-widget elementor-widget-heading\" data-id=\"182f408\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Conclusion<\/strong><\/h3>\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07ea1d3 elementor-widget elementor-widget-text-editor\" data-id=\"07ea1d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe financial losses and service interruptions caused by these attacks are having a subtler negative result as well. Knowledge of the breaches is discouraging some organizations from upgrading their operational technology systems with productivity-enhancing digital technology. Aware that installing sensors on industrial equipment might open them up to compromise, many would prefer to suffer inefficiency as the price they must pay for keeping their systems secure.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9816806 elementor-widget elementor-widget-text-editor\" data-id=\"9816806\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBad actors \u2014 including well-funded nation-states with a deep knowledge of industrial systems and the willingness to inflict costly disruption \u2014 are gearing up. The frequency, sophistication, and severity of these threats is well known. The new and dangerous threats to OT and critical infrastructure require an innovative defensive strategy. With digital transformation implemented and the convergence of IT and OT networks, many organizations are not ready for the attacks and threats they are facing.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The convergence of OT and IP-based IT networks makes society more vulnerable, requiring CISOs to rethink defense. Thanks to technology advances in operational technology (OT) and critical infrastructure, physical and cyber systems can now be combined and leveraged in new ways that were unimaginable just a decade ago. These new capabilities provide the ability to<\/p>\n","protected":false},"author":166,"featured_media":4204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[1950],"class_list":["post-2003","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":1950,"user_id":166,"is_guest":0,"slug":"marc-wilczek","display_name":"Marc Wilczek","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_00058d24-991e-4fe8-b65f-2188edaded40-150x150.jpg","user_url":"http:\/\/www.marcwilczek.com","last_name":"Wilczek","first_name":"Marc","job_title":"","description":"Marc Wilczek, Chief Operating Officer at Link11, is a columnist and recognized thought leader helping organizations drive their digital technology. Over the past 20 years, he has held various senior leadership roles across the ICT industry. Previously, he was a member of the management board of T-Systems\u2019 Computing Services &amp; Solutions (CSS) division. Besides being a public speaker, he has authored dozens of publications featured in CIO Magazine, InformationWeek, Bloomberg, Information Management, DarkReading, ZDNet, and others."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2003"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2003\/revisions"}],"predecessor-version":[{"id":36402,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2003\/revisions\/36402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/4204"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2003"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}