4 minute read

Building cyber resilience for industrial control systems

AS I SEE IT

BUILDING CYBER RESILIENCE FOR INDUSTRIAL CONTROL SYSTEMS

The hyper-convergence of information technology and operational technology is having a profound impact on industrial control systems (ICS). The rise of the fourth industrial revolution, also known as Industry 4.0, promises to significantly increase the performance, scalability and reliability of a plant; however, these enhancements don’t come without their own challenges. One such challenge is cybersecurity. The threat landscape in automation and process control systems is evolving at an alarming rate with attacks continuously increasing in sophistication, frequency and severity. The reality is that operators of critical infrastructure assets in all industry verticals are struggling to keep up with the growing number of attack mechanisms and entities attempting cyber threats from all over the world; in fact, cyber-attacks on critical infrastructure have evolved to be the new normal for ICS operators.

There is a common misconception that the primary objective of cybersecurity should be to eliminate all security risks, exposures and vulnerabilities; however, in my experience this is simply not feasible in most situations. Nothing is unhackable. I believe that the main goal and objective should be focused on understanding the plant’s security risk profile and increasing its overall security posture, using a multi-layered holistic cyber-defence approach known as ‘defence in depth’. The reality is that every launched attack will cost time and money for threat actors; as such, they will normally focus on easy targets by finding easily exploitable system vulnerabilities and weaknesses. By raising the security posture of your ICS, you inherently raise the organisation’s security status to a level of ‘too expensive to hack’, which considerably reduces the likelihood of becoming a target and victim of a cyber-attack. In simple terms, you should drive threat actors to easier targets by making your systems too expensive to attack.

Implementing a cyber-resilient ICS is a challenging topic for most organisations; moreover, there is currently a severe shortage of industrial cybersecurity professionals required to help protect ICS assets for critical infrastructures in all industry verticals — a shortage that is expected to get much worse in the foreseeable future. In order for organisations to have a fighting chance to protect themselves against the evolving cybersecurity threat landscape, automation is currently the most efficient and effective way to drastically reduce the volume of threats and to enable continuous threat detection, prevention and remediation — of both known threats and zero-day exploits. The good news is that there are now several OT-centric industrial cybersecurity solutions developed in recent years that are designed to leverage automation coupled with AI and machine learning in order to provide operators with actionable intelligence on their critical ICS assets in near real time. Many of these security solutions also operate in passive mode, which is a crucial element for mission-critical and safety-critical systems; in other words, the security solutions should not have the potential to have any harmful impacts to the availability, performance or integrity of the ICS ecosystem.

Modern cyber-attacks require modern solutions. Organisations that try to defend against the growing sophistication of the cyber-threat landscape using manual efforts will find themselves at a significant disadvantage against very determined threat actors. Security automation tools should be leveraged whenever possible to help ensure a strong security posture for the ICS infrastructure and increase the chances of defeating threat actors and their often-devastating attacks. When it comes cyber-attacks, automation is the ultimate equaliser.

Serge Maillet is the Industrial Cyber Security - Country Segment Manager for Siemens Digital Industries in Australia and New Zealand. Serge has an engineering background in industrial (OT) networks and holds a Master of Science degree in cybersecurity. He helps organisations in all industry verticals with increasing their IT-OT cybersecurity posture and compliance for critical infrastructure assets.

Westwick-Farrow Media A.B.N. 22 152 305 336

www.wfmedia.com.au

Head Office Unit 7, 6-8 Byfield Street, North Ryde Locked Bag 2226, North Ryde BC NSW 1670 AUSTRALIA ph: +61 2 9168 2500

Editor Glenn Johnson pt@wfmedia.com.au

Publishing Director/MD Geoff Hird

Art Director/Production Manager Julie Wright

Art/Production Colleen Sam, Veronica King

Circulation Dianna Alberry, Sue Lavery circulation@wfmedia.com.au

Copy Control Mitchie Mullins copy@wfmedia.com.au

Advertising Sales Industrial Group Sales Manager Nicola Fender-Fox – 0414 703 780 nfender-fox@wfmedia.com.au

Sandra Romanin – 0414 558 464 sromanin@wfmedia.com.au

Tim Thompson – 0421 623 958 tthompson@wfmedia.com.au

Subscriptions For unregistered readers price on application. If you have any queries regarding our privacy policy please email privacy@wfmedia.com.au

Contact the editor

Printed and bound by Bluestar Print Print Post Approved PP100007403 ISSN No. 0819-5447

All material published in this magazine is published in good faith and every care is taken to accurately relay information provided to us. Readers are advised by the publishers to ensure that all necessary safety devices and precautions are installed and safe working procedures adopted before the use of any equipment found or purchased through the information we provide. Further, all performance criteria was provided by the representative company concerned and any dispute should be referred to them. Information indicating that products are made in Australia or New Zealand is supplied by the source company. Westwick Farrow P/L does not quantify the amount of local content or the accuracy of the statement made by the source.

This article is from: