People, processes and systems must come together to cultivate smarter, more secure networks with high visibility to monitor and control both information technology (IT) and operational technology (OT) environments; according to KPMG‘s latest cybersecurity publication.
The publication found that converging IT and OT environments requires the right preconditions in an organisation’s environment and culture to be successful and lasting.
“Preparing an organisation’s people and culture for IT/OT convergence is critical for success, with process and workflow convergence being integral to a broader IT/OT convergence plan,” explains Ton Diemont, Head of Cybersecurity and Data Privacy at KPMG in Saudi Arabia.
While organisations often prioritise efficiency or productivity improvements, cybersecurity must not be overlooked and should be integral to an IT/OT convergence strategy.
IT/OT convergence is a double-edged sword from a cybersecurity lens. It can allow for more robust monitoring of systems, but it also might expose industrial control systems (ICS), process control systems and other operational technology to malware attacks, hacktivism, employee sabotage and other security risks that previously affected only corporate IT systems.
“Securing OT systems is a prerequisite to IT/OT convergence. Cybersecurity capabilities need to be implemented to evaluate existing systems for threats and to continually monitor them in the future,” adds Hossain Alshedoki, IT/OT Cybersecurity ENR Lead at KPMG in Saudi Arabia.
Though zero-day attacks are impossible to predict during and after IT/OT convergence, micro-segmentation helps organisations mitigate their risk. Implementing ‘resilient by design’ principles before IT/OT convergence also decreases the likelihood of successful zero-day attacks.
Unlike IT personnel in an IT environment, training OT personnel requires not only a cybersecurity background but also a strong understanding of the engineering process and physical systems. To overcome this challenge, KPMG has created OT/ICS cyber range labs using production-grade equipment to simulate scale-model versions of industrial processes to bring OT simulation efforts up to par with IT.
The labs can be used to establish secure remote connections through KPMG’s infrastructure to perform hands-on training sessions, cyberattack simulations, proofs-of-concept and industrial cybersecurity-related research.
“Our virtual labs can be built to replicate an organisation’s IT and OT environments by connecting proprietary devices and virtualising OT components. This enables IT and OT professionals to cross-train their incident response strategies until mastery,” concludes Diemont.