The pointlessness of pointing fingers
Can business, IT, and OT stakeholders play nice?
To get to cyber resilience, organizations must develop a security governance framework that permeates the enterprise – from the boardroom to the shop floor.
Things are changing pretty radically in the energy, resources, and industrial (ER&I) space. Industry 4.0 and the emergence of autonomous systems powered by data, analytics, and AI are driving an unprecedented wave of transformation. A growing number of mergers, acquisitions, and divestitures are shining a light on systemic gaps, as are a rising number of cyber incidents and more rigorous board focus on cyber maturity.
The imperative to find innovative solutions to address endemic challenges—ranging from improved environmental performance to more collaborative community relationships—is altering operational realities. And the spread of COVID-19 has only accelerated this trend, forcing organizations to transition to remote work at breakneck speeds.
It’s progressive. It’s disruptive. And it’s sparking conflict between the digital teams championing these new initiatives and the operational technology (OT) teams expected to operationalize them.
Cultural clashes between business, IT, and OT may not be new, but their fallout now threatens to take a toll that extends far beyond productivity challenges. They are also opening enterprises up to higher levels of cyber risk.
Sharing the risk
Missteps are happening at both ends of the spectrum. On the one hand, digital transformation teams tend to work in a rarefied environment that celebrates big ideas—even when those ideas veer from traditional operational practices.
Eager for the first-mover advantage, these teams sometimes fail to bake security into their processes from the outset, resulting in security lapses that unintentionally expose their organizations to a higher risk of breach. It doesn’t help that many IT organizations are scrambling to keep pace with the risks introduced by digital initiatives, leading to potentially severe security control gaps.
Cybersecurity at all levels
On the other hand, OT teams may be underestimating their vulnerability to cyberattack. Habituated to work in isolated factories and manufacturing environments, they often struggle to grasp how increased connectivity has changed the game.
Cloud computing, remote work, and extended supply chains have broken through the fortifications that once kept OT systems protected—presenting cybercriminals with a larger attack surface. In recent years, hackers have targeted supervisory control and data acquisition systems, programmable logic controllers, safety systems, and industrial control systems around the world.
According to a 2019 study conducted by Deloitte and the Manufacturers Alliance for Productivity and Innovation, 40 percent of respondents indicated their operations were affected by a cyber incident in the past 12 months, with attacks on manufacturing operations estimated to cost companies in excess of $150 million. In one case, an attack on safety systems even put humans at risk. The ER&I sector is particularly at risk from these types of targeted attacks on power plants, autonomous vehicles, and remote operating centers.
These missteps are not going unnoticed. Every high-profile breach that hits the news creates greater reputational risk for a sector that is often assailed by negative publicity. In response, boards are placing mounting pressure on both business and OT teams to strengthen their cybersecurity postures.
Where to from here?
This is not simply about IT/OT integration or creating alignment between traditionally-siloed functions. To get to cyber resilience, organizations must dig deeper. This means developing a security governance framework that permeates the enterprise—from the boardroom to the shop floor.
Despite forming the backbone of digital transformation initiatives, cybersecurity still often falls under the sole domain of the IT function. This has tochange. Instead, organizations must be able to create defined cybersecurity processes at the enterprise, business unit, and equipment levels. Similarly, they must clarify accountabilities at every level of the organization so that best practices can be embedded into people’s daily work lives.
How can we make room for everyone at the table? We can start by working together rather than acting as adversaries. Perhaps this means running war games or cyber simulations that encourage disparate teams to collectively respond to a hypothetical breach scenario. Perhaps it means creating a digital twin of your manufacturing facility as a playground for cross-functional stakeholders to stress-test your cyber resiliency and model out alternate scenarios.
These types of exercises aren’t just about healing cultural rifts. They’re about strengthening your cybersecurity posture so that when you face an attack (and you will), you have the functional maturity to effectively respond.
For more information contact:
Global Cyber OT/ICS Leader
Global Cyber ER&I Leader
Matthew William Holt
Global Cyber Emerging Technologies Leader
North South Europe Emerging Technologies Leader