Picture - New Challenges, New Opportunities

Digital Transformation

Protect to thrive: meeting the growing cybersecurity threat

By Michael T. Lester


 

Manufacturers, utilities and operators of critical infrastructure face increasing and more sophisticated cybersecurity threats. Attacks are constantly evolving, as commoditised malware and advanced technologies provide new attack capabilities to threat actors.

The motivation for cyberattacks is still mostly financial gain, but nation state actors are increasingly involved and there are increasing numbers of attacks targeting the industrial control space from various threat actors.

Effective cybersecurity requires staying updated on the latest threats, performing real-time inventory of assets, improving threat-detection capabilities, ensuring equipment and devices have the latest defence measures, patching and updating systems, and improving incident response capabilities. In addition, policies and procedures, workforce upskilling and periodic training are all key aspects of cybersecurity that should be deployed to protect critical systems by following a risk-based approach.

For manufacturers looking to unlock the potential of the Industrial Internet of Things (IIoT), cybersecurity is a major concern. The need for effective cybersecurity is well known, but there is not great understanding of the subject within the industry. Designing and implementing IIoT technology requires new skills and cybersecurity expertise. New solutions can introduce new threat vectors if not implemented and maintained securely.

Identifying vulnerabilities

Within manufacturing, engineered solutions with higher capital expenditure costs creates reluctance to update systems and a slow rate of change. Outdated systems that are not patched or well protected with a defence-in-depth approach are most vulnerable.

For manufacturers looking to unlock the potential of the Industrial Internet of Things (IIoT), cybersecurity is a major concern

Users must prioritise the actions they will take in response to identified threats and attacks and create a roadmap of those actions. This includes implementing and regularly testing incident response and back-up/recovery plans for all the people, processes and technologies in their organisation during the lifecycle of each. Even something simple like user account management must address each user’s lifecycle from when they are first authorised to when they leave the organisation.

There is increasing need for collaboration between IT and OT stakeholders to implement new systems and services that help an organisation digitally transform.  In developing a cybersecurity strategy, IT and OT stakeholders must understand each other’s strengths and how to achieve business goals whilst maintaining the highest levels of security.

Each expertise brings something different to the table, with IT having a highly standardized process and OT having a more engineered solution. The goals of both stakeholders need to be reviewed and requirements established to avoid gaps and risk to operations. Automation suppliers can make secure deployment of systems more successful by providing a layered portfolio of security controls, procedures and services that enhance system security and help end users prioritise cybersecurity assessments.

Organisations must consider cybersecurity during the front-end engineering and design of a control system project. Too often cybersecurity defences are added later, and this is more expensive and rarely as effective as building cybersecurity into the project. This is referred to as the ‘Shift Left’ concept. Secure by design, coupled with an appropriate cyber risk analysis, should include a review of security features and controls to ensure their effectiveness against the growing cyber threat landscape.

To support the business justification of a cybersecurity initiative, assessments can be used as a risk reduction metric that represents the progress of cyber initiatives implemented thus far and the potential protection afforded by deploying additional cyber protections. A good way to justify cybersecurity capabilities can be through the ‘Shift Left’ concept, where each euro of proactive security spent is equal to over 60 euros of reactive security.

If an attack does happen, the best way to overcome it is to have a well-documented and practised incident response plan. In short, overcoming an attack does not go well without cybersecurity features, controls and a well-thought-out plan.

A cultural issue
When cybersecurity is not part of the culture of an organisation, its personnel create a significant cyber risk through unintentional actions that result in vulnerabilities. A pervasive cybersecurity culture reduces risk from both external and internal threats. Upskilling personnel on new technology and related cybersecurity helps to create a cybersecurity culture.

In short, overcoming an attack does not go well without cybersecurity features, controls and a well-thought-out plan

It is critical to create training opportunities for employees to increase their technology and cybersecurity competencies. Upskilling can take time but educating the workforce to consciously accept cybersecurity responsibility and accountability is a good first step. If cybersecurity is no longer someone else’s responsibility, people will naturally ask a lot more questions and work with those who have expertise to prevent unintentional consequences.

Cybersecurity requires more than just technology. Cybersecurity requires behaviour and culture change. A deep-rooted understanding across the entire organisation of the ‘why’ and ‘how’ of cybersecurity is critical to driving meaningful behavioural change. It is therefore important to build a cybersecurity culture that encompasses people, processes and technology.

All Digital Transformation Insights

Cracking the Code on Cybersecurity Through a Risk-Based Approach

Adopting a risk-based approach to cybersecurity can help power and water suppliers identify and protect against potential vulnerabilities.

Saving More Lives with Digitalized Life Sciences Manufacturing

A look at Emerson’s vision for the digitalization of the life sciences industry to enable greater speed-to-market and flexible, multi-product...

Managing Cyber Risk and Threats: Returning to Foundational Principles

Emerson helps customers protect their vital assets from cyberattacks.

Protect to thrive: Meeting the growing cybersecurity threat

For manufacturers looking to unlock the potential of the Industrial Internet of Things (IIoT), cybersecurity is a major concern

DeltaV™ Technology for Next-Generation Operations

Emerson’s DeltaV™ team offers one vision on how plant managers, operators, and engineers may digitally transform the way plants and teams operate.

Digital Transformation for the Power Industry

Emerson's wireless solutions can help the power industry quickly and easily implement new monitoring processes.

The Digital Transformation of Power: From Concept to Reality

Digital twin technology is enabling the power industry to increase uptime and reduce human error while addressing the talent shortage.

Chevron Drives Operational Improvement with Connected Services Solution

Working with Emerson and Microsoft®, Chevron has implemented a cloud-enabled monitoring solution for the heat exchangers at one of its refineries.

Top Quartile - The Business Case for Digital Transformation

Digital transformation can have a transformative impact for businesses, but they need the right approach. Emerson can help.
Please enable JavaScript to use this website.