NOV-DEC 2018

Issue link:

Contents of this Issue


Page 9 of 56

Collaboration? Yes, that's how we'll build a robust cybersecurity landscape Assessing the key players and strategies By Andrew Kling T en years ago, cybersecurity was a trend, a small but important issue industrial manufacturers were just aware of. But today, with the threatscape increasing expo- nentially in scope and scale, cybersecurity is completely revolutionizing industrial manufac- turing around the globe. It is time for the indus- try as a whole to reassess how it will secure and protect its people, assets, and operations from attack. Cheaper computing power and connectivity are why cybersecurity has become the problem it is today. The Industrial Internet of Things (IIoT) and other emerging trends (e.g., digitization) bring true business benefits, but reaping the most value from these initiatives requires manufacturers to unify their operations and business processes in some way. One common way is by bringing the informa- tion technology (IT) functions that have historical- ly controlled the business closer together with the operational technology (OT) functions that have historically controlled the manufacturing process. More intelligent, connected devices empower bet- ter visibility and control of more than just real-time operations. Plant managers can begin to control other critical business variables in real time, too, including safety, reliability, and, especially, opera- tional profitability. This is the culmination of clos- ing the OT-IT divide. The promise of that approach is that manufacturers gain better, real-time vis- ibility and control of their business perfor- mance, but connecting the business lay- er with the operations layer increases the entry points for potential hackers. And because many—if not most—of the systems that control our most critical and volatile manu- facturing operations were installed decades ago, long before cybersecurity was a consideration, we are never safe from an intru- sion. What is more, many of today's progres- sively bold, innovative attacks are perpetrated by malicious actors, such as nation-states, who effectively have unlimited time, resources, and funding. Such attacks aim to disrupt industrial activity for financial, competitive, political, or social gain. When you put it all together, it means every connected system must be viewed and assessed within the context of a comprehen- sive cybersecurity program. Last year, the world's first known cyberattack on a safety instrumented system occurred. Com- monly referred to as Triton, this incident remains a call to action for the global industrial process and manufacturing industry. In the year since, the industry has taken a step forward in cyberattack preparedness. Plant asset owners are address- ing cyberrisks with more vigilance, and vendors 10 INTECH NOVEMBER/DECEMBER 2018 WWW.ISA.ORG

Articles in this issue

Links on this page

Archives of this issue

view archives of InTech - NOV-DEC 2018