Q + A + Q + A + Q + A + Q + A + Q + A + Q + A + Q + A +
MAHER JADALLAH,
REGIONAL DIRECTOR
MIDDLE EAST AT TEN
The convergence of the data side of
the business (traditionally the realm
of IT) and the operational technology
(OT) side (used to manage industrial control
systems (ICS)) has revolutionised our critical
infrastructure. This connectivity can remove
the need for a physical person to be on-site
to manually make changes and instead use
a computer to remotely adjust settings
whenever and wherever necessary. While
IT/OT convergence improves efficiency,
enables predictive maintenance and
reduces downtime, it also exposes
industrial environments to a much wider
attack surface.
Cybercriminals have infiltrated IT networks
for many years, seeking to gain access
to sensitive databases and assets. As we
continue to connect our OT infrastructure,
threat actors are seeing more possibilities
to exploit vulnerabilities and exposures in
legacy ICS equipment. The merging of these
two previously separated environments
poses a real risk by introducing even more
attack vectors, while making cybersecurity
threats harder to detect, investigate and
remediate. In addition to the threat to data,
an attack against OT systems could have
physical consequences, both on the business
infrastructure but also cause bodily harm.
When looking at the type of threat
faced, particularly as a result of IT and
OT convergence, ransomware features
prominently. Cybercriminals will seek
financial gain and leverage ransomware to
hold these organisations hostage.
The second major threat is from inside
the organisation, for example, disgruntled
employees, third party contractors,
compromised individuals or simply human
error. Whether the intention is malicious
or purely accidental, it can have the same
impact. For example, a contractor that plugs
a malware infected PC into a remote site.
With cybercriminals ty
target low hanging fru
it is inevitable that we
see attacks aimed at t
defended OT infrastru
The biggest challenge
teams tasked with man
sensitive and expande
visibility. Automated so
to identify and charact
OT systems, providing
view detailing what is e
what extent across the
environments. Failure t
creates blind spots whe
www.intelligentcio.com