Intelligent CIO Middle East Issue 55 | Page 65

///////////////// EDITOR’S QUESTION – ABLE pically looking to it to gain entry, will continue to he perceived least cture. facing the security aging this complex, d attack surface is lutions are needed erise converged IT/ a unified, risk-based xposed, where and to combined IT and OT o identify all systems re some systems are potentially insecure, thereby increasing downtime risk. When a security incident occurs, timely resolution depends on immediate availability of accurate inventory including every bit of information all the way from a device model down to the firmware version. While it might seem overwhelming, identifying weaknesses within OT environments is critical to understanding risk. Vulnerabilities must be assessed and prioritised, based on risk and likelihood of exploitation. Those that create the most risk should be remediated either by patching or by other mitigation measures – such as changes to firewall rules. INTELLIGENTCIO 33