/////////////////
EDITOR’S QUESTION
–
ABLE
pically looking to
it to gain entry,
will continue to
he perceived least
cture.
facing the security
aging this complex,
d attack surface is
lutions are needed
erise converged IT/
a unified, risk-based
xposed, where and to
combined IT and OT
o identify all systems
re some systems
are potentially insecure, thereby increasing
downtime risk. When a security incident occurs,
timely resolution depends on immediate
availability of accurate inventory including
every bit of information all the way from a
device model down to the firmware version.
While it might seem overwhelming,
identifying weaknesses within OT
environments is critical to understanding
risk. Vulnerabilities must be assessed and
prioritised, based on risk and likelihood of
exploitation. Those that create the most risk
should be remediated either by patching
or by other mitigation measures – such as
changes to firewall rules.
INTELLIGENTCIO
33