Intelligent CIO Middle East Issue 84 | Page 84

FINAL WORD developing resources and guidelines that can facilitate an increase in adoption .
Laying a robust cybersecurity foundation
Mariia Nalapko , Digital Twin Global Process Leader , Capgemini ’ s
Business Services from these projects can then be used to create best-in-class methods for the future , ensuring the attributes that make the process frictionless can be scaled effectively .
Empower the network at scale
For a Digital Twin to mine , model , simulate , predict and monitor effectively , the integration of multiple data sources must be properly facilitated . However , it ’ s not uncommon to see large organisations dealing with hundreds or even thousands of stakeholders , partners or suppliers throughout their ecosystem . Scaling Digital Twins to encompass this complexity – inclusive of data that extends far beyond just one organisation – makes integration more challenging .
In order to combat this , it ’ s essential to get the buy-in of external partners and fully onboard them from the beginning to ensure that the relevant data is accessible and accurate . Organisations should also endeavour to become data-sharing masters by developing a robust data management strategy as part of a wider data ecosystem . This will help organisations qualify the right data , understand how the data flows across various systems and processes and transform the data into actionable insights . Collaborations , specifically through consortiums , can play a vital role in the design and development of Digital Twins . They can help tap into best practices and standard requirements and aid with
As Digital Twins are scaled , it is paramount that security is not compromised . Digital Twins , just as their name implies , are exact replicas . By their very nature , they implicitly contain sensitive information unique to a particular system . Therefore , it ’ s essential to understand the risk of any hack of an unsecured Digital Twin allowing immediate access to the internal data of the entire business system . And it ’ s crucial to secure the communication between the twin and its physical counterpart to protect the confidentiality and integrity of the business and personal information .
Prior to the deployment of Digital Twins , it is the responsibility of each company to ensure secured infrastructure architecture and privacy measures . We know that 69 % of businesses are planning to make major changes to their end-to-end cybersecurity to accommodate Digital Twins . That said , enhancing an organisation ’ s cybersecurity resilience requires a specific skillset . Organisations should look to attract new talent or upskill existing employees to ensure they have the core business skills necessary for Digital Twin implementation . The key knowledge and competencies would be : embedded software , secure network architecture , network security , cryptography , system security , database security and hybrid cloud systems . It is critical to ensure that the system is not reachable from other network segments , that access to it is protected and restricted , and that the data handling ( data-in-transit and data-at-rest ) is done according to the industry ’ s best practices .
Successful businesses understand that change is constant and are well placed to face new challenges as they arise . Digital Twins allow an organisation to evolve as circumstances change and are therefore critical for any enterprise looking to simplify workflows , exceed customer expectations , deliver value and future-proof their businesses . p
84 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com