• About US
  • Terms of use
  • Cookie Policy
  • Privacy Policy
  • Advertising guide
No Result
View All Result
BBG Architecture Life
  • Architecture
  • Design
  • Interiors
  • Technology
  • Trends
  • Projects
  • Collections
  • Education
  • House
  • Restaurant
  • Greenhouse
  • Hotel
BBG Architecture Life
  • Interiors

    Miami Beach residence by SAOTA takes indoor-outdoor living to the extreme

    Vision unveiled for London school powered by Thames tide

    Erasmus exchange programme could remain open to UK students after Brexit

    Sou Fujimoto creates ornate bookshelves for Basel installation

    Frank Lloyd Wright merged eastern and western architecture at Tokyo’s Imperial Hotel

    Drone footage captures brutalist Robin Hood Gardens ahead of imminent demolition

    Dan Brunn renovates Frank Gehry-designed LA house for an illustrator

  • Design
    Screen Shot 2019-10-14 at 8.49.03 AM

    The Design Spark 2019 Product Showcase Set to Show Innovations Around Independent Living | Best Brothers Group of Companies

    Ho (left) and Chang sharing EcoWorld’s future plans at the Eco Sanctuary Gallery. (Photos by Low Yen Yeing/EdgeProp.my)

    Malaysia: Universal Design for EcoWorld’s Future Projects | Best Brothers Group of Companies

    A computer model of one of the accessible homes.

    How Gaming Technology is Helping Design More Accessible Homes | Best Brothers Group of Companies

    New Universal Design Guide Aims to make Public Spaces Pleasant for All | Best Brothers Group of Companies

    New Universal Design Guide Aims to make Public Spaces Pleasant for All | Best Brothers Group of Companies

    University Students Design Wheelchair Hand Warmer for Persons with Muscular Dystrophy | Best Brothers Group of Companies

    University Students Design Wheelchair Hand Warmer for Persons with Muscular Dystrophy | Best Brothers Group of Companies

    The Home Innovation Challenge

    UK-based Design Council Focuses on Accessible Home Innovation   | Best Brothers Group of Companies

    Private Transport Provider to Offer an Inclusive Experience in Malta   | Best Brothers Group of Companies

    Autonomous Vehicle Design Should Benefit Broader Group of Potential Drivers   | Best Brothers Group of Companies

    Ikea to Use 3-D Printing to Make Furniture More Accessible for Persons with Disabilities   | Best Brothers Group of Companies

    Ikea to Use 3-D Printing to Make Furniture More Accessible for Persons with Disabilities   | Best Brothers Group of Companies

    Toyota Improves Universal Design Taxicab for Quicker Wheelchair Access   | Best Brothers Group of Companies

    Toyota Improves Universal Design Taxicab for Quicker Wheelchair Access   | Best Brothers Group of Companies

  • Technology
    Dahua USA Releases New LincX2PRO Line Linking Homes with Professional Systems – Dahua Technology USA Inc | Best Brothers Group of Companies

    Dahua USA Releases New LincX2PRO Line Linking Homes with Professional Systems – Dahua Technology USA Inc | Best Brothers Group of Companies

    Dahua Helps Retail Operations Run Smoothly – Dahua Technology USA Inc | Best Brothers Group of Companies

    two people seated on a table and signing agreements Two people standing behind them on a stage.

    Mada Assistive Technology Centre Signs MoU with Korea Trade Promotion Agency | Best Brothers Group of Companies

    A computer model of one of the accessible homes.

    How Gaming Technology is Helping Design More Accessible Homes | Best Brothers Group of Companies

    Government of Canada Announces New Accessible Technology Program Funding Recipients | Best Brothers Group of Companies

    Dahua Technology USA Announces Product Lineup for GSX 2019 – Dahua North America | Best Brothers Group of Companies

    Dahua Technology Partners with Pepper to Bring Heightened Security to Its Video IoT Devices – Dahua North America | Best Brothers Group of Companies

    Dahua Technology Partners with Pepper to Bring Heightened Security to Its Video IoT Devices – Dahua North America | Best Brothers Group of Companies

    India: Assistive Technology for All 2030 Conference Focuses in Infrastructure, Assistive Devices | Best Brothers Group of Companies

    India: Assistive Technology for All 2030 Conference Focuses in Infrastructure, Assistive Devices | Best Brothers Group of Companies

    Private Transport Provider to Offer an Inclusive Experience in Malta   | Best Brothers Group of Companies

    National Federation of the Blind Applauds Introduction of Greater Access and Independence through Nonvisual Access Technology (GAIN) Act | Best Brothers Group of Companies

  • Projects
    Ho (left) and Chang sharing EcoWorld’s future plans at the Eco Sanctuary Gallery. (Photos by Low Yen Yeing/EdgeProp.my)

    Malaysia: Universal Design for EcoWorld’s Future Projects | Best Brothers Group of Companies

    European Commission Provides 20 Cities with Funding for Innovative Projects on Inclusion  | Best Brothers Group of Companies

    European Commission Provides 20 Cities with Funding for Innovative Projects on Inclusion  | Best Brothers Group of Companies

    The Portland Art & Learning Studio Encourages Diverse Projects by Artists with Disabilities | Best Brothers Group of Companies

    The Portland Art & Learning Studio Encourages Diverse Projects by Artists with Disabilities | Best Brothers Group of Companies

    Yoocan Seeks Collaborative Partners, Highlights Projects at Naidex 2019   | Best Brothers Group of Companies

    Yoocan Seeks Collaborative Partners, Highlights Projects at Naidex 2019   | Best Brothers Group of Companies

    Vision unveiled for London school powered by Thames tide

    Climate change forces emergency repairs to “failsafe” Arctic seed vault

    Grenfell Tower fire deaths raise questions about safety of post-war renovations

    Santiago Calatrava’s World Trade Center Oculus continues to leak

    Note Design and Afteroom hack IKEA kitchens to make living room furnishings for Reform

No Result
View All Result
BBG Architecture Life
No Result
View All Result
Home BBG

Establishing Common Ground for Securing Digitized Manufacturing

Admin by Admin
October 15, 2019
in BBG
0 0
0
Establishing Common Ground for Securing Digitized Manufacturing
336
SHARES
2k
VIEWS
Share on FacebookShare on TwitterShare on Google Share on Linkedin
Establishing Common Ground for Securing Digitized Manufacturing


By Rick Peters, Operational Technology Global Enablement Director, Fortinet


On a global scale, manufacturers are rapidly connecting and expanding their respective enterprise environments to the IT network. This new digital connectivity brings significant advantages to organizations, such as being more responsive to market demands and changes while gaining deeper insight into equipment and processes. Conversely, this shift in connectivity also increases the risk to critical elements such as control and automation operations that constitute the cyber physical.


According to a new IDC white paper on operational security for manufacturing environments, 88% of manufacturing operational assets are now connected to a converged IT/OT network. This is a strong indicator that digitalization efforts are transforming manufacturing environments, making them increasingly reliant on the availability of data to perform critical tasks. This ongoing IT/OT convergence should also be a catalyst for the implementation of robust security measures designed to protect these newly exposed environments.


 


The Challenges of Converging IT and OT Security Objectives


While security is clearly an important objective of such modernization, it is easier acknowledge the need than to accomplish in timely fashion. Historically, IT has owned the cybersecurity strategy for an organization, with the OT network often isolated from risk either through a hardened perimeter or by being air-gapped from the IT network. Now that the manufacturing floor is being connected to the IT network, the first impulse of the security team is to extend existing security devices and strategies into the OT environment.


This is often the first, and one of the most significant hurdles that need to be addressed when considering how to best secure the OT network. Even before connectivity is established between the IT and OT environments, security teams must gain a clear understanding of what new assets they are trying to protect. And the most effective way to do that is for the security team to proactively engage frontline OT personnel to identify the environment’s most critical assets and critical points of risk.

The next significant hurdle involves aligning the objectives of the manufacturing environment with those of IT. The traditional priorities that drive IT security (confidentiality, integrity, availability, productivity, and Propriety) reflect quite the contrast to an OT environment where safety and continuous operations equate to unique abolutes (Availability, Integrity, Productivity, Confidentiality, and Propriety). In some manufacturing environments, ensuring the safety and security of workers, and even the surrounding community, is an even higher requirement – a concern that IT rarely if ever has to consider.


While not completely indifferent to maintaining data integrity and protection, the primary objective of the manufacturing operation is to safely optimize productivity and throughput while maintaining the continuity of operations. That unique posture is all about avoiding unplanned downtime due to a system failure or security event as such events can cost the organization upward of hundreds of thousands or even millions of dollars per hour.


Of course, IT has characterized financial concerns of its own that underpin the necessity of well defined strategies and countermeasures to address cybersecurity . In the US, according to one IBM study, the average cost of a security breach is $3.86 million, and in the United States, that number jumps to $7.9 million.


As a result, according to the IDC report cited above, “the notion of converging IT and OT is about finding a way to address the divergent priorities while safely enabling the best of modern technology capabilities. As manufacturing organizations seek to engage in IT/OT convergence, they must look for ways to overcome the biggest impediment to enacting IT/OT convergence: the issue of security.”


 


Getting to Common Ground


Addressing the convergence challenge requires that both the IT Security and OT subject matter experts   be open to ways of approaching securing that are neither too restrictive, nor an impediment to production. They must also visualize security as essential to maintain business value and create trust with customers. This understanding can help guide the security team in how to best achieve those objectives.


One of the best places to start, according to the IDC report, is to understand the commonalities that can ensure alignment between the IT and OT teams. And more than anything else, that common thread in today’s global digital marketplace is data. Both IT and OT environments generate and rely on data, and it is the sharing of that information that is driving convergence efforts.

But in protecting that data, two ideas must remain paramount: First, traditional IT security policies, while a reasonable starting point, must take into account critically unique OT priorities. Second, as cybercriminals increasingly target potentially vulnerable OT systems, any security strategies in place must be flexible enough to scale, adapt, and ultimately mitigate the growing sophistication of attacks without compromising OT’s operational objectives.


Companies that are able to successfully align their IT and OT security strategies with the digital goals of the organization will be better positioned to minimize the frequency and impact of security-related threats. At the end of the day, protecting these high value OT assets, including the physical manufacturing environment itself, is a common goal on which all key stakeholders can agree.


About the Author


Rick brings more than three decades of cybersecurity and global partnering experience working across foreign, domestic, and commercial industry sectors at the National Security Agency (NSA). As Fortinet’s Operational Technology Global Enablement Director, he delivers cybersecurity defense solutions and insights for the OT/ICS/SCADA critical infrastructure environments. Prior to Fortinet, Rick led development of cyber capability across Endpoint, Infrastructure, and Industrial Control System technologies. Previously, Rick also served as an executive leader supporting the Information Assurance Directorate at the NSA.

Did you Enjoy this Article?

Check out our free e-newsletters
to read more great articles.

Subscribe Now

Establishing Common Ground for Securing Digitized Manufacturing


By Rick Peters, Operational Technology Global Enablement Director, Fortinet


On a global scale, manufacturers are rapidly connecting and expanding their respective enterprise environments to the IT network. This new digital connectivity brings significant advantages to organizations, such as being more responsive to market demands and changes while gaining deeper insight into equipment and processes. Conversely, this shift in connectivity also increases the risk to critical elements such as control and automation operations that constitute the cyber physical.


According to a new IDC white paper on operational security for manufacturing environments, 88% of manufacturing operational assets are now connected to a converged IT/OT network. This is a strong indicator that digitalization efforts are transforming manufacturing environments, making them increasingly reliant on the availability of data to perform critical tasks. This ongoing IT/OT convergence should also be a catalyst for the implementation of robust security measures designed to protect these newly exposed environments.


 


The Challenges of Converging IT and OT Security Objectives


While security is clearly an important objective of such modernization, it is easier acknowledge the need than to accomplish in timely fashion. Historically, IT has owned the cybersecurity strategy for an organization, with the OT network often isolated from risk either through a hardened perimeter or by being air-gapped from the IT network. Now that the manufacturing floor is being connected to the IT network, the first impulse of the security team is to extend existing security devices and strategies into the OT environment.


This is often the first, and one of the most significant hurdles that need to be addressed when considering how to best secure the OT network. Even before connectivity is established between the IT and OT environments, security teams must gain a clear understanding of what new assets they are trying to protect. And the most effective way to do that is for the security team to proactively engage frontline OT personnel to identify the environment’s most critical assets and critical points of risk.

The next significant hurdle involves aligning the objectives of the manufacturing environment with those of IT. The traditional priorities that drive IT security (confidentiality, integrity, availability, productivity, and Propriety) reflect quite the contrast to an OT environment where safety and continuous operations equate to unique abolutes (Availability, Integrity, Productivity, Confidentiality, and Propriety). In some manufacturing environments, ensuring the safety and security of workers, and even the surrounding community, is an even higher requirement – a concern that IT rarely if ever has to consider.


While not completely indifferent to maintaining data integrity and protection, the primary objective of the manufacturing operation is to safely optimize productivity and throughput while maintaining the continuity of operations. That unique posture is all about avoiding unplanned downtime due to a system failure or security event as such events can cost the organization upward of hundreds of thousands or even millions of dollars per hour.


Of course, IT has characterized financial concerns of its own that underpin the necessity of well defined strategies and countermeasures to address cybersecurity . In the US, according to one IBM study, the average cost of a security breach is $3.86 million, and in the United States, that number jumps to $7.9 million.


As a result, according to the IDC report cited above, “the notion of converging IT and OT is about finding a way to address the divergent priorities while safely enabling the best of modern technology capabilities. As manufacturing organizations seek to engage in IT/OT convergence, they must look for ways to overcome the biggest impediment to enacting IT/OT convergence: the issue of security.”


 


Getting to Common Ground


Addressing the convergence challenge requires that both the IT Security and OT subject matter experts   be open to ways of approaching securing that are neither too restrictive, nor an impediment to production. They must also visualize security as essential to maintain business value and create trust with customers. This understanding can help guide the security team in how to best achieve those objectives.


One of the best places to start, according to the IDC report, is to understand the commonalities that can ensure alignment between the IT and OT teams. And more than anything else, that common thread in today’s global digital marketplace is data. Both IT and OT environments generate and rely on data, and it is the sharing of that information that is driving convergence efforts.

But in protecting that data, two ideas must remain paramount: First, traditional IT security policies, while a reasonable starting point, must take into account critically unique OT priorities. Second, as cybercriminals increasingly target potentially vulnerable OT systems, any security strategies in place must be flexible enough to scale, adapt, and ultimately mitigate the growing sophistication of attacks without compromising OT’s operational objectives.


Companies that are able to successfully align their IT and OT security strategies with the digital goals of the organization will be better positioned to minimize the frequency and impact of security-related threats. At the end of the day, protecting these high value OT assets, including the physical manufacturing environment itself, is a common goal on which all key stakeholders can agree.


About the Author


Rick brings more than three decades of cybersecurity and global partnering experience working across foreign, domestic, and commercial industry sectors at the National Security Agency (NSA). As Fortinet’s Operational Technology Global Enablement Director, he delivers cybersecurity defense solutions and insights for the OT/ICS/SCADA critical infrastructure environments. Prior to Fortinet, Rick led development of cyber capability across Endpoint, Infrastructure, and Industrial Control System technologies. Previously, Rick also served as an executive leader supporting the Information Assurance Directorate at the NSA.

Did you Enjoy this Article?

Check out our free e-newsletters
to read more great articles.

Subscribe Now

© 2019, Best Brothers Group. All rights reserved.

Tags: commonDigitizedEstablishinggroundManufacturingSecuring
Admin

Admin

Canada 🇨🇦

0
Confirmed
0
Deaths
0
Recovered

Stay Connected

  • 1.4k Fan
  • 3 Follower
  • 35 Follower
  • 131 Follower

Popular Post

    Follow Our Page


    For all queries regarding print editions of BBG Architecture Life, including change of address, change of payment details requests and back issues, please contact +1-888-224-8688. Email: [email protected]
    • About US
    • Terms of use
    • Cookie Policy
    • Privacy Policy
    • Advertising guide

    Recent News

    B.C. under fire for cutting COVID-19 financial help for seniors, people with disabilities

    B.C. under fire for cutting COVID-19 financial help for seniors, people with disabilities

    December 15, 2020
    • Best Brothers Group
    • BBG Security Cameras
    • BBG Hub Home Automation
    • BBG Renovations
    • BBG Construction
    • BBG Business Partnership
    • BBG I/O Marketing
    • Security Cameras GK
    • Automatic Door Depot
    • About US
    • Terms of use
    • Cookie Policy
    • Privacy Policy
    • Advertising guide

    © 2018 BBG Architecture Life - supports the architecture industry on a daily news by Best Brothers Group.

    No Result
    View All Result
    • Interiors
    • Design
    • Technology
    • Projects

    © 2018 BBG Architecture Life - supports the architecture industry on a daily news by Best Brothers Group.

    Login to your account below

    Forgotten Password?

    Fill the forms bellow to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In