Operating technology at risk. Information technology vs Operating Technology.

Talking about that lately growing incidence of cyber attacks would be carrying coals to Newcastle. The fact that these attacks can have an impact on the daily life of all of us.

Senior Security Architect, Unicorn Systems

Senior Security Architect, Unicorn Systems

IT technology now controls the vast majority of critical infrastructure. By that, we mean for example. Nuclear power plants, pipelines, power distribution networks, train control and air operations, major banks, etc.. Could you imagine the impact of a successful cyber attack on the national or European level?

Operating technology at risk
Operating technology at-risk

Emerging trends: 

In recent years, watching the trend towards greater openness and integration of critical infrastructure with other information systems. Still used by department management systems from other networks and the Internet is hard to resist demands for on-line extraction and processing of data. 

This creates additional paths to successful cyber attacks (be careful - it is a critical mistake to think that the department operating / managing networks by means other adequate securities).

From the opposite perspective, it is possible to monitor the activities of which have associated risks mitigated. This includes the newly adopted law on cyber security, which comes into force on 1 January 2015 (with a one-year deadline for fulfillment of legitimate measure). 

The advent of the Act reflects the increasing need for security in the cyber environment and coming "eleventh hour". On the other hand, the requirements under the Act will have a considerable impact on the need for investment in this area and still in the related legislative provisions there are some contradictory definitions - egg. Health is not included in the critical infrastructure only hospital in the country.

low on cyber security
low on cyber security

What to prepare?

What if every manager of critical infrastructure should be deployed, or perform in technical, organizational arrangements and documentation? They are managers of critical infrastructure prepared to effectively use tools such as IDS (Intrusion Detection System), SIEM (Security Incident and Event Management), encryption, etc..? 

Administrators have the critical infrastructure redundant data centers and plans to do in the event of an accident / attack system? They can be in one of the company managers agree common IT systems (ERM, CRM, payroll, intranet, etc..) Administrators operational technology (general SCADA systems)? They can at critical moments agree with other entities (suppliers, competitors)?

What should we do?

How to new trends and cyber law stand? The crucial question is whether the preparation and implementation of projects related venture to themselves or choose the right supplier.

cost reduction
Cost Reduction

An experienced contractor can quickly compare the current state of the environment in terms of legislative provisions and accelerate the process of implementation of individual projects. It also can appropriately design the individual components manufacturer supplied so that no problems in their integration. The correct procedure can be summarized into the following steps:

  1. Preparation of a strategy / analysis, which measures the order in which we realize. Well strategy minimizes the risk of thwarted future investments.
  2. Plan and start projects according to the strategy.
  3. Modify internal processes so that new systems can be effectively operated.
  4. Set up and test the ability of communication inside and outside the company in case of a critical event.
  5. Regularly audit the status of the systems and manage their development and changes over time.

At a time when "the door" intelligent network (Smart Grid), cars and trains with the ability to drive without a driver, etc.., Cyber security has another dimension - to be ready before it is too late.

Comments