Topics In Demand
Notification
New

No notification found.

Blog
The Cybersecurity Challenge of IT/OT Convergence

October 13, 2017

540

0


Listen to this article



The Industrial Internet of Things has moved beyond the hype, and end users are dealing with the challenges of implementing real-world IIoT technology in their plants. This trend is accelerating the convergence of IT and OT technologies, which has already been an issue for end users as commercial IT technologies become more pervasive in today’s control systems and worker roles and organizations continue to change.

The resulting cybersecurity challenges that come with this convergence are considerable. Cyber threats are on the rise. Malware and ransomware attacks are disrupting services and supply chains, leading to damaged equipment and impacting the company brand as well as the bottom line. It can be challenging to manage security personnel and the teams entrusted to safeguard company assets and operations, especially with limited budgets and resources. Communicating effectively with company leadership about cyber risks also holds its own set of challenges.

 

ISSSource Podcast with ARC and SANS Institute: Cybersecurity in The Age of Convergence

In this ongoing series of podcasts with ISSSource and Greg Hale, ARC’s Mark Luciw and SANS Institute’s Mike Assante discuss these convergence challenges and their impact on cybersecurity, which will be the focus of the upcoming SANS Institute workshop to be held at the ARC Orlando Forum on Feb. 11 at 4 p.m, 2018. This Sunday workshop will be led by Michael Assante and Doug Wylie of SANS Institute’s Industrial Practice Area. This workshop is intended for directors and managers responsible for the teams that defend company operations from current and future cyber threats.

Expect to:

  • Give critical thought to how IT and Operational Technology (OT) convergence affects your company
  • Gain a deeper understanding of your company’s security posture and consider its ideal future state
  • Discuss best practices for how to build a security action plan and ways to measure progress
  • Equip yourself to engage more effectively with your staff, peers and outside parties in cyber-risk decisions

“Reprinted with permission, original blog was posted here. You may also visit here for more such insights on the digital transformation of industry.

 

About ARC Advisory Group (www.arcweb.com): Founded in 1986, ARC Advisory Group is a Boston based leading technology research and advisory firm for industry and infrastructure.

For further information or to provide feedback on this article, please contactakanagali@arcweb.com

 

About the Author:

Larry O’Brien

Vice President, Research

Larry is responsible for providing oversight in ARC’s research into process automation markets, including process automation systems, process safety systems, plant asset management systems, intelligent device management strategies, and field networks.


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


© Copyright nasscom. All Rights Reserved.