IT environments have always been considered the forefront when it comes to cybersecurity, and OT environments have been the forefront when it comes to physical security.

As more and more cyber threats are taking place, and with an increasing number recently focused on OT environments, everyone seems to be concerned with how to upscale and secure their OT estates in terms of cybersecurity. However, rather than saying that OT dominions are the only ones that need to be upgraded, perhaps it is a good time to also review their IT holdings and look towards OT in terms of upscaling their physical environment and protecting the devices in scope.

OT environments have always focused on protecting physical entities such as walls, gates, doors, keys, and network hardware. To some extent, many have not even been protected with basic effective username and password authentication security. Although this has historically been a good enough practice, with newer communication methodologies being introduced to make remote management and vendor access easier, this has now opened up a whole bunch of new cyber threats. The OT world is now looking towards the IT world for help.

A World of IT and OT

IT environments have taken a different route. Rather than focusing on 100% protection of physical appliances, they have chosen to reduce the physical focal point in favor of keeping things simple and flexible. The new spotlight is to secure the non-tangible elements of permissions to data and communication access. Historically, this has been a feasible methodology, but with the recent breaches of well-known hardware manufacturers providing backdoor access to data, this has now opened up a new threat angle. The IT professionals should look towards the OT world for help.

Imagine a world where we could have the best of both OT and IT (Read more...)