SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
| @ema_research
Challenges and Best
Practices for Securing
Modern Operational
Technology Networks
Tim Roddy
Vice President of Marketing
Open Systems
Shamus McGillicuddy
Vice President of Research, Network Infrastructure
and Operations
Enterprise Management Associates (EMA)
| @ema_research 2
Watch the On-Demand Webinar
• Challenges and Best Practices for Securing Modern Operational
Technology Networks On-Demand Webinar:
https://info.enterprisemanagement.com/securing-modern-
operational-techn-networks-webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Featured Speakers
Shamus is a Vice President of Research at Enterprise
Management Associates (EMA), where he leads the
network infrastructure and operations practice. He
has nearly two decades of experience in the IT
industry. His research focuses on all aspects of
managing enterprise networks, including network
automation, AIOps-driven network operations, multi-
cloud networking, and WAN transformation.
Tim brings over 25 years of go-to-market strategy,
marketing, and partner expertise in cybersecurity,
software, cloud, and SaaS, including 15 years of
executive and leadership positions at iboss, Fidelis
Cybersecurity, McAfee, and Secure Computing. As
Vice President of Marketing for Open Systems, Tim is
responsible for global marketing strategy, branding,
messaging, communications, demand generation,
analyst relations, and partner marketing.
© 2023 Enterprise Management Associates, Inc. 3
Shamus McGillicuddy
Vice President of Research
EMA
Tim Roddy
Vice President of Marketing
Open Systems
| @ema_research
| @ema_research
OT/IT Convergence Goes Mainstream
© 2023 Enterprise Management Associates, Inc. 4
Industries especially impacted:
43% of network I&O teams:
IoT and OT are major drivers of our
network strategy
Construction/Civil
engineering
Health care
Logistics/Wholesale/
Distribution
Manufacturing
Retail
Transportation
83% IT organizations:
OT and IoT technology are connecting to enterprise networks
| @ema_research
| @ema_research
Why is Convergence Happening?
© 2023 Enterprise Management Associates, Inc.
Fundamental benefits of IT/OT convergence:
Unlock data from the OT edge
Integrate OT and business systems to drive innovation
Outcomes of convergence:
Smart, better automation
Better, responsive customer service
Data-driven decision-making
Efficiencies that reduce costs, environmental impact, etc.
5
| @ema_research
| @ema_research
Attacks on OT systems are highly
targeted
OT Security is Not Ready for IT Convergence
© 2023 Enterprise Management Associates, Inc. 6
Top intrusion alert by industry**
Water treatment: generic network scan
Industrial machinery/manufacturing:
program transfers and weak passwords
Building materials: cleartext passwords
Energy: OT protocol packet injection
* Microsoft, “Cyber Signals,” December 2022.
** Nozomi Networks, “Unpacking the Threat Landscape with Unique Telemetry Insight,” August 2023
Physical isolation was the
default approach
Physical access control
was the ultimate
protection
Convergence breaks air
gap model
75% of industrial controllers
in Microsoft customers’ OT
networks have unpatched,
high-severity vulnerabilities
One million internet-
connected IoT devices are
running Boa OS (open-
source web server
discontinued in 2005)*
OT security relies on
air gaps
OT groups aren’t
hardening systems
| @ema_research
| @ema_research
Securing OT Convergence
© 2023 Enterprise Management Associates, Inc. 7
Investments in response to OT convergence:
“We have a dedicated team for [OT connectivity]. We’re investing in security to support it. There are
discussions on how to segment the network to isolate these devices.”
Network team manager
Fortune 100 pharmaceutical company
55% buy new
network security
• Firewalls
46 buy new network
access controls
• ZTNA
50% buy network
automation solutions
• Provisioning
connectivity
• Segmenting
networks
• Managing firewall
policy
| @ema_research
| @ema_research
Organizations with formal
zero trust initiatives pursue
tailored policies
Air gaps are history. Granular controls are preferred.
IT Organizations are Building Zero Trust Controls and Policies for OT
© 2023 Enterprise Management Associates, Inc. 8
Preferences for granting OT devices network access:
36% Tailored policies based on business function, device type, etc.
28% IoT VLAN
23% Untrusted, limited access
12% Banned, no network access
Only 42% who enforce tailored
OT/IoT policies have been
completely successful
Weak collaboration between NetOps
and SecOps undermines success
| @ema_research
| @ema_research
NetOps and SecOps Must Partner on OT Convergence
© 2023 Enterprise Management Associates, Inc. 9
79% of organizations report:
IoT drives network and
security teams to
collaborate more
43% see NetOps and
SecOps influence over
IoT strategy improve
when they partner
Key areas of collaboration:
Technology evaluation/procurement
Planning and design
Technology implementation
Operational monitoring/logging
| @ema_research
| @ema_research
Final Thoughts From EMA
© 2023 Enterprise Management Associates, Inc. 10
IT/OT convergence is
mainstream
OT platforms and systems are
fundamentally insecure & highly targeted
NetOps teams must invest in network
security, access controls, automation
Zero trust should drive OT
convergence strategy
NetOps and SecOps
must partner closely
© 2023 Open Systems. All rights reserved. Proprietary & Confidential.
Securing Modern OT with
Open Systems
Tim Roddy
Vice President, Marketing
© 2023 Open Systems. All rights reserved. Proprietary & Confidential.
Securing OT with IT: SASE and The Purdue Model
12
© 2023 Open Systems. All rights reserved. Proprietary & Confidential.
Challenges with the Purdue Model: Connected OT
13
The advent of smart devices and use of wireless connectivity by OT breaks Purdue Model
Sources: https://www.cvedetails.com/ and https://hub.dragos.com/hubfs/312-Year-in-Review/2022/Dragos_Year-In-Review-Report-2022.pdf?hsLang=en
© 2023 Open Systems. All rights reserved. Proprietary & Confidential.
Securing OT with IT: leverage Secure Access Service Edge
14
© 2023 Open Systems. All rights reserved. Proprietary & Confidential.
Implementing SASE to Secure Modern OT in the Purdue Model
15
© 2023 Open Systems. All rights reserved. Proprietary & Confidential.
Open Systems Secure Access Experience™
SD-WAN Networking
Firewall
Connectivity Management
ZTNA
SWG
CASB
SASE Platform as a Service
SD-WAN-aaS SSE-aaS
Unified Management Portal
Experience Delivery as a Service
Mission Control
and Support
Integration
Management
Implementation and
Change Management
24 x 7
Global Ops
Service
Experience
Promise
Assigned
Experts
Proactive and
Pre-emptive
Level 3
engineers
Commitment
To innovation
© 2023 Open Systems. All rights reserved. Proprietary & Confidential. 17
Summary
Securing OT with IT: leverage Secure Access Service Edge
For more information about securing modern OT environments, read
our white paper:
https://go.open-systems.com/Modern-OT-Environments.html

Más contenido relacionado

Similar a Challenges and Best Practices for Securing Modern Operational Technology Networks

Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...Enterprise Management Associates
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...Enterprise Management Associates
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldEnterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...Enterprise Management Associates
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsIron Mountain
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...Enterprise Wired
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud EnterprisesEnterprise Management Associates
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringEnterprise Management Associates
 

Similar a Challenges and Best Practices for Securing Modern Operational Technology Networks (20)

Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Network Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud WorldNetwork Engineering and Operations in a Multi-Cloud World
Network Engineering and Operations in a Multi-Cloud World
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
The Future of Data Center Network Automation
The Future of Data Center Network AutomationThe Future of Data Center Network Automation
The Future of Data Center Network Automation
 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart Buildings
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...Mastering Enterprise Networking: Components, Strategies, and Trends  | Enterp...
Mastering Enterprise Networking: Components, Strategies, and Trends | Enterp...
 
Application Delivery Infrastructure for Multi-Cloud Enterprises
 Application Delivery Infrastructure for Multi-Cloud Enterprises Application Delivery Infrastructure for Multi-Cloud Enterprises
Application Delivery Infrastructure for Multi-Cloud Enterprises
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network Monitoring
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Enterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and BeyondEnterprise Network Automation for 2020 and Beyond
Enterprise Network Automation for 2020 and Beyond
 

Más de Enterprise Management Associates

Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...Enterprise Management Associates
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Enterprise Management Associates
 
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost DataEnterprise Management Associates
 

Más de Enterprise Management Associates (20)

Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 
Modern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed EnterpriseModern ITAM in the Digitally-Transformed Enterprise
Modern ITAM in the Digitally-Transformed Enterprise
 
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
2023 ITOps Budgeting to Win: Use New Research-Based Outage Cost Data
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Challenges and Best Practices for Securing Modern Operational Technology Networks

  • 1. | @ema_research Challenges and Best Practices for Securing Modern Operational Technology Networks Tim Roddy Vice President of Marketing Open Systems Shamus McGillicuddy Vice President of Research, Network Infrastructure and Operations Enterprise Management Associates (EMA)
  • 2. | @ema_research 2 Watch the On-Demand Webinar • Challenges and Best Practices for Securing Modern Operational Technology Networks On-Demand Webinar: https://info.enterprisemanagement.com/securing-modern- operational-techn-networks-webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch © 2023 Enterprise Management Associates, Inc.
  • 3. | @ema_research | @ema_research Featured Speakers Shamus is a Vice President of Research at Enterprise Management Associates (EMA), where he leads the network infrastructure and operations practice. He has nearly two decades of experience in the IT industry. His research focuses on all aspects of managing enterprise networks, including network automation, AIOps-driven network operations, multi- cloud networking, and WAN transformation. Tim brings over 25 years of go-to-market strategy, marketing, and partner expertise in cybersecurity, software, cloud, and SaaS, including 15 years of executive and leadership positions at iboss, Fidelis Cybersecurity, McAfee, and Secure Computing. As Vice President of Marketing for Open Systems, Tim is responsible for global marketing strategy, branding, messaging, communications, demand generation, analyst relations, and partner marketing. © 2023 Enterprise Management Associates, Inc. 3 Shamus McGillicuddy Vice President of Research EMA Tim Roddy Vice President of Marketing Open Systems
  • 4. | @ema_research | @ema_research OT/IT Convergence Goes Mainstream © 2023 Enterprise Management Associates, Inc. 4 Industries especially impacted: 43% of network I&O teams: IoT and OT are major drivers of our network strategy Construction/Civil engineering Health care Logistics/Wholesale/ Distribution Manufacturing Retail Transportation 83% IT organizations: OT and IoT technology are connecting to enterprise networks
  • 5. | @ema_research | @ema_research Why is Convergence Happening? © 2023 Enterprise Management Associates, Inc. Fundamental benefits of IT/OT convergence: Unlock data from the OT edge Integrate OT and business systems to drive innovation Outcomes of convergence: Smart, better automation Better, responsive customer service Data-driven decision-making Efficiencies that reduce costs, environmental impact, etc. 5
  • 6. | @ema_research | @ema_research Attacks on OT systems are highly targeted OT Security is Not Ready for IT Convergence © 2023 Enterprise Management Associates, Inc. 6 Top intrusion alert by industry** Water treatment: generic network scan Industrial machinery/manufacturing: program transfers and weak passwords Building materials: cleartext passwords Energy: OT protocol packet injection * Microsoft, “Cyber Signals,” December 2022. ** Nozomi Networks, “Unpacking the Threat Landscape with Unique Telemetry Insight,” August 2023 Physical isolation was the default approach Physical access control was the ultimate protection Convergence breaks air gap model 75% of industrial controllers in Microsoft customers’ OT networks have unpatched, high-severity vulnerabilities One million internet- connected IoT devices are running Boa OS (open- source web server discontinued in 2005)* OT security relies on air gaps OT groups aren’t hardening systems
  • 7. | @ema_research | @ema_research Securing OT Convergence © 2023 Enterprise Management Associates, Inc. 7 Investments in response to OT convergence: “We have a dedicated team for [OT connectivity]. We’re investing in security to support it. There are discussions on how to segment the network to isolate these devices.” Network team manager Fortune 100 pharmaceutical company 55% buy new network security • Firewalls 46 buy new network access controls • ZTNA 50% buy network automation solutions • Provisioning connectivity • Segmenting networks • Managing firewall policy
  • 8. | @ema_research | @ema_research Organizations with formal zero trust initiatives pursue tailored policies Air gaps are history. Granular controls are preferred. IT Organizations are Building Zero Trust Controls and Policies for OT © 2023 Enterprise Management Associates, Inc. 8 Preferences for granting OT devices network access: 36% Tailored policies based on business function, device type, etc. 28% IoT VLAN 23% Untrusted, limited access 12% Banned, no network access Only 42% who enforce tailored OT/IoT policies have been completely successful Weak collaboration between NetOps and SecOps undermines success
  • 9. | @ema_research | @ema_research NetOps and SecOps Must Partner on OT Convergence © 2023 Enterprise Management Associates, Inc. 9 79% of organizations report: IoT drives network and security teams to collaborate more 43% see NetOps and SecOps influence over IoT strategy improve when they partner Key areas of collaboration: Technology evaluation/procurement Planning and design Technology implementation Operational monitoring/logging
  • 10. | @ema_research | @ema_research Final Thoughts From EMA © 2023 Enterprise Management Associates, Inc. 10 IT/OT convergence is mainstream OT platforms and systems are fundamentally insecure & highly targeted NetOps teams must invest in network security, access controls, automation Zero trust should drive OT convergence strategy NetOps and SecOps must partner closely
  • 11. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. Securing Modern OT with Open Systems Tim Roddy Vice President, Marketing
  • 12. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. Securing OT with IT: SASE and The Purdue Model 12
  • 13. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. Challenges with the Purdue Model: Connected OT 13 The advent of smart devices and use of wireless connectivity by OT breaks Purdue Model Sources: https://www.cvedetails.com/ and https://hub.dragos.com/hubfs/312-Year-in-Review/2022/Dragos_Year-In-Review-Report-2022.pdf?hsLang=en
  • 14. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. Securing OT with IT: leverage Secure Access Service Edge 14
  • 15. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. Implementing SASE to Secure Modern OT in the Purdue Model 15
  • 16. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. Open Systems Secure Access Experience™ SD-WAN Networking Firewall Connectivity Management ZTNA SWG CASB SASE Platform as a Service SD-WAN-aaS SSE-aaS Unified Management Portal Experience Delivery as a Service Mission Control and Support Integration Management Implementation and Change Management 24 x 7 Global Ops Service Experience Promise Assigned Experts Proactive and Pre-emptive Level 3 engineers Commitment To innovation
  • 17. © 2023 Open Systems. All rights reserved. Proprietary & Confidential. 17 Summary Securing OT with IT: leverage Secure Access Service Edge For more information about securing modern OT environments, read our white paper: https://go.open-systems.com/Modern-OT-Environments.html