APAC CIO Outlook
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Agile

    AI Healthcare

    Artificial Intelligence

    Aviation

    Bi and Analytics

    Big Data

    Cloud

    Cyber Security

    Digital Infrastructure

    Digital Marketing

    Digital Transformation

    Digital Twin

    Drone

    Internet of Things

    Low Code No Code

    Networking

    Remote Work

    Smart City

    Startup

    Unified Communication

    Wireless

  • E-Commerce

    Education

    FinTech

    Healthcare

    Manufacturing

    Pharma and Life Science

    Retail

    Travel and Hospitality

  • Dell

    IBM

    Microsoft

    Salesforce

    SAP

  • Cognitive

    Compliance

    Contact Center

    Corporate Finance

    Data Center

    Data Integration

    Digital Asset Management

    Full Stack Development

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    Proptech

    RegTech

Menu
    • IoT
    • Compliance
    • IBM
    • Big Data
    • Unified Communication
    • Digital Infrastructure
    • Data Center
    • Salesforce
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Internet of Things
    Editor's Pick (1 - 4 of 8)
    left
    Connecting dots the IOT way!

    Sunil Singh, Regional Chief Information Officer, Coca-Cola Beverages Vietnam

    Disrupting the Automotive Industry through Digitalization

    Esteban Remecz, CIO, Asia Pacific, ZF Group

    Simplifying Deployment and Management of Branch Office Networks

    Ari Bose, CIO, Brocade

    Internet-of-Things: The Rise of Connected Businesses and Connected Lives

    Harnath Babu, CIO, KPMG India

    How IOT is Driving Competitive  Advantage to Asian Supply Chains?

    Steve Walker, CIO, DHL Supply Chain Asia Pacific

    Embracing Advanced Tech-enabled Solutions that Foster Innovation and Growth

    Steven Weinreb, CIO & EVP, Technology & Operations, Asia, MetLife

    5G Update

    David Turkington, Head Of Technology, Gsma

    Enterprise networks turn to cellular LPWA to power their IoT-enabled futures

    Alexander Bufalino, Quectel Wireless Solutions – Vp Global Marketing, Quectel (Sha: 603236)

    right

    Digital transformation - Gaining Momentum in Operational Technology (OT)

    Martin Schlatter, CIO and Regional CEO, APAC, NTT Security

    Tweet
    content-image

    Martin Schlatter, CIO and Regional CEO, APAC, NTT Security

    Digital transformation isn’t new in Information Technology (IT) but its gaining momentum in Operational Technology (OT) – and fast. Thanks to the internet, devices that are not traditionally classified as IT are now being connected. Factory production lines, critical infrastructure utilities like power plants, medical equipment, vehicles, cameras and physical doors are all being Internet Protocol (IP) enabled and connected.

    IP connectivity enables real-time monitoring, facilitates automation and provides centralized control.

    A connected OT network enables advanced data analytics which encourages organizations to extract actionable intelligence from these devices. Digital transformation however comes with inherent risks.

    What do we mean by OT?

    OT is mainly associated with the critical infrastructure sector which includes electricity, water, gas and other infrastructure providers. It combines real-time applications, IT infrastructure and supervisory control and data acquisition (SCADA) devices that enable the control and monitoring of a large scale industrial network. In practice, OTalso includes more than just the utility sector – it can be found in buildings, hospitals, shopping malls , ships, trains, ports, airports, manufacturing plants, and mines to name a few.

    Each of the above industries has various levels of OT systems installed, ranging in asset value from hundreds of thousands to hundreds of millions of dollars. These OT systems also contain large numbers of OT equipment ranging from hundreds to thousands of individual devices. OT devices are used to control and monitor automated environments such as beverage bottling plants, electricity grids, shipping container terminals or Heating, Ventilation and Air Conditioning (HVAC) systems that provide finite temperature control for pharmaceutical production. OT systems generally have a lifespan of 15 to 30 years, these systems have typically been insecure by design, are costly to replace and take a long time to upgrade.

    Cybersecurity is a major issue affecting OT systems. According to NTT Security’s 2018 Global Threat Intelligence Report (GTIR) the manufacturing industry is now the fourth most targeted sector by cyber-attacks. There are a range of threats too. A portable 4G modem, for example, can easily be installed into a manufacturing network by any number of people working in the environment; this can introduce unrestricted access into the OT network.
    In addition, connecting a laptop or USB stick into the OT network, which is not uncommon, can introduce malware specifically designed to infect OT systems.

    OT threats are real and are happening now

    In August 2018, one of the world’s largest chipmakers was shutdown for three days after the WannaCry outbreak. This resulted in revenue loss estimated to be about $170 million. This shutdown was made more significant because the factory used advanced manufacturing systems that required connectivity to external networks. Given WannaCry struck in mid- 2017, this also indicates there is still a lot to be done to ensure OT networks are resilient to cyber-attacks. There are numerous accounts of successful breaches through cyber-attacks on state based power plants, shipping companies, logistics systems and pharmaceutical production facilities that have caused significant downtime and damages exceeding USD $100 million.

    Other industries are vulnerable too. For the healthcare sector, connected medical devices (known as Internet of Medical Things or IoMT) offer the potential to improve patient care, while driving down operating costs. But, as healthcare increasingly relies on remote monitoring, the availability of IoMT devices is critical and can be life threatening in some cases. A number of IoMT devices still use legacy operating systems which contain vulnerabilities that can easily be exploited. These vulnerabilities often cannot be patched as these changes may invalidate the device safety certification. Even something as trivial as posting a picture of a birthday celebration in hospital may expose sensitive patient data, while WiFi used by medical equipment can be hacked if not properly secured. Patients and clinicians will therefore need support from information security advisors to give them confidence that appropriate data protection and governance controls are in place, while avoiding protocols that unnecessarily limit the beneficial use of new information.

    Ransomware’s effect on the UK’s National Health Service, and multiple US-based healthcare organizations is well documented. The effect of these cyber-attacks resulted in loss of patient data to temporary facility shutdown causing patients in some cases to be turned away from medical facilities. Globally, healthcare is the third most affected industry sector by ransomware attacks according to the NTT Security 2018 Global Threat Intelligence Report.

    In October 2016, the Mirai malware created botnets on IoT devices which were then used to launch distributed denial of service (DDoS) attacks that disrupted all global internet traffic. This was the start of the first major attack against IoT devices. IoT devices are pervasive across the internet and are often inherently insecure due to their use of default and/or weak usernames and passwords. In a number of cases these username and password combinations are not even configurable. IoT devices are designed to connect easily to existing IT networks, but this has allowed IoT to bypass existing IT security controls, such as change control and traditional firewalls. As a result, IT administrators face numerous security challenges maintaining their security posture.

    Securing OT

    Across the globe, we are seeing a few remediation trends. Organizations have started to follow guidelines from ENISA and NISTwhen implementing connected devices. These guidelines were developed in consultation with industry experts, vendors and government bodies. Many have also started to engage with OT teams, biomedical technicians, and facilities teams to understand devices connected to the network. They are finding a common ground, discovering connected devices, and formulating a strategy to address basic but critical cybersecurity needs.

    It’s evident that IT and OT functions within organizations need to work together to ensure security controls are applied against all connected infrastructure elements and that governance of cyber security extends to OT and IOT environments where these are used.

    tag

    IoT

    Critical Infrastructure

    Pharmaceutical

    Information Technology

    Remote Monitoring

    Information Security

    Weekly Brief

    loading

    Featured Vendor

    • Things on Net: Unlocking the Ultimate Potential of IoT
      Things on Net: Unlocking the Ultimate Potential of IoT
    Top 10 IoT Solutions Companies - 2022
    ON THE DECK

    IoT 2022

    Top Vendors

    IoT 2020

    Top Vendors

    IoT 2019

    Top Vendors

    IoT 2018

    Top Vendors

    IoT 2017

    Top Vendors

    IoT 2016

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Agile Transformation Journey

    Agile Transformation Journey

    Sachin Nair, VP CIO, Khan Bank
    Meeting the IT Profitability Objective

    Meeting the IT Profitability Objective

    Steve Heilenman, CIO, Computer Aid Inc
    The Changing Landscape of Cyber Security

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State
    Accelerating Petcare Innovation through CRM and Digital Vision

    Accelerating Petcare Innovation through CRM and Digital Vision

    Miao Song, Chief Information Officer, Mars Petcare
    How Cloud Systems are Impacting Business Environments

    How Cloud Systems are Impacting Business Environments

    Martin Stegner, CIO, NOVUM Hospitality
    Digital Tack

    Digital Tack

    Claus Nehmzow, Chief Innovation Officer, Eastern Pacific Shipping Pte
    Brokering the Cloud Services

    Brokering the Cloud Services

    Eric Boyette, Secretary & State CIO, Information Technology
    Defining a Cloud Strategy: A Higher Education Paradigm

    Defining a Cloud Strategy: A Higher Education Paradigm

    Russell M. Kaurloto, VP and CIO, Clemson University
    Loading...

    Copyright © 2022 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    |  Sitemap |  Subscribe |   About us

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://internet-of-things.apacciooutlook.com/ciospeaks/digital-transformation-gaining-momentum-in-operational-technology-ot-nwid-6147.html