• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology

IT-OT co-existence security conundrum

Allan Tan by Allan Tan
September 8, 2020
Images from Pexels

Images from Pexels

To try and find a word to describe the IT-OT co-existence is to illicit an indifferent look from information technology professionals.

Before we delve deeper, let’s set the scene by standardising on one of set of definitions. Below are Gartner definitions.

Information Technology (IT) refers to the spectrum of technologies for information processing, including software, hardware, communications technology and related services. It does not include embedded technologies that do not generate data for enterprise use.

Operation Technology (OT) is hardware and software that detects or causes a change through the direct monitoring and/or control of industrial equipment, assets, processes and events.

Internet of Things (IoT) is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.

Industrial Internet of Things (IIoT) is the market for industrial Internet of Things platforms s a set of integrated software capabilities. These capabilities span efforts to improve asset management decision making, as well as operational visibility and control for plants, depots, infrastructure and equipment within asset-intensive industries.

Rolf O’Grady, vice preside of customer success at Mocana, refers to OT as the commercial side of IoT, driven by consumers and end-users. He thinks of IIoT as extensions of IoT but deployed in siloed environments. The challenge with IIoT is the sheer volume of devices across operating environments, operating systems and hardware types.

In an OT environment, losses or disruptions go beyond the financial aspect or disruption to operations that is often associated with kinks when something happened to IT. OT disruptions can extend to include human experiences including the potential for loss of life.

This presents a different level altogether when consider the security aspects of OT.

In a YouTube presentation on IT vs OT approaches to IT security, O’Grady refers to IT security as a position where “you are always playing defence, always trying to get to a security posture that is either good enough or reasonable enough or manageable enough to at least ascertain what your current risk posture is.

Vincent Liu, regional director, APAC, Nozomi Networks

In the dialogue that follows, FutureCIO spoke to Vincent Liu, regional director, APAC, Nozomi Networks on his take on securing IT and OT.

Integration Challenges

What are the key challenges that businesses in APAC are facing with IT and OT integration?

Vincent Liu: One of the biggest challenges with the integration of IT and OT is that they are traditionally seen internally as being segregated and independent. While they have shared values around confidentiality, integrity, and availability, how each group prioritizes and implements their policies is vastly different.

As Industry 4.0 drives the convergence of IT and OT, there are financial benefits for APAC executives to ensure both teams work in concert to optimize operations and to secure the entire organization from cyber threats.

The Security Conundrum

How can culture hinder the security of integrated IT and OT systems?

Vincent Liu: In APAC, we do see significant cultural differences between IT and OT. IT cybersecurity teams are apt to embrace new technology since the cyber threat landscape evolves so quickly.

On the other hand, it is understandable that OT security teams focus on physical security measures such as video surveillance systems, ID badging systems, and prevention of physical manipulation or destruction of assets. Historically, OT has operated under the guise of security through obscurity when it comes to cyberattacks.

In general, IT teams focus on securing information, while OT teams are mandated to ensure their physical systems are running 24x7. Therefore, perceived vulnerabilities dictate spend and resources in securing their environments.

Overcoming barriers

What steps can businesses in APAC take to achieve a culture shift and overcome the barriers in implementing a strong security framework?

Vincent Liu: An easy way to understand this is to look back at the achievements we have made in securing organizations from zero-day attacks in the past decade. Governments and large enterprises received board level or executive support in highlighting the importance of building resilience to these emerging threats. IT cyberattacks often made headline news, and a shift toward more IT cybersecurity spend gained traction quickly.

In the past several years, cyberattacks against OT environments have been on the rise. Though OT cyber incidents have not be as numerous compared to attacks on IT, the stakes are high. Successful attacks have shut down production, caused extensive financial damage and threatened public safety.

A top-down approach to security along with education can effectively shift culture and motivate both departments to develop initiatives to jointly create a holistic cyber framework.

How can businesses implement a holistic approach in securing both cyber and physical systems?

Vincent Liu: Organizations need to anticipate and prepare for changes in their existing people, processes, and technology practices. Here are examples of initiatives companies use to ease the transition:

  • Run tabletop exercises with IT and OT teams to evaluate the organization’s cyber crisis processes, tools, and ability in responding to cyberattacks from strategic and tactical perspectives.
  • Adopt technology that can provide visibility into OT assets, while detecting threats to their network.
  • Conduct an integrated IT/OT compliance mapping initiative to bolster corporate compliance.

Beyond the technical challenges, cultural issues such as overcoming distrust between the two groups can be a big hurdle all on its own. Methods that might ease the transition include conducting workshops designed to reconcile perspectives and to cross-pollinate experiences to build bridges and establish trust.

Related:  Convergence to fuel cybersecurity spending in commercial and public sectors
Tags: GartnerIT-OT integrationNozomi Networkssecurity strategies
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Experts warn against AI-powered deepfake impersonation scams
  • Dropbox updates universal search and knowledge management product
  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe