Integrated risk management essential

August 2019 Infrastructure, Security Services & Risk Management, Industrial (Industry)

With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is an industry that is highly vulnerable to cyberattacks. Yet, the manufacturing industry remains fragmented in its approach to managing cyber-related risks.

Charl Ueckermann.
Charl Ueckermann.

This is according to Charl Ueckermann, CEO at AVeS Cyber Security, who was on the Manufacturing Indaba’s panel of discussion at the Sandton Convention Centre in June; “For manufacturing companies, the focus has always been on production innovation, operational efficiencies, minimising downtime and keeping the lights on. Therefore, when it comes to technology infrastructures in the manufacturing industry, the availability of systems has always taken priority over integrity and confidentiality, which inherently made cyber risk the least of concerns. However, in modern manufacturing, where systems are connected to the Internet, integrity and confidentiality will start to play a bigger role. In most other industries, such as financial services, confidentiality and integrity of their technology systems are prioritised over availability already, making the management of cyber risks a key focus.

“Historically, IT and operational technologies (OT) in manufacturing have also been managed separately, within different departments with their own sets of vocabulary and structures. OT departments don’t generally have as much insight into cyber risks as IT and this, by default, means that OT tends to lag behind IT in this regard.

“Yet nowadays, cyber risks are no less for a manufacturing company to protect its data, intellectual property and trade secrets than for a bank to ensure the confidentiality of customer information and other sensitive data. In fact, a cyber breach on an OT system could present a life or death situation for a manufacturing business because the health and safety of workers are at risk, and machinery and processes may become unsafe.

“The good news is that there is no need to compromise and sacrifice confidentiality and integrity over availability. In modern manufacturing, cyber risks can be effectively managed with the correct setup of OT networks that continue streamlining their production efficiency and capacity.”

Know the status quo

He advises manufacturing companies to get a firmer grip on the devices used on their OT networks.

“Have a good picture of the status quo. You need clear visibility of your OT architecture and know what devices are being connected to it so that effective security mechanisms can be incorporated into that fabric. No unauthorised devices should be permitted onto the network. Do not make use of off-the-shelf Raspberry Pis for testing in a live, non-air-gapped network that is not physically isolated from the Internet. It is doable to prevent an attack as experienced by NASA in June 2019; according to Forbes magazine, an unauthorised Raspberry Pi that was connected to its JPL servers was targeted by hackers, who then moved laterally further into the NASA network, comments Ueckermann.1

He continues: “You also want to find the best practices around cybersecurity hardening on your Supervisory Control and Data Acquisition (scada) systems and engage with a specialist OT security provider to implement the correct software required to ensure that your manufacturing environment is well protected, without compromising machine uptime. Ideally, due to the potential health and safety risks in the event of a breach, you should obtain the services of an OT governance organisation to assist with creating or adjusting processes that are globally aligned.”

Assess before you spend

His advice to manufacturing companies is to perform an Industrial Cyber Security (ICS) assessment before making any rash investments in people or technologies. Such an assessment comprises of a vulnerability assessment and a penetration test of the current infrastructure to get an accurate view of the assets and architecture and understand the cyber risks.

“Once this has been done, a pragmatic ICS cyber risk roadmap needs to be developed to determine the risks and how these can be minimised, accepted or outsourced. Importantly, operational and production efficiencies, as well as capacity, should not be compromised. Cybersecurity can be built intelligently into the fabric of the production systems,” explains Ueckermann, adding that ongoing monitoring with appropriate tools and processes is imperative to ensuring a proactive and predictive approach to managing risks in industrial control environments over the long term.

He concludes: “Manufacturing companies can benefit from a two-pronged approach that encompasses both risk management and risk outsourcing in the form of cyber insurance. The company’s risk profile will determine the level of cover required. Companies could lower their cyber insurance costs by taking steps to improve their risk profile, for instance, by ensuring that security solutions are up-to-date and properly managed, and by practising good governance.

“Cyber risk management in modern manufacturing is still new to the industry, and manufacturing companies need to plan and implement effective strategies and appropriate tools to manage and offset cyber risks in their environments. A team with a deep skill-set and appropriate experience is needed to find solutions for specific environments and risk profiles.”

Reference:

1. Winder, D. (2019, June 20). NASA has been hacked. Retrieved from Forbes: www.forbes.com/sites/daveywinder/2019/06/20/confirmed-nasa-has-been-hacked/#2e99f18cdc62



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Layered security for complex spaces
Regal Security Distributors SA Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.