Cyber Security in Operational Environments

Traditionally, Operational Technology (OT) environments were separated from corporate IT networks, making the security of the OT environment simpler. The increasing convergence and interconnection of Industrial Control System (ICS) environments with other external digital infrastructure – remote access, data analytics and corporate IT environment - means that the security posture of this environment is more complex (and necessary) than before.

Keeping the OT environment operational, safe, and secure requires a comprehensive understanding of the environment - what the problem is (or could be), how to solve it (or plan for it), and actually executing the resolutions. It is this approach that forms the basis of Denver's OT Security consulting which starts with an independent OT Security Health Check & Maturity Assessment.

Challenges We See Right Now in OT Security

  • The blurring of the physical OT perimeter and increased interconnect of OT to external systems
  • Evolving the role of the network to connect all these devices securely
  • Integrating cyber security into your industrial plant/ICS environments maintenance planning
  • The convergence of IT and OT
  • Developing an OT security governance methodology that supports your ICS security architecture
  • Balancing the need to “air-gap” infrastructure and process automation systems from the rest of the organisation while still ensuring integration with key business systems for efficiency gains
  • COVID associated travel restrictions increase the need for OEM vendor remote access to perform maintenance and support activities to critical OT systems.

How We Can Help in OT Security

  • Taking our clients IT/OT strategy and roadmap items/priorities from assessments and building security policy frameworks for later implementation.
  • Independent evaluation of proposed OT architectures and policy frameworks and benchmarking them against best practice.
  • Assessment of proposed solutions from third party vendors and providing oversight, as well as ensuring alignment against corporate standards.
  • Network design and architecture with the appropriate segregation of IT and OT infrastructure.
  • Facilitating integration between OT and IT systems in Resource & Energy industries, without compromising security.
  • Enabling remote management of OT without compromising security.
OT Security Health Check >
Blog

Securing your OT and ICS environments – it’s a cost and safety issue

Cybersecurity risk in the mining and resource sector isn’t solely about the loss of intellectual property. An attack can deeply impact daily business operations causing shutdowns, equipment damage, financial loss, or worse, endanger lives.

Blog

The Critical Need for Secure PCN in Mining, Oil & Gas

Process Control Networks are complex in design and implementation because they integrate with a range of corporate and industrial components. PCN's perform sensitive and vital tasks for managing and handling critical infrastructure. It’s imperative to implement security in these systems because they are targets for cyber-attacks.

Blog

Securing OT Networks Beyond Guards, Guns & Gates

In this Insight, Denver Strategic Consulting Services Manager, Keren Jenns asks two of Denver's OT SME's to consider IT and OT convergence issues on manufacturing operations and look at how organisations are securing their operations beyond guards, guns and gates.

Featured Reading