OT Cybersecurity: Safeguarding Building Operations in a Digitized World

These concerns are brought into the spotlight by high-profile ransomware attacks, which can now penetrate even the most intricate systems.
Recently, in September, the gravity of this threat was illustrated when two Las Vegas casinos fell victim to an information technology cybersecurity breach.
The aftermath of these attacks cost these institutions millions of dollars in revenue, underscoring that no business, regardless of the sophistication of its cybersecurity systems, is immune to such attacks.
While this example shows how the consequences of any cybersecurity attack can be severe, it is imperative to also recognize that attacks associated with operational technology cybersecurity can be even more catastrophic.
Unlike IT cybersecurity attacks, which primarily jeopardize data, OT cybersecurity breaches threaten not only the integrity of information but also the functionality and safety of the spaces we inhabit.
Several factors contribute to this trend, including inadequately protected cybersecurity environments, the influx of new Internet of Things devices and connected systems, and the escalating complexity of securing OT systems.
In tandem with the surge in attack incidents, the global cost of cybercrime is also increasing, with a portion of the multi-trillion dollar cybercrime industry cost being attributed to attacks on operational technology environments.
This emphasizes the escalating threat to OT environments and highlights the urgency for organizations to bolster their cybersecurity measures to protect against attacks, especially given the critical role OT systems play in the safe and effective operation of industrial processes.
As the cybersecurity threat landscape continues to expand within both OT and IT, it is paramount for organizations to proactively stay ahead of the curve.
When speaking about OT cybersecurity attacks in buildings, it is imperative to understand that buildings are not just physical structures but instead, they serve as the vital hubs of modern life, encompassing offices, entertainment facilities, factories, hospitals and more.
As the lines blur between the physical and digital worlds, attackers exploit new avenues to infiltrate these spaces.
To enhance a building's resilience against OT attacks, cybersecurity governance stakeholders, from facility managers, operators to CISOs should adopt a layered security approach.
Once an assessment has been completed, key stakeholders can identify vulnerabilities, create a secure configuration and design plan that prioritizes critical assets while also selecting additive cybersecurity appliances and software to bolster defenses.
From there, operators can begin to implement holistic cybersecurity monitoring and importantly create an incident readiness plan to be prepared in case of any future incidents.
While these are just a few of the steps building owners and operators can take to reduce vulnerabilities, each plan will vary based on the building's security risk requirements and budget.
The intersection of OT and IT cybersecurity in the built environment requires a comprehensive approach.
The future demands a holistic approach to OT security, aligning IT and building management to safeguard the spaces we rely on.
Mirel Sehic is the vice president general manager of cybersecurity for Honeywell Building Technologies.
He leads a team that is responsible for educating and helping customers efforts to protect their operational technology cybersecurity critical infrastructure environments.
Mirel oversees the cybersecurity business globally, including the integration with development, partnerships, marketing of solutions, sales and operations.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Mon, 15 Jan 2024 06:13:04 +0000


Cyber News related to OT Cybersecurity: Safeguarding Building Operations in a Digitized World

OT Cybersecurity: Safeguarding Building Operations in a Digitized World - These concerns are brought into the spotlight by high-profile ransomware attacks, which can now penetrate even the most intricate systems. Recently, in September, the gravity of this threat was illustrated when two Las Vegas casinos fell victim to an ...
5 months ago Cyberdefensemagazine.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
1 month ago Feeds.fortinet.com
Cybersecurity Curriculum Development Tips - In this article, we will explore essential tips for developing a comprehensive and up-to-date cybersecurity curriculum. By staying abreast of the latest industry trends, educational program developers can ensure that their curriculum remains relevant ...
6 months ago Securityzap.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
6 months ago Securityzap.com
Business Cybersecurity Culture: Building a Secure Workforce - To protect their operations and sensitive data, organizations must prioritize the development of a strong cybersecurity culture within their workforce. In this discussion, we will explore the crucial elements of a robust cybersecurity culture and ...
5 months ago Securityzap.com
Cybersecurity Workshops for Students - Cybersecurity workshops for students serve as an effective means to educate and empower the younger generation in protecting their digital assets. With proper planning and organization, cybersecurity workshops enable students to navigate the digital ...
6 months ago Securityzap.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
6 months ago Securityzap.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
1 week ago Techtarget.com
Cybersecurity in the Healthcare Industry: Protecting Patient Data - In the rapidly advancing era of technology, the healthcare industry faces a critical challenge: protecting patient data from cyber threats. This article will emphasize the significance of cybersecurity in the healthcare industry and explore the ...
5 months ago Securityzap.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
6 months ago Securityzap.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
5 months ago Legal.thomsonreuters.com
Beyond Mere Compliance - Too often we continue to see executives whose approach to cybersecurity - compliance rather than protection - is strikingly similar to that of the ill-advised business owner whose minimal fire protection is designed only to meet the building code. ...
6 months ago Cyberdefensemagazine.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
5 months ago Securityzap.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
6 months ago Securityintelligence.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
6 months ago Securityzap.com
Saudi Arabia Strengthens Its Cybersecurity Posture - The Kingdom of Saudi Arabia continues to advance its strategic commitment to cybersecurity, led by its National Cybersecurity Authority, the driver of many of the country's cyber protection initiatives. The NCA, formed in 2017, in the past year has ...
6 months ago Darkreading.com
Essential Features of Cybersecurity Management Software for MSPs - Protect your clients' businesses from cyber threats with Cybersecurity Management Software. A vital tool that aids MSPs in enhancing their cybersecurity practices is Cybersecurity Management Software. In this article, we will delve into the features ...
1 month ago Hackread.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
7 months ago Feeds.dzone.com
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
6 months ago Darkreading.com
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
6 months ago Securityzap.com
Cybersecurity for Art and Design Schools - In the digital age, art and design schools face unique cybersecurity challenges. This article aims to shed light on the importance of cybersecurity in art and design schools and provide insights into safeguarding digital portfolios and ensuring ...
5 months ago Securityzap.com
Cybersecurity Awareness Campaigns in Education - Cybersecurity awareness campaigns in education are essential to protect digital systems and information. The target audience for cybersecurity awareness campaigns in education includes students, teachers, administrators, and other staff members. ...
6 months ago Securityzap.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
4 months ago Securityzap.com
How to Avoid Falling Below the Cybersecurity Poverty Line - The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy ...
1 year ago Csoonline.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
6 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)