Download document () of 20
Today, manufacturers and industrial facilities are implementing digital, connected technology to gain efficiencies in their operations and improve productivity. However, with more connected devices comes new vulnerability threats. Desmond Agwu, OT cybersecurity specialist at Eaton, explains key considerations safeguarding OT networks. 

Key takeaways:

  • Today, manufacturers and industrial facilities are implementing digital, connected technology to gain efficiencies and improve productivity. However, with more connected devices comes new vulnerability threats.  
  • Facility managers cannot solely rely on the expertise of their IT team to understand the best methods of protecting their OT assets. 
  • Threat actors have evolved over the years with more sophisticated methods and capabilities to carry out cyber attacks so facilities must be proactive to ensure proper cybersecurity.
  • IT and OT network security have different priorities when determining and balancing risk. While there is some flexibility to take an IT system offline to apply updates and patches, OT networks require more planning and change management processes to execute.
  • OT systems like SCADA, building automation systems and distributed control systems, to name a few, are just as at risk for cyber threats as IT networks. And as a result, “bad actors” (or hackers) are employing more sophisticated methods to tap into these systems and cause major issues.
  • There are several OT security solutions out in the market today and choosing a solution depends greatly on business need. Consider one that integrates properly within your existing cybersecurity program and consider what is required to maintain it.
  • Eaton takes a comprehensive approach to cybersecurity using a secure development lifecycle (SDLC) and apply a secure-by-design philosophy for our products. Our vulnerability and incident response program is used to actively find, address, communicate, and fix cybersecurity issues within our products and solutions. And a partnership with UL to certify our products and processes with the highest level of cybersecurity. Learn more about our approach to cybersecurity >
  • When choosing a cybersecurity vendor, ensure there is cross-functionality expertise not only in cybersecurity but cybersecurity specific to OT and ICS systems who understand the criticality, real-time safety and availability requirements of the systems and can apply OT cybersecurity practices effectively.

To learn more about securing your OT networks, visit Eaton.com/cybersecurity.

spacer

Desmond Agwu

With nearly ten years of experience in IT, with the last 4 years in cybersecurity focused on Operational Technology (OT) and Industrial Control Systems (ICS), Desmond is experienced in vulnerability and patch assessment, threat modeling, remediation and management of change. In his current role as OT cybersecurity specialist at Eaton, he is part of a team delivering cybersecurity services including consulting, audits and assessments, industrial network defense and threat modeling. Desmond also has experience understanding business requirements, design, implementation and deployment of security solutions on an enterprise scale.

spacer

Listen now

Listen on your preferred podcast directory

Today more devices are connected than ever. And when there's a business need to connect a device that was not designed with security in mind to a network, you open up a new vector for possible exploitation.

Desmond Agwu, OT cybersecurity specialist

More on cybersecurity