Evolving OT Cybersecurity Guidelines

December 4, 2024

Cybersecurity has increasingly become top-of-mind with events such as the recent ransomware attack on supply chain management software provider Blue Yonder serving as constant reminders of its pertinence. With OT becoming more and more looped into this concern, the mission to protect such networks from evolving threats will certainly continue to be a priority throughout the rest of 2024 and into the future.

A New OT Cybersecurity Framework

The threat to OT cybersecurity is especially apparent when you consider ongoing risks associated with actors such as Volt Typhoon. As MeriTalk reported, Volt Typhoon reflects “a large interest by adversaries in not just knowing where our OT is, but also in taking a living-off-the-land approach to encamping themselves on those networks,” according to Matt Hayden, GDIT vice president for cyber and emerging threats for intelligence and homeland security.

With trends like this becoming more commonplace, security organizations from around the world have partnered to publish a new guide for OT operators. Titled “Principles of Operational Technology Cybersecurity,” the guide was put together by the Australian Cyber Security Centre (ACSC) in collaboration with CISA and other international entities to help those impacted by the potential of OT cybersecurity threats, particularly those in critical infrastructure fields. It is based on six key principles, including safety in OT environments, the protection of OT data, network segmentation, securing OT supply chains, business knowledge, and staff training.

The Important Role of OT Training 

Angel Coker Jones at Commercial Carrier Journal reports that, “The NSA and other agencies recommend OT decision makers apply these six principles to help determine if a decision being made is likely to adversely impact the cybersecurity of an OT environment.” While all of the principles are essential, the last two listed above are foundational. Business knowledge ensures that companies truly understand why OT cybersecurity is worth the attention and investment, and staff training emphasizes a focus on the people in control of executing the plans to protect OT networks.

Education as amplified in the guide is necessary across the board, whether working in the private or public sector. It was the central point of a recent initiative introduced by the CISA, which launched a new platform to replace its internal education platform and Federal Virtual Training Environment. The new offering features a range of cybersecurity classes, General Services Administration webinars on artificial intelligence, and more.

Sources: 

Related Posts

You Might Also Like…

Press Releases
DYNICS Welcomes Greg Jenkins to the Team to Drive Sales Efforts in the Southeast and Accelerate Cybersecurity for Customers

DYNICS Welcomes Greg Jenkins to the Team to Drive Sales Efforts in the Southeast and Accelerate Cybersecurity for Customers

With demand on the rise for protective IT solutions, new senior hires will cultivate relationships.ANN ARBOR, MI – November 5, 2024 – DYNICS is excited to announce the addition of Greg Jenkins to its team as Regional Sales Manager of the Southeast. With over 25...

Read More