MARCH 2019CIOAPPLICATIONS.COM8oday, there is more technology-driven possibility at our fingertips than ever before. Within the manufacturing industry, the industrial internet of things (IIoT) and digital tools like artificial intelligence (AI) and augmented reality are being applied to drive undisputable business value. Organizations now have an unprecedented quantity of data, and with it, the ability to make real-time decisions that improve the performance and profitability of their industrial assets and operations.However, with these new opportunities comes risk. We are in a new geopolitical climate where malicious actors have unlimited time, resources and funding to carry out cyberattacks on industrial systems. However, what's clear to those in the cybersecurity field is less apparent to others in our industry: It is surprising to learn many industrial organizations continue to take a conservative approach when it comes to cybersecurity. It's time to evolve this culture. While many in the industry take a "if it ain't broke, don't fix it," attitude, as technology advances and connectivity increases, so does the attack surface. In the age of IIoT, organizations can't afford to rely on older practices and safeguards as they are not always strong enough to mitigate the threats of today. The increasing demand to have better visibility into and control over plants' performance must be balanced with appropriate levels of cybersecurity to protect assets, operations and people. Five Innovations for Industrial OrganizationsAs leaders look to safeguard industrial operations from cyberattacks, it is helpful first to better understand how digitization and connectivity are changing industry, as well as the associated risks and how to protect against emerging threats.Connectivity TechnologiesAs the evolution of technology and IIoT continues to drive the demand for connectivity, our communication channels are also improving. While this is a positive thing for business operations, these new mechanisms also contain risks: · The Scaling Attack Vector­Broader connectivity between people and assets means additional attack surface and more threats of attack. To reduce these threats, it is prudent to adopt and enforce modern security techniques and best practices, which includes implementing only secure IIoT devices. · Bandwidth and Convergence­As bandwidth increases, convergence of multiple physical networks into one ANDREW KLING, DIRECTOR OF CYBERSECURITY AND SOFTWARE PRACTICES, PROCESS AUTOMATION BUSINESS, SCHNEIDER ELECTRICThese Five Innovations Are Changing How You Will Secure Your Digital Operations TIN MY VIEW
< Page 7 | Page 9 >