SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Internet of Things
Adapting
Experts share how to embrace
the coming merger of IT and OT.
for the
Change the Dynamics
How Does the IoT
Between IT and OT?
“The coming phenomenon
referred to as the ‘ IoT’ is in large
part about the ultimate physical
merging of many traditional OT
and IT components.”
Chris Blask
@chrisblask
Chair of ICS-ISAC
“The ‘OT is different than IT’
fallacy stems from ICS
professionals comparing OT
to desktop management.
OT is mission critical IT.”
Dale Peterson
@digitalbond
Founder of Digital Bond & S4 Conference
Leading SCADA security blogger
“Although this [merger] has many
benefits for interoperability and
efficiency, it also brings security
risks.”
“Cooperation on a consistent
security strategy across both IT
and OT is essential for the future.”
David Meltzer
@davidjmeltzer
Chief Research Officer, Tripwire
“The choice to connect plant floor devices
and share information for many
manufacturers in the past depended on a
controls engineer taking initiative. That
engineer may or may not know how to connect
in a way that made information available and
made the network secure.”
“Those days are over. The risk is too high.”
Doug Brock
@doug_brock
Factory Automation Expert
“Until recently, there were only two
classes of smart devices in the typical
industrial facility; the devices ‘owned’ by IT,
and the controllers ‘owned’ by OT.”
“All of these assets have unique operational
and access requirements—all are at different
levels of security, and all now need to be
considered in any holistic security strategy.”
Eric Byres
@tofinosecurity
ICS and SCADA security expert
“IT desires data directly from
production/manufacturing and OT
usually implements IoT in production/
manufacturing.”
“This is a way that both organizations
can collaborate without politics
interfering.”
Gary Mintchell
@garymintchell
Founder/CEO, The Manufacturing Connection
“It is abundantly clear the fractured IT/OT
relationship will need to become stronger
and more connected.”
“OT focuses on keeping plants up and running
and plugging any weakness around the ICS.
Along those same lines, IT faces a fire hose of
new attacks with all types new of devices
connecting in to the enterprise.”
Greg Hale
@isssource
Editor/Founder of ISSSource.com
“The real issue is the blurring of the
line as IT implements ‘things that smell
like OT,’ and OT implements ‘things that
are traditional IT.’”
“When the line is blurred, where does the
responsibility for resilience lie?”
James Arlen
@myrcurial
Director, Risk Advisory Services
Leviathan Security Group
“As networking extends deeper into devices
and systems, businesses will be able to
collect finer-grained and timelier information
and use this information to optimize
processes, minimize downtime, and reduce
operating costs.”
“Achieving this vision, however, requires
closer cooperation between the OT and IT
worlds than has historically been required.”
Jeff Lund
jeff.lund@belden.com
IIoT Expert, Product Management, Belden
Pat Differ
pat.differ@securicon.com
Cybersecurity Expert for Real-time Systems
Securicon, Inc.
“Today, IT professionals and engineering
professionals have different capabilities,
roles and responsibilities, although there
is some convergence centered around
security.”
“The dynamics are starting to become
more tightly integrated.”
“IT and OT are different, but this is
really just a matter of time.
At some point in the not too distant
future, we will only have technology.
No more IT/OT distinction. Just T.”
Patrick Miller
@PatrickCMiller
Critical Infrastructure Security and Regulatory Advisor
“IoT is not changing the dynamics
between IT and OT. The systems
themselves have been converging
for years in terms of technology.
The difference between IT and OT
is in what they do.”
Robert Lee
@RobertMLee
USAF Cyber Warfare Ops Officer
“The overall implications are relating
to what is owned, what is not, and
where the border ends, not only at
the corporate perimeter but also at
the device level.”
John Walker
@SBLTD
Freelance Author in Cyber Security
IT and OT
What practical tips can you provide for
to work together effectively?
Chris Blask
@chrisblask
Chair of ICS-ISAC
“IT and OT have two different skill sets that
can effectively complement each other.
Both sides need to remember that it is a
two-way street and if they work together
they can support each other.”
Teamwork
Cross-Functional
Training
“For IT security pros that want to
cooperate on security with OT, learning
about how OT works is a great starting
place.”
David Meltzer
@davidjmeltzer
Chief Research Officer, Tripwire
“If you don’t know security, you risk bringing
down or exposing your network. The bigger risk
might be not allowing your workers access to
information, while your competitors do. Get
educated or get help but don’t wing it.”
Improve Skills
& Capabilities Doug Brock
@doug_brock
Factory Automation Expert
“One vulnerable system is a potential pathway to
all systems. Yet at the same time, IT can’t own all
systems. Senior management can be the first to
identify the IoT systems, be clear on who is
responsible for each one and then drive
consistent behaviors for security through out
the company.”
Goal Setting
Eric Byres
@tofinosecurity
ICS and SCADA security expert
“Getting IT and OT to work together is not a
technology problem. It is a people problem.
Organizationally, the best way is cross-functional
training and teamwork guided by a leader who
creates a collaborative environment and metrics
that emphasize teamwork.”
Cross-Functional
Training Gary Mintchell
@garymintchell
Founder/CEO, The Manufacturing Connection
“Communicate.
If IT and OT get that down, then everything
else falls into place. Yes, their missions
differ. Working together is so vital, the
mandate has to come from the top.”
Communication Greg Hale
@isssource
Editor/Founder of ISSSource.com
“The most practical tip is to execute on having
some people skills, cooperating to ensure that
there is a bright-line for responsibility, and that
where knowledge transfer can be undertaken, it
is obvious that the transfer happens.”
People Skills James Arlen
@myrcurial
Director, Risk Advisory Services
Leviathan Security Group
“IT must work closely with OT to understand
the volume of data, as well as archiving and
retention needs. Once we have secure
connections to remote devices, data and
scalable storage, IT and OT will need to
collaborate to make use of that data.”
Collaboration Jeff Lund
jeff.lund@belden.com
IIoT Expert, Product Management, Belden
“Set up a core IoT ownership group that includes
both IT and OT to establish roles, responsibilities,
common goals, and objectives.”
“Establish role-based training and awareness
programs for IoT that outlines the corporate
objectives, eliminates any potential silos and insures
daily cooperation with all stakeholders.”
Role-Based
Training Pat Differ
pat.differ@securicon.com
Cybersecurity Expert for Real-time Systems
Securicon, Inc.
“Spend some time working side by side
with the other [group]. Job shadowing
and embedded observation will do
wonders for helping both sides see each
other’s perspective more clearly.”
Observation
Patrick Miller
@PatrickCMiller
Critical Infrastructure Security and Regulatory Advisor
“The most important thing for having IT
and OT work together is to ensure that the
people are integrating together to voice
their concerns and identify what they
consider critical assets and processes.”
Integration Robert Lee
@RobertMLee
USAF Cyber Warfare Ops Officer
http://tripwire.me/adaptitot
Read more at:
Image courtesy of ShutterStock.com
and
www.belden.com/adaptitot	
  
www.tripwire.com/blog
For the latest security news, trends and insights, visit:
@TripwireInc	
  
For industrial security news and discussions, visit:
www.belden.com/blog	
  
@BeldenInc	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 

Was ist angesagt? (20)

Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
 

Andere mochten auch

Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Capgemini
 
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Beckett Hsieh
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 

Andere mochten auch (20)

IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Falling in Love With Forms [Breaking Development Nashville 2015]
Falling in Love With Forms [Breaking Development Nashville 2015]Falling in Love With Forms [Breaking Development Nashville 2015]
Falling in Love With Forms [Breaking Development Nashville 2015]
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Pacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the InternetPacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the Internet
 
How the Convergence of IT and OT Enables Smart Grid Development
How the Convergence of IT and OT Enables Smart Grid DevelopmentHow the Convergence of IT and OT Enables Smart Grid Development
How the Convergence of IT and OT Enables Smart Grid Development
 
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
Alstom Grid And Capgemini Form Global Alliance For Smart Grid: About the Firs...
 
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
Nvivo10質性研究軟應用-三星統計陳群典顧問-20130727
 
[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence
 
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
質性研究軟體Nvivo10實作-三星統計陳群典顧問-20131123版
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Internet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter KitInternet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter Kit
 
Free Powerpoint Templates
Free Powerpoint TemplatesFree Powerpoint Templates
Free Powerpoint Templates
 
7 PowerPoint Design Hacks
7 PowerPoint Design Hacks7 PowerPoint Design Hacks
7 PowerPoint Design Hacks
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
How I Created Easy Infographics Using MS PowerPoint
How I Created Easy Infographics Using MS PowerPointHow I Created Easy Infographics Using MS PowerPoint
How I Created Easy Infographics Using MS PowerPoint
 
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
Infographics Shapes TimeLines PPT Flow Diagrams - infodiagram part2
 

Ähnlich wie Adapting for the Internet of Things

Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
David Rubal, CISSP
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
Patricia M Watson
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 

Ähnlich wie Adapting for the Internet of Things (20)

Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense Workshop
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 
From internet of-things to internet-of-everything
From internet of-things to internet-of-everythingFrom internet of-things to internet-of-everything
From internet of-things to internet-of-everything
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Cyber Security Mesh
Cyber Security Mesh Cyber Security Mesh
Cyber Security Mesh
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 

Mehr von Tripwire

Mehr von Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks
 
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesMost RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
 
ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy Industry
 

Kürzlich hochgeladen

Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 

Kürzlich hochgeladen (20)

Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

Adapting for the Internet of Things

  • 1. Internet of Things Adapting Experts share how to embrace the coming merger of IT and OT. for the
  • 2. Change the Dynamics How Does the IoT Between IT and OT?
  • 3. “The coming phenomenon referred to as the ‘ IoT’ is in large part about the ultimate physical merging of many traditional OT and IT components.” Chris Blask @chrisblask Chair of ICS-ISAC
  • 4. “The ‘OT is different than IT’ fallacy stems from ICS professionals comparing OT to desktop management. OT is mission critical IT.” Dale Peterson @digitalbond Founder of Digital Bond & S4 Conference Leading SCADA security blogger
  • 5. “Although this [merger] has many benefits for interoperability and efficiency, it also brings security risks.” “Cooperation on a consistent security strategy across both IT and OT is essential for the future.” David Meltzer @davidjmeltzer Chief Research Officer, Tripwire
  • 6. “The choice to connect plant floor devices and share information for many manufacturers in the past depended on a controls engineer taking initiative. That engineer may or may not know how to connect in a way that made information available and made the network secure.” “Those days are over. The risk is too high.” Doug Brock @doug_brock Factory Automation Expert
  • 7. “Until recently, there were only two classes of smart devices in the typical industrial facility; the devices ‘owned’ by IT, and the controllers ‘owned’ by OT.” “All of these assets have unique operational and access requirements—all are at different levels of security, and all now need to be considered in any holistic security strategy.” Eric Byres @tofinosecurity ICS and SCADA security expert
  • 8. “IT desires data directly from production/manufacturing and OT usually implements IoT in production/ manufacturing.” “This is a way that both organizations can collaborate without politics interfering.” Gary Mintchell @garymintchell Founder/CEO, The Manufacturing Connection
  • 9. “It is abundantly clear the fractured IT/OT relationship will need to become stronger and more connected.” “OT focuses on keeping plants up and running and plugging any weakness around the ICS. Along those same lines, IT faces a fire hose of new attacks with all types new of devices connecting in to the enterprise.” Greg Hale @isssource Editor/Founder of ISSSource.com
  • 10. “The real issue is the blurring of the line as IT implements ‘things that smell like OT,’ and OT implements ‘things that are traditional IT.’” “When the line is blurred, where does the responsibility for resilience lie?” James Arlen @myrcurial Director, Risk Advisory Services Leviathan Security Group
  • 11. “As networking extends deeper into devices and systems, businesses will be able to collect finer-grained and timelier information and use this information to optimize processes, minimize downtime, and reduce operating costs.” “Achieving this vision, however, requires closer cooperation between the OT and IT worlds than has historically been required.” Jeff Lund jeff.lund@belden.com IIoT Expert, Product Management, Belden
  • 12. Pat Differ pat.differ@securicon.com Cybersecurity Expert for Real-time Systems Securicon, Inc. “Today, IT professionals and engineering professionals have different capabilities, roles and responsibilities, although there is some convergence centered around security.” “The dynamics are starting to become more tightly integrated.”
  • 13. “IT and OT are different, but this is really just a matter of time. At some point in the not too distant future, we will only have technology. No more IT/OT distinction. Just T.” Patrick Miller @PatrickCMiller Critical Infrastructure Security and Regulatory Advisor
  • 14. “IoT is not changing the dynamics between IT and OT. The systems themselves have been converging for years in terms of technology. The difference between IT and OT is in what they do.” Robert Lee @RobertMLee USAF Cyber Warfare Ops Officer
  • 15. “The overall implications are relating to what is owned, what is not, and where the border ends, not only at the corporate perimeter but also at the device level.” John Walker @SBLTD Freelance Author in Cyber Security
  • 16. IT and OT What practical tips can you provide for to work together effectively?
  • 17. Chris Blask @chrisblask Chair of ICS-ISAC “IT and OT have two different skill sets that can effectively complement each other. Both sides need to remember that it is a two-way street and if they work together they can support each other.” Teamwork
  • 18. Cross-Functional Training “For IT security pros that want to cooperate on security with OT, learning about how OT works is a great starting place.” David Meltzer @davidjmeltzer Chief Research Officer, Tripwire
  • 19. “If you don’t know security, you risk bringing down or exposing your network. The bigger risk might be not allowing your workers access to information, while your competitors do. Get educated or get help but don’t wing it.” Improve Skills & Capabilities Doug Brock @doug_brock Factory Automation Expert
  • 20. “One vulnerable system is a potential pathway to all systems. Yet at the same time, IT can’t own all systems. Senior management can be the first to identify the IoT systems, be clear on who is responsible for each one and then drive consistent behaviors for security through out the company.” Goal Setting Eric Byres @tofinosecurity ICS and SCADA security expert
  • 21. “Getting IT and OT to work together is not a technology problem. It is a people problem. Organizationally, the best way is cross-functional training and teamwork guided by a leader who creates a collaborative environment and metrics that emphasize teamwork.” Cross-Functional Training Gary Mintchell @garymintchell Founder/CEO, The Manufacturing Connection
  • 22. “Communicate. If IT and OT get that down, then everything else falls into place. Yes, their missions differ. Working together is so vital, the mandate has to come from the top.” Communication Greg Hale @isssource Editor/Founder of ISSSource.com
  • 23. “The most practical tip is to execute on having some people skills, cooperating to ensure that there is a bright-line for responsibility, and that where knowledge transfer can be undertaken, it is obvious that the transfer happens.” People Skills James Arlen @myrcurial Director, Risk Advisory Services Leviathan Security Group
  • 24. “IT must work closely with OT to understand the volume of data, as well as archiving and retention needs. Once we have secure connections to remote devices, data and scalable storage, IT and OT will need to collaborate to make use of that data.” Collaboration Jeff Lund jeff.lund@belden.com IIoT Expert, Product Management, Belden
  • 25. “Set up a core IoT ownership group that includes both IT and OT to establish roles, responsibilities, common goals, and objectives.” “Establish role-based training and awareness programs for IoT that outlines the corporate objectives, eliminates any potential silos and insures daily cooperation with all stakeholders.” Role-Based Training Pat Differ pat.differ@securicon.com Cybersecurity Expert for Real-time Systems Securicon, Inc.
  • 26. “Spend some time working side by side with the other [group]. Job shadowing and embedded observation will do wonders for helping both sides see each other’s perspective more clearly.” Observation Patrick Miller @PatrickCMiller Critical Infrastructure Security and Regulatory Advisor
  • 27. “The most important thing for having IT and OT work together is to ensure that the people are integrating together to voice their concerns and identify what they consider critical assets and processes.” Integration Robert Lee @RobertMLee USAF Cyber Warfare Ops Officer
  • 28. http://tripwire.me/adaptitot Read more at: Image courtesy of ShutterStock.com and www.belden.com/adaptitot  
  • 29. www.tripwire.com/blog For the latest security news, trends and insights, visit: @TripwireInc   For industrial security news and discussions, visit: www.belden.com/blog   @BeldenInc