Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    The Cybersecurity Training Gap in Industrial Networks

    justmattgBy justmattgFebruary 19, 2024No Comments4 Mins Read

    [ad_1]

    Cyberattacks on critical infrastructure are steadily increasing, driven by geopolitical conflicts as well as the longtime problem of poorly secured devices that remain exposed and unprotected on the public Internet.

    But with cyberattacks on water treatment plants rising and the US federal government issuing a high-profile warning about China’s plans to disrupt US critical infrastructure, the stakes could not be higher for protecting today’s ICS/OT systems.

    Irfan Shakeel, the Dubai-based vice president of training and certification services at cybersecurity vendor OPSWAT spoke with Dark Reading on what he sees as a knowledge gap in protecting critical infrastructure — and how the Middle East and Africa region stands to improve cyber defenses in its ICS/OT networks. (OPSWAT offers a certification in critical infrastructure protection).

    Irfan Shakeel

    Irfan Shakeel, vice president of training and certification services at OPSWAT

    Dark Reading: Why are we seeing more urgency this past year in protecting industrial networks?

    Irfan Shakeel: Previously, all of IT [networks in these organizations] used to come under attack, but now even the OT [is under attack]. The challenges organizations are facing — particularly for the OT environment — is that most of the systems are legacy, and we need to think about OT from the OT perspective; we cannot manage OT from the IT perspective.

    So as far as the cybersecurity challenges are concerned: yes, the cyberattacks are growing and attackers are targeting the OT side of the operation … [attackers] know that OT is the weakness.

    DR: What type of security training and certification is available for OT defenders?

    Shakeel: In the IT training environment, we have tons of training available online and offline, and universities are also focusing on IT cybersecurity. However, as far as the OT security is concerned, [the industry does] not have proper education or training available in the market. That’s why in most of the organizations, people doing OT are not aware of how to secure their OT environment.

    They are really good in managing the operation, but they do not know the security challenges and how to properly design, or securely design, the OT environment architecture.

    If we train people properly … if we give them the right skillset and knowledge and up-to-date resources about the evolving threat landscape and the evolving cybersecurity challenges, they will be able to effectively protect their environment.

    Without proper education or training, they won’t be able to do that.

    DR: What resources are available to security teams in this sector?

    Shakeel: [With] SCADA systems and other devices such as programmable logic controllers (PLCs) … even if you search online, you will not find information about how to properly or securely configure Siemens models or PLCs.

    You can find guides available in the Siemens [documentation]. but most people don’t really read the documentation, that’s why we need a user-friendly way to teach them — to teach them how to configure a specific device, or how to ensure that their PLC is transmitting or sending the data securely over the channel to the other OT devices.

    People also need to understand how to encrypt their data, because most of the communications are still happening in plain text [in these environments].

    Typically [OT] should be the isolated network, and should not be available online … [when it is], it’s basically your organization welcoming attackers: “Hey, come and see what kind of devices we are using, and see that our devices are not properly patched.”

    DR: From a Middle East and Africa perspective, what is the state of OT security?

    Shakeel: In the Middle East and Africa region, the entire cybersecurity market is growing … and now organizations are focusing on … securing their organizations.

    OT in the Middle East region is very important, specifically in the energy sector, and the oil and gas field. After the Saudi Aramco [attack], they have realized that cybersecurity is very key to keep their operation running.

    The attack on Saudi Aramco changed the way organizations invested in cybersecurity. Oil and gas organizations are now investing in cybersecurity solutions, tools, and technologies, — and also investing in human resources.

    So, in the Middle East region: it’s already there. The African region is growing rapidly, and organizations now also are looking to invest in cybersecurity.

    Cyberattacks [on OT networks] cause disruption and these organizations cannot afford disruption and they cannot afford their processes to be halted.



    [ad_2]

    Source link

    Previous ArticleRussian-Linked Hackers Breach 80+ Organizations via Roundcube Flaws
    Next Article Meta Warns of 8 Spyware Firms Targeting iOS, Android, and Windows Devices
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑