Cyber Magazine January 2024 | Page 94

OPERATIONS
WATCH NOW
to identify vulnerabilities in hardware , software , and configurations . Fourth , OT networks should be segmented from corporate networks , and remote access should be limited and or compensated by additional security measures like multifactor authentication and zero trust strategies .”
Looking at the big picture , Goble believes that OT should take a leaf out of IT ’ s book and import best practices from IT security . This will result in capturing the processes that are normal in the IT environment and harnessing them .
“ Wherever possible , merge and consolidate the asset management strategies and cyber solutions currently in use ,” she says . “ Reducing complexity makes the task easier to handle . Consider what your OT ‘ crown jewels ’ are . What do cybercriminals view as your most important OT assets , and how are they likely to attempt to access them ? While keeping an eye on your long-term plan , don ’ t forget about the present . Protect the resources that are most important to your organisation .”
Collaboration is key to improving OT security Today , cybersecurity is no longer just a concern for individual companies ; it is a shared responsibility that requires collaboration among enterprises . By working together , businesses can share threat intelligence , develop common standards and pool resources to create a more secure environment for everyone .
“ Collaboration among enterprises has enormous potential to transform the
94 January 2024