Cyber Magazine May 2022 | Page 86

Securing Operational Technology As firms integrate new technology solutions into their cyber operations , their risk of exposure also increases . CCE extends beyond the usual areas of security by looking at an organisation ' s entire operation , securing the most vital elements while simultaneously securing the overall technology . These frameworks go beyond standard vulnerability evaluations , considering the potential impact an exploited vulnerability could have on an entire organisation ' s operations and procedures as a whole .
" Organisations within the sector are also a key target for attackers because they play a key role in the supply chains of other industries , including critical sectors such as defence and infrastructure ," Goble added . " This adds to the need for the business to free themselves from the ransomware and resume operations ."
Attention to success Developing and collaborating across critical infrastructure sectors to identify the highest consequence operational systems provides a practical method for industry and government to invest against and prioritise threats to vital functions . Recently , INL concluded a successful CCE pilot project with a large utility . As admitted by the utility ' s own engineers , the process transformed their viewpoints , fundamentally affecting how they approach risk decisions .
86 May 2022