Cyber Magazine May 2022 | Page 99

MERALCO real-time demand and response , all of which has been brought about by the IT and OT convergence or driven by Industry 4.0 – hence the prevalence of IT and OT technologies .”
With rapidly advancing technology being integrated into such systems , maintaining and heightening security protocols can be much more difficult to track and so requires a comprehensive cybersecurity policy .
“ To maintain a level of resilience through the implementation of a zero-trust security model , and whilst embarking on digital transformation programmes , it ’ s most important – first and foremost – to create an architecture where security is included right from the start ,” Migriño says .
This architecture should consist of three layers , where the first is a physical layer , the second is a communication layer , and the third is the actual application layer – where the head end systems would actually reside .
“ We need to identify the risk in each layer and implement appropriate security measures ,” Migriño asserts . “ Looking at the physical layer as an example , we can see the data as a potential risk as it can lead to fraud or theft in case of tampering with cyber
cybermagazine . com 99