02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Whether it’s malicious outsiders or employee sabotage, the stakes are much higher in the industrial<br />

internet of things, where business continuity and personal safety are both at risk. And the rapid increase<br />

in IIoT devices has expanded the attack surfaces and threat vectors the cybersecurity industry is facing<br />

on a daily basis.<br />

IIoT <strong>Cyber</strong>security: A Great Concern<br />

<strong>Cyber</strong>security is not always considered as a top priority during an IIoT product's design phase. Because<br />

the IIoT is a burgeoning market, many product designers and manufacturers are more concerned with<br />

rapidly getting their products to market, instead of taking the necessary steps to build cybersecurity in<br />

from the start. From default passwords to a lack of computing resources necessary to implement effective<br />

cybersecurity, many IIoT devices do not or cannot offer adequate cybersecurity protection features.<br />

As a result, bad actors are scanning for IIoT vulnerabilities at a frenetic pace. In fact, according to “The<br />

CEO’s Guide to Securing the Internet of Things,” experts have seen a dramatic 458 percent increase in<br />

IoT vulnerability scans against devices since 2013, with scans representing adversaries looking for<br />

weaknesses in your network defenses.<br />

While the analysis and distribution of collected information and data is essential for device developers<br />

and manufacturers to derive predictive models, managing the overwhelming amount of data remains a<br />

privacy concern as well. The expectation of the public is when companies handle data, they will handle<br />

it securely. Unfortunately, as recent high-profile examples have illustrated, that notion is not aligned with<br />

reality.<br />

Today, the IIoT focus is primarily on integration and convergence across industrial verticals. As such,<br />

implementing a robust cybersecurity program for IIoT requires a complicated combination of architecture,<br />

technical and integration controls as well as adaptation of traditional cybersecurity platforms. And while<br />

executing a credible approach to cybersecurity is one thing, the ongoing operational management of<br />

authentication credentials and operations, especially for large deployments of non-homogenous devices,<br />

is equally important.<br />

Automation<br />

Traditional cybersecurity does not always work with IIoT device deployments. For example, IIoT platforms<br />

struggle to verify the authenticity of 10,000 IIoT devices when they don’t have associated users to enter<br />

a user name and password. A major challenge is keeping IIoT devices updated and secured throughout<br />

their lifecycles.<br />

As IIoT device adoption increases, automation becomes an essential component of cybersecurity.<br />

Automation is crucial when you think about the vast number of connected devices and applications in our<br />

daily lives. Because it’s impractical to manage the configuration of 10,000 devices manually, we need to<br />

step out of the traditional IT mindset that a human is going to “touch” a device to harden it from a<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!