Autodesk Water
Connecting Waterpeople
Autodesk Water Webinar Series - April 30th, 10h (UTC+1)

Building smarter, secure networks through IT/OT convergence

  • Building smarter, secure networks through ITOT convergence
  • IT & OT convergence in energy and natural resources sector.

  • KPMG research says cybersecurity should be integral to IT/OT convergence strategy.

  • Cybersecurity capabilities need to be implemented to evaluate existing systems for threats.

  • KPMG has created OT/ICS cyber range labs and can be used to establish secure remote connections through KPMG’s infrastructure to perform training, cyberattack simulations.

  • KPMG virtual labs can be built to replicate an organization’s IT and OT environments.

About the entity

KPMG
KPMG firms operate in 146 countries and territories, and in FY20, collectively employed close to 227,000 people.

Themes

KPMG latest cybersecurity publication on IT/OT convergence in the energy and natural resources sector highlights the need to bring people, processes and systems closer together to build a smarter, more secure network with high visibility to monitor and control both IT and OT environments.

Converging information technology (IT) and operational technology (OT) environments requires the right preconditions in an organization’s environment and culture to be successful and lasting. 

“Preparing an organization’s people and culture for IT/OT convergence is critical for success, with process and workflow convergence being integral to a broader IT/OT convergence plan,” explains Ton Diemont, Head of Cybersecurity & Data Privacy at KPMG in Saudi Arabia.

While organizations often prioritize efficiency or productivity improvements, cybersecurity must not be overlooked and should be integral to an IT/OT convergence strategy.

IT/OT convergence is a double-edged sword from a cybersecurity lens. It can allow for more robust monitoring of systems, but it also might expose industrial control systems (ICS), process control systems and other operational technology to malware attacks, hacktivism, employee sabotage and other security risks that previously affected only corporate IT systems.

“Securing OT systems is a prerequisite to IT/OT convergence. Cybersecurity capabilities need to be implemented to evaluate existing systems for threats and to continually monitor them in the future,” adds Hossain Alshedoki, IT/OT Cybersecurity ENR Lead at KPMG in Saudi Arabia. 

Though zero-day attacks are impossible to predict during and after IT/OT convergence, micro-segmentation helps organizations mitigate their risk

Though zero-day attacks are impossible to predict during and after IT/OT convergence, micro-segmentation helps organizations mitigate their risk. Implementing ‘resilient by design’ principles before IT/OT convergence also decreases the likelihood of successful zero-day attacks.

Training OT personnel requires not only a cybersecurity background, but also a strong understanding of the engineering process and physical systems is required unlike IT personnel in IT environment. To overcome this challenge, KPMG has created OT/ICS cyber range labs using production-grade equipment to simulate scale-model versions of industrial processes to bring OT simulation efforts up to par with IT. 

The labs can be used to establish secure remote connections through KPMG’s infrastructure to perform hands-on training sessions, cyberattack simulations, proof-of-concepts and industrial cybersecurity-related research.

“Our virtual labs can be built to replicate an organization’s IT and OT environments by connecting proprietary devices and virtualizing OT components. This enables IT and OT professionals to cross-train their incident response strategies until mastery,” concludes Diemont.

Subscribe to our newsletter

Topics of interest

The data provided will be treated by iAgua Conocimiento, SL for the purpose of sending emails with updated information and occasionally on products and / or services of interest. For this we need you to check the following box to grant your consent. Remember that at any time you can exercise your rights of access, rectification and elimination of this data. You can consult all the additional and detailed information about Data Protection.