By Gary Southwell, General Manager and VP of HPPD, ARIA Cybersecurity Solutions
Finding attackers in operational technology (OT) environments can feel like chasing ghosts. For years, operations have sunk money into building a defense that could keep attackers out by limiting the way in. Unfortunately, 700-plus successful OT attacks over the past three and a half years show that the most dangerous attackers have figured out how to get in without being detected by current cybersecurity solutions.
One of the simplest approaches to defending and protecting against attacks is the NIST Cybersecurity Framework (CSF). Both Rockwell Automation and its Technology Partner, ARIA Cybersecurity, are proponents of using the NIST CSF to prepare organizations to deal with cybersecurity challenges.
The NIST CSF can be thought of as two sides of a coin: on one side, steps to prevent harm, and on the flip side, steps to manage the aftermath of an attack.
The Aftermath of an Attack
Let’s start by looking at firefighting and cleanup. This investigative response involves tools, people and services that hopefully identify and contain the problem quickly.
However, people and services are extremely expensive, with retainers paid in advance just to secure their time. Paying for the aftermath, companies incur millions of dollars out-of-pocket for the average attack. And that doesn’t include loss of production, dealing with compliance reporting, or trying to get your insurance company to pay out. Just look at Merck’s OT attack — five years and $1.4 billion in losses later, the pharmaceutical giant finally wins against insurers in court.