Intelligent CISO Issue 36 | Page 46

Cybersecurity does not have to involve a massive budget in order to ward off many of the risks facing manufacturers today .
industry unlocked
they can do so by using ABB ’ s Reference Architecture , a blueprint for industrial control systems based on the IEC 62443 control system security standard .
ABB Reference Architecture covers cybersecurity setup and configuration best practices , including network segmentation , placement and configuration of hosts , and inbound / outbound data flows , to name a few .
ABB Reference Architecture is a forcing function to drive the conversation to threat modelling and risk management .
Operators should view this process of properly applying , deploying , managing and configuring remote access as an opportunity to mitigate their exposure to risks and threats and become aware of other potential vulnerabilities such as legacy Windows XP hosts .
Data gathering and the use of Edge devices
In all major global industries , the COVID-19 pandemic has accelerated the digitalisation process , most notably the transition to remote working ; with this comes the increasing popularity of remote connectivity .
Fundamentally , remote connectivity relies upon a VPN connection with multiple uses , among them enabling a human being to access the secure work environment , and being a conduit for inbound and outbound data flows – preparing the way for Edge analytics and business process improvements , both on-premise and in the cloud .
With regards to Edge technology , it is very important to ensure that operators have the right architecture and technology solution to secure the communication that must move inbound / outbound from the asset environment .

Cybersecurity does not have to involve a massive budget in order to ward off many of the risks facing manufacturers today .

There are also other security and regulatory implications : customer data may be restricted to one locality or region , meaning a cloud vendor may have a business requirement for colocation facilities in any given country .
The stakes are high
The Pareto principle states that around 80 % of consequences come from 20 % of the causes . In the context of cybersecurity , that means 80 % of risk exposure comes from 20 % of the attack surface .
If CISOs do the foundational things right and identify and manage basic risk at scale , you will significantly mitigate exposure to cyberattack . Then , continue to assess and enhance your security programme . Security is a process of continuous improvement , learning , adaptation and remaining agile in the face of an evolving risk landscape .
Cybersecurity does not have to involve a massive budget in order to ward off many of the risks facing manufacturers today . Know your threat landscape , understand the impact to your business from a cyber incident and structure your security budget accordingly . u
46 www . intelligentciso . com