Lack of skills and visibility seen as biggest challenges for businesses managing operational technology risks

Confusion about which business function is responsible for securing OT.

  • 4 years ago Posted in

A lack of skills is considered to be one of the biggest challenges facing organisations managing Operational Technology (OT) risks today, according to a new online poll conducted by NTT Security, the specialised security company and centre of excellence in security for NTT Group. The poll also reveals that when it comes to who is responsible within the business for securing OT, most people feel it falls to the Engineering function rather than the security or IT department. 

Asked what the biggest challenge is for companies managing OT risk, just under half (46 per cent) of respondents point to the lack of skills, while 29 per cent say it is a lack of visibility into OT networks to facilitate risk assessment. A quarter of respondents believe that a disconnect between OT and IT teams could be cause for concern. On the subject of responsibility, 42 per cent of respondents believe OT security falls to the Engineering Director, while more than a third (38 per cent) point to the CTO. Just one in five say it is the job of the CISO. 

When it comes to responding to a cyber attack on OT systems, only one in four (26 per cent) respondents believe that the majority of incident response plans cover both OT and IT, while a third say that none do.

“It’s clear that arrangements for securing OT are a huge challenge for organisations, especially when it comes to identifying exactly what those risks are and the potential impact they may have on the business. With greater connectivity and convergence with IT comes greater risks and these have to be managed accordingly,” comments Tim Ennis, Senior Operational Technology Consultant, Cyber Security Consulting at NTT Security.

“Having the rights skills in place is fundamental, as are clear lines of responsibility within the business.  There is no one-size-fits-all solution for OT security. It might be right that the CISO has responsibility, but equally it could be that the engineering director is best placed to do this. What is important is getting the right organisational structure in place that can empower and support the OT team to improve security, and to enable the business to achieve its objectives.”

Sector most vulnerable to a cyber attack

While we are yet to see any major cyber attacks on telecommunications networks, over half of respondents (53 per cent) believe that the Telecoms sector is most vulnerable to attack and a third believe it is Utilities.  Despite the fact that Manufacturing is reported to be the second most targeted indusry sector in the UK, according to the recently launched NTT Security Global Threat Intelligence Report (GTIR), just 13 per cent of respondents say it is most vulnerable to a cyber attack.

NTT Security's four key steps to managing OT risks:

1.     Establish a programme of work for securing operational technology (OT), including:

·       Forming a multi-discipline team

·       Reviewing roles and responsibilities, ensuring people are suitably trained and briefed

·       Establishing security context, ensuring that security enables the business to achieve its objectives


2.     Assess the risks associated with OT

·       Identify OT assets, increasing visibility into OT networks

·       Identify a baseline and target risk profile

·       Assess risks

·       Identify prioritised tasks required to reach target profile


3.     Implementation of risk reduction measures

·       Review architecture

·       Identify security concept for OT environment

·       Establish network baseline, i.e. “normal behavior”

·       Implement security controls and review effectiveness against risks


4.     Improve security operations

·       Regular review of risks and opportunities

·       Review and respond to detected anomalies

·       Practice incident response plans

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and...
New distribution agreement set to bolster Westcon-Comstor’s Zero Trust offering in more markets...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...