The explosion of connected devices is happening at breakneck speed. By 2020, Gartner predicts 20 billion connected devices and more devices mean more security threats.
In a keynote address at RSA, Matt Watchinski, Cisco VP of the Talos Threat Intelligence Research Group, said that everything from cameras, to audio equipment, to parking meters connect to our networks. âWe have entire generations that look at the world, and swipe it, and touch it, and talk to it,â Watchinski said. Itâs this connected world that exposes people to security vulnerabilities.â
One of the most notable and recent IoT security attacks was the VPN filter, which the Talos Group helped to expose last May. Talos researchers, working with public and private-sector threat intelligence partners and law enforcement discovered malware infecting at least 500,000 home office networking devices. Law enforcement believes it was a state-sponsored attack. What made this attack so dangerous was that it had the capability to scan for specific operational technology (OT) traffic.
The VPN filter attack is proof that hackers are out to exploit OT, and we can only expect attacks like this one to grow. Thatâs why connecting information security with operational technology is critical. âThese technologies will make it into our critical infrastructure, theyâll make their way into how we deliver water and power,â Watchinski said. âWe have achieved so much in IT security, we are now going to have to learn a completely different world of OT security.â
Liz Centoni, SVP of Ciscoâs IoT Business Group, joined Watchinski on the RSA stage and outlined the focused need on OT security. Centoni says security is the reason IT teams and OT teams were forced to work together. âThe number one thing customers talk about when they discuss bringing IoT to scale is security,â Centoni said.
Building the bridge between OT and IT may be challenging for information security professionals, but it also offers immense opportunity to protect hundreds of millions of people by protecting critical infrastructure. âThe OT world cares about people safety, equipment safety, and what rolls off the production line,â Centoni said. And thatâs whatâs at the heart of the intersection of IT and OT.
Centoni explained the need for security to be baked into the DNA of OT. Once implemented, OT systems usually donât get upgraded for decades, so security has to be a fundamental part of the original design.
The time is now for InfoSec to start building relationships and partnerships to help secure this new world.
While some see challenges with this, Centoni sees opportunity. She saw it done with IT, and she believes the same lessons can be applied to OT. Centoni wrapped up her keynote with this simple request: âBe the bridge between IT and OT.â
Read more about Liz Centoni's Biography