Technology Insights: IT/OT Convergence

Christopher Nichols, Director Site Resiliency Operations Engineering and Operational Technology Support - IT Operations, Stanley Black & Decker

Christopher Nichols, Director Site Resiliency Operations Engineering and Operational Technology Support - IT Operations, Stanley Black & Decker

As technology expands at an increasingly high rate, insights into real-time data have become a critical component in operations due to increased speed with fewer errors and critical decision-making; so, what are the next steps?

Many systems and tools can be deployed to monitor real-time information for real-time decision-making, connecting to manufacturing execution systems (MES), maintenance, quality, and others, and subsequently, machine vision to analyze results. These systems can provide essential data, providing considerable insights and gains to improve operations. But with so many systems and software out there, how do you choose? This is exactly the question everyone should be asking.

As digital transformation continues to expand, there is a growing need to link and integrate business systems with manufacturing systems and shop-floor equipment. However, it is crucial to note that this convergence between IT and OT carries substantial risk because industrial control systems (ICS), which are used in almost every machine which are running operations – are often uncontrolled and do not play nice with anti-virus software, so they are highly susceptible to attacks. For organizations responsible for critical infrastructure, any hint of compromise needs to be taken very seriously. This is why it is time to get down to business to start planning to secure your environments and segment your networks.

Standard IT systems and connections are mostly standardized; OT systems use many connection protocols specific to function, industry, geography, etc., which can pose a significant cyber risk. As IIoT devices become more common, external partner products present weighty challenges to creating secure environments, and let’s not forget about securing legacy systems. In effect, digital transformation efforts generate these structural problems, exacerbated by poor IT security hygiene practices within OT environments. This is largely due to the insecure deployment of IIoT devices, a lack of visibility of the devices, or their interface through networks to business systems.

"As digital transformation continues to expand, there is a growing need to link and integrate business systems with manufacturing systems and shop-floor equipment"

You must understand that the enormous presence of unprotected IIoT devices provides opportunities for threat actors. The terrifying part is that most of these devices are plug-and-play without the need for passwords or configurations, which essentially makes security optional. Many of these types of devices are shipped with commonly known default passwords to provide easy access to configuration panels. You might be able to imagine that it is not so difficult for hackers to create botnets to trigger distributed denial-of-service, which freezes or disables systems. From a technical point of view, these attacks have elaborate mechanisms that are difficult to detect because they are encrypted and designed to profile processes. These attacks can enter your poorly secured OT environments into your business systems to exfiltrate organizational data and threaten to leak it or steal proprietary information.

We know that the devices are not secure and pose threats to organizations, but there are additional concerns regarding IT/OT convergence that need to be mentioned. The first is the accidental insider who is on a quest to create greater efficiencies and lacks security awareness; they may accidentally introduce conditions that make environments more susceptible through ill-advised changes in configurations. Secondly are external actors: As most organizations need help from external partners to set up these new shiny things, accidents can happen. Third is a malicious insider: a trusted person with technical knowledge and access who manipulates systems. The fourth is a malicious outsider, whether an external partner or a hacker; the lack of security controls puts organizations at unnecessary risk.

If all these points are starting to alarm you, then you are starting to understand that you should not be taking these risks. So, what do you do? The best answer is planning a physical separation of devices and networks. For example, you should not co-locate IT and OT applications on the same physical infrastructure. OT lower-level devices should be on-premises and not have access to the internet, and you can control who has access to those devices using the local OT infrastructure. Evaluate your networks to ensure you have a separation between IT and OT; this way, the firewalls can act to prevent OT devices from going through the IT networks and vice versa. Segregate internal networks: IT systems should access separate subnets to OT systems; this way, individual switch ports can be configured to that subnet.

Now you might be thinking, great, there is a way to fix it. Well, yes, in many cases, but there are many considerations to plan for. Many solution providers are using PCs as managers for their systems, and quite frankly, they are far less secure than a physical server, so that device must be placed into the lower level and accessed through a Jump Host. There are also considerations on the number of subnets, configurations, failover devices, clusters versus high availability, methods and devices to scan OT environments, and the big one – support processes.

So do yourself a favor and create a detailed process flow map that can lead to architecture discussion, which will lead to system needs, which leads to secure environments and real organizational value.

Read Also

On-Orbit Computing for Next Generation Space Missions

On-Orbit Computing for Next Generation Space Missions

Mark Broadbent, Sr. Avionics Engineer and Katie Gibas, Marketing Communications Manager, Moog Inc
Hollywood in Your Hand: Shooting for Different Mediums

Hollywood in Your Hand: Shooting for Different Mediums

Robert Jarzen, Group Creative Services Director, Midwest Marketing Team, Audacy, Inc
Implementing Industrial Robots

Implementing Industrial Robots

Laurent Huberty, Manufacturing Technology Team Manager, Husky Technologies
Building Cybersecure Offshore Platforms with Smart Design Strategies

Building Cybersecure Offshore Platforms with Smart Design Strategies

Gabriel Albuquerque, Automation and Instrumentation Design Manager, Petrobras
Ethics & Compliance In A Digital World: Navigating Hcp Engagement In Apac

Ethics & Compliance In A Digital World: Navigating Hcp Engagement In Apac

Sherene Cham, Regional Director, Ethics & Compliance – Apac, Menarini Group
Bridging Innovation, Strategy and Patient Connection

Bridging Innovation, Strategy and Patient Connection

Shigeto Miyamoto, VP of Digital Solutions, APAC, Syneos Health
follow on linkedin
Copyright © 2025 Applied Technology Review.All Rights Reserved
Top