SlideShare a Scribd company logo
1 of 15
© 2017 Interstates
IT vs OT
The Convergence of Data, but Not Practice
© 2017 Interstates
Presenters
• Brandon Bohle
• 2 years OT Cybersecurity Field Experience
• BS Computer & Network Security, MS Information Assurance
• CISSP, CISA
• Alan Raveling
• 6 years OT Cybersecurity Field Experience
• BS Computer Science, MS Cybersecurity
• CISSP, GICSP, MCSA, VCP
• Interstates Control Systems Inc.
• Control Systems Integrator
• Operational Technology Security & Solutions
• Sioux Falls, SD – Sioux Center, IA – West Chester, OH
© 2017 Interstates
Agenda
• IT vs OT
• What is The Connected Enterprise
• Benefits
• Ideal Connected Enterprise
• Roadblocks
© 2017 Interstates
IT vs OT
© 2017 Interstates
Connected Enterprise Defined
Availability
Security
© 2017 Interstates
Why Bother?
© 2017 Interstates
Data Collection
© 2017 Interstates
Ideal Implementation
© 2017 Interstates
Struggles of Implementation - Infrastructure
© 2017 Interstates
Struggles of Implementation – Corporate Policies
© 2017 Interstates
Struggles of Implementation - IT/OT Politics
© 2017 Interstates
Thank You
Questions, comments, feedback?
14Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 2018 Rockwell Automation TechED™ Event #ROKTechEDPUBLIC
Share your Feedback
Please complete a session survey on the mobile app
 Download the Rockwell Automation Events App
 Select Rockwell Automation TechED and login
 Click on Session Surveys or Schedule in the main menu
 Select the session you are attending
 Click on the survey tab
 Complete the survey and submit
www.rockwellautomation.com
PUBLICPUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. 2018 Rockwell Automation TechED™ Event #ROKTechED
#ROKTechED
Thank you!

More Related Content

What's hot

Funding Australias Future - Oppermann_2015
Funding Australias Future - Oppermann_2015Funding Australias Future - Oppermann_2015
Funding Australias Future - Oppermann_2015
Ian Oppermann
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
John Weiler
 

What's hot (11)

Big Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedBig Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance Reimagined
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world
 
Delivering analytics at scale with a governed data lake
Delivering analytics at scale with a governed data lakeDelivering analytics at scale with a governed data lake
Delivering analytics at scale with a governed data lake
 
2017 05 Seattle Vendor Forum
2017 05 Seattle Vendor Forum2017 05 Seattle Vendor Forum
2017 05 Seattle Vendor Forum
 
Funding Australias Future - Oppermann_2015
Funding Australias Future - Oppermann_2015Funding Australias Future - Oppermann_2015
Funding Australias Future - Oppermann_2015
 
Smart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibmSmart City Alliance final 09 18 2014 cisco+ibm
Smart City Alliance final 09 18 2014 cisco+ibm
 
Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018
 
NUS-ISS Learning Day 2018- Business agility for business leaders
NUS-ISS Learning Day 2018- Business agility for business leadersNUS-ISS Learning Day 2018- Business agility for business leaders
NUS-ISS Learning Day 2018- Business agility for business leaders
 
Data Engineering @ Patistic Innovations
Data Engineering @ Patistic InnovationsData Engineering @ Patistic Innovations
Data Engineering @ Patistic Innovations
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
Big data services slideshare - agilisium 2.0 - v1.0
Big data services   slideshare - agilisium 2.0 - v1.0Big data services   slideshare - agilisium 2.0 - v1.0
Big data services slideshare - agilisium 2.0 - v1.0
 

Similar to Crossing the it and ot divide

Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
James Sutter
 

Similar to Crossing the it and ot divide (20)

The Data & Analytics Journey – Why it’s more attainable for your company than...
The Data & Analytics Journey – Why it’s more attainable for your company than...The Data & Analytics Journey – Why it’s more attainable for your company than...
The Data & Analytics Journey – Why it’s more attainable for your company than...
 
The Data & Analytics Journey – Why it’s more attainable for your company than...
The Data & Analytics Journey – Why it’s more attainable for your company than...The Data & Analytics Journey – Why it’s more attainable for your company than...
The Data & Analytics Journey – Why it’s more attainable for your company than...
 
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of ThingsGoverning Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
MWLUG2017 - The Data & Analytics Journey 2.0
MWLUG2017 - The Data & Analytics Journey 2.0MWLUG2017 - The Data & Analytics Journey 2.0
MWLUG2017 - The Data & Analytics Journey 2.0
 
RWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance FrameworkRWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance Framework
 
RWDG Slides: Apply Data Governance to Agile Efforts
RWDG Slides: Apply Data Governance to Agile EffortsRWDG Slides: Apply Data Governance to Agile Efforts
RWDG Slides: Apply Data Governance to Agile Efforts
 
Data Analytics in Cyber Security
Data Analytics in Cyber SecurityData Analytics in Cyber Security
Data Analytics in Cyber Security
 
Data Analytics in Cyber Security
Data Analytics in Cyber Security Data Analytics in Cyber Security
Data Analytics in Cyber Security
 
RWDG Webinar: Big Data & BI Analytics Require Data Governance
RWDG Webinar: Big Data & BI Analytics Require Data GovernanceRWDG Webinar: Big Data & BI Analytics Require Data Governance
RWDG Webinar: Big Data & BI Analytics Require Data Governance
 
Jay Ferro
Jay FerroJay Ferro
Jay Ferro
 
Data Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation AnalyticsData Virtualization - Enabling Next Generation Analytics
Data Virtualization - Enabling Next Generation Analytics
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Why Data Lake should be the foundation of Enterprise Data Architecture
Why Data Lake should be the foundation of Enterprise Data ArchitectureWhy Data Lake should be the foundation of Enterprise Data Architecture
Why Data Lake should be the foundation of Enterprise Data Architecture
 
Why data lake should be the foundation of enterprise data architecture by Raj...
Why data lake should be the foundation of enterprise data architecture by Raj...Why data lake should be the foundation of enterprise data architecture by Raj...
Why data lake should be the foundation of enterprise data architecture by Raj...
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
Health IT Summit in Denver 2014 - Opening Keynote "Leading Transformation at ...
 
Health Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BIHealth Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BI
 
Data & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customersData & Analytic Innovations: 5 lessons from our customers
Data & Analytic Innovations: 5 lessons from our customers
 

More from IntelligentManufacturingInstitute

More from IntelligentManufacturingInstitute (18)

Tae technologies powers up with reliable control system
Tae technologies powers up with reliable control systemTae technologies powers up with reliable control system
Tae technologies powers up with reliable control system
 
Stupp corporation improved control and gained insight with mes
Stupp corporation improved control and gained insight with mesStupp corporation improved control and gained insight with mes
Stupp corporation improved control and gained insight with mes
 
Mes is remedy for herbal health company production challenges
Mes is remedy for herbal health company production challengesMes is remedy for herbal health company production challenges
Mes is remedy for herbal health company production challenges
 
Pharmaceutical company finds prescription for compliance woes
Pharmaceutical company finds prescription for compliance woesPharmaceutical company finds prescription for compliance woes
Pharmaceutical company finds prescription for compliance woes
 
Sonoco products smart manufacturing initiative boosts uptime 30 percent
Sonoco products smart manufacturing initiative boosts uptime 30 percentSonoco products smart manufacturing initiative boosts uptime 30 percent
Sonoco products smart manufacturing initiative boosts uptime 30 percent
 
Dairy company milks track and-trace capabilities and strengthens its food sa...
Dairy company milks track and-trace capabilities and strengthens its  food sa...Dairy company milks track and-trace capabilities and strengthens its  food sa...
Dairy company milks track and-trace capabilities and strengthens its food sa...
 
Medical device manufacturer improves quality, cuts risk with historian
Medical device manufacturer improves quality, cuts risk with historianMedical device manufacturer improves quality, cuts risk with historian
Medical device manufacturer improves quality, cuts risk with historian
 
Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...Diamond offshore drilling transforms control infrastructure from target to ce...
Diamond offshore drilling transforms control infrastructure from target to ce...
 
Interchangeable skids provide plug and-play capabilities, improve uptime
Interchangeable skids provide plug and-play capabilities, improve uptimeInterchangeable skids provide plug and-play capabilities, improve uptime
Interchangeable skids provide plug and-play capabilities, improve uptime
 
Wastewater treatment dcs upgrade adds remote capabilities, improves performance
Wastewater treatment dcs upgrade adds remote capabilities, improves performanceWastewater treatment dcs upgrade adds remote capabilities, improves performance
Wastewater treatment dcs upgrade adds remote capabilities, improves performance
 
Aerospace maintenance facility increases utilization by 50%, saves money
Aerospace maintenance facility increases utilization by 50%, saves moneyAerospace maintenance facility increases utilization by 50%, saves money
Aerospace maintenance facility increases utilization by 50%, saves money
 
What's new in the integrated architecture hardware
What's new in the integrated architecture hardwareWhat's new in the integrated architecture hardware
What's new in the integrated architecture hardware
 
PlantPAx system - what's new and what's next
PlantPAx system - what's new and what's nextPlantPAx system - what's new and what's next
PlantPAx system - what's new and what's next
 
Introduction to the rockwell automation library of process objects
Introduction to the rockwell automation library of process objectsIntroduction to the rockwell automation library of process objects
Introduction to the rockwell automation library of process objects
 
Project design considerations for integration of oem skid equipment with plan...
Project design considerations for integration of oem skid equipment with plan...Project design considerations for integration of oem skid equipment with plan...
Project design considerations for integration of oem skid equipment with plan...
 
Building converged plantwide ethernet architectures
Building converged plantwide ethernet architecturesBuilding converged plantwide ethernet architectures
Building converged plantwide ethernet architectures
 
Fundamentals of ether netip i iot network technology
Fundamentals of ether netip i iot network technologyFundamentals of ether netip i iot network technology
Fundamentals of ether netip i iot network technology
 
Solve system problems with predictive analytics
Solve system problems with predictive analyticsSolve system problems with predictive analytics
Solve system problems with predictive analytics
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 

Crossing the it and ot divide

Editor's Notes

  1. Audience Questions: How many of you have or are working towards having connectivity between your controls and enterprise networks? How many of you have policies specifically around control systems? How many of your organizations promotes communication between the leaders of the Controls and Enterprise networks?
  2. The goal of The Connected Enterprise is to have all systems accessible to gather information to make intelligent manufacturing decisions. Connecting our manufacturing systems is not as simple as plugging in a switch to the Internet and all of our systems into that switch like we might do at home. In manufacturing Availability is king when it comes to prioritizing the importance of Confidentiality, Integrity, and Availability designated as the three pillars of information security. (CLICK) With such high importance on Availability we rely heavily on consistency in our processes. We do not like to take chances by making changes to processes we know are tried and true, and create the possibility of issues which effect our system Availability. The idea of being able to get more up to date information on how efficient a line or process it makes executives salivate at the thought of their ROI rising, but engineers cringe at the thought of making major changes to systems that are established and working.
  3. When properly implemented The Connected Enterprise can give us next to real-time analysis of or processes. What you see is an example of a manufacturing line which is taking measurements of a product its creating. There have been parameters set showing variation from an ideal size. In this case if there is a variation up to 2 and two to -2 that is the good range, 2 to 7 and -2 to -7 as acceptable, and above 7 or below -7 as unacceptable. Each data point shown represents a specific measurement taken at that time. In the actual graph you would be able to click on a particular square and see what the parameter is, the time stamp when it was made, and an image of the product that is being measured. In this example, we see a group of product that is falling outside what is deemed as acceptable. Through the analysis of data in the Connected Enterprise we can go back and possibly correlate this change to potentially a speed, temperature, pressure, additive, or other parameter change to the making process. By having this next to real-time look into the making process we can finely tune our systems to increase production efficiency.
  4. With our ideal setup in the Connected Enterprise we gather our data from our various sensors, depending on what we are looking to analyze. We aggregate that data and match it with an image that aligns with the timestamp of when the sensor collects the data, and finally we store that data in the database with all of the records. From here we can set up queries within the database to give us our analytical data that we are looking to better understand.
  5. The Purdue model was created to segment an enterprise into multiple layers. It has been highly adopted within the Industrial Control Systems industry as what an ideal connected enterprise looks like. There are many different variations of this model, but the idea of creating layers is the main consistency. As the Purdue model relates to the Connected Enterprise the Demilitarized Zone, DMZ, or sometimes referred to as layer 3.5 is really designed as a place where there is commonality between what is happening within the corporate side of the organization and the controls system side. Because of the sensitivity of the systems and data within controls systems we want to limit the direct interactions between users on the corporate network. For this reason any information that needs to be accessed by the corporate network should be sent to a system in the DMZ that does not have access to make changes in the controls system zones. The DMZ is a location that is used as a stop gap to ensure unintentional changes are not made in the Controls area.
  6. As we begin to usher in the Connected Enterprise in hopes of quickly reaping the benefits we need to take a step back and understand how we can actually implement it in a safe and secure manner. Like mentioned earlier as Control Systems tend to have longer lifecycles, around 15 to 20 or more years, new technology quickly becomes more than it can handle. Imaging being give a cell phone from the early 2000s and asked to rebook you flight home. You might be able to do it, but you are going to have to become creative if you aren’t just calling customer service. This is a similar concept as what we are asking older control systems to do, by retro fitting them into the Connected Enterprise. The concept of networking all of the control systems together and operating it in the same way as an enterprise network sounds like a simple task to a regular IT guy, but in practice some regular IT tasks could cause downtime or serious damage to the processes. A ping sweep is common practice in the corporate environment to help get a better understanding of what systems are on the network, but if the same ping sweep is done in a controls system network some PLCs or control systems will stop functioning because they do not know how to properly handle the request. Also, as we start collecting data we need to determine what information we want to collect and how frequently we are looking to collect it. The more data points we start to collect the more traffic is going to be traveling around the network. Some processing can be very time dependent. If we do not have the proper infrastructure in place this new traffic could add additional latency to the network causing these time sensitive processes to function improperly. This of it as if you town would all of a sudden reroute all traffic through your neighborhood. How would that effect your travel efforts? As we talked about earlier in an ideal situation we want to limit the traffic that flows between the corporate network and the controls network. This process can take months to accomplish because we want to make sure a good sampling of traffic is captured before restrictive firewall rules are put into place. If rules are implemented without being properly vetted, data that is critical but does not occur frequently may start to be stopped by the firewall. So how to we go about addressing this solution? First off, we need to make sure that we communicate to management the importance of adequate networking hardware. Without the proper hardware in place the controls network will cripple itself with all of the additional traffic sent around with our new Connected Enterprise. Next we need to understand what data we are really interested in. This is going to be different from organization to organization and even from system to system. By focusing efforts on specific information we are being more precise about the additional traffic that is added rather than just grabbing everything and sorting it out later. Finally we need to make sure we communicate that at most budget points this type of conversion or upgrade is going to take time to make sure everything works properly. If the connecting the sides of the organization is done improperly it could cause larger issues in the future.
  7. Policies and procedures are another obstacle that tend add additional complication into the control systems network. As we begin to connect the control systems network with the corporate network executives realize we need to have appropriate policies and procedures in place to effectively manage the systems. There the issue comes into places is many times the policies that are put into place are the ones that are already in place for the corporate network; however, many of these policies to not fit properly as written. Many corporate policies have requirements such as performing regular vulnerability scanning. While these are good practices to do they will cause havoc to a controls system. Like we talked about before many older control systems do not know how to handle unknown requests and will simply freeze up or even shutdown or restart without warning. Patch management is another example of policies that do tend not to work as written in a control systems environment. Most IT policies stat that all patches should be applied to systems within X number of days. If this practice is followed with all control systems many systems would begin to fail. This is due to specific software having dependencies to specific versions. A better way to achieve similar results is to have a testing environment where patches can be applied and run for a period of time to see if there are any negative repercussions to installing a certain patch or patches. Once a patch is verified to be safe, it is then important to patch systems to reduce the attack footholds an attacker would have to your organization.
  8. Ownership of the connected portion of control systems is also another area that can be highly contested within an organization. Within some organizations the IT or OT portions of the organization will disagree on who should be in control of the connected enterprise. In some cases both want control and in others neither want to take ownership. Ideally there should be healthy cooperation between both parties in order to most effectively mange the Connected Enterprise. Many times people within the IT world do not fully understand the sensitivity of systems in a controls network and try to manage them just like a regular IT system. This creates a sense of distrust from the engineering group, and a reluctance to allow the IT individuals to make any changes which might effect the network infrastructure within the controls network. In this same sense many engineering individuals do not want to create governing policies so it is left on the plates of the individuals in charge of the IT department. This generally causes the controls network to fall under the same policies that were set fourth for the enterprise. So what can we do? (CLICK) The best thing to do is to have an open mind and have both groups work together. Creating a group comprised of individuals from both sides of the organization that meet on a regular basis to discuss and solve issues can help bridge the gap between the two sides of the organization. Realistically there needs to be a strong cohesion between the two teams to have a truly successful Connected Enterprise.