SlideShare a Scribd company logo
1 of 19
Download to read offline
Vishnu Murali
Director IT
NRG Energy
05.26.2015
According to the results of a 2015 MPI/Rockwell survey
Less than half (45%) of manufacturers surveyed said that their OT
and IT teams collaborated on issues such as upgrading legacy
operations or enterprise systems
A scant 37% reported a collaborative approach to solving technical
enterprise issues
Nearly 10% reported no collaboration between the two
departments.
- Industry Week
 Dumpers, loaders and
heavy mining equipment
 Sensors to monitor asset
performance
 Onboard event logging and
prognosis
 Transmission of events
from assets
 Intelligent asset response
 Resource deployment
 Remote
troubleshooting……
 Enterprise backbone
integration
 Communication networks
and database
 Hardware / Software
updates
 Integrating Enterprise ERP
with OT applications
 Integration between
Equipment data logger and
big data back-end / cloud
 Field service management
 Supply chain
management…..
Tesla’s
Response
Tesla communicated the recall to its
customer but told them “not to worry”.
Next day morning 29, 222 cars were
updated with the fix while the customers
were sleeping overnight.
Previously Tesla had also performed a silent
/ non-recall fix where in it had to tweak the
settings of the electronic shock absorbers
to make it more resilient at high speed.
GM’s
Response
GM asked its customers to take its cars
to the dealers for update and fix.
NIST ICS (Special Publication 800-82, Revision 2, Guide to Industrial Control Systems (ICS) Security (Pages 2-16 to 2-17)(4)
Category IT Systems OT Systems
Primary Players • CIO
• Computer Science Grads
• “Wintel geeks” / Younger generation
• COO, Engineers, Technicians, Production
Managers and Staff
• Older staff who moved up through then ranks
from line operators to technicians
Primary Focus • Data confidentiality and integrity is paramount
• Automation of business processes
• Information management and manipulation
• Safety and protection of the process and
equipment
• Response to human and other emergency
interaction is critical
• Controlling physical process
Component Lifetime • Lifetime in order of 3-5 years • Lifetime in order of 15-20 years
Security Approach • Confidentiality, Integrity and Availability • Availability, Integrity, Confidentiality
Performance
Requirement
• Non-real time
• High throughputs demanded
• Downtimes acceptable
• Real-time
• Reponses is time-critical
• Downtime or delays unacceptable
Data • Complex data type
• Multilayered analytics
• Low data rate (10k records/second)
• Simple data type
• Just-in-time analytics
• High data rate (1M messages/sec)
Interfaces and
Networks
• Web browser
• Keyboard
• TCP/IP based
• Typical IT networking practices
• HIM
• Sensors with embedded OS and Programs
• Codded displays and touch screens
• Serial based communication (Moving to TCP/IT)
Culture
CIO
CTO
CMO
CDO
CISOCOO
CDA
CEA
Awareness of
Enterprise OT
Systems Landscape
and Degree of
Convergence
Consensus That
Convergence Means
a Change in
Managing OT
Rationalization and
Alignment of OT
Management and
Methods With IT
Tools
Integration of IT and
OT Systems and
Infrastructure
Optimize and
Standardize
Processes
LEVEL 1
LEVEL 2
LEVEL 3
LEVEL 4
LEVEL 5
Research
Foundation
Alignment
Integration
Transformation
1. As-is IT & OT
Architecture
2. As-is OT mtn. process
mapping
3. IT-OT Technical
integration
Architecture (Data,
Security)
1. IT-OT Competency
Center model
2. Vision, Goals, Charter,
R&R and Governance
3. CC Operating Norms
4. Cross departmental
training through job
rotation
1. To-be integration
architecture
2.OT Risk and Roadmap
profiling – Heat Map
3. Vendor Collaboration
4. Process alignment
1. Pilot Integration
Projects
2. Vendor Collaboration
3. Monitoring
4. Cyber Security Testing
1. Launch targeted
transformation
initiatives
2. Measure benefits
3. Repeat
Source: © 2011 Gartner
 Where do we begin?
1. Start with NIST framework and evolve it to suite the needs
2. Perform Risk Assessment – Technology, Market Forces, Vendor strategy, Business Strategy, IT Strategy
3. Establish Vision and “to-be” state
4. Market and Sell business case to the business stakeholders
5. Establish a focused team that will work on execution of process, frameworks and data analysis
6. Create a center of excellence along with vendors participation
 What are some of the challenges that you are
facing in your organization with IT/OT
integration?
 What is your IT / Cyber Security department
doing to bridge the IT and OT skills gap?
 What approach are you taking to address
security concerns as part of your IT /OT
initiatives?
 How are you getting the stakeholder buy-ins
on related investments?
Vishnu Murali
Vish.murali@nrg.com
askvishnu@gmail.com
Cell: 513 478 7004
IT OT Integration_Vishnu_Murali_05262016_UPDATED

More Related Content

What's hot

Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And Architecture
Alan McSweeney
 
Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)
MD. IFTEKARUL ALAM
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
Alan McSweeney
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
Alan McSweeney
 

What's hot (20)

OE 4.0 and the Autonomous Plant
OE 4.0 and the Autonomous PlantOE 4.0 and the Autonomous Plant
OE 4.0 and the Autonomous Plant
 
Industry X.0 | Smart Factory | Session no.2
Industry X.0 | Smart Factory | Session no.2Industry X.0 | Smart Factory | Session no.2
Industry X.0 | Smart Factory | Session no.2
 
Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And Architecture
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdf
 
Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...Enterprise Architecture Implementation And The Open Group Architecture Framew...
Enterprise Architecture Implementation And The Open Group Architecture Framew...
 
Foundry technical intro
Foundry technical introFoundry technical intro
Foundry technical intro
 
NQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation GuideNQA - ISO 27001 Implementation Guide
NQA - ISO 27001 Implementation Guide
 
Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution Architecture
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
AWS Manufacturing Day Philadelphia-Boston-April 2019
AWS Manufacturing Day Philadelphia-Boston-April 2019AWS Manufacturing Day Philadelphia-Boston-April 2019
AWS Manufacturing Day Philadelphia-Boston-April 2019
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
 

Similar to IT OT Integration_Vishnu_Murali_05262016_UPDATED

UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
BLACKSPAROW
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
Jonah Kowall
 

Similar to IT OT Integration_Vishnu_Murali_05262016_UPDATED (20)

ADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture MaturityADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture Maturity
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...
ADV Slides: What the Aspiring or New Data Scientist Needs to Know About the E...
 
Real world IoT for enterprises
Real world IoT for enterprisesReal world IoT for enterprises
Real world IoT for enterprises
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
 
How to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT OperationsHow to Use Big Data to Transform IT Operations
How to Use Big Data to Transform IT Operations
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
Manufactures whats keeping you up
Manufactures   whats keeping you upManufactures   whats keeping you up
Manufactures whats keeping you up
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
Challenges of Operationalising Data Science in Production
Challenges of Operationalising Data Science in ProductionChallenges of Operationalising Data Science in Production
Challenges of Operationalising Data Science in Production
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front lines
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
 
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
 
Two speed-it
Two speed-itTwo speed-it
Two speed-it
 

IT OT Integration_Vishnu_Murali_05262016_UPDATED

  • 1. Vishnu Murali Director IT NRG Energy 05.26.2015
  • 2. According to the results of a 2015 MPI/Rockwell survey Less than half (45%) of manufacturers surveyed said that their OT and IT teams collaborated on issues such as upgrading legacy operations or enterprise systems A scant 37% reported a collaborative approach to solving technical enterprise issues Nearly 10% reported no collaboration between the two departments. - Industry Week
  • 3.
  • 4.  Dumpers, loaders and heavy mining equipment  Sensors to monitor asset performance  Onboard event logging and prognosis  Transmission of events from assets  Intelligent asset response  Resource deployment  Remote troubleshooting……  Enterprise backbone integration  Communication networks and database  Hardware / Software updates  Integrating Enterprise ERP with OT applications  Integration between Equipment data logger and big data back-end / cloud  Field service management  Supply chain management…..
  • 5. Tesla’s Response Tesla communicated the recall to its customer but told them “not to worry”. Next day morning 29, 222 cars were updated with the fix while the customers were sleeping overnight. Previously Tesla had also performed a silent / non-recall fix where in it had to tweak the settings of the electronic shock absorbers to make it more resilient at high speed. GM’s Response GM asked its customers to take its cars to the dealers for update and fix.
  • 6.
  • 7. NIST ICS (Special Publication 800-82, Revision 2, Guide to Industrial Control Systems (ICS) Security (Pages 2-16 to 2-17)(4) Category IT Systems OT Systems Primary Players • CIO • Computer Science Grads • “Wintel geeks” / Younger generation • COO, Engineers, Technicians, Production Managers and Staff • Older staff who moved up through then ranks from line operators to technicians Primary Focus • Data confidentiality and integrity is paramount • Automation of business processes • Information management and manipulation • Safety and protection of the process and equipment • Response to human and other emergency interaction is critical • Controlling physical process Component Lifetime • Lifetime in order of 3-5 years • Lifetime in order of 15-20 years Security Approach • Confidentiality, Integrity and Availability • Availability, Integrity, Confidentiality Performance Requirement • Non-real time • High throughputs demanded • Downtimes acceptable • Real-time • Reponses is time-critical • Downtime or delays unacceptable Data • Complex data type • Multilayered analytics • Low data rate (10k records/second) • Simple data type • Just-in-time analytics • High data rate (1M messages/sec) Interfaces and Networks • Web browser • Keyboard • TCP/IP based • Typical IT networking practices • HIM • Sensors with embedded OS and Programs • Codded displays and touch screens • Serial based communication (Moving to TCP/IT)
  • 8.
  • 11.
  • 12. Awareness of Enterprise OT Systems Landscape and Degree of Convergence Consensus That Convergence Means a Change in Managing OT Rationalization and Alignment of OT Management and Methods With IT Tools Integration of IT and OT Systems and Infrastructure Optimize and Standardize Processes LEVEL 1 LEVEL 2 LEVEL 3 LEVEL 4 LEVEL 5 Research Foundation Alignment Integration Transformation 1. As-is IT & OT Architecture 2. As-is OT mtn. process mapping 3. IT-OT Technical integration Architecture (Data, Security) 1. IT-OT Competency Center model 2. Vision, Goals, Charter, R&R and Governance 3. CC Operating Norms 4. Cross departmental training through job rotation 1. To-be integration architecture 2.OT Risk and Roadmap profiling – Heat Map 3. Vendor Collaboration 4. Process alignment 1. Pilot Integration Projects 2. Vendor Collaboration 3. Monitoring 4. Cyber Security Testing 1. Launch targeted transformation initiatives 2. Measure benefits 3. Repeat
  • 13. Source: © 2011 Gartner  Where do we begin? 1. Start with NIST framework and evolve it to suite the needs 2. Perform Risk Assessment – Technology, Market Forces, Vendor strategy, Business Strategy, IT Strategy 3. Establish Vision and “to-be” state 4. Market and Sell business case to the business stakeholders 5. Establish a focused team that will work on execution of process, frameworks and data analysis 6. Create a center of excellence along with vendors participation
  • 14.
  • 15.  What are some of the challenges that you are facing in your organization with IT/OT integration?
  • 16.  What is your IT / Cyber Security department doing to bridge the IT and OT skills gap?
  • 17.  What approach are you taking to address security concerns as part of your IT /OT initiatives?  How are you getting the stakeholder buy-ins on related investments?