Zero to hero: Protect critical infrastructure from top floor to the plant floor

Wednesday
 
27
 
November
1:30 pm
 - 
2:10 pm

Speakers

Yiyi Miao

Yiyi Miao

Chief Product Officer
Opswat

Synopsis

With Industry 4.0 and increased digitalization across IT and OT, protecting critical infrastructure—from the plant floor to the top floor—has never been more important. Zero trust is a crucial strategy in safeguarding these vital systems and is based on the principle of continuous verification, assuming threats can exist both inside and outside the network. It demands a defense-in-depth approach to the data, device, network, and human levels to ensure security.

At the core of a zero-trust philosophy is the shift from a detection-focused mindset to a prevention-based strategy. Relying solely on detection means that a threat has already infiltrated the network, potentially causing harm before it can be identified and mitigated. Instead, zero trust emphasizes proactive measures, such as continuously scanning for malware, sanitizing all files regardless of perceived risk, employing dynamic analysis to safely detonate and analyze suspicious content in controlled environments and more. This proactive approach helps to identify and neutralize threats before they can become real-world impacts.

At the enterprise level, zero trust involves protecting various types of data, including files, emails, and third-party code. This means implementing strict access controls and continuously monitoring data for any signs of compromise. Ensuring data integrity and confidentiality is essential in preventing data breaches, securing the software supply chain, and maintaining the operational continuity of critical infrastructure.

At the device level, zero trust requires securing transient cyber assets and peripheral media that bridge the air-gapped operational technology (OT) environments that are often found in critical infrastructure. These devices can be vulnerable entry points for malicious actors. By applying defense-in-depth security measures and monitoring device activity, organizations can prevent unauthorized access, keep the hardware supply chain intact, and reduce the risk of malware propagating throughout a network.

When it comes to the network level, zero-trust applies to secure any access for both IT and OT systems, focusing on network segmentation to isolate critical components and the use of data diodes and industrial firewalls to control and monitor network traffic. These measures create a multi-layered defense system that limits the movement of potential threats and can increase cybersecurity maturity.

Finally, the human element is often the weakest link in cybersecurity. Under a zero-trust model, it is essential to implement strict user authentication and authorization processes. Regular training and awareness programs also help ensure that employees recognize potential threats and understand the importance of adhering to security protocols. By securing human interactions systems, organizations can further reduce potential risks along with digital and physical cyber defense layers.

Throughout this presentation, Yiyi Miao will delve into applying zero trust to each of these levels to effectively safeguard the essential environments within critical infrastructure. 

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country