Cybersecurity Challenges Facing Remote Operators of OT and other Critical Infrastructure Systems

U.S. critical infrastructure must guard against malicious cyberattacks by implementing encryption and authentication at all access points for connected OT assets or continue to face an increased level of cyber risk.

Russian hackers are attempting to broadly penetrate Ukrainian infrastructure to disrupt critical services such as electricity, transportation, finance, and telecommunications.

Attendees will learn simple methodologies for building a zero-trust architecture to protect against such cyberattacks, including:

  • Ensure all communication from IT/Internet to OT network is encrypted
  • Ensure there is no data-in-transit for any user sessions not associated with a multi-factor authenticated session
  • Isolate all data communication protocols to OT network
  • Ensure all user access session data to critical OT systems are logged and recorded
  • Ensure plant-level controls for allowing remote access through “software lockbox” and “virtual wait lobby,” including visual and audible alarms
  • Monitor all non-read-only user access sessions
  • Verify acceptable risk level for access to critical assets through asset monitoring, threat (IOC) feeds, and vulnerability detection tools.