Industry Defence Insights

Redefining Cyber Protection for Industrial Networks

Jarek Sordyl Season 2 Episode 2

Could the new EU NIS2 directive mean personal liability for board members and senior management? Join us as we uncover how this groundbreaking legislation is not just shaking up the cybersecurity landscape but also redefining business risks in operational technology (OT) and industrial control systems (ICS). With personal accountability now on the line, cybersecurity transcends being merely a technical concern to become a pressing business imperative. We break down the critical steps businesses must take, including regular risk assessments and comprehensive documentation, to navigate these new challenges and safeguard against reputational damage.

Our discussion doesn't shy away from the unique hurdles faced by OT and ICS environments—systems traditionally not built with cybersecurity in mind. Learn about the pivotal elements of visibility and secure remote access, especially crucial in our interconnected world. We also spotlight the pressing need for swift incident reporting and the collaboration between IT and OT security teams to foster transparency and prevent future breaches. This episode is essential listening for anyone invested in industrial cybersecurity, offering actionable insights into breaking down silos and ensuring robust protection in a rapidly evolving landscape.

Support the show

Speaker 1:

In today's podcast we are going to talk about key NIS2 implementation steps for operational technology and industrial control systems. Environments. All right, welcome in. Everyone Ready for another deep dive.

Speaker 2:

Let's do it.

Speaker 1:

Today we're getting into some pretty complex stuff Cybersecurity.

Speaker 2:

Oh yeah, Always a hot topic.

Speaker 1:

But especially when we think about these really like critical systems, the stuff most people don't even think about.

Speaker 2:

Right, the stuff that keeps the lights on.

Speaker 1:

Literally Exactly Power grids, manufacturing plants, all that infrastructure we kind of take for granted until something goes wrong.

Speaker 2:

Yeah, then it's all anyone can talk about.

Speaker 1:

And that's where NIS2 comes in.

Speaker 2:

Yeah, yes, nis2, the EU's new cybersecurity directive Big implications there.

Speaker 1:

Huge and this deep dive we're focusing on how it's impacting those industrial environments. You know operational technology.

Speaker 2:

Industrial control systems ICS. Yeah.

Speaker 1:

Those systems are so crucial, but they can also be really vulnerable.

Speaker 2:

Absolutely. They weren't always built with cybersecurity as the top priority.

Speaker 1:

Right. So this new directive is kind of shaking things up and we've got a great guide we're diving into today to help us unpack it all.

Speaker 2:

Looking forward to it.

Speaker 1:

Yeah, there's some pretty eye-opening stuff in here.

Speaker 2:

Like what.

Speaker 1:

Well, you know about those big fines companies face if they don't comply right.

Speaker 2:

Oh yeah, Reputational damage too, Nobody wants that.

Speaker 1:

But get this Board members and senior management. They can be held personally liable now.

Speaker 2:

Whoa hold on Personally liable. That's serious.

Speaker 1:

Seriously serious.

Speaker 2:

That changes things. Cybersecurity is no longer just a tech issue. It's a business risk, a big one.

Speaker 1:

Exactly, and the guide really hammers that home. It calls it direct oversight.

Speaker 2:

Yeah, direct oversight, meaning management can't just delegate cybersecurity and wash their hands of it. They need to be actively involved.

Speaker 1:

So what does that look like in practice?

Speaker 2:

Think regular risk assessments, clear accountability for every cybersecurity measure and a whole lot of documentation Basically a paper trail a mile long proving they're taking it seriously. Yep, and it can't just be a one-time thing.

Speaker 1:

You know this has to be an ongoing process, constant vigilance, speaking of which the incident reporting timelines under NIS2.

Speaker 2:

Intense how intense are we talking?

Speaker 1:

24 hours for that initial report, then a detailed follow-up within 72 hours. Can you imagine?

Speaker 2:

That's a tight turnaround, but it makes sense when you think about it.

Speaker 1:

How so.

Speaker 2:

Well, the faster you can contain a breach, the less damage it can do, and by sharing information quickly, you might even prevent similar attacks from happening elsewhere.

Speaker 1:

Right. So it's about transparency and collaboration too.

Speaker 2:

Exactly Plus don't forget that one month deadline for the full incident analysis.

Speaker 1:

Oh yeah, that's looming large. So basically, organizations need to be ready to jump into action.

Speaker 2:

Absolutely. You need the right tools, the right processes and the expertise to not only respond quickly, but also to really investigate what happened and learn from it.

Speaker 1:

So let's talk about OT and ICS specifically.

Speaker 2:

Right. Securing those systems comes with its own unique set of challenges.

Speaker 1:

Yeah, like we said, they weren't really designed with cybersecurity in mind.

Speaker 2:

Think of it like trying to install modern safety features on a classic car. It's possible, but it's going to take some work.

Speaker 1:

I like that analogy, yeah. So what are some of the key things to consider when securing OTcations?

Speaker 2:

Well, the guide stresses the importance of visibility. You need to know what assets you have, how they're connected and where your data is flowing.

Speaker 1:

That sounds like a massive undertaking, especially given how complex these systems can be.

Speaker 2:

It can be, but it's essential. You can't protect what you don't know you have. Right, that makes sense. What else Secure? Remote access is huge, especially now with so many people working remotely, and of course, we're seeing more and more interconnected systems.

Speaker 1:

So we need to make sure those connections are locked down tight.

Speaker 2:

Exactly Strong authentication, access controls, continuous monitoring, all that good stuff.

Speaker 1:

And you know there's always that challenge of getting IT and OT security teams on the same page.

Speaker 2:

Oh yeah, breaking down those silos is crucial. Nis 2 really pushes for integration because, at the end of the day, security is everyone's responsibility.

Speaker 1:

It's like you can build the strongest fortress in the world, but if your supply chain is weak one weak link can bring the whole thing crashing down. Exactly, and NIS2 doesn't let you off the hook there either. You have to assess the cybersecurity of your vendors and suppliers too.

Speaker 2:

Right. So you need to think about things like incorporating cybersecurity requirements into contracts, doing regular audits, really understanding the risks associated with every part of your supply chain.

Speaker 1:

So we've covered a lot of ground here. A lot of complexity. Where does someone even start with all of this?

Speaker 2:

Well, the guide actually points to a pretty good framework.

Speaker 1:

Oh yeah, what's that?

Speaker 2:

The SAMS ICS, five critical controls.

Speaker 1:

OK, so what are those?

Speaker 2:

They're essentially five key areas to focus on.

Speaker 1:

Give me the rundown.

Speaker 2:

Sure. So first you've got network visibility and security monitoring. Like we said, you've got to know what's on your network and what's happening Big sense. Then there's securing remote access, which we already talked about. Check Risk-based vulnerability management is next. That's all about prioritizing and addressing the most critical vulnerabilities.

Speaker 1:

Okay, so focusing on the biggest threats first. What else?

Speaker 2:

Supply chain security. We've got to make sure those third parties are up to snuff.

Speaker 1:

Right, can't forget about them.

Speaker 2:

And finally, incident response capabilities being ready to react quickly and effectively if something does happen Makes sense.

Speaker 1:

So these five controls, they line up pretty well with what NIS2 is asking for.

Speaker 2:

Yeah, they do, and it's not a coincidence. They were developed based on real-world attacks, you know, studying what's actually happening out there.

Speaker 1:

So it's not just theory. It you know, studying what's actually happening out there. So it's not just theory, it's practical, actionable stuff. Exactly you know, what strikes me in all this is that NIS2 isn't just about setting rules. It's about changing the whole mindset around cybersecurity.

Speaker 2:

I think that's a really good point. It's about being proactive, not reactive.

Speaker 1:

Right, it's about seeing cybersecurity as a core part of doing business.

Speaker 2:

And building it into your strategy from the ground up.

Speaker 1:

Okay, so let's bring it all home for our listeners. Nis2 is here. It's big, it means management accountability, it means rapid incident reporting, it means tackling those unique challenges of OT and ICS and it means securing your supply chain.

Speaker 2:

It's a lot to take in, but the bottom line is NIS2 is pushing us all towards a more secure digital world.

Speaker 1:

It's setting a new standard.

Speaker 2:

A higher bar for everyone.

Speaker 1:

And that's a good thing.

Speaker 2:

Absolutely, it's a necessary step.

Speaker 1:

But it's also just the beginning, right? Oh yeah.

Speaker 2:

The threat landscape is constantly changing, so we need to be ready to adapt and evolve.

Speaker 1:

And that brings us to our final thought, for everyone listening. You've heard about the regulations, the frameworks, the controls, but here's the real question how are you going to create a culture of cybersecurity within your organization?

Speaker 2:

Because it can't just be about checking boxes.

Speaker 1:

It's got to be about weaving security into the very fabric of what you do.

Speaker 2:

Yeah.

Speaker 1:

So think about that. How are you going to make cybersecurity a part of your DNA?

Speaker 2:

It's a challenge, but it's one we all need to face head on.

Speaker 1:

Because the stakes yeah. They've never been higher. That's it for this deep dive. Thanks for joining us, until next time.

Speaker 2:

Take care. This podcast is supported by OTCert EU cohort.