APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Field Service
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    E-commerce and the Data behind it

    Klemen Drole, CIO, Lazada Group

    The Bi-Model Approach to Customer Engagement

    Sumit Puri, CIO, Max Healthcare

    PropTech: the Future of Real Estate

    Aidan Coleman, CIO & CTO, Charter Hall

    mobileOne Technology: Real-Time Solutions to CPGs

    CEO

    myFLO: Streamlining Business Processes through Comprehensive Field Solutions

    Founder

    Field Force Automation: Where We Are, and Where We Need to Go

    Kelvin Hubbard, COO & CIO, Visual Mobile Technologies, Inc.

    Field Service Management Lifecycle

    Dean Lane, Executive or CIO Consultant, The Office of the CIO & Mayumi Okada, Executive or CIO Consultant, The Office of the CIO

    Technology is No Longer a Support Function

    Mark Wilmshurst,

    right

    Three Ways to Manage the Risk of Your Operational Technology Assets

    Wahab Yusoff, Vice President, Asia, ForeScout Technologies, Inc.

    Tweet
    content-image

    Wahab Yusoff, Vice President, Asia, ForeScout Technologies, Inc.

    Operational technology (OT) assets are now at the core of most organizations today, as they offer the ability to automate, control, monitor and integrate business processes.

    While OT systems have historically been proprietary and isolated from corporate IT systems, OT suppliers have now largely converged onto common, connected IT platforms. This increased connectivity is compelling but dangerous, and could potentially have dire consequences if not well-managed.

    As organizational operations become increasingly connected and complex, so does the need to gain better understanding of the organization’s security and risk posture. This can be achieved through regularly identifying and prioritizing risks, analyzing threats and resolving vulnerabilities in the business’ critical infrastructure.

    With the diversity of technology, variety of device and protocols, and the sensitivity of equipment, extreme caution needs to be taken to ensure that security solutions do not impose risk to physical safety and operational uptime. It is with only proper identification and prioritization of risks that organizations can secure critical assets and assure reliability, business continuity, and regulatory compliance.

    How then can organizations effectively manage the risk of their OT assets?

    Gaining Visibility into Connected Devices

    Lack of asset visibility and device status knowledge continue to be top concerns for OT security and risk management leaders. Oftentimes, organizations lack a complete, up-to-date inventory of the OT assets they have. Furthermore, many maintenance processes are still either being performed manually or by their equipment vendors.

    As threats expand beyond traditional IT networks, so does the need to extend security visibility into all networks.

    Visibility of connected devices and intelligence of device security posture is therefore essential in helping organizations effectively manage security risks.

    Visibility of connected devices and intelligence of device security posture is essential in helping organizations effectively manage security risks

    Identifying key OT assets

    Reducing OT related business risk starts with understanding and identifying the OT assets associated with critical business processes. Only then can organizations understand which OT assets need security focus and investments to reduce their OT related business risk in a cost-effective manner.

    According to the 2018 SANS Industrial IoT (IIoT) survey, most organizations envision a 10 to 25 percent growth in their connected devices for the foreseeable future. This explosion of devices, in addition to the existing obscurity issues inherent in OT, makes asset discovery difficult.

    In a typical asset discovery there is a tendency to start grouping devices by type, such as Windows, Mac, Linux devices, PLCs, sensors, as so on, which distracts focus from managing the risk of the critical processes. Instead, doing discovery based on the critical asset systems really helps us not “boil the ocean”, waste resources and lose focus.

    Start with critical impact systems and work in priority order to identify what assets support the process, what hardware and software run on the assets and what is the network topology supporting them, as well as what endpoints, devices and non-network connected devices really constitute the asset system.

    Organizing Impact Systems

    Once organizations have an in-depth understanding of what the critical asset systems look like, the process will highlight the importance of protecting high-impact systems, such as data centre assets or operations. Requesting funding becomes easier to justify from a business perspective, especially when introducing risk-mitigating controls.

    Organizing impact systems on a high/medium/low scale can ease successful implementation of many Risk Management Frameworks (RMFs).RMFs are best-practice policies to assess and reduce OT asset-related business risk.

    In addition to the RMFs, there are also international standards and regulations for which organizations can be certified. What they all have in common is a framework of controls that should be put in place from asset discovery, hardware and software asset management, configuration management, and vulnerability management, to where you have a blueprint allowing for efficient and measurable business risk reduction.

    When we start from the ‘top down’ approach versus the ‘bottoms up approach’, we end up building a solid risk management program that executive management can understand, protecting the most critical processes to the business, and achieving both cost-effectively.

    Check this out: Top Managed Security Service Companies in APAC
    tag

    inventory

    IoT

    Critical Infrastructure

    Industrial IoT

    IIoT

    Software Asset Management

    Weekly Brief

    loading
    Top 10 Field Services Companies - 2020
    ON THE DECK

    Field Service 2020

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Advancing the Chemical Industry through Digital Transformation

    Advancing the Chemical Industry through Digital Transformation

    Jan Mandrup Olesen, Global Head of Digital Business, Indorama Ventures
    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Digital Transformation: A Journey Beyond Technology

    Digital Transformation: A Journey Beyond Technology

    John Ang, Group CTO, EtonHouse International Education Group
    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Richa Arora, Senior Director Of Data Governance, Cbre
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://field-service.apacciooutlook.com/cxoinsights/three-ways-to-manage-the-risk-of-your-operational-technology-assets-nwid-6090.html