<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Juliette BARBIER, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/juliette-barbier/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 10 Dec 2025 15:40:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Juliette BARBIER, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Purple Teaming for OT:  How to switch from a compliance to a performance mindset?</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/12/purple-teaming-for-ot-how-to-switch-from-a-compliance-to-a-performance-mindset/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/12/purple-teaming-for-ot-how-to-switch-from-a-compliance-to-a-performance-mindset/#respond</comments>
		
		<dc:creator><![CDATA[Juliette BARBIER]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 15:40:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=28481</guid>

					<description><![CDATA[<p>In our previous articles of this OT cybersecurity monitoring series (Cybersecurity monitoring for OT / Cybersecurity tooling strategy), we explained the current state of OT detection capabilities and discussed the right tooling strategy.  This third article focuses on a key question: how do you measure the efficiency of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/12/purple-teaming-for-ot-how-to-switch-from-a-compliance-to-a-performance-mindset/">Purple Teaming for OT:  How to switch from a compliance to a performance mindset?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="auto">In our previous articles of this OT cybersecurity monitoring series (</span><a href="https://www.riskinsight-wavestone.com/en/2025/09/cybersecurity-monitoring-for-ot-current-situation-perspectives/"><span data-contrast="none">Cybersecurity monitoring for OT</span></a><span data-contrast="auto"> / </span><a href="https://www.riskinsight-wavestone.com/en/2025/10/cybersecurity-tooling-strategy-for-an-effective-industrial-detection/"><span data-contrast="none">Cybersecurity tooling strategy</span></a><span data-contrast="auto">), we explained the current state of OT detection capabilities and discussed the right tooling strategy.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">This third article focuses on a key question: </span><b><span data-contrast="auto">how do you measure the efficiency of your OT detection?</span></b><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">From compliance to efficiency: a KPI paradigm shift</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h1>
<p><span data-contrast="auto">KPI stands for </span><i><span data-contrast="auto">Key Performance Indicator. </span></i><span data-contrast="auto">However, we tend to create KPIs to monitor progress against our plans, not real performance. While useful, monitoring only deployment or coverage (number of sites connected to the SOC, EDR deployment on OT machines, number of probes registered to the management console) </span><b><span data-contrast="auto">tells you very little about the actual ability of your SOC to detect a real attacker.</span></b><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">So, how confident are you in your detection tools, use cases, and processes? The only way to be sure is simple: </span><b><span data-contrast="auto">test them. </span></b><span data-contrast="auto">And the best way to test them is through </span><b><span data-contrast="auto">Purple Team exercises</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h1 aria-level="1">What is Purple Teaming in OT? </h1>
<p><span data-contrast="auto">A Purple Team exercise is a </span><b><span data-contrast="auto">collaborative mission</span></b><span data-contrast="auto"> between the Red Team (attackers) and the Blue Team (defenders). Unlike a traditional Red Team assessment, where the defenders are kept in the dark and evaluated afterward, </span><b><span data-contrast="auto">a Purple Team exercise is an iterative, joint effort</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">This collaborative approach allows both teams to:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><span data-contrast="auto">Share assumptions about the OT environment</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Validate detection logic in real time</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Understand blind spots</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Improve playbooks and detection pipelines</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Align everyone around a realistic threat model</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<h1 aria-level="2">Performing a Purple Team Exercise </h1>
<p><span data-contrast="auto">A Purple Team operation can be summarized in </span><b><span data-contrast="auto">three main phases</span></b><span data-contrast="auto">:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h2>1. Preparation</h2>
<p><span data-contrast="auto">The preparation phase is often the most challenging, especially in OT environments, where safety, process continuity, and vendor constraints must be considered.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Depending on the maturity of the organization, preparation can range from basic to highly sophisticated:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Unit Tests</span></b> <br /><span data-contrast="auto">Small, isolated tests of specific detection rules (e.g., “Detect Modbus function code 90”).</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Feared Scenario-based Testing</span></b> <br /><span data-contrast="auto">Build scenarios around the organization’s crown jewels and failure modes (e.g., “Unauthorized remote program upload on a PLC controlling a critical process”).</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">CTI-Infused Testing</span></b> <br /><span data-contrast="auto">Integrate threat intelligence: test techniques used by real OT-focused attackers (e.g. TTPs from Volt Typhoon, Sandworm, Xenotime, or ransomware groups targeting industrial environments).</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">To structure the preparation phase, two elements are essential:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><b><span data-contrast="auto">A good knowledge of your OT environment</span></b> <br /><span data-contrast="auto">Planning an exercise that will be relevant to both the business risks &amp; OT detection without impacting the process requires a deep knowledge of the site and its automation.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Mapping to the </span></b><a href="https://attack.mitre.org/matrices/ics/"><b><span data-contrast="none">MITRE ATT&amp;CK for ICS matrix</span></b></a> <br /><span data-contrast="auto">Mapping your tests to the ATT&amp;CK matrix allows you to have a common language with the detection teams. This allows you to select relevant techniques, avoid blind spots, and ensure coverage across multiple layers: OT workstations, PLCs, network interactions, engineering actions…</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<h2>2. D-day (Execution)</h2>
<p><span data-contrast="auto">Execution is performed jointly:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><span data-contrast="auto">The Red Team launches controlled and authorized actions</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">The Blue Team monitors detections in real time</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Both teams adjust, document, and validate findings as the exercise unfolds</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">Depending on the scope and complexity of the tests, the Purple Team operation can last from a few hours to a few days.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h3 aria-level="4"><i><span data-contrast="none">Ensuring Reproducibility with Caldera</span></i><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:80,&quot;335559739&quot;:40}"> </span></h3>
<p><span data-contrast="auto">To ensure repeatability and consistency across Purple Team exercises, automation becomes key.  </span><a href="https://www.mitre.org/resources/caldera-ot"><b><span data-contrast="none">Caldera</span></b></a><span data-contrast="auto">, an open-source Breach &amp; Attack Simulation (BAS) framework developed by MITRE, is a powerful tool for this.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">As a former pentester, I’ve always disliked the term “automated pentest”—but BAS tools are the closest thing we have to repeatable, safe attack execution.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<h3 aria-level="5"><em>Why use Caldera instead of performing tests manually? </em></h3>
<p><span data-contrast="auto">Caldera enables you to:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><span data-contrast="auto">Prepare and validate a controlled list of tests on a controlled list of assets</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Ensure only authorized actions are executed</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Guarantee reproducibility across environments</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Replay the exact same actions to measure improvements after configuration changes</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">Some OT-specific plugins already exist in the </span><b><span data-contrast="auto">Caldera-OT</span></b><span data-contrast="auto"> module, supporting Modbus, Profinet, DNP3, and others.</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><span data-contrast="auto">Recently, Wavestone released two additional OT plugins:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Siemens S7 protocol support</span></b><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">OPC-UA communications actions</span></b><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<h3 aria-level="5"><em>Caldera in a nutshell </em></h3>
<p><span data-contrast="auto">Caldera usage relies on:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Abilities</span></b><span data-contrast="auto">: atomic technical actions (e.g., reading coils, writing tags, scanning a PLC)</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Adversaries</span></b><span data-contrast="auto">: collections of abilities that form a scenario</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Operations</span></b><span data-contrast="auto">: real-time execution of those adversaries against a target</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><b><span data-contrast="auto">Fact sources</span></b><span data-contrast="auto">: parameters provided for an operation; you can launch the same operations against different environments by just changing the fact source.</span><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p>
<p><span data-contrast="auto">The following video (French with English subtitles) will walk you through a demonstration of Caldera on our small ICS demo setup:</span> </p>
<div align="center"><iframe title="YouTube video player" src="//www.youtube.com/embed/wq8BMagjhwE" width="800" height="450" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"></iframe></div>
<div align="center"> </div>
<h2>3. Debriefing</h2>
<p><span data-contrast="auto">The debrief is where most of the value is extracted. The following types of </span><i><span data-contrast="auto">Key Performance Indicators</span></i><span data-contrast="auto"> might be used:</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Detection Coverage</span></b><span data-contrast="auto"> – what percentage of executed stimuli were detected?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Alert Quality</span></b><span data-contrast="auto"> – were alerts actionable, precise, and intelligible?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Reaction Time</span></b><span data-contrast="auto"> – how long before an alert is raised and acknowledged?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Playbook Efficiency</span></b><span data-contrast="auto"> – were the right actions taken in the expected time frame?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">These might phase results in:</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><span data-contrast="auto">Updated detection rules</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Improved SIEM/SOC playbooks</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Better monitoring architecture</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Training material for analysts and engineers</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<h1 aria-level="1"><span data-contrast="none">Start Testing Now!</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h1>
<p><span data-contrast="auto">Purple Team testing brings value immediately, no matter what your current maturity level is:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><span data-contrast="auto">It validates your tools in real-world conditions</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">It trains your SOC and OT teams</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">It reveals blind spots early in the program</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">It provides quantitative KPIs to drive detection improvements</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">And yes, </span><b><span data-contrast="auto">it is possible, in most production environments, under the following conditions</span></b><span data-contrast="auto">:</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<ul>
<li><span data-contrast="auto">Strictly controlled scope</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Vendor-approved actions</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">No disruptive functions executed</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Involvement of operations and safety teams</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
<li><span data-contrast="auto">Continuous monitoring of system behavior during testing</span><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">In short: </span><b><span data-contrast="auto">start small, stay safe, and iterate.</span></b><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">Do not wait for your OT security program to be “finished” before you start testing its effectiveness!</span></b><span data-ccp-props="{&quot;335559738&quot;:240,&quot;335559739&quot;:240}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/12/purple-teaming-for-ot-how-to-switch-from-a-compliance-to-a-performance-mindset/">Purple Teaming for OT:  How to switch from a compliance to a performance mindset?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/12/purple-teaming-for-ot-how-to-switch-from-a-compliance-to-a-performance-mindset/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity tooling strategy for an effective industrial detection</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/10/cybersecurity-tooling-strategy-for-an-effective-industrial-detection/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/10/cybersecurity-tooling-strategy-for-an-effective-industrial-detection/#respond</comments>
		
		<dc:creator><![CDATA[Juliette BARBIER]]></dc:creator>
		<pubDate>Thu, 30 Oct 2025 13:32:52 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=28068</guid>

					<description><![CDATA[<p>Detection within industrial environment In a previous article: Cybersecurity monitoring for OT, Current situation &#38; perspectives we have seen that OT, while overall less impacted than IT, is not exempt from cyberthreats &#38; not immune to cyberattacks. But, due to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/10/cybersecurity-tooling-strategy-for-an-effective-industrial-detection/">Cybersecurity tooling strategy for an effective industrial detection</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1>Detection within industrial environment</h1>
<p><span class="TextRun SCXW3808787 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun CommentStart SCXW3808787 BCX0">In </span><span class="NormalTextRun SCXW3808787 BCX0">a previous</span><span class="NormalTextRun SCXW3808787 BCX0"> article: </span></span><a class="Hyperlink SCXW3808787 BCX0" href="https://www.riskinsight-wavestone.com/en/2025/09/cybersecurity-monitoring-for-ot-current-situation-perspectives/" target="_blank" rel="noreferrer noopener"><span class="TextRun Underlined SCXW3808787 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW3808787 BCX0" data-ccp-charstyle="Hyperlink">Cybersecurity monitoring for OT, Current situation &amp; perspectives</span></span></a><span class="TextRun SCXW3808787 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW3808787 BCX0"> w</span><span class="NormalTextRun SCXW3808787 BCX0">e have seen that </span><span class="NormalTextRun SCXW3808787 BCX0">OT</span><span class="NormalTextRun SCXW3808787 BCX0">, while overall less impacted than IT, is not exempt from cyberthreats &amp; not immune to cyberattacks</span><span class="NormalTextRun SCXW3808787 BCX0">. B</span><span class="NormalTextRun SCXW3808787 BCX0">ut</span><span class="NormalTextRun SCXW3808787 BCX0">,</span><span class="NormalTextRun SCXW3808787 BCX0"> d</span><span class="NormalTextRun SCXW3808787 BCX0">ue to the difficulty in updating legacy Industrial Control Systems (ICS), cybersecurity measures are often added after deployment. </span><span class="NormalTextRun SCXW3808787 BCX0">Continuous monitoring is seen as a practical substitute for built-in, cyber-by-design </span><span class="NormalTextRun SCXW3808787 BCX0">protection.</span></span><span class="EOP SCXW3808787 BCX0" data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>When it comes to monitoring tooling, we observed that 100% of our clients have detection tools deployed on the IT side of industrial sites. But only one-third extend monitoring down to the lower layers of the industrial environment:</p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-28077 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN1.png" alt="" width="733" height="526" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN1.png 1051w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN1-266x191.png 266w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN1-54x39.png 54w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN1-768x551.png 768w" sizes="(max-width: 733px) 100vw, 733px" /></p>
<p>There is a large variety of detection sources allowing monitoring across different levels of the Purdue model:</p>
<ul>
<li>Firewalls (including industrial firewalls)</li>
<li>Endpoint protection (AV, application whitelisting, EPP, EDR etc.)</li>
<li>Authentication and access logs (e.g., Active Directory, local authentication)</li>
<li>Remote access logs (e.g., VPN, jump servers, bastion)</li>
<li>Deceptive technologies (e.g., honeypots or decoys)</li>
<li>Network detection and monitoring probes (listening industrial networks)</li>
<li>Logs from media sanitization or data transfer stations (e.g., USB kiosks)</li>
<li>Industrial logs (from SCADA, HMI, PLC … when available)</li>
</ul>
<p>Traditionally, these logs are collected and analyzed by SIEM and/or SOAR solutions, with or without specific OT detection patterns, and should enable the SOC team to detect, investigate, and respond to security events.</p>
<p>Building a consistent detection strategy for OT environments does not require collecting data from every possible source. In fact, a few well-chosen, <strong>properly configured, and actively monitored sources can provide strong visibility and early detection capabilities</strong>. The key is to focus on data sources that are both relevant to the specific OT architecture and feasible to monitor without disrupting operations. Prioritizing quality and operational relevance over quantity ensures a more effective and sustainable cybersecurity posture.</p>
<h1>How to get the most of detection sources?</h1>
<h2>Start with logs you already have</h2>
<p>A pragmatic and cost-effective way to approach OT detection is to <strong>start by leveraging the logs and detection patterns already available</strong> within the industrial environment, particularly those already exploited for your IT environments. For example, <strong>firewall logs</strong>, especially those monitoring IT/OT boundaries, can provide valuable insights into network traffic patterns, segmentation breaches, or suspicious remote access attempts. Similarly, Active Directory (AD) logs can reveal abnormal user behavior, failed authentication attempts, or privilege escalations — all of which are critical signals in both IT and OT contexts. Leveraging these existing sources allows organizations to build initial detection capabilities without heavy investment, while laying a solid foundation for more advanced monitoring in the future.</p>
<p>Rather than starting with deploying complex OT-specific detection tools, organizations should <strong>build initial detection capabilities using what is already deployed, configured, and understood</strong>. This not only reduces costs but accelerates implementation across industrial sites. The goal is to <strong>ensure a consistent baseline of visibility</strong> across critical applications, systems, and infrastructure before diving deeper.</p>
<p>By starting with what you already have, and focusing on <strong>coverage, not complexity</strong>, organizations can address OT detection with speed, relevance, and operational realism, while setting the stage for more advanced capabilities down the line.</p>
<p>We will now focus on the two detection tools most widely adopted and discussed in industrial environments today: <strong>EDR solutions</strong> and <strong>OT network detection probes</strong>.<br />In the following sections, we will examine how to leverage these solutions effectively and outline our recommendations.</p>
<h3>EDR</h3>
<p><strong>Endpoint Detection &amp; Response </strong>solutions provide continuous monitoring and analysis of endpoint activities to detect, investigate, and respond to cyber threats in real time. EDR collects detailed data such as process execution, file changes, network connections, and user behavior. By leveraging behavioral analytics and threat intelligence, EDR tools can identify suspicious activities like malware infections, lateral movement, or privilege escalation.</p>
<p>This detection tool, widely used and popularized in IT environments, is now being adopted by most of our clients for deployment within their industrial environments, driven by the evolution of deployment models, the broader coverage of operating systems, and the improved performance of detection models in increasingly complex environments.</p>
<p>However, this does not mean that 100% of OT devices are compatible with EDR solutions. In fact, <strong>EDR compatibility varies significantly across different industrial systems</strong> due to their diversity and operational constraints. EDR deployment is generally straightforward on higher levels of the Purdue model, such as Layer 3 and Layer 3.5, where systems resemble traditional IT environments like servers and workstations. At Layer 2, implementation requires careful evaluation with vendors support and testing, as devices and protocols become more specialized and resource constrained. Finally, at the lowest levels, controllers, PLCs, and field devices, EDR is generally not viable due to limited processing capacity, proprietary operating systems, and real-time performance requirements.</p>
<p><img decoding="async" class="size-full wp-image-28079 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN2.png" alt="" width="1252" height="489" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN2.png 1252w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN2-437x171.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN2-768x300.png 768w" sizes="(max-width: 1252px) 100vw, 1252px" /></p>
<p>For environments that support it, extending EDR coverage allows to:</p>
<ul>
<li>Address low maturity: Start with tools that are easier to implement and require less maturity.</li>
<li>Broad coverage: Focus on quickly covering a wide range of systems, sites, and critical applications.</li>
<li>Leverage IT tools: Use IT-based solutions like EDR for effective detection without heavy infrastructure requirements.</li>
</ul>
<p>To conclude, <strong>deploying EDR Agents on OT Servers and Workstations</strong> is becoming increasingly relevant, and a <strong>quick win for OT detection</strong>, according to our clients’ feedback.</p>
<h3>OT Probes</h3>
<p>A <a href="https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/">detection probe</a> is a piece of equipment, virtual or physical, connected to the information system in order to map and monitor it. It consists of sensors distributed across the network to collect data. And typically, a central console to aggregate, correlate and analyze this data.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24238 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737.png" alt="" width="1309" height="248" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737.png 1309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-437x83.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-768x146.png 768w" sizes="auto, (max-width: 1309px) 100vw, 1309px" /></p>
<p>Probes for industrial environments, which we will refer to simply as OT probes here, are characterized by their passive, non-invasive listening on the network, and their understanding of industrial protocols and behavior. All their probe solutions work on the same principle: network traffic is collected using flow duplication (SPAN, ERSPAN …) or physical duplicator like taps, etc. Packets are inspected in real time to provide several types of data: flow inventory and mapping, asset and vulnerability management, and finally anomaly and incident detection. OT probes promises wide detection capabilities and variety of possible cases of these data. The features and types of users involved (operational and business team, cybersecurity team, etc.) is what makes OT probes so popular. </p>
<p>However, our clients often face <strong>significant challenges when it comes to deploying</strong> these probes and effectively leveraging them for detection at scale.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-28081 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN3-e1761750642650.png" alt="" width="1276" height="482" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN3-e1761750642650.png 1276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN3-e1761750642650-437x165.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN3-e1761750642650-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/10/otprobe2_EN3-e1761750642650-768x290.png 768w" sizes="auto, (max-width: 1276px) 100vw, 1276px" /></p>
<p>Here are a few common pain points when deploying OT probes:</p>
<ul>
<li><strong>Industrial site network capabilities and resources</strong>: Deploying OT probes often presents significant challenges due to the limitations of industrial network infrastructure. Network taps and SPAN ports on switches, commonly used for traffic monitoring, are not always manageable or available in OT environments, which limits options for passive traffic capture. Additionally, the costs associated with installing dedicated network taps can be prohibitive, especially across distributed and remote industrial sites. Moreover, deploying and maintaining probes requires skilled resources on-site.</li>
<li>OT probes collect and correlate information through network traffic capture. To be effective, their deployment requires carefully selecting listening points based on the intended targets. Listening points need to be tailored to each site architecture, often limited by local team knowledge and lack of documentation. Moreover, because industrial environments vary between different sites within the same organization, it is very difficult to establish a one-size-fits-all blueprint. In some architectures, achieving comprehensive asset coverage may require deploying dozens of collection points. As a result, selecting and configuring listening points is a repetitive, iterative process that must be adapted for each location to ensure optimal visibility and detection capabilities.</li>
</ul>
<p>More than deploying, operating these probes also comes with challenges and requires a <strong>significant workload</strong>. They tend to generate a high number of false positives, which means teams must create tailored detection rules and playbooks to filter and respond effectively. On average, we estimate that one <strong>full-time SOC analyst</strong> is required to manage the alerts generated by<strong> 50 probes</strong>.</p>
<p>In the end, OT probes may be popular, but <strong>deployment and tuning costs and resources limit their full utilization</strong>. Our recommendation is to prioritize deploying OT probes for critical sites or within key network segments that demand advanced industrial and network monitoring capabilities. Deployment should also be aligned with the organization’s capacity to <strong>manage the associated tuning and operational workload</strong>. This approach helps maximize <strong>return on investment</strong> while ensuring effective detection where it matters most for our clients.</p>
<h3>Consider other solutions?</h3>
<p>Regarding detection for industrial perimeter, while this article focuses on key detection sources like EDR and OT network probes, it is important to acknowledge that other solutions such as deceptive technologies (e.g., honeypots or decoys) <strong>can also play a valuable role</strong> and be relevant in specific scenarios or environment according to your industrial sites architecture or <strong>feared compromission scenarios</strong>.</p>
<h1>Conclusion</h1>
<p>To conclude, here are the key recommendations to build an effective detection tooling strategy to monitor industrial environments       :</p>
<ol>
<li><strong>Leverage existing tools for immediate impact:</strong></li>
</ol>
<p>Begin by maximizing the value of <strong>detection sources already available</strong> in your industrial environment: firewall logs, active directory, remote access logs&#8230; and <strong>EDR</strong>, that can be quickly implemented on <strong>OT servers and workstations</strong>, offering high visibility with minimal effort. Adapting <strong>proven IT detection logic</strong> to OT use cases enables organizations to rapidly establish a baseline level of visibility without the need for heavy investments or complex integrations. This pragmatic approach ensures faster deployment and broader coverage of your OT assets.</p>
<ol start="2">
<li><strong>Deploy advanced solutions where </strong><strong>you can manage the workload</strong></li>
</ol>
<p>When extending your detection capabilities, prioritize the deployment of advanced tools like OT network probes where they provide the most value. For <strong>network probes</strong>, focus on critical sites or segments, and carefully select <strong>listening points</strong> to balance visibility, cost, and operational overhead. This targeted deployment approach ensures resources are used efficiently and strategically.</p>
<ol start="3">
<li><strong>Prioritize quality and relevance over quantity</strong></li>
</ol>
<p>Building an effective OT detection strategy does not require monitoring every possible data source. Instead, focus on sources that are both relevant to your environment and technically feasible to collect without disrupting operations. This approach allows reducing log storage and management costs and enable the creation of more relevant, high quality detection rules.</p>
<p>Do not hesitate to reach out to discuss how you can <strong>build and improve your detection strategy</strong> to <strong>monitor your industrial assets</strong>!</p>
<p>In our next article, we will look at how to evaluate detection in industrial environments using <strong>purple team exercises</strong>, a practical way to assess and improve your detection capabilities.</p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/10/cybersecurity-tooling-strategy-for-an-effective-industrial-detection/">Cybersecurity tooling strategy for an effective industrial detection</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/10/cybersecurity-tooling-strategy-for-an-effective-industrial-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity monitoring for OT &#8211; Current situation &#038; perspectives</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/cybersecurity-monitoring-for-ot-current-situation-perspectives/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/cybersecurity-monitoring-for-ot-current-situation-perspectives/#respond</comments>
		
		<dc:creator><![CDATA[Juliette BARBIER]]></dc:creator>
		<pubDate>Thu, 25 Sep 2025 11:20:39 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27774</guid>

					<description><![CDATA[<p>OT, lower exposure but higher vulnerability Operational Technology, while overall less impacted than IT, is not exempt from cyberthreats &#38; not immune to cyberattacks. Let’s take a closer look at a simplified view of the threat landscape for industrial environments:...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/cybersecurity-monitoring-for-ot-current-situation-perspectives/">Cybersecurity monitoring for OT &#8211; Current situation &amp; perspectives</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1>OT, lower exposure but higher vulnerability</h1>
<p>Operational Technology, while overall less impacted than IT, is not exempt from cyberthreats &amp; not immune to cyberattacks. Let’s take a closer look at a simplified view of the threat landscape for industrial environments:</p>
<ul>
<li><strong>Hacktivism</strong>: Increased geopolitical tensions in 2025 have led to low-level attacks by groups like CyberArmyofRussia_Reborn and CyberAv3ngers.</li>
<li><strong>Cyber Crime</strong> / <strong>Ransomware</strong>: There has been an 87% increase in ransomware attacks on industrial groups in 2025 according to Dragos in its annual report.</li>
<li><strong>Nation-State</strong>: Notable campaigns include Voltzite OT information theft and the IOControl campaign.</li>
</ul>
<p>This threat landscape was notably depicted by Chris Sistrunk, ICS/OT Technical Leader at Mandiant, Google Cloud Security, at Black Hat 2025:</p>
<p><img loading="lazy" decoding="async" class=" wp-image-27771 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN14.png" alt="" width="684" height="374" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN14.png 958w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN14-350x191.png 350w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN14-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN14-768x419.png 768w" sizes="auto, (max-width: 684px) 100vw, 684px" /></p>
<p>Given this increasing threat landscape targeting OT, continuous monitoring is essential. So, we know why industrial information systems need to be closely monitored, and we also know that our clients are actively working toward that goal. But one key question remains: <em><strong>how do we measure the effectiveness of detection?</strong></em> And how can we improve it?</p>
<h1>How to assess the effectiveness and improve detection on industrial perimeter?</h1>
<p>To answer that question, we developed a methodology aimed at evaluating detection capabilities within industrial SOCs.</p>
<p>The evaluation was built around the core activities of a SOC, structured into four pillars:</p>
<p><img loading="lazy" decoding="async" class=" wp-image-27719 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN1.png" alt="" width="794" height="395" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN1.png 1389w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN1-384x191.png 384w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN1-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN1-768x382.png 768w" sizes="auto, (max-width: 794px) 100vw, 794px" /></p>
<p>Using this framework, <strong>we assessed ~15 industrial clients</strong> to better understand their level of maturity. In this article, we’ll share the <strong>key trends and insights that emerged</strong>, focusing specifically on detection-related questions. Two follow-up articles will be published: one delving into the effectiveness of various detection strategies and solutions, and another explaining how to test detection capabilities in industrial environments with purple teaming and the custom modules developed for that purpose.</p>
<h2>Governance &amp; Strategy</h2>
<p>The first question we focused on was whether industrial sites monitoring is handled by a dedicated team using specialized tools — or if, on the contrary, it&#8217;s integrated into a broader, centralized SOC approach.</p>
<p>Responses are unanimous:</p>
<p><img loading="lazy" decoding="async" class="wp-image-27779 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN2-1.png" alt="" width="765" height="112" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN2-1.png 1153w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN2-1-437x64.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN2-1-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN2-1-768x113.png 768w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>These figures can be explained by several factors. One key reason is <strong>financial rationalization</strong>. Maintaining two separate teams with similar skill sets: managing alerts, configuring tools, duplicating capabilities… is costly. However, a unified SOC implies an<strong> extended scope to cover OT</strong>, but not the presence of OT-specific tools or expertise and in the end, OT detection capabilities.</p>
<p>Even if this approach does not guarantee effective detection and response across the OT scope, a unified SOC can manage OT incidents efficiently, under the right conditions:</p>
<h3>End-to-end monitoring</h3>
<p>If we look closely at the simplified threat landscape, cyberattacks might not be IT or OT-specific. Cybercrime such as ransomware, the dominant threat today, is not limited to IT or OT alone. It often spreads across both, making it essential for alerts to be followed from end-to-end.</p>
<p>In the end, unifying the detection teams &amp; tools make sense as <strong>attacks are not necessarily exclusively IT or OT. </strong></p>
<h3>Link with industrial sites</h3>
<p>Response time &amp; information sharing is crucial in cyber incidents. As most security teams are centralized in a unique location, there is a <strong>need for a link between central security teams and local industrial sites</strong> in cyber incident response process:</p>
<ul>
<li>This relay is familiar with industrial sites, their specific characteristics, operational context, and modes of functioning</li>
<li>They also maintain contact on-site to quickly gather the information required for triage, doubt resolution or investigation</li>
<li>In addition, in global organizations, having resources in the right time zones and ability to communicate in the local language is key, especially in the industrial world</li>
</ul>
<p>Referred to as Cyber-OT Referents, these relays play an <strong>active role in the incident resolution process</strong>, particularly during investigation and remediation:</p>
<p><img loading="lazy" decoding="async" class=" wp-image-27723 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN3.png" alt="" width="739" height="308" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN3.png 1441w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN3-437x182.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN3-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN3-768x320.png 768w" sizes="auto, (max-width: 739px) 100vw, 739px" /></p>
<p>In conclusion, even though <strong>unified SOC covering IT and OT</strong> are often driven by cost optimization, the model makes sense considering that many threats span both domains. Still, this must not be treated as a simple extension of the perimeter to cover, <strong>dedicated OT relays and expertise are essential</strong> to properly handle industrial-specific contexts.</p>
<h2>Tooling</h2>
<p>When it comes to tooling, we observed that 100% of our clients have detection tools deployed on the IT side. However, only one-third extend monitoring down to the lower layers of the industrial environment.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-27725 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN4.png" alt="" width="769" height="517" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN4.png 844w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN4-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN4-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN4-768x517.png 768w" sizes="auto, (max-width: 769px) 100vw, 769px" /></p>
<p style="text-align: center;"><em>Detection sources covering different levels of the Purdue model</em></p>
<p>We will focus on popular solutions to address detection in industrial environments: EDR and OT probes.</p>
<h3>2.2.1 EDR</h3>
<p>Few figures regarding EDR:</p>
<p><img loading="lazy" decoding="async" class=" wp-image-27727 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN5.png" alt="" width="393" height="95" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN5.png 982w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN5-437x105.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN5-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN5-768x185.png 768w" sizes="auto, (max-width: 393px) 100vw, 393px" /></p>
<p>Most of our clients have started deploying EDR in their industrial environments.</p>
<p>However, this does not mean that 100% of EDR-compatible OT machines are covered.</p>
<p>For environments that support it, extending EDR coverage allows to:</p>
<ul>
<li>Address low maturity: Start with tools that are easier to implement and require less maturity.</li>
<li>Broad coverage: Focus on quickly covering a wide range of systems, sites, and critical applications.</li>
<li>Leverage IT tools: Use IT-based solutions like EDR for effective detection without heavy infrastructure requirements.</li>
</ul>
<p>To do so, most organizations opt to use the same EDR solution for both IT and OT environments. It enables faster rollout thanks to a known and already-integrated tool. Depending on needs and available resources, a different solution may be selected to improve resilience and OT-compatibility.</p>
<p><img loading="lazy" decoding="async" class="wp-image-27729  aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN6-e1758784575390.png" alt="" width="741" height="231" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN6-e1758784575390.png 1005w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN6-e1758784575390-437x137.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN6-e1758784575390-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN6-e1758784575390-768x240.png 768w" sizes="auto, (max-width: 741px) 100vw, 741px" /></p>
<p>To conclude, with IT/OT convergence, <strong>deploying EDR Agents on OT Servers and Workstations</strong> is becoming increasingly relevant, and a <strong>quick win for OT detection</strong>, according to our clients’ feedback.</p>
<h3>OT Probes</h3>
<p>Few figures regarding probes:</p>
<p><img loading="lazy" decoding="async" class=" wp-image-27731 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN7.png" alt="" width="588" height="149" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN7.png 970w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN7-437x111.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN7-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN7-768x195.png 768w" sizes="auto, (max-width: 588px) 100vw, 588px" /></p>
<p>When it comes to probes, the gap between these two figures highlights the <strong>challenge of deploying probes at scale</strong> and effectively using them for detection in industrial networks.</p>
<p>Indeed, probes collect and correlate information through network traffic capture. To be effective, their deployment requires carefully selecting listening points based on the intended targets. Listening points need to be tailored to each site architecture, often limited by local team&#8217;s knowledge and lack of documentation.</p>
<p>Operating these probes also comes with challenges and requires a <strong>significant workload</strong>. They tend to generate a high number of false positives, which means teams must create tailored detection rules and playbooks to filter and respond effectively.</p>
<p>In the end, OT Probes may be popular, but <strong>deployment and tuning costs and resources limit their full utilization.</strong></p>
<h3>Start basic with OT detection tools</h3>
<p>In the end, for OT detection, we believe in starting basic by leveraging “IT” tools to ensure a first level of coverage across all sites, critical apps, and infrastructure:</p>
<ul>
<li><strong>Prioritize critical assets</strong>: Focus on key systems (MES, safety tools, network) essential for production, ensuring they are closely monitored before extending deployment to the lower levels of the Purdue model.</li>
<li><strong>Implement basic detection</strong>: Establish foundational detection across sites and infrastructure for early issue identification, before advancing to complex OT solutions.</li>
</ul>
<h2>Training &amp; Testing</h2>
<p>Detection does not rely on deploying tools alone; we will focus here on team&#8217;s ability to use them effectively.</p>
<h3>A need for more OT-specific knowledge</h3>
<p>Benchmark figures revealed a limited understanding and adaptation of both teams and processes to industrial environments:</p>
<p><img loading="lazy" decoding="async" class="wp-image-27733 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN8.png" alt="" width="612" height="145" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN8.png 928w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN8-437x104.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN8-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN8-768x182.png 768w" sizes="auto, (max-width: 612px) 100vw, 612px" /></p>
<p>To bridge the gap, teams need training tailored to industrial contexts, basic for all SOC analysts, and in-depth for OT specialists.</p>
<p><img loading="lazy" decoding="async" class="wp-image-27735 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN9.png" alt="" width="745" height="180" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN9.png 1009w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN9-437x106.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN9-71x17.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN9-768x186.png 768w" sizes="auto, (max-width: 745px) 100vw, 745px" /></p>
<p>In the same way, <strong>investigation and response processes must also be adapted</strong> to address the specific needs of industrial environments, where priorities such as availability differ from those in the IT world.</p>
<p><img loading="lazy" decoding="async" class="wp-image-27737 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN10.png" alt="" width="729" height="159" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN10.png 1003w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN10-437x95.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN10-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN10-768x168.png 768w" sizes="auto, (max-width: 729px) 100vw, 729px" /></p>
<h3>Test your detection!</h3>
<p>Finally, improving detection starts with evaluating it but today …</p>
<p><img loading="lazy" decoding="async" class=" wp-image-27810 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN11-1.png" alt="" width="436" height="105" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN11-1.png 498w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN11-1-437x105.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN11-1-71x17.png 71w" sizes="auto, (max-width: 436px) 100vw, 436px" /></p>
<p>Only a small minority test their real detection capabilities, but we believe that there is <strong>room for purple team exercise in OT</strong>. These collaborative exercises with the OT SOC, tailored to its maturity and goals, can <strong>test and enhance both detection tools and OT SOC processes.</strong></p>
<p><img loading="lazy" decoding="async" class=" wp-image-27741 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN12.png" alt="" width="745" height="496" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN12.png 1015w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN12-287x191.png 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN12-59x39.png 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN12-768x511.png 768w" sizes="auto, (max-width: 745px) 100vw, 745px" /></p>
<p>It can start simple: by selecting appropriate production environments and performing a few basic tests like inserting a USB key with a standard malware sample or attempting a couple of privilege escalation actions… we can evaluate whether the EDR deployed on a workstation connected to your SOC will trigger an investigation.</p>
<p>This exercise helps <strong>identify the blind spots and adjust tooling, process and playbooks</strong> accordingly.</p>
<h1>Conclusion: How to enhance the overall low maturity in detection for industrial systems?</h1>
<p>The benchmark’s first conclusion is clear: <strong>maturity levels are low</strong>, and this is a consistent answer across all collected responses. How to enhance this overall low maturity in detection for industrial systems?</p>
<p>Here are the<strong> key outcomes</strong> regarding the three topics covered in this article:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-27743 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN13.png" alt="" width="1545" height="595" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN13.png 1545w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN13-437x168.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN13-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN13-768x296.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/SOCOT1_EN13-1536x592.png 1536w" sizes="auto, (max-width: 1545px) 100vw, 1545px" /></p>
<p>Do not hesitate to reach out to discuss how you can <strong>strengthen your detection capabilities</strong> and <strong>measure your maturity against the market</strong>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/cybersecurity-monitoring-for-ot-current-situation-perspectives/">Cybersecurity monitoring for OT &#8211; Current situation &amp; perspectives</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/cybersecurity-monitoring-for-ot-current-situation-perspectives/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Detection probes for OT : The keys to a successful deployment</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/#respond</comments>
		
		<dc:creator><![CDATA[Juliette BARBIER]]></dc:creator>
		<pubDate>Wed, 16 Oct 2024 08:39:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24270</guid>

					<description><![CDATA[<p>Enterprise demand for detection probes has been rising in recent years, particularly in the industrial sector. This can be for many reasons: regulatory or contractual constraints, need for incident detection capabilities on the industrial network, desire for greater visibility on...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/">Detection probes for OT : The keys to a successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Enterprise demand for detection probes has been rising in recent years, particularly in the industrial sector. This can be for many reasons: regulatory or contractual constraints, need for incident detection capabilities on the industrial network, desire for greater visibility on industrial assets …  <br />So, let’s answer the question: <strong>Should you embark on the OT probes journey? And if so, how could you achieve a successful probes service roll-out?  </strong></p>
<h1>OT Probes: A tool for monitoring industrial networks </h1>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24238 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737.png" alt="" width="1309" height="248" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737.png 1309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-437x83.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-768x146.png 768w" sizes="auto, (max-width: 1309px) 100vw, 1309px" /></p>
<p style="text-align: center;"><i>Figure 1: Listening to the network to assess and detect</i> </p>
<p>A detection probe is a piece of equipment, virtual or physical, connected to the information system (IS) in order to map and monitor it. It consists of sensors distributed across the network to collect data. And typically, a central console to aggregate, correlate and analyse this data. Probes for industrial environments &#8211; which we will refer to simply as OT probes here &#8211; are characterized by their passive, non-invasive listening on the network, and their understanding of industrial protocols and behaviour. Many players are present on the market, you can find our market overview here: <a href="https://www.riskinsight-wavestone.com/en/2021/03/detection-probes-in-industrial-environments-our-vision-of-the-market/">https://www.riskinsight-wavestone.com/2021/03/les-sondes-de-detection-en-milieu-industriel-notre-vision-du-marche/</a>  </p>
<p>All their probe solutions work on the same principle: network traffic is collected using flow duplication (SPAN, ERSPAN …) or physical duplicator like taps, etc. Packets are inspected in real time to provide several types of data: flow inventory and mapping, asset and vulnerability management, and finally anomaly and incident detection. </p>
<p>This variety of possible use cases of these data and the types of users involved (operational and business team, cybersecurity team, etc.) is what makes OT probes so popular.  </p>
<p>However, procuring and deploying these solutions are costly. The organisation must have a clear understanding of their needs, a view of potential users and the exact added value required before embarking on such a project. </p>
<h1>Let’s take two very different examples </h1>
<p>Imagine two companies are considering deploying OT probes on their industrial sites.  </p>
<h2>1st Company: WavePetro </h2>
<p>WavePetro is a company with a large sensitive site, which has a good level of cybersecurity maturity, as well as a segmented architecture. The company wants to deploy OT probes to be compliant with regulations and to improve its detection capabilities. </p>
<p>Considering its architecture and detection requirements, numerous listening points will be needed on the site. WavePetro can rely on its local teams for expertise and site knowledge to support this complexity. </p>
<h2>2nd Company: RenewStone </h2>
<p>RenewStone has numerous scattered and unmanned small sites with different cybersecurity maturity levels. The sites are connected to central Group infrastructure. <br />The company wants to deploy OT probes to gain visibility on its sites using inventory and vulnerability management features.  </p>
<p>With this configuration, RenewStone needs to standardize a turnkey OT probe roll-out and run service with as little local complexity as possible.  </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24236 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004.png" alt="" width="1219" height="603" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004.png 1219w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004-386x191.png 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004-768x380.png 768w" sizes="auto, (max-width: 1219px) 100vw, 1219px" /></p>
<p style="text-align: center;"><i>Figure 2: 2 companies, 2 reasons to deploy OT probes, 2 implementation plans</i> </p>
<h1>What is required for a successful roll-out? </h1>
<p>Although these two companies have different drivers and maturities, they will go through the same 5 key stages, albeit with different approaches.  </p>
<h2>1.Perform a Proof of Concept </h2>
<p>Let’s start with the first step: the proof of concept. The objective for both companies is to test the feasibility and challenge the value this tool brings to the organisation. </p>
<p>While WavePetro have to validate feasibility on a reduced perimeter in the factory, RenewStone has to validate OT probe added value validation on few different sites. </p>
<p>The PoC is key in identifying what can be valuable for both companies. To get the most of it, it is important to: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1">Adapt vendors selection to your needs: The market is quite diversified between pure players, those specializing in industry or extending their IT solutions …  <br /><i>Do I want strong detection capabilities? Do I want a managed service? Do I want a unified solution for IT and OT?</i>  </li>
<li>Select the PoC scope: Identify a representative scope with resources to test on so that results can be reproduced at scale.  </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">Draft a target architecture before the PoC: This allows to test an architecture that will be representative of what would be deployed at scale, in order to validate the tests carried out. </li>
</ul>
<p>PoC is an essential step to ensure that the tool provides value to your company, but also to be able to convince businesses to deploy especially when not constrained by regulations. </p>
<h2>2.Build the associated operating model  </h2>
<p>Even from the early stages, before rollouts, it is important to remember that the end goal of the probes deployment will be to get value from its operation. To be able to do so, it is essential to: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">Define an operating model for handling alerts, managing the inventory and managing the probes themselves. While WavePetro can have an operating model heavily relying on local knowledge and expertise, RenewStone must build a central operation model to include group teams such as SOC, OT security, network, infrastructure and so on. </li>
<li>Decide whether to call on a third party or manage your probes in-house: Few vendors also propose managed service, so you would need to create your own model, which could also rely – wholly or partly &#8211; on externalization. </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">Create a RACI: Considering the different use cases and the number of players involved in using or maintaining probes, a RACI is key to ensuring that all stakeholders are involved. </li>
</ul>
<p>This stage must be addressed upstream to facilitate the next steps. </p>
<h2>3.Prepare the roll-out  </h2>
<p>Once the first step has demonstrated the added value of a probe and their operating model has been defined, let’s prepare for the roll-out. You need to define the final target: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">Where you will deploy: Especially if you have many diverse sites, like RenewStone, you need to be precise on, and prioritize, the scope: It will not be possible to deploy all sites at the same time. </li>
<li>When you will deploy: Work on budget estimates, even if not accurate, as soon as possible so that sites are able to plan a roll-out on the following year. Probes are an expensive solution, not only in terms of hardware and licensing, but also in terms of the resources required to deploy and operate them. </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">How you will deploy: In any case, you need to work on a standard architecture blueprint. But especially if you have many sites to deploy or very limited local resources, you should work on building a packaged service offer to deploy.  </li>
</ul>
<p>This preparation part is key to avoid wasting time with deployments and guarantee their success. </p>
<h2>4.Deploy ! </h2>
<p>Let&#8217;s start deploying… The motto is the same for both companies: Start small and grow.  <br />The difference lies in the scale:  </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">Gradually roll out across the site for WavePetro: It will take some time to be able to listen everywhere effectively. Focus on the expected data to prioritize where to place the probe at first and where to listen to the network. </li>
<li>Learn and improve from one roll-out to the next for RenewStone: Rollouts are centralized and more standardized, so teams will learn and improve from one roll-out to the next. There should be a first ring of roll-out that is comprised of representative sites to test and improve the deployment model on.  </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="11" data-aria-level="1">Include change management: in all cases, the deployment of a new tool must absolutely include awareness-raising and training if probes are to find their users. </li>
</ul>
<p>Deploying OT probes can be a long and tedious process, but do not get discouraged, because there is still one big step left! </p>
<h2>5.Fine-tune OT probe console </h2>
<p>A probe roll-out is not a “1-and-done” kind of project. This is a tool for continuous improvement and needs to learn to deliver value. You should therefore dedicate time to: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="12" data-aria-level="1">Fine-tune OT Probes dashboard: Take time to improve the detection model (whitelist some behaviors, prioritize sensitive assets …), the automatic asset inventory and mapping (enrich inventory, import data, tag VLANs …), and so on. This fine-tuning needs to be done by someone with site-specific knowledge.  </li>
<li>Integrate with other technologies: You can integrate OT probes consoles with your other solutions and tools such as the SIEM, firewalls or CMDBs to make the most of the data collected by the probes. </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="14" data-aria-level="1">Try adding features: once you have gained some maturity over the solution, you can go even further with the features available like performing active queries to enrich the inventory and go even further with the features available. </li>
</ul>
<p>Fine-tuning enables the solution to reduce the amount of data it retrieves, so that it can focus on security data and alerts that will bring value to your company and its security level. </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24234 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056.png" alt="" width="1279" height="652" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056.png 1279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056-375x191.png 375w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056-768x392.png 768w" sizes="auto, (max-width: 1279px) 100vw, 1279px" /></p>
<p style="text-align: center;"><i>Figure 3: Takeaways from 5 key steps towards an OT probes service</i> </p>
<h1>Conclusion </h1>
<p>These 2 examples have taught us a lot about OT probes, and the many challenges involved in deploying and using them. If tomorrow, I were facing a customer wondering what to do with this OT Probe project on his roadmap, I would pick out 3 main elements: </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24248 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216.png" alt="" width="1088" height="470" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216.png 1088w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216-437x189.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216-768x332.png 768w" sizes="auto, (max-width: 1088px) 100vw, 1088px" /></p>
<p style="text-align: center;"><i>Figure 4: The 3 keys to a successful probe project</i> </p>
<h2>Before deploying: Is it worth it ? </h2>
<p>Without clearly identified use cases and defined objectives, you may end up with probes providing unused or no real added value information. OT probes are expensive, both financially and in terms of time. You need to make sure they are worth it, and then gives you the means to fully exploit them. </p>
<p>To do this, take the time to evaluate the quality and value of the information provided by the OT probes with your different teams (cybersecurity, operations, business&#8230;). </p>
<h2>Start small and grow </h2>
<p>Don’t be afraid to start small and grow progressively, whether that is in the number of monitored sites, assets or use cases. </p>
<p>The long-term operation of OT probes is complex and builds over deployments. Take the time to take care of the solution adoption: if you want teams to use the solution, train them and demonstrate OT probes value! </p>
<h2>Rely on continuous improvement </h2>
<p>As for any robust cybersecurity process, continuous improvement should be at its core. Cyber threats are constantly evolving, from attacker techniques to OT exposure due to process digitalization. </p>
<p>In parallel OT Probes can provide a wide of capabilities from incident detection to cartography, vulnerability management and even more yet to be released by editors. </p>
<p>Focus first on capabilities that reduce your OT risks, progressively improving the services as it gains maturity! </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/">Detection probes for OT : The keys to a successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
