{"id":22294,"date":"2024-01-23T08:54:20","date_gmt":"2024-01-23T07:54:20","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=22294"},"modified":"2024-01-23T08:56:46","modified_gmt":"2024-01-23T07:56:46","slug":"it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/","title":{"rendered":"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?"},"content":{"rendered":"\n<p>During the Wavestone OT Cyber Day, Lo\u00efc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions for OT. Based on their experience with our customers, they presented an overview of the difficulties with cybersecurity in OT today, and then, presented a method to enable the industrialization of IT services for OT. The stated goal is to set up a <em>Solution Factory<\/em> to be able to develop a catalogue of ready-to-use cybersecurity products adapted to the industrial world.<\/p>\n<p>\u00a0<\/p>\n<h1>The Current Perception of Cybersecurity in OT<\/h1>\n<p>In industrial environments, cybersecurity does not always have a positive image and is seen as a potential obstacle to business development. Cybersecurity teams are often criticised for defining rules but delegating their implementation without providing a solution or any help for the implementation of requested changes. For example, it is difficult to regularly change the passwords of dozens of generic industrial accounts, even though this rule is standard on a traditional IT perimeter. As a result, OT teams are often left alone to meet the criteria for security policy requirements.<\/p>\n<p>Left alone, industrial operational teams develop &#8220;homemade&#8221; solutions designed with their <strong>very local point of view<\/strong>, at the scale of their site. These solutions <strong>are beyond the group&#8217;s control<\/strong> and are very specific (dependence on a local supplier, in-house solution designed for the site&#8217;s specific network architecture, etc.), and <strong>scalability capabilities are not evaluated<\/strong>. All these solutions are developed by expert and passionate teams who can question security practices and standards, but who rarely have in mind any strategic vision, even at the local scale, making the integration of their solutions at the scale of a group of industrial sites nearly impossible.<\/p>\n<h3>Short-term solutions&#8230; or even dangerous<\/h3>\n<p>In the long run, these local solutions have many disadvantages:<\/p>\n<ul>\n<li>They are not up to production standards and <strong>remain in the POC phase<\/strong>.<\/li>\n<li>They are poorly documented, which makes <strong>maintenance difficult<\/strong>.<\/li>\n<li><strong>Scaling up <\/strong>to a group of industrial sites is <strong>nearly impossible<\/strong> in the long term.<\/li>\n<\/ul>\n<p>As shown below, some of the &#8220;homemade&#8221; solutions encountered have even proven to be dangerous:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-22296\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN1.png\" alt=\"\" width=\"649\" height=\"320\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN1.png 1291w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN1-387x191.png 387w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN1-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN1-768x379.png 768w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Real-life examples taken from the 2020-2023 industrial sites audits<\/em><\/p>\n<h3>Standardise cybersecurity integration in operations<\/h3>\n<p>Industrial companies stand out by their strong needs of availability and the substantial real-world implications of the operations. Consequently, investments in this sector must align with the magnitude of these challenges which require cybersecurity solutions of <strong>very large scale and complexity<\/strong>. <strong>IT, cybersecurity, and OT departments must cooperate <\/strong>throughout the development process to ensure that solutions are suitable for operations while meeting the group&#8217;s security standards. The goal is to <strong>industrialise the development<\/strong> of cybersecurity solutions for the OT perimeter, providing <strong>ready-to-use solutions ready to be deployed<\/strong> at scale.<\/p>\n<p>The solution is the development of a catalogue of cybersecurity services in which services are selected and developed <strong>at the group level, <\/strong>in <strong>collaboration with all the players<\/strong> (Cyber, operations, IT) and integrating <strong>the management of the entire life cycle <\/strong>of the solution (maintenance, documentation, decommissioning, etc.). Thus, the cybersecurity department and the IT department can create, with the industrial department, a product management roadmap, with an industrialized process for the creation of solutions.<\/p>\n<p>\u00a0<\/p>\n<h1>Designing an OT Cybersecurity Solution<\/h1>\n<p>The process of creating a solution must address several issues:<\/p>\n<ul>\n<li><strong>Collect the needs<\/strong> of all stakeholders.<\/li>\n<li><strong>Transcribing needs<\/strong><\/li>\n<li><strong>Ensuring Large-Scale Adoption<\/strong> by all industrial sites.<\/li>\n<\/ul>\n<p>To ensure the efficiency of the process and the solutions, the development of the different solutions is necessarily long and can extend over a period of <strong>2 to 3 years<\/strong>. Wanting to go faster means exposing oneself to poor <strong>coverage of operational needs,<\/strong> which could lead to the <strong>development of uncontrolled local solutions<\/strong> or <strong>poorly controlled and incomplete deployment<\/strong>.<\/p>\n<h3>Providing security solutions: a 6-step process<\/h3>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-22298\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN2.png\" alt=\"\" width=\"650\" height=\"260\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN2.png 1377w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN2-437x175.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN2-71x28.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN2-768x307.png 768w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><br \/>\u00a0<em>Solution Factory Process<\/em><\/p>\n<h6>1.\u00a0\u00a0\u00a0\u00a0 Research &amp; Development<\/h6>\n<p>The goal of the R&amp;D phase is<strong> to find the best solution to meet all cybersecurity needs<\/strong>. Thus, in the event of an audit of the central office, compliance with security policies is guaranteed if the tool is used. During R&amp;D, a few points are crucial:<\/p>\n<ul>\n<li>Assemble a <strong>project team with representatives from IT, cybersecurity as well as the operations, <\/strong>to guarantee the usefulness and usability of the solution.<\/li>\n<li><strong>Define operational constraints at the right level<\/strong> (availability, resistance in a harsh environment, support, etc.) in order to control costs without compromising the usability of the product.<\/li>\n<li><strong>Plan maintenance, update and release processes <\/strong>as early as R&amp;D to avoid getting stuck with an imperfect or obsolete product.<\/li>\n<li><strong>Plan the budget and business model <\/strong>of the product. In particular, who has to pay and what are the operating and investment costs. This helps prevent the project from getting stuck at the deployment step due to budget issues.<\/li>\n<\/ul>\n<p>During the R&amp;D phase, it is also interesting to <strong>start from what already exists<\/strong>. This makes it possible to identify <strong>talents or solutions<\/strong> that could be <strong>adapted at scale and across an OT perimeter<\/strong>. There are two possible approaches to finding solutions:<\/p>\n<ul>\n<li>Find solutions that OT teams use locally and scale them up.<\/li>\n<li>Search for cybersecurity solutions from the IT for<em> IT catalogue <\/em>and adapt them to the industrial world.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-22300\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN3.png\" alt=\"\" width=\"649\" height=\"275\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN3.png 1531w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN3-437x185.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN3-71x30.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN3-768x326.png 768w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><br \/>Two methods to take into account the existing situation<\/em><\/p>\n<h6>2.\u00a0\u00a0\u00a0\u00a0 Prototype<\/h6>\n<p>It is essential <strong>to think about the user experience and to take care of the image of the<\/strong> product from the prototype. The prototype is first and foremost a <strong>showcase that should facilitate the adoption of the product<\/strong>, but which can also damage its image if it is not practical and functional. When presenting the prototype, it is important to <strong>frame the use cases<\/strong> covered, and to have a functional and <strong>simple product<\/strong>. The first image of the prototype is the one that the operational staff will remember.<\/p>\n<h6>3.\u00a0\u00a0\u00a0\u00a0 Minimum Viable Product<\/h6>\n<p>The MVP phase has two main challenges: <strong>to test the product<\/strong>, and <strong>to bring together promoters<\/strong>. Communication around the MVP must be neat, and everything must be done to avoid failures. When testing, you should not only test the solution itself, but also all the support functions and the integration with the rest of the production environment.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-22302\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN4.png\" alt=\"\" width=\"649\" height=\"194\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN4.png 1521w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN4-437x130.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN4-71x21.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN4-768x229.png 768w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/p>\n<p>Because the MVP can be a <em>Single Point of Failure<\/em> for production, it is also necessary to take into account <strong>the needs of high availability<\/strong> and set up <strong>bypass mechanisms<\/strong> in case of problems to reassure operational team and facilitate the integration. <strong>A MVP can severely damage<\/strong> a product&#8217;s reputation in the long run if it fails.<\/p>\n<h6>4.\u00a0\u00a0\u00a0\u00a0 Packaging<\/h6>\n<p>The packaging stage allows you to define all the prerequisites for the deployment of the product. It is necessary to define:<\/p>\n<ul>\n<li><strong>Processes throughout the life cycle<\/strong> such as the management of deployment requests, defining the obligation or not to deploy, maintenance processes, update processes considering operational needs, etc.<\/li>\n<li><strong>Define responsibilities<\/strong>, but considering that <strong>industrial sites must maintain a stronger independence<\/strong> than what is usually done on IT perimeters. There needs to be <strong>a clear definition of what is delegated<\/strong> to on-site managers in nominal mode and in the event of an emergency.<\/li>\n<li>The <strong>cost model, <\/strong>including long-term cost, <strong>must be clearly defined<\/strong> and compared to external solutions.<\/li>\n<li>Support should be considered as <strong>Support as a Service <\/strong><em>and all processes and tools should be set up and communicated.<\/em><\/li>\n<\/ul>\n<h6>5.\u00a0\u00a0\u00a0\u00a0 Preparing for maintenance<\/h6>\n<p>The last step before the actual deployment is the preparation for operational maintenance. For each product, a <strong><em>Solution Owner<\/em><\/strong> must be identified to manage <strong>the relationships between users, suppliers<\/strong> and \u2013 during the integration \u2013 the integrator. This person should be identified <strong>internally<\/strong> prior to deployment to ensure that maintenance is operational throughout <strong>the lifecycle <\/strong>without having to rely on an external.<\/p>\n<p>Prior to deployment, there are three things that need to be taken care of to prepare for the product lifecycle and promote its widespread adoption:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-22304\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN5.png\" alt=\"\" width=\"651\" height=\"207\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN5.png 1333w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN5-437x139.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN5-71x23.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/EN5-768x244.png 768w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/p>\n<h6>6.\u00a0\u00a0\u00a0\u00a0 Deployment<\/h6>\n<p>During the deployment of the product, <strong><em>early adopters<\/em> must be supported<\/strong> as much as possible to maximize the chances of adoption of the project by other sites. <strong>Financial<\/strong> <strong>incentives<\/strong>, such as discounts for early adopters, can also be put in place. <strong>Different scenarios of speed of adoption must be anticipated<\/strong> in order to be able to deploy quickly enough in case of great success, but without cost issues in case of adoption difficulties.<\/p>\n<p>\u00a0<\/p>\n<h1>Conclusion<\/h1>\n<p>In an industrial environment<strong>, cybersecurity<\/strong> is still seen as too <strong>restrictive<\/strong>, an obstacle to productivity, and too <strong>prescriptive<\/strong>. IT departments set up security policies but do not provide solutions to comply with them, which leads to the development of <strong>poorly controlled local solutions<\/strong>. To control these risks, one solution is the development of an <strong>IT solution catalogue for OT.<\/strong> The development of these solutions is a <strong>lengthy process <\/strong>that can take several years, especially when several projects are launched in parallel. To maximize the chances of success, the <strong>operational needs must be considered <\/strong>from the R&amp;D phase up until deployment. Integration with <strong>operational processes, support processes, <\/strong>and all <strong>budget<\/strong> issues must be considered. Finally, the final key to the success of the solution development process is <strong>communication<\/strong>. The image of the product must be carefully maintained and controlled to <strong>maximize adoption<\/strong> by industrial sites after the start of deployment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the Wavestone OT Cyber Day, Lo\u00efc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions for OT. Based on their experience with our customers,&#8230;<\/p>\n","protected":false},"author":1347,"featured_media":22266,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977,3274],"tags":[],"coauthors":[3141,3253,4338],"class_list":["post-22294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"During the Wavestone OT Cyber Day, Lo\u00efc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions for OT. Based on their experience with our customers,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-23T07:54:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-23T07:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1707\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lo\u00efc Lebain, Benoit Bouffard, Joris Gallene\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lo\u00efc Lebain, Benoit Bouffard, Joris Gallene\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/\"},\"author\":{\"name\":\"Lo\u00efc Lebain\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c\"},\"headline\":\"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?\",\"datePublished\":\"2024-01-23T07:54:20+00:00\",\"dateModified\":\"2024-01-23T07:56:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/\"},\"wordCount\":1541,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/\",\"name\":\"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg\",\"datePublished\":\"2024-01-23T07:54:20+00:00\",\"dateModified\":\"2024-01-23T07:56:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg\",\"width\":1707,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c\",\"name\":\"Lo\u00efc Lebain\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-lebain\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/","og_locale":"en_US","og_type":"article","og_title":"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses? - RiskInsight","og_description":"During the Wavestone OT Cyber Day, Lo\u00efc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions for OT. Based on their experience with our customers,...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/","og_site_name":"RiskInsight","article_published_time":"2024-01-23T07:54:20+00:00","article_modified_time":"2024-01-23T07:56:46+00:00","og_image":[{"width":1707,"height":2560,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Lo\u00efc Lebain, Benoit Bouffard, Joris Gallene","twitter_misc":{"Written by":"Lo\u00efc Lebain, Benoit Bouffard, Joris Gallene","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/"},"author":{"name":"Lo\u00efc Lebain","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c"},"headline":"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?","datePublished":"2024-01-23T07:54:20+00:00","dateModified":"2024-01-23T07:56:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/"},"wordCount":1541,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/","name":"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg","datePublished":"2024-01-23T07:54:20+00:00","dateModified":"2024-01-23T07:56:46+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/charlesdeluvio-AT5vuPoi8vc-unsplash-scaled.jpg","width":1707,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b74db063222565f0b973370928e4815c","name":"Lo\u00efc Lebain","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/loic-lebain\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1347"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=22294"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22294\/revisions"}],"predecessor-version":[{"id":22312,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22294\/revisions\/22312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/22266"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=22294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=22294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=22294"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=22294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}