



















Improving the cybersecurity of automation systems remains a topic of considerable interest for suppliers, end users, government agencies, and other stakeholders. Just as with areas such as safety and quality, lasting improvement requires a continuous improvement approach that addresses all aspects of the opportunity. Single projects are seldom effective, and any gains achieved can be difficult to sustain. Maturity assessment has become an essential element of cybersecurity programs but there are several such models available, and it can be a challenge to determine the best alternative. Moreover, maturity models can be quite complex and difficult to implement.
This Insight describes how maturity assessments can be used in conjunction with other methods to address cybersecurity risks that are present at all stages of the solution lifecycle.
Improving the cybersecurity of automation systems has been an area of focus for almost two decades. Awareness of the seriousness of the challenge continues to increase, due in large part to efforts on the part of industry associations, standards bodies, and suppliers to share information about potential threats, current vulnerabilities, and examples of negative consequences. This has also led to an increased understanding of the size and scope of the problem. Virtually all industry sectors that employ these systems face varying degrees of risk in this area.
Although much has been done to address this imperative, challenges remain. Products and supporting technologies have been improved, but the capabilities of legacy products and systems are still inadequate. New systems must be designed and configured with security as an important consideration, and asset owners must take the steps necessary to secure their current systems.
Although essential, awareness and understanding of the potential risks are not sufficient. End user companies operate in an environment that includes all manner of risks, and it is always a challenge to convince decision-makers to approve the investments necessary to address specific examples. Just as with any investment, there must be some sort of return. It is common to justify cybersecurity-related efforts by focusing on the possible consequences of inadequate security, such as loss of production, loss of intellectual property, damage to physical processes and equipment, and loss of company reputation.
If we accept the premise that there has not been sufficient progress in addressing the cybersecurity imperative, it leads to the obvious question of what is limiting progress. Many of the causes are long-standing and well known.
Given the inherent size and complexity of the problem and the impediments listed above, it is impossible to make substantial improvements to automation systems’ security by applying single measures. The required response must be seen as more of a process than a project with a defined beginning and a defined end. A continuous improvement program can be an effective approach for defining and delivering the changes needed to address cybersecurity risks.
ARC Advisory Group clients can view the complete report at ARC Client Portal
If you would like to buy this report or obtain information about how to become a client, please Contact Us
Keywords: Cybersecurity, Lifecycle, Maturity, Metrics, Performance, Risk Management, ARC Advisory Group.