Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

By Jennifer Halsey
technology-network-cyber-freepik.jpg
September 2, 2021

On May 7, 2021, Colonial Pipeline’s 5,500-mile east coast pipeline halted its mainline production when administrators detected advanced ransomware. This attack – the most disruptive cyberattack to U.S critical infrastructure to date – should serve as a wake-up call for organizations in critical infrastructure and advanced manufacturing. For those that haven’t implemented a standards-based approach to cybersecurity risk assessment and mitigation, now is the time. 


While many organizations follow best practices and a standards-based approach to securing the information technology (IT) systems within their organizations, an industrial system’s operational technology (OT) can often be overlooked, ultimately opening the door to vulnerabilities and potential attacks on infrastructure, product safety and more.


Fortunately, industry-leading industrial organizations have been working together to address this challenge. Through the formation of the ISA Global Cybersecurity Alliance under the International Society of Automation (ISA), 50 companies and organizations have come together to accelerate the expansion and use of the ISA/IEC 62443 industry standards. The series of standards was created to provide organizations with technical specifications and procedures that can be mutually understood and provide guidance on how businesses can best protect their organizations at the industrial layer. 


Five trends, in particular, are complicating industrial automation cybersecurity and driving the increased need for a standards-based approach.


1 - Industrial Internet of Things

Internet of Things (IoT) and Industrial Internet of Things (IIoT) advancements are at the heart of the connected enterprise and the future of manufacturing. However, more connections lead to more security concerns, increased threat landscapes and different risk profiles. These devices are designed to connect to cyber and physical worlds, meaning security breaches won’t be contained in cyberspace but can spill over into physical damage or malfunctions.


As a real-world example, a recent attack on a water plant in the U.S. almost resulted in tampering with the level of chemicals in the water supply or the shutdown of this critical infrastructure. Cases like this indicate just how much is at stake for asset owners, device manufacturers and communities at large when it comes to developing clear security standards and implementing them internationally through standards-setting organizations.


2 - OT/IT Convergence

Server performance and cloud computing power drive today’s productivity, but threat actors can now leverage IT-based techniques to target OT networks – and historically effective IT defenses don’t always work in operational environments. Regulatory efforts tend to focus primarily on IT/IoT devices and neglect to consider challenges posed by the IIoT ecosystem. This challenge is further complicated by the fact that IIoT devices are in industrial settings, which leads to implications for the potential safety and security consequences resulting from a technical vulnerability being exploited.


3 - Legacy Systems

Difficult to update and maintain, legacy systems typically prioritize availability and integrity over security and make supply chain integrity impossible because manufacturers no longer build spare parts. The differences between IoT and IIoT devices are plainly obvious with legacy systems, further complicating cybersecurity. The unique characteristics of IIoT technologies present significant technical and economic challenges to securing the IIoT ecosystem. For instance, IIoT devices have limited computational capabilities and are not designed to support effective security measures, like advanced encryption. Another technical challenge is managing end-point security and traffic analysis for a rapidly growing number of devices.


4 - Multi-Vendor Environments

Without widespread compliance to industry-adopted standards, integration with multiple vendors introduces risks and challenges to the security of many products. Beyond these technical challenges, there is also a set of economic challenges to securing an IIoT ecosystem. The IIoT supply chain is complex, making it difficult to secure. It’s also difficult to assign liability to various stakeholders for vulnerabilities introduced at different supply chain stages. Each vendor follows its own design principles, and many vendors are not aligned with security principles outlined by the ISA/IEC 62443 series of standards.


5 - Skill Gaps

The aging population of engineers and technical specialists – especially in North America – has increased industries’ reliance on contract workers, making consistent practices increasingly difficult to maintain without standardized competency assessments. This is more challenging because there are not enough workers with cybersecurity skills and IIoT experience to meet the demand for managing IIoT systems. In addition to the growing importance of standards-based practices for systems and facilities, our current environment is also illuminating the need for further training and workforce development.


To learn more about a standards-based approach and how to get started, download the free ISA/IEC 62443 Quick Start Guide at www.isa.org/cyberguide. 


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: critical infrastructure cyber security information security Internet of Things (IoT) risk management

Share This Story

Jennifer Halsey is the Director of Communications and Brand Engagement at the International Society of Automation, a non-profit professional association founded in 1945 to create a better world through automation.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing