“ By getting a company such as Siemens Energy involved , we ’ re combining our leading OT security solutions with their domain expertise and operational know-how to maximise the customer experience ”
— Richard Bussiere , Technical Director , Tenable , APAC
plant activity , and billions of other data points to rapidly and accurately understand if it ’ s a true potential threat or mere benign anomaly .
“ MDR becomes part of a security ecosystem , where we have our intelligence , our algorithms , an AI engine behind it that captures all these assets we want to look at , this logic we want to apply , how to make sense of these different methods that we ’ ve prebuilt ,” Martinot says . “ There ’ s a team that triages that and picks it up and walks the client through the process of remediation that makes sense in the OT environment .”
The triage team is crucial . Plenty of companies offer ostensible cybersecurity “ solutions ”, but have never applied them to critical energy assets , let alone the intersection of OT and IT . MDR , the team that built it , and the experts who manage it are different .
“ We see a lot of the IT players trying to go into this space , and it ’ s a common mistake : We have incidents in the region where IT players go in and cause accidents in the plants , causing significant amounts of damage . These are not cyberthreats , these are IT companies trying to fix things and doing more damage ,” Martinot says . “ We have a very deep understanding of the process : How the plants function , what the risks can be , even making virtual copies of the plants , understanding the impacts and assessing which are threats and which are not threats .”
Bussiere points out that one of the biggest differences between IT and OT environments is their pedigree and approach . “ In general , IT people are used to working with the latest and greatest hardware and software . Meanwhile , OT staff are used to working with legacy technologies , many of
21 energydigital . com