JUNE 2022CIOAPPLICATIONS.COM8CIO InsightsCXO InsightsIn My Viewur world continues to become more connected and electrified. In the next five years, analysts like IDC expect 41.6 billion connected devices will generate 79.4 zettabytes of data that will need to be maintained and processed. At the same time, our world is becoming more electrified with the digitalization of building and transportation systems steadily increasing. A single vulnerability or firmware weakness can cripple an organization. Even if you isolate your systems, they can still be compromised as recently spotlighted by TLStorm vulnerabilities, which can allow attackers to take control and destroy intelligent backup power devices. Here's the bottom line--our increasingly connected and electrified world needs trusted environments. Yet, a system is only as secure as its weakest link. Supporting secure connectivity is the most important first step in our industry's ongoing marathon to harness the full potential of the IIoT. With 95 percent of CIOs expecting cybersecurity threats to increase and impact their organizations, the need for partnerships across industries and communities to innovate and build safer and more secure technologies is essential.Device manufacturers have a critical responsibility to ensure all product development follows a proactive and consistent enterprise-wide approach to cybersecurity. Only by adopting a secure by design methodology can we provide customers with confidence that their connected solutions meet rigorous standards to operate securely worldwide. To achieve this, cybersecurity risks should be managed through a Secure Development Lifecycle with protocols in place for threat modeling, requirements analysis, implementation, verification, and ongoing maintenance to manage risk.Additionally, companies should take inventory of everything connected to their networks and employ a zero-trust model.The bottom line is that cybersecurity is a must-have for product development, much like safety and quality. This means strict procedures and cybersecurity protocols need to be integrated at every phase of product development that involve people, processes and technologies.Cybersecurity must also be integrated into organizational maintenance strategies. As electrical systems and industrial control equipment become more connected, a robust cybersecurity program requires coordination between operational technology (OT) and information technology (IT) teams. OMICHAEL REGELSKI, SENIOR VICE PRESIDENT, R&D-INTELLIGENT POWER MANAGEMENT SOLUTIONS, AND CHIEF TECHNOLOGY OFFICER FOR EATON'S ELECTRICAL BUSINESSINDUSTRY COLLABORATION IS ESSENTIAL TO SECURE OUR INCREASINGLY CONNECTED WORLD Michael Regelski
< Page 7 | Page 9 >