Title: Risks Increase as Legacy Systems Incorporate New Technologies and Connected Devices
The convergence of legacy systems with new technologies and the addition of connected devices presents a growing risk for companies across various industries. This integration brings about changes in processes, requiring IT and operational technology (OT) teams to adapt and create new security strategies. Consequently, these changes give rise to new challenges and vulnerabilities that need to be addressed effectively.
During a panel discussion at the recent RCR Wireless News’ Industrial 5G Forum, industry experts shared their insights on reducing operational complexity, integrating a diverse range of technologies, and ensuring the seamless integration of 5G with robust security systems.
Pamela Gupta, CEO of Trusted AI, highlighted one of the main challenges related to the convergence of IT and OT teams: the shift away from the traditional security model. Gupta emphasized that implementing 5G disrupts the traditional model of segregating environments through security technologies like firewalls. Unlike previous systems, 5G directs traffic to routers rather than a centralized security system, presenting new security challenges that must be addressed.
Neils Konig, the head of department production metrology at Fraunhofer IPT and coordinator of 5G Industry Campus Europe, emphasized the challenge of bringing together different cultures, vocabularies, and paradigms prevalent in the mobile communication industry and the production industry. While communication between different teams is possible, Konig emphasized that differences in ecosystems and security architectures create additional hurdles.
A survey conducted specifically on the cybersecurity implications of 5G in production reveals that the majority of companies recognize the potential benefits of 5G in their industry. However, 75% of these companies also acknowledge the need for special security measures to protect their 5G systems.
Vijayakumar Kempuraj, digital twin lead at Ford, draws attention to the risks associated with integrating legacy systems. These older OT systems may lack support for modern security measures, leaving them vulnerable to potential threats. Moreover, a lack of expertise in IT and security, as well as difficulties in bridging the gap between these two domains, contribute to the overall challenges faced by companies.
When considering the risks for manufacturers planning to adopt 5G, Konig cautions that different security levels exist between public and private networks. Private on-premise 5G networks offer the highest security level, while public networks maintain a lower security threshold. Nevertheless, public networks should not be dismissed as unsecured, as measures are in place to ensure their reliability.
In summary, the incorporation of new technologies and connected devices into legacy systems introduces complex challenges and security vulnerabilities for companies across various industries. Adjustments in security configurations, bridging gaps between IT and OT teams, addressing legacy systems’ limitations, and acquiring the necessary expertise are critical steps in safeguarding businesses against potential threats. Companies must also be aware of the distinct security levels between public and private 5G networks and implement appropriate measures accordingly.
As industries continue to navigate this evolving landscape, effective risk management and robust security measures will be crucial in safeguarding critical systems, protecting sensitive data, and ensuring uninterrupted operations.
Sources:
– RCR Wireless News: [insert link here]
– Fraunhofer IPT: [insert link here]