Intelligent CIO APAC Issue 17 | Page 84

FINAL WORD
Peerapong Jongvibool , Senior Director ,
Southeast Asia and Hong Kong , Fortinet
• Artificial Intelligence-driven security operations : Deploying technologies like Artificial Intelligence ( AI ) and Machine Learning ( ML ) coupled with automated processes can detect and neutralize threats at the speed of business .
Securing converged IT / OT environments
Moreover , securing the business edge requires an adaptive approach to cloud security that spans across on-premise , multi-cloud and hybrid infrastructures . As part of the plan , organizations can take a four-pillar approach to their adaptive cloud security strategy to yield continuous earned trust :
• Zero Trust : Using intent-based segmentation that interprets business and security requirements , then automatically converts them into a segmentation policy , can help isolate workflows and applications .
• Security-driven networking : Integrating network infrastructure with security architecture using an integrated security platform to enable access control and segmentation .
• Adaptive cloud security : Connecting resources to protect from multiple threat vectors while leveraging consistent models and integrating with third-party applications .
Like any infrastructure expansion , the benefits of moving OT to the cloud can outweigh the risks . However , organizations must concurrently implement a robust security strategy to mitigate these potential risks . This requires leveraging automation to improve processes , enhance analytic accuracy and reduce errors . To secure these IT / OT interconnected layers , organizations must view them as systems within systems and understand the complexity of the infrastructure it supports . Vigilance across the OT architecture must extend from the plant floor all the way up through to the cloud . Foundationally , visibility remains a primary problem to address as firms move toward a digitally transformed IT / OT environment .
These transformational challenges associated with migrating to the cloud can be addressed with the adoption of a platform built around a common operating system and management framework . By doing so , the system can continuously assess risks and automatically adjust to provide comprehensive real-time protection .
Having an integrated cybersecurity platform enables consistent security across the network , provides seamless interoperability and complete visibility , as well as granular control for hybrid deployments .
It enables organizations to build security by design with the broadest set of offerings to maintain the same level of security across their IT and OT network environments . The centralized management system enables OT businesses to configure , manage and monitor all components , to eliminate silos and provide greater visibility .
Moreover , an integrated security architecture minimizes threat detection and response times while also enabling automated incident response for enhanced threat remediation across the extended network .
All of these security solution components work together to ensure safe , sustained operations – a concept that is top of mind across OT and embodies the ICS infrastructure upon which they are built . By identifying and adopting services that provide sustained situational awareness , OT leaders can achieve a sense of omnipresence to protect the transactions of their new cloud businesses . p
84 INTELLIGENTCIO APAC www . intelligentcio . com