CyPhy Part 3 – Breaking down CISO and CSO silos to reach Security Convergence.

By David Strickland, Vice President of Kenton Brothers

CyPhy Part 3The third of a three part series covering the Cybersecurity and Infrastructure Security Administrations (CISA) newest announcements around Security Convergence. Kenton Brothers Systems For Security hopes to help organizations understand this concept and adopt best practices for securing the Cyber-Physical Systems (CPS) currently deployed.

In part two, we discussed the size of the problem we have worldwide with the advent of 46 Billion IOT and IIOT devices. In this blog, we will concentrate on breaking down the CISO and CSO silos and the specific steps an organization can take to reach Security Convergence.

Breaking down the Walls 

In a Siloed Organization…

Convergence of Cyber and Physical SecuritySecurity functions operate independently with limited collaboration on enterprise-wide risks. Senior leaders and teams lack the visibility of interconnected physical and cyber assets. Lines of communication are unclear and impede coordination and collaboration. Organizations are unable to quickly identify, prevent and respond to complex threats.

The Solution:  

Organizations with converged cybersecurity and physical security functions are more resilient and better prepared to identify, prevent, mitigate, and respond to threats. Convergence also encourages information sharing and the development of unified security policies across security divisions. To accomplish a converged effort, you must first break down the walls that hold each siloed department back.

Cybersecurity and Physical Security Convergence

How does an organization do that? Through Communication, Coordination and Collaboration.

Cybersecurity and Physical Security Convergence

Communication, Coordination and Collaboration

COMMUNICATION

  1. Initiate a Dialogue
    1. Enable Communication with security leaders. Engage with upper management to discuss what convergence might look like. Successful convergence relies on support from leadership
  2. Review Leadership Roles
    1. Identify the leaders of this movement
  3. Establish a Convergence Team
    1. Convergence Team – Identify key players such as CSO or  CISO, Physical Security personnel, IT personnel and facility managers
  4. Enable Information Sharing
    1. Engage with team members across all security functions to identify points of convergence

COORDINATON

  1. Formalize Convergence team roles and responsibilities
    1. Establish a cadence and structure for team coordination
  2. Identify Linked Assets
    1. Coordinate with team members across security functions to assess cyber and physical assets and which ones are linked. Assess the risk of each
  3. Conduct a Vulnerability Assessment
    1. Identify gaps in security and risk mitigation and determine where gaps may be closed through convergence
  4. Determine the Baseline
    1. Leverage the information gained in your assessments and gap analysis to determine your baseline for security operations and incident mitigation

COLLABORATION

  1. Run the Numbers
    1. Determine if convergence on any scale is financially feasible from short-term and long-term perspective
  2. Prioritize Improvements
    1. Identify and prioritize improvements, including patches, software updates, virus protections, certificate management, and opportunities for automation – There are some powerful options here
  3. Craft Risk Driven policies
    1. Develop and implement risk driven policies with broad reach that reflect converged security functions. Identify best practices. There are some powerful options here as well
  4. Strategic Alignment
    1. Align strategy to shared practices and goals. Focus on improving efficiency and increased information sharing

An integrated threat management strategy reflects in-depth understanding of the cascading impacts to interconnected cyber-physical infrastructure. As rapidly evolving technology increasingly links physical and cyber assets—spanning sectors from energy and transportation to agriculture and healthcare—the benefits of converged security functions outweigh the challenges of organizational change efforts and enable a flexible, sustainable strategy anchored by shared security practices and goals.

Kenton Brothers Systems for Security is ready to help your organization take on this task. We can help facilitate conversations or simply conduct assessments that can help springboard the effort. Give us a call today.

Resources

There are many resources available to get this conversation started. One of our favorites is the table top exercise templates provided by CISA. You can find them at www.CISA.gov. The table top exercise gives you real world scenarios and asks you to use it in your planning. These are a really comprehensive tool that will have immediate impact on your discussions.

Cybersecurity and Physical Security Convergence Cybersecurity and Physical Security Convergence

This is one of the best articles I’ve read on the subject (outside our blogs)
Convergence questions answered – Control Engineering Europe

Again, thank you for joining us on this three-part series. We are standing by to help in any way.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply