Jay Abdallah is a cybersecurity professional with 18 years enterprise-class experience. He joined Schneider Electric in 2010, after a three-year tenure as a senior Symantec security consultant. Throughout his career, he has designed and implemented some of corporate America’s largest and most sophisticated endpoint security systems. Jay is a fluent Arabic speaker, was educated in the US, and holds a multitude of industry certifications including CISSP, CISM, CISA, ISO27001 Lead Auditor, and ISA99 Cybersecurity Specialist.
Modernization of operational infrastructure and online activation of more IP devices is rapidly expanding the attack surface and increasing the complexity of managing OT systems. As malicious threats now pose a much greater risk to operational uptime/availability and IP-enabled OT systems expose business-critical IP data, leaders are under pressure to ensure OT systems are protected.
This is exacerbated by the fact that OT security seriously lags behind IT security. It is no wonder that 89% of firms with OT systems experienced a breach in those systems (and over half in the past year). The threat of malicious intrusions and attacks can have a much greater dramatic impact on operational availability and safety, with only a few downtime minutes adding up to hundreds of thousands or even millions of dollars in lost productivity and revenue, heightening safety concerns, and detrimentally impacting brand reputation.
Upgrading OT security is not easy, as planned downtime is required for testing, installation, and maintenance. But with increasing pace and sophistication of the threat landscape, traditional security approaches will not work. Industries in purview: manufacturing, oil & gas, transportation, and energy/utilities.