top of page

Urgent Call to Action: Strengthening OT Cybersecurity in the Philippines



A recent report titled "A Comprehensive Guide to Trends, Risks, and Cyber Resilience" has revealed a troubling reality for industrial organizations in the Philippines: over 70 percent experienced cyberattacks on their operational technology (OT) environments in the past year. The frequency and severity of these attacks are alarming, with nearly half of the respondents facing such threats monthly or even weekly. These incidents have not only disrupted operations but have also led to operational shutdowns in 23.1 percent of organizations, resulting in lost revenue and significant remediation costs (Source: Deriq Bernard, August 7, 2024).


Despite the rising recognition of the importance of OT security, the report highlights a significant disconnect between OT and IT teams. More than half of the respondents described their relationship as siloed or frictional, with only 17.6 percent indicating alignment. This lack of coordination is further exacerbated by the fact that only 37.3 percent reported shared responsibility for OT cybersecurity purchase decisions between the two teams. This misalignment is a critical barrier to effective cybersecurity measures.


Artificial intelligence (AI) also plays a dual role in OT security, as noted in the report. While 70.6 percent of respondents identified AI attacks as a critical issue, 80 percent believed that AI would be key to stopping such attacks. This paradox reflects the growing awareness of both the threats and opportunities AI presents in the industrial cybersecurity landscape.


Moreover, the move to cloud computing presents both opportunities and challenges for OT security. While 92.2 percent of organizations believe that cloud adoption will enhance security, 64.7 percent anticipate increased cybersecurity challenges in the next two years. This highlights the need for a strategic approach to integrating cloud technologies while addressing potential vulnerabilities.





The report emphasizes the necessity for proactive risk mitigation and system resilience. As industrial operations undergo digital transformation in the AI era, traditional security measures are inadequate against advanced cyber threats. AI-driven defenses must be adopted to quickly analyze large data sets and detect patterns of impending threats, often before an attack occurs. Further, close collaboration between IT and OT teams is essential to ensure a unified and effective approach to cybersecurity.


The report underscores the importance of adopting a Zero Trust approach to OT security, a strategy endorsed by over 80 percent of respondents. However, the implementation rates remain low, with only slightly more than 20 percent having fully implemented Zero Trust solutions. This gap between recognition and action highlights the urgent need for industrial organizations in the Philippines to prioritize OT security.


In this context, Directpath Global Technologies (DGT) stands ready to support organizations in their cybersecurity efforts. As a Managed Security Service Provider (MSSP), DGT offers a comprehensive suite of services including Mobile Threat Defense (MTD), Extended Detection and Response (XDR), Vulnerability Assessment and Penetration Testing (VAPT), System Organization Controls Type 2 (SOC2), Vulnerability Risk Management as a Service (VRMaaS), Web Application Firewall (WAF), and Virtual Chief Information Security Officer (vCISO) services. DGT's advanced Artificial Intelligence Division is particularly adept at tailoring services to meet the unique needs of various organizations, addressing not only cybersecurity but many other operational aspects.


The findings from the report highlight the critical need for industrial organizations in the Philippines to prioritize OT security, foster collaboration between IT and OT teams, and embrace advanced technologies like AI and Zero Trust to mitigate the growing risk of cyberattacks. By partnering with experts like DGT, organizations can enhance their resilience against these evolving threats and secure their operations for the future. Source: Business Insight

3 views0 comments

Comments


bottom of page