Fortinet, and the invisible tech that powers our lives

--:--
In this episode of TechCentral’s TCS+, Fortinet’s Matthew Taljaard, subject matter expert in operational technology (OT) for Africa at Fortinet, demystifies OT, explaining what it is, how it differs from IT, the industries it powers, and much more.
Watch or listen to the interview below.
The distinction between OT and IT is often blurry, leading to confusion. OT is the unsung hero of many industries and plays a crucial role in enhancing efficiency, safety and reliability. So, what is OT, and how does it differ from IT?
OT encompasses the hardware and software systems responsible for monitoring and controlling physical processes and industrial operations. In essence, OT manages the “things” in the internet of things (IoT). Conversely, IT focuses on processing, storing and transmitting data, predominantly utilising computers, networks and software for decision-making and business processes.
While both IT and OT share similarities such as network connectivity and data exchange, their objectives and priorities diverge. IT prioritises data integrity, confidentiality and availability, while OT emphasises reliability, availability and safety of industrial processes.
The primary goals of OT include:
• Improving operational efficiency through automation, real-time adjustments and equipment health monitoring.
• Enhancing safety by controlling processes to prevent accidents and respond to emergencies.
• Increasing reliability with systems designed for harsh industrial environments.
• Enabling predictive maintenance using sensors and data analytics to anticipate equipment failures.
• Ensuring product or service quality by controlling production parameters to meet predefined standards.
OT drives various industries, including manufacturing, energy, utilities, transportation and healthcare, ensuring efficient and safe operations. For instance, in manufacturing, OT automates production lines to optimise productivity and quality, while in healthcare, it oversees medical equipment and ensures the reliability of medical procedures.
The OT field offers diverse job roles, each requiring specialised skills. OT engineers design, implement and maintain control systems and automation solutions. OT technicians troubleshoot and maintain systems. Cybersecurity specialists protect critical infrastructure from cyber threats. Data analysts gather and analyse data for efficiency and predictive maintenance. Control systems architects design the overall architecture of OT systems to meet specific industrial requirements, offering exciting opportunities for those with the right skills and passion for innovation.
The convergence of IT and OT brings about numerous benefits but also introduces new challenges, particularly in cybersecurity. A report found that 75% of OT organisations experienced at least one intrusion in the last year. A successful cyberattack on OT can result in production disruptions, safety hazards, environmental damage and economic losses. Therefore, ensuring the security of OT systems is crucial not only for business operations but also for public safety and national interests.
Robust cybersecurity measures include network segmentation, regular updates, access controls, monitoring, employee training and incident response plans. Here are some practical tips for OT security:
• Implement asset inventory and segmentation and employ micro segmentation and virtual patching solutions.
• Collaborate across IT, OT and production teams to assess cyber and production risks and inform the chief information security officer.
• Develop a vendor and OT cybersecurity platform strategy, considering a wide portfolio of solutions.
• Incorporate cybersecurity awareness education and training for all computer and mobile device users.
For more, visit https://techcentral.co.za/.
30 Oct 2023 English South Africa Technology · Business

Other recent episodes

Zahir Cajee on Samsung’s new Galaxy Z Fold7, Flip7 and Watch8 line-up

Folding phones are advancing at light speed. For consumers, the appeal is self-evident: on one hand, folding phones give them the option to have a larger, tablet-like interface that offers enhanced productivity and a better user experience. On the other hand, the fit-in-your-pocket design when folded maintains easy portability. Samsung…
31 Jul 18 min

Lessons from South Africa’s biggest cyberattacks

IT security breaches are on the rise in South Africa and worldwide, and with AI tools at their disposal, criminals are scaling up their attacks. With the risk of attack so high, organisations are forced to look beyond beefing up security – they must prepare for the unfortunate event where…
25 Jul 15 min

First Distribution’s guide to a bulletproof cyber crisis response strategy

In cybersecurity, prevention is always better than cure. However, organisations have to prepare for the worst-case scenario, one where their systems are breached by cybercriminals. This is the second in a series of three podcasts on how to manage cyber crises effectively when they happen. The first episode – watch…
24 Jul 11 min

How cyberthreats turn into cyber crises

In today's hyperconnected society, a cybersecurity crisis isn’t just a technical glitch; it's a profound disruption that can bring businesses, governments and even entire countries to a halt. For organisations to protect themselves effectively, they must understand what cybercriminals are capable of, where the vulnerabilities in their own systems are…
23 Jul 13 min

Vox’s Craig Blignaut on the data boom and the future of Wi-Fi

Data is like oxygen in the digital era, and people are using more of it. In 2025 alone, global mobile data usage is projected to reach 200 exabytes per month. That is 200 billion gigabytes of data consumed monthly by everything from high-definition video streaming to online gaming and IoT…
22 Jul 14 min