Understanding Operational Technology Personnel's Mindsets and Their Effect on Cybersecurity Perceptions: A Qualitative Study With Operational Technology Cybersecurity Practitioners
Abstract
1 Introduction
2 Background and related work
2.1 Human-centred Cybersecurity
2.2 Background in OT
2.3 Institutional and Organisational OT Cybersecurity
3 Methodology
3.1 Population Sample and Recruitment
3.2 Interview Design and Data Collection
3.3 Data Analysis
3.4 Terminology Considerations
4 Results
4.1 Operational Needs and Values (Availability, Production, Safety)
“In the operational technology side, it's all about the availability. So it's just keeping everything up and running. What drives them is not changing anything, it's just having a stable service, you know? And if that means they don't patch anything, they don't upgrade anything for years, they're happy with it because it will just run and that's it. Stability and service is what they want.” P_78, Chief Information Security Officer, Energy sector
“I would say that there's a perception by the people that work on the plant that cyber security isn't a problem. Umm, because nothing's ever happened before. We used to hear that all the time on the safety side of things. So I was involved in investigating explosives’ accidents. People killed, massive damage all around and they say, ‘Well, it never happened before’. Well, it's gonna happen at some point.” P_36, Cybersecurity Training Professional, Various sectors
“We had the culture of everyone has the right to stop a job if they see or feel that it's unsafe, that there's something unsafe going on. If I am the control and instrumentation engineer and I see all the racks that I don't touch, but they're open, I have the right to question that. If I see someone who's putting their hand into those right, I have the right to go and stop them and ask for a permit to work. Like, do you have the right to be here? What are you doing? Who are you? That is part of the safety culture.” P_12, OT Cybersecurity Consultant, Various sectors
4.2 Operational Realities
“Maybe they're working one job and they're not qualified to do it, or experienced. Therefore, they're just about swimming. They're just about staying on top of their workload, and because cybersecurity hasn't ever organically been part of their role, it's in my opinion still fairly new, adding that onto their plate is just another thing for them to do.” P_20, OT Cybersecurity Consultant, Various sectors
“You just find, almost no matter where you look, the things that you would presume to be fixed in an IT environment, just are never done in an OT environment, and to a certain extent deliberately, right? The primary reason that a lot of those pieces of equipment were installed is that they react in real time, they're very fast. And therefore the overheads of additional layers of security and checks, they slow it down and you don't want that. And for a lot of them, for a long time the best measure of your automation equipment was how quickly does it respond. And so I think a lot of corners were cut for the sake of that. And unfortunately, like the hangover is now, we're in a pretty dire situation.” P_90, OT Cybersecurity Product & Services Provider, Various sectors
“Very recently I gave a presentation about cyber threats. At the end of the presentation, there was about 200 people in the room, I asked [them] to put their hands up if this was all a surprise to them. And about half the room put their hands [up]. From a very rough estimate, around about x% of engineering are completely unaware of the threats from hacktivists, from cyber criminals, and especially from APTs and their potential impact. This week, the NCSC and CISA put out a guidance around making sure that your systems are not connected directly to the Internet and default passwords. Well, it falls on deaf ears when it comes to the engineering world.” P_49, OT Cybersecurity Consultant, Various sectors
4.3 Occupational and Professional Development
“We have to increase people's knowledge through education and ongoing training. In engineering, I think universities are very guilty of not doing this. I'm actually trying to change the situation with academia [as] there's not enough training going on in engineering courses around OT security. Any controlled and instrumentation course, any engineering course should have cyber in it. We have to change people's understanding and we have to change their training and education.” P_49, OT Cybersecurity Consultant, Various sectors
4.4 Perceptions of IT and Cybersecurity
4.4.1 Technological Misperceptions
“We can say this is happening in other critical national, other CNI industries, but then they go, ‘Yes, but we are the railway, we are not a nuclear power plant’.” P_9, OT Cybersecurity Consultant, Rail Sector
“That operator's often the first line of defence, or the first person to understand a malfunction, misfunction or a misaction on their control system. So they may see that ‘Hey, my server is slowing down, or I can't do anything, or I've got a ransomware screen on my HMI. What do I do?’ And so I think what's really valuable for that is an operator to think now. ‘Ohh this could be security’. For a technician to think that ‘Ohh my control system. This may not be [a case of] I need to go out and swap out a bunch of cards. This could be a security, you know, [a] time adversarial attack’. So those people normally communicate again very well. But it's were they are stumped oftentimes, is thinking about, it's that paradigm mind shift of this may be security and what do I do about it now. And a lot of times [they'll] pull up their operational procedures which tell them how to start up and shutdown the unit. But it says nothing about security” P_1, OT Cybersecurity Consultant, Various sectors
4.4.2 Stereotyping of Practices
“[The] cultural clash between the IT and the engineering [is] you can't just turn up and start installing equipment. You can't just bring the system down for 10 minutes while we do this. And certainly, in certain critical national infrastructure, you are literally having to plan these things years in advance. So yeah, there is a big difference there. I [always] say engineers are generally conservative with a little c you know, things work. ‘Something's working. Don't touch it’. Yeah, whereas IT always got that. ‘Well, we can make this better. We can improve this. We can do this’.” P_64, OT Cybersecurity Consultant, Various sectors
“Culturally, from an engineering background, I'm working on this assumption that everything in IT is really straightforward and most IT people have no idea what they're doing. Why do I have that impression? So when I used to work in the plant, that SCADA system we talked about where my Windows NT box is on and it had a bunch of routers and a bunch of connectivity out. Our cabinets were like engineering cabinets, right? All of the cables were like nicely dressed in and labelled and all that stuff, right? It was neat. It was tidy and it was clearly done by engineers. Just across the way, there's an IT cabinet. You can't close the door in the cabinet because it's just so much cable like pouring and there's not a label on it anywhere. Nobody actually knows what anything is. There's no drawings, there's nothing. Because IT people are complete amateurs, says the engineer.” P_15, Senior Automation Manager, Oil & Gas sector
4.5 Security Practitioners’ efforts
“To paraphrase X, ‘We've got two ears and one mouth, and you should probably use them in that ratio’. You got to listen to what people are telling you, because I understand the processes to a degree, but each platform in the oil and gas space will operate in a slightly different way. So you got to listen to what they're telling you, and then work out what the business needs” P_66, OT Cybersecurity Consultant, Various sectors
5 Discussion
5.1 Limitations and Avenues for Future Research
6 Conclusion
Acknowledgments
A Appendices
A.1 Participant Information
Role | Total Number of Participants with the Role | Sector, (specialism, if applicable), number of participants |
---|---|---|
Chief Information Security Officer (CISO) | 3 | Water-1 Energy-1 Transport-1 |
Security Awareness/Training/Culture Specialists | 7 | Water-1 Energy-2 Transport-1 Space-1 Various (External)-1 Oil & Gas (Security manager)-1 |
Others | 5 | Academia-1, Academia & Industry Coordinator-1 Government & Industry Coordinator-1 Student (former Integrator)-1 Security Researcher-1 |
Regulators | 5 | Energy-1 Transport-2 Water-1 Nuclear-1 |
Security Product & Service Vendors (e.g., Business Development, Sales, CTO, CEO,) | 9 | Various sectors (Business Development)-4 Various sectors(CEO, CTO)-3 Maritime (CEO)-1 Transport (Business Development)-1 |
OT Managers | 10 | Water (IoT)-1 Water-1 Water (Security)-1 Energy-3 Oil & Gas-1 Transport-1 Transport (Security)-2 |
OT Cybersecurity Consultants | 33 | Transport-3 Energy-2 Manufacturing-1 Automotive-1 Various sectors-26 |
Company Type | Number of companies and participants at each company | Total Number of Participants in Company Type |
---|---|---|
Original Equipment Manufacturers (OEM) | 3 companies with 1 participant each 1 company with 2 participants 1 company with 4 participants | 9 |
OT Cybersecurity Product and Services Companies | 5 companies with 1 participant each 3 companies with 2 participants 1 company with 3 participants | 14 |
Consultancies and Engineering Companies providing OT Cybersecurity | 9 companies with 1 participants each 4 companies with 2 participants 1 company with 4 participants | 21 |
Regulatory and governmental bodies | 6 organisations with 1 participant each | 6 |
Oil & Gas | 1 company with 1 participant 1 company with 2 participants | 3 |
Transport | 3 companies with 1 participant each 1 company with 2 participants | 5 |
Energy | 1 company with 1 participant 1 company with 5 participants | 6 |
Water | 3 companies with 1 participant each 1 company with 2 participants | 5 |
Universities | 3 universities with 1 participant each | 3 |
Total | 49 Companies | 72 participants |
Role | Examples |
---|---|
Operators | • Field operators (e.g., machine operators) • Control room operators |
Technicians/Maintenance | • Production Technicians • Controls & Automation Specialists • Process Controller etc. |
Engineers | • Process Engineer • Control and Instrumentation Engineer • Product Engineer • Project Engineer • Energy Engineer etc. |
Managerial Positions | • Project Supervisor • Plant manager • Senior Engineer etc. |
A.2 Interview Topic Guide
A.3 Code Examples
Footnote
References
Index Terms
- Understanding Operational Technology Personnel's Mindsets and Their Effect on Cybersecurity Perceptions: A Qualitative Study With Operational Technology Cybersecurity Practitioners
Recommendations
The Cyber Talent Gap and Cybersecurity Professionalizing
Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are ...
Women in Cybersecurity: A Study of Career Advancement
Although cybersecurity is considered a critical area of information technology, women continue to be underrepresented among its ranks. This study, which is the first of female cybersecurity professionals, examines the skills women need to succeed in the ...
Motivating Cybersecurity Advocates: Implications for Recruitment and Retention
SIGMIS-CPR '19: Proceedings of the 2019 on Computers and People Research ConferenceGiven modern society's dependence on technological infrastructure vulnerable to cyber-attacks, the need to expedite cybersecurity adoption is paramount. Cybersecurity advocates are a subset of security professionals who promote, educate about, and ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/6af5e6cb-82b3-4fd7-a1eb-354eaba29906/3688459.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- EPSRC Centre for Doctoral Training in Cybersecurity
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 365Total Downloads
- Downloads (Last 12 months)365
- Downloads (Last 6 weeks)184
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in