À§ÇùÀÌ È®´ëµÇ°í À§Çèµµ°¡ ³ô¾ÆÁö¸é¼ Áß¿ä ÀÚ»êÀ» º¸È£ÇÏ´Â °ÍÀÌ ±â¾÷ÀÇ ÃÖ¿ì¼± °úÁ¦°¡ µÇ°í ÀÖ½À´Ï´Ù.
»çÀ̹ö º¸¾È Àü·«Àº ÀüÅëÀûÀ¸·Î IT º¸¾È ¼Ö·ç¼Ç°ú µðÁöÅÐ ÀÚ»ê ¹× ½Ã½ºÅÛ º¸È£¿¡ ÁßÁ¡À» µÎ¾î ¿Ô½À´Ï´Ù. ±×·¯³ª »ê¾÷ °£ °æ°è°¡ Çã¹°¾îÁö°í µðÁöÅÐȰ¡ ÁøÇàµÇ¸é¼ ºñÁî´Ï½º ¿î¿µ¿¡ ÇʼöÀûÀÎ ¸¹Àº ÀÚ»ê, ÀåÄ¡ ¹× ½Ã½ºÅÛÀÌ µ¿ÀÏÇÑ µðÁöÅÐ »ýŰ迡 ¿¬°áµÇ°í ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ Ä¿³ØÆ¼µå ¿î¿µ ±â¼ú(OT) Áõ°¡´Â ÀÌ·¯ÇÑ ½Ã½ºÅÛµéÀÌ ±âÁ¸ IT ÀÚ»êó·³ ÀÛµ¿Çϰųª ¹ÝÀÀÇÏÁö ¾Ê´Â´Ù´Â »ç½Ç°ú ¸Â¹°·Á ÀϹÝÀûÀÎ IT »çÀ̹ö º¸¾È ¼Ö·ç¼Ç°ú Àü·«À¸·Î´Â OT ½Ã½ºÅÛÀ» °ø°ÝÀ¸·ÎºÎÅÍ º¸È£Çϱ⿡ ÃæºÐÇÏÁö ¾Ê´Ù´Â °ÍÀ» ÀǹÌÇÕ´Ï´Ù. °ø°ÝÀ¸·ÎºÎÅÍ OT ½Ã½ºÅÛÀ» º¸È£Çϱ⿡ ÃæºÐÇÏÁö ¾Ê´Ù´Â °ÍÀ» ÀǹÌÇÕ´Ï´Ù. ÀÌ·¯ÇÑ »ç½Ç°ú »çȸ ¶Ç´Â ±¹°¡ ¾Èº¸¿¡ Áß¿äÇÑ ÀÎÇÁ¶ó·Î °£ÁֵǴ ¸¹Àº ±â¾÷À̳ª Á¶Á÷ÀÌ ¹æ´ëÇÑ OT ³×Æ®¿öÅ©¿¡¼ ¿î¿µµÇ°í ÀÖ´Ù´Â Á¡À» °í·ÁÇϸé, ±â¾÷Àº OT »çÀ̹ö º¸¾È ÇÁ·ÎÅäÄÝÀ» ¸ðµç »çÀ̹ö º¸¾È Àü·«°ú ÇÁ·Î±×·¥¿¡¼ ÃÖ¿ì¼± ¼øÀ§·Î »ï¾Æ¾ß ÇÕ´Ï´Ù. ¹× ÇÁ·Î±×·¥¿¡ OT »çÀ̹ö º¸¾È ÇÁ·ÎÅäÄÝÀ» ÃÖ¿ì¼± °úÁ¦·Î »ï¾Æ¾ß ÇÕ´Ï´Ù.
OT »çÀ̹ö º¸¾È ¼Ö·ç¼ÇÀº OT »çÀ̹ö º¸¾È ½Ã½ºÅÛ°ú À¯»çÇÑ ¼öÁØÀÇ ¼º¼÷µµ¿¡ µµ´ÞÇϱâ À§ÇØ ºü¸£°Ô ÁøÈÇϰí ÀÖ½À´Ï´Ù. ¿©±â¿¡´Â ÀÚµ¿È ±â´ÉÀÇ Ãß°¡, Áö¼ÓÀûÀÎ ¸ð´ÏÅ͸µ, ÀÚ»ê °¡½Ã¼º ¹× ŽÁö, ¿£µåÆ÷ÀÎÆ® º¸¾È ¿øÄ¢, OT Àü¿ë ÀÎÅÚ¸®Àü½º ¹× ¼ºñ½ºÀÇ ÃâÇö µîÀÌ Æ÷ÇԵǸç, OT Áß½ÉÀÇ ³×Æ®¿öÅ©¿Í ÀÚ»êÀ» »ç¿ëÇÏ´Â ºñÁî´Ï½º¿Í Á¶Á÷Àº OT »çÀ̹ö º¸¾È ¼Ö·ç¼ÇÀÌ °¡´ÉÇÑ ÇÑ ¸¹Àº À§Çù º¤Å͸¦ º¸È£ÇÒ ¼ö ÀÖµµ·Ï ÇØ¾ß ÇÕ´Ï´Ù. »çÀ̹ö º¸¾È ¼Ö·ç¼ÇÀÌ °¡´ÉÇÑ ÇÑ ¸¹Àº À§Çù ¿ä¼Ò·ÎºÎÅÍ º¸È£ÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â °ÍÀÌ ¸Å¿ì Áß¿äÇÕ´Ï´Ù.
Áß¿äÇÑ ÀÎÇÁ¶ó Á¶Á÷Àº Á¶Á÷»Ó¸¸ ¾Æ´Ï¶ó »çȸÀûÀ¸·Îµµ Áß´Ü ¾ø´Â ¼ºñ½º¿Í ¿î¿µ È¿À²¼º¿¡ ÀÇÁ¸Çϰí ÀÖÀ¸¸ç, OT ½Ã½ºÅÛÀº ÇöÀç Ãë¾àÇÑ °ø°Ý º¤ÅÍ·Î °£Áֵǰí Àֱ⠶§¹®¿¡ Á¶Á÷Àº ºñÁî´Ï½º Ȱµ¿À» ¹æÇØÇÏÁö ¾Ê°í ÀáÀçÀûÀÎ °ø°Ý°ú ÇÇÇØ¸¦ º¸È£, ŽÁö ¹× ¿ÏÈÇÒ ¼ö ÀÖ´Â ¼Ö·ç¼ÇÀ» ÅëÇØ OT »çÀ̹ö º¸¾ÈÀÇ º¹¿ø·ÂÀ» Çâ»ó½ÃÄÑ¾ß ÇÕ´Ï´Ù.
¸ñÂ÷
Àü·«Àû Çʼö ¿ä°Ç
- ¿Ö ¼ºÀåÀÌ ¾î·Á¿öÁö°í Àִ°¡?
- The Strategic Imperative 8(TM)
- ¿ÀÆä·¹À̼¡¤Å×Å©³ë·ÎÁöÁî(OT) »çÀ̹ö º¸¾È ¾÷°è Àü·«Àû Çʼö ¿ä°ÇÀÇ ¿µÇâ
- ¼ºÀå ±âȸ´Â Growth Pipeline Engine(TM)À» °¡¼Ó
¼ºÀå ±âȸ ºÐ¼®
- ºÐ¼® ¹üÀ§
- ¾÷°èº° ¼¼ºÐÈ
- Áö¿ª ºÎ¹®
- ÁÖ¿ä °æÀï»ç
- ¼ºÀå ÁöÇ¥
- ¼ºÀå ÃËÁø¿äÀÎ
- ¼ºÀå ¾ïÁ¦¿äÀÎ
- ¿¹ÃøÀÇ ÀüÁ¦Á¶°Ç
- ÁöÃâ ¿¹Ãø
- ¾÷°èº° ÁöÃâ ¿¹Ãø
- Áö¿ªº° ÁöÃâ ¿¹Ãø
- ÁöÃâ ¿¹Ãø ºÐ¼®
- OT »çÀ̹ö º¸¾È : ÁöÁ¤ÇÐÀûÀ¸·Î Ä¿Áö´Â ¿µÇâ·Â
- OT »çÀ̹ö º¸¾È : ±ÔÁ¦ »óȲ º¯È
- OT »çÀ̹ö º¸¾È Àü·« º¯È : OT¿Í IoT
- OT Àü·« º¯È : IT º¸¾È Á¢±Ù
- °æÀï ȯ°æ
- °æÀï ȯ°æ : ´ÙÀ½ »ê¾÷ ´Ü°è
- °æÀï ȯ°æ : ½ÃÀå °æÀï
¼ºÀå ±âȸ ºÐ¼® : °øÇ× ¾÷°èº°
- ¼ºÀå ÁöÇ¥
- ÁöÃâ°ú ¼ºÀå ¿¹Ãø
- Áö¿ªº° ÁöÃâ ¿¹Ãø
- ¿¹Ãø ºÐ¼®
- Áö¿ªº° ¿¹Ãø ºÐ¼® : °øÇ×
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : °øÇ×
¼ºÀå ±âȸ ºÐ¼® : ¾÷°èº°
- ¼ºÀå ÁöÇ¥
- ÁöÃâ ¿¹Ãø
- ÇÏÀ§ ºÎ¹® ÁöÃâ°ú ¼ºÀå ¿¹Ãø
- Áö¿ªº° ÁöÃâ ¿¹Ãø
- ¿¹Ãø ºÐ¼®
- Áö¿ªº° ¿¹Ãø ºÐ¼® : À¯Æ¿¸®Æ¼
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : ¼öµµ »ç¾÷ÀÚ
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : Àü±â»ç¾÷ÀÚ
¼ºÀå ±âȸ ºÐ¼® : Á¦Á¶¾÷º°
- ¼ºÀå ÁöÇ¥
- ÁöÃâ°ú ¼ºÀå ¿¹Ãø
- ÇÏÀ§ ºÎ¹® ÁöÃâ¾×°ú ¼ºÀå ¿¹Ãø
- Áö¿ªº° ÁöÃâ ¿¹Ãø
- ¿¹Ãø ºÐ¼®
- Áö¿ªº° ¿¹Ãø ºÐ¼® : Á¦Á¶¾÷
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : Á¦Á¶¾÷
¼ºÀå ±âȸ ºÐ¼® : ¿î¼Û ¹× ¹°·ù ¾÷°èº°
- ¼ºÀå ÁöÇ¥
- ÁöÃâ¾×°ú ¼ºÀå ¿¹Ãø
- ÇÏÀ§ ºÎ¹® ÁöÃâ¾×°ú ¼ºÀå ¿¹Ãø
- Áö¿ªº° ÁöÃâ ¿¹Ãø
- ¿¹Ãø ºÐ¼®
- Áö¿ªº° ¿¹Ãø ºÐ¼® : ¿î¼Û ¹× ¹°·ù
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : ¿î¼Û ¹× ¹°·ù
¼ºÀå ±âȸ ºÐ¼® : ¾÷°èº°
- ¼ºÀå ÁöÇ¥
- ÁöÃâ°ú ¼ºÀå ¿¹Ãø
- ÇÏÀ§ ºÎ¹® ÁöÃâ°ú ¼ºÀå ¿¹Ãø
- Áö¿ªº° ÁöÃâ ¿¹Ãø
- ¿¹Ãø ºÐ¼®
- Áö¿ªº° ¿¹Ãø ºÐ¼® : »ê¾÷
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : »ê¾÷(¼®À¯ ¹× °¡½º)
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : »ê¾÷(±¤¾÷)
¼ºÀå ±âȸ ºÐ¼® : ºôµù ÀÚµ¿È ½Ã½ºÅÛ ºÐ¾ß
- ¼ºÀå ÁöÇ¥
- ÁöÃâ°ú ¼ºÀå ¿¹Ãø
- Áö¿ªº° ÁöÃâ ¿¹Ãø
- ¿¹Ãø ºÐ¼®
- Áö¿ªº° ¿¹Ãø ºÐ¼® : ºôµù ÀÚµ¿È
- OT »çÀ̹ö º¸¾È ÁÖ¿ä ÇÁ·Î±×·¥ ¿ä±¸ : ºôµù ÀÚµ¿È
¼ºÀå ±âȸ
- ¼ºÀå ±âȸ 1: Á¦·Î Æ®·¯½ºÆ® º¸¾È Á¤Ã¥ÀÇ ±¸Çö
- ¼ºÀå ±âȸ 2: º¸¾È ¼³°è Çϵå¿þ¾î ±¸¼º ¿ä¼Ò
- ¼ºÀå ±âȸ 3: OT ½Ã½ºÅÛÀ» À§ÇÑ Ä§ÇØ ¹× °ø°Ý ¼Ö·ç¼Ç
- ¼ºÀå ±âȸ 4: OT Àü¿ë À§Çù ŽÁö ¹× ¿ÏÈ ¼Ö·ç¼Ç
- ¼ºÀå ±âȸ 5: OT ½Ã½ºÅÛÀ» À§ÇÑ MSS
´ÙÀ½ ´Ü°è
LSH
As the Threat Landscape Expands and Risk Profiles Increase, Protecting Critical Assets is Now Top-of-mind for Businesses
Cybersecurity strategies have traditionally focused on IT security solutions and the protection of digital assets and systems. However, ongoing digitalization across industry verticals has allowed for many assets, devices, and systems that are critical to the operations of a business to now be connected into the same digital ecosystem. The rise in these connected operational technologies (OT), coupled with the fact that many of these systems do not act or respond as traditional IT assets do, means that many of the common IT cybersecurity solutions or strategies will be inadequate at protecting OT systems from attack. Coupling this fact with the idea that many businesses or organizations seen as critical infrastructure to society or national security run on vast, sprawling OT networks, businesses must approach any cybersecurity strategy and program with OT cybersecurity protocols as top-of-mind.
OT cybersecurity solutions are rapidly evolving to reach similar maturity levels to those of OT cybersecurity systems. This includes the addition of automated functionalities, continuous monitoring, asset visibility and detection, endpoint security principles, and the emergence of OT-specific intelligence and services. Because of the criticality associated with the businesses and organizations that utilize OT-centric networks and assets, ensuring that OT cybersecurity solutions can protect against as many threat vectors as possible will be crucial.
Critical infrastructure organizations are dependent upon uninterrupted services and operational efficiency, not just for their organization, but for society. With OT systems now viewed as vulnerable attack vectors, organizations must improve their OT cybersecurity resiliency with solutions that can protect, detect, and mitigate any potential attack or damage, all without hindering business activity.
Table of Contents
Strategic Imperatives
- Why is it Increasingly Difficult to Grow?
- The Strategic Imperative 8™
- The Impact of the Top 3 Strategic Imperatives on the Operational Technologies (OT) Cybersecurity Industry
- Growth Opportunities Fuel the Growth Pipeline Engine™
Growth Opportunity Analysis
- Scope of Analysis
- Vertical Segmentation
- Regional Segmentation
- Key Competitors
- Growth Metrics
- Growth Drivers
- Growth Restraints
- Forecast Assumptions
- Spending Forecast
- Spending Forecast by Vertical
- Spending Forecast by Region
- Spending Forecast Analysis
- OT Cybersecurity-Growing Sway in Geopolitics
- OT Cybersecurity-The Changing Regulatory Landscape
- Shifting OT Cybersecurity Strategies-OT and IoT
- Shifting OT Strategies-IT Security Approaches
- Competitive Environment
- Competitive Environment-Next Industry Phase
- Competitive Environment-Market Activity
Growth Opportunity Analysis-Airports Vertical
- Growth Metrics
- Spending and Growth Forecast
- Spending Forecast by Region
- Forecast Analysis
- Forecast Analysis by Region-Airports
- OT Cybersecurity Key Program Needs-Airports
Growth Opportunity Analysis-Utilities Vertical
- Growth Metrics
- Spending Forecast
- Sub-segment Spending and Growth Forecast
- Spending Forecast by Region
- Forecast Analysis
- Forecast Analysis by Region-Utilities
- OT Cybersecurity Key Program Needs-Water Utilities
- OT Cybersecurity Key Program Needs-Electric Utilities
Growth Opportunity Analysis-Manufacturing Vertical
- Growth Metrics
- Spending and Growth Forecast
- Sub-segment Spending and Growth Forecast
- Spending Forecast by Region
- Forecast Analysis
- Forecast Analysis by Region-Manufacturing
- OT Cybersecurity Key Program Needs-Manufacturing
Growth Opportunity Analysis-Transportation and Logistics Vertical
- Growth Metrics
- Spending and Growth Forecast
- Sub-segment Spending and Growth Forecast
- Spending Forecast by Region
- Forecast Analysis
- Forecast Analysis by Region-Transportation and Logistics
- OT Cybersecurity Key Program Needs-Transportation and Logistics
Growth Opportunity Analysis-Industrial Vertical
- Growth Metrics
- Spending and Growth Forecast
- Sub-segment Spending and Growth Forecast
- Spending Forecast by Region
- Forecast Analysis
- Forecast Analysis by Region-Industrial
- OT Cybersecurity Key Program Needs-Industrial (Oil and Gas)
- OT Cybersecurity Key Program Needs-Industrial (Mining)
Growth Opportunity Analysis-Building Automation Systems Vertical
- Growth Metrics
- Spending and Growth Forecast
- Spending Forecast by Region
- Forecast Analysis
- Forecast Analysis by Region-Building Automation
- OT Cybersecurity Key Program Needs-Building Automation
Growth Opportunity Universe
- Growth Opportunity 1: Implementation of Zero-trust Security Policies
- Growth Opportunity 2: Secure-by-design Hardware Components
- Growth Opportunity 3: Breach and Attack Solutions for OT Systems
- Growth Opportunity 4: OT-specific Threat Detection and Mitigation Solutions
- Growth Opportunity 5: MSS for OT Systems
Next Steps
- Your Next Steps
- Why Frost, Why Now?
- List of Exhibits
- Legal Disclaimer