OT Cyber Sync: 

Series 2

Voices from the Frontline of Industrial Connectivity and Security

John Coffey emphasizes the importance of integrating security into a company’s strategic planning, ensuring that all operational aspects are designed with security as a fundamental consideration.

Webinar 1200x628 (6)

Sections

Key Takeaways from Interview

Introduction

In our latest series exploring insights from leaders in industrial connectivity and security, we feature John Coffey, Managing Director and Co-Founder of GC Technology.

With nearly two decades of experience, GC Technology is a managed service provider that acts as an in-house IT department for clients across a multitude of sectors.

The company takes care of core IT functions such as infrastructure support, system security, system monitoring, and strategic direction, ensuring technological competence and secure digitalization whilst maintaining operational efficiency.

Section 1

Digitalization in Business

John begins by underscoring that the real benefit of digitalisation lies in its capacity to boost business efficiency—chiefly through the automation of mundane and repetitive tasks. This automation not only results in significant cost savings but also enhances employee morale by freeing them from tedious work. Further, John highlights the transformative impact of artificial intelligence (AI) and machine learning, technologies that are redefining the productivity landscape across industries.

John outlines that "Digitalization is all about improving the efficiencies within a business. Automating repetitive tasks, for instance, is a significant area where digitalization can make a profound impact. By eliminating tedious tasks, we not only achieve cost savings but also enhance the workplace experience for our employees.".

 

Section 2

The Role of AI and Machine Learning in Cybersecurity

AI's role in cybersecurity is continuously evolving and becoming more critical as cyber threats increase in complexity and frequency. Current applications of AI in business operations include not just administrative tasks like summarising meetings and documents but also more advanced uses such as threat detection, pattern recognition, and automated responses to security incidents.

John discusses the importance of AI in enhancing cybersecurity measures by automating the analysis of vast amounts of data to identify potential threats quickly. This capability allows companies to respond to threats more swiftly and effectively, reducing the potential for damage.

However, John also stresses the need for accuracy and reliability in AI outputs. As AI systems take on more complex security tasks, the accuracy of the data they provide becomes critical. Incorrect information can lead to misdirected resources or worse, a failure to respond to actual threats.

"AI can be a great time saver, potentially five or 10 hours of their time doing stuff, that's huge. But it's still got to be seen what role it'll have in some businesses because, you know, AI can make things very simple, it can provide information at the drop of a hat but the important thing is how correct is that information.".

This emphasis on the accuracy of AI highlights the dual-edge of deploying these technologies in sensitive areas like cybersecurity, where the stakes are high, and the margin for error is minimal. The need for human verification and validation of these outputs remains key and needs to be implemented selectively.

 

Section 3

Cybersecurity and Strategic Alignment in Manufacturing

Cybersecurity is essential across all sectors but holds particular significance in the manufacturing industry due to the critical need to protect intellectual property and ensure constant uptime. John discusses the profound impact that cybersecurity incidents can have on manufacturing operations, potentially leading to significant financial losses and operational disruptions. 

John elaborates on how cybersecurity measures must be seamlessly integrated with the business's operational strategies. This integration helps in maintaining not only the security of the information and operational technologies but also supports the continuity of the entire supply chain. He highlights the interconnected nature of modern manufacturing environments where production systems, supply chain logistics, and vendor communications are deeply interlinked and increasingly digital.

John also emphasizes the role of cybersecurity in safeguarding against the interruption of manufacturing processes. In this sector, any downtime due to cyber incidents can lead to cascading delays across the supply chain, affecting everything from production timelines to product delivery, thus underlining the broader economic implications.

"Uptime is important and protecting the businesses systems, communications is vital so in manufacturing you're going to have not only customers but you're going to have suppliers, vendors, third party contractors and there are communications back and forth so it's no different than any business whether it's email-driven, data driven or file sharing that has to be properly maintained and secured."

By extending the discussion in this manner, you can provide a more comprehensive view of how cybersecurity not only protects the technical infrastructure but also supports and enables the strategic objectives of manufacturing enterprises. This approach illustrates the necessity of cybersecurity as a foundational element of modern manufacturing operations, securing assets, and ensuring that both the supply chain and internal processes remain uninterrupted and efficient.

 

Section 4

Impact of Cybersecurity Incidents on Business Operations

Unfortunately, ransomware has emerged as a particularly pervasive threat to businesses. John outlined that these attackers look for points of weakness. In the manufacturing industry, they have legacy systems that are not always necessarily maintained,  they are behind the curve and with a weak point of entry they gain access and can move laterally in an organisation's infrastructure to do considerable damage. This type of malicious attack can lock users out of their systems, encrypt files, and demand a ransom for access restoration. The implications of such attacks extend beyond immediate financial losses to include long-term reputational damage, loss of customer trust, and potential legal consequences. John emphasizes the critical nature of these threats and the substantial impact they can have on business operations and continuity.

To combat these evolving threats, John highlights the need for control systems and continuous and adaptive cybersecurity training for all employees. He points out that the nature of cybersecurity threats is sophisticated, necessitating a dynamic approach to security training that can keep pace with these changes. Traditional once-a-year training sessions are no longer sufficient in a landscape where new threats emerge with alarming frequency. 

"Educating your employees is huge, we have that across the majority of our clients where we have continuous training and it's all about testing and learning.".

This strategy reflects a shift towards a more proactive and preventive approach to cybersecurity, recognizing that human factors are often the weakest link in security chains. By fostering a culture of security awareness and readiness, businesses can significantly mitigate the risk of falling victim to cyber attacks.

 

Conclusion and Reflections

John Coffey’s insights reveal the critical intersection of digitalization and cybersecurity within business strategies, particularly for professional services and manufacturing sectors. John recommends embedding robust cybersecurity practices into every layer of business processes and getting it documented. In addition any new new software or connected assets must be assessed before implementing and its vital to have a special focus on closing the gaps in legacy system upgrades and patches, staying vigilant against emerging threats, and continuously educating employees to strengthen defenses. This approach highlights the importance of proactive risk management and collaborative efforts in maintaining secure and efficient operations.


Listen the Interview in Full Below 👇

 

Industrial Networks Performance and Security

Trout builds technology to accelerate secure digitization in industrial environments