Global Cybersecurity Outlook 2025
Page 35 of 49 · WEF_Global_Cybersecurity_Outlook_2025.pdf
The security of the OT environment is an important
area affected by the growing complexity in
cyberspace. Though the convergence of IT and OT
is a recognized dynamic, they remain distinct in their
characteristics and the attention they require, with
IT and OT teams traditionally working at different
ends of the technology stack and data flow. They
tend to approach, prioritize and govern cybersecurity
differently. Lack of collaboration on a formal
IT/OT convergence strategy hinders the secure digitalization of industrial environments.43 Strategic
planning for OT security typically takes place
over long timelines, is often dependent on highly
specialized suppliers and therefore does not have the
same agility to adapt within the typical investment
lifespan of production systems, as is common in
IT systems. Organizational cyber resilience is the
sum total of resiliency of all parts, which means that
IT and OT can no longer be treated in isolation as
holistic risk-management strategies are designed.Complexity at the intersection of IT and OT
Schneider Electric’s products are integral to
several vital infrastructure providers such as
power plants, solar farms, critical buildings
and data centres that operate in increasingly
connected environments. Given the importance
of these sectors to national and global resilience,
cybersecurity is of the utmost priority.
Consequently, Schneider Electric uses “security
by design” with secure development life-cycle
principles and independent penetration testing
for its products while emphasizing securing its
factories for manufacturing.
Further, Schneider Electric embraces “security
by operations”, including continuous monitoring
and real-time threat detection, which is central to
protecting operational environments through the
entire value chain, with clarified responsibilities to maintain robust security measures at
every stage. It also prioritizes regular security
assessments and updates to ensure its systems
remain resilient against evolving cyber threats.
A key initiative, developed in partnership with
BitSight, involves scanning the internet and
detecting exposed unsecured OT protocols
that are “open doors” to critical environments
and proactively mitigating associated risks in
collaboration with customers and authorities.
Through these efforts, Schneider Electric
demonstrates a commitment to working
collaboratively with all relevant stakeholders and
leveraging advanced security technologies to
create a more secure and reliable operational
environment for its customers.CASE STUDY 6
Schneider Electric’s comprehensive approach
to operational technology (OT) cybersecurity
35
Global Cybersecurity Outlook 2025
Ask AI what this page says about a topic: