Edited by Eamonn Ryan
The following presentation was delivered at the 2023 GCCA Cold Chain Conference in Cape Town, by cybersecurity expert and 30-year veteran Charl van Niekerk, CEO of 2TS, on the topic ‘Industrial Systems, the New Frontier for Cyber Attacks’. This is Part 1 of a three-part series.

There is a parallel between cyber threats and cancer – the silent and often undetectable nature of both. In this scenario, there is an important role for preventative measures, including regular screenings and vigilance to detect it as early as possible. In the same manner, preventative cybersecurity practices including specialised analysis are vital in preserving the health of industrial systems involved in the cold chain.
HVAC&R businesses ought to pose the following critical question of their organisation: does their business have a dedicated cybersecurity budget, solution and personnel?
While there is a myriad of components to any business, facilities are the lifeblood especially when it comes to refrigeration and maintaining cold rooms, but also billing systems, emails and comms lines – and many cybersecurity strategies do not adequately protect this crucial aspect of operations. There is a need for a strategic shift in focus from convenience to critical infrastructure when allocating resources for cybersecurity.
There may be potential skepticism about allocating resources to Operational Technology (OT) which poses distinct challenges with fundamental design differences between Information Technology (IT) and OT, emphasising the need for a tailored approach to secure industrial systems.
Confidentiality vs convenience: a balancing act
One must stress the confidentiality-driven nature of OT security given the reluctance to implement changes that might disrupt critical processes. In sharp contrast with the ever-changing landscape of IT, there is a compelling case for the necessity of a more stable and resilient security framework for industrial systems.
There are distinct protocols governing IT and OT communications. While IT environments are changing constantly, operating on a handful of universally adopted protocols, this creates a complexity which acts as a shield, making it challenging for attackers to penetrate and exploit vulnerabilities.
OT environments are the exact opposite: they are characterised by a multitude of unique, industry-specific protocols that are based on ‘set and forget’ – like cooling temperatures. With cold storage, change to temperatures means disruption and loss of income. One can’t put something in and just forget about it. Every new device or sensor comes with its own protocol as they were not connected to the outside world, and there can be thousands of them – which is why it is difficult to effect change and it is simply left alone for 10 or 12 years.