Stefan LĂźders and Tim Bell of CERN.
CERN
Employing proprietary technology can introduce risks, according to Tim Bell, leader of CERNâs IT governance, risk and compliance section, who is responsible for business continuity and disaster recovery. âIf youâre a visitor to a university, youâll want to bring your laptop and use it at CERN. We canât afford to remove these electronic devices upon arrival at the facility. It would be incompatible with the nature of the organization. The implication is that we must be able to implement BYOD-type security measures.â
Because at the core of everything always remains the collaborative nature of CERN. âAcademic papers, open science, freedom of research, are part of our core. Cybersecurity needs to adapt to this,â LĂźders notes. âWe have 200,000 devices on our network that are BYOD.â How then does the adaptation of cyber protection apply? âItâs called defense in depth,â explains the CISO. âWe canât install anything on these end devices because they donât belong to us, (âŚ) but we have network monitoring.â In this way, even if you donât have direct access to each device, you are warned when something is being done against the centerâs policies, both at the level of cybersecurity and inappropriate uses, such as employing the technology they provide for particular interests.â
These measures also extend to obsolete systems, which the organization is able to assimilate because they have a network resilient enough that even if one piece of equipment is compromised, it wonât damage any other CERN systems. The legacy technology problem extends to the equipment needed for the physics experiments being performed at the center. âThese are protected by dedicated networks, which allows the network protection to kick in and protect them against any kind of abuse,â LĂźders explains. On IoT connected devices not designed with cybersecurity in mind, âa problem for all industries,â LĂźders is blunt: âYou will never get security in IoT devices.â His solution is to connect them to restricted network segments where they are not allowed to communicate with anything else, and then define destinations to which they can communicate.
