The Digital Factory (Data Flow) - Part 2

Industry 4.0 data/event driven data flows and security considerations and how's CISO's role is evolved in OT security. [Securing Things by M. Yousuf Faisal]

In partnership with

Disclaimer: All views presented here, in this newsletter, are my own.

Author or the newsletter are not liable for any actions taken by any individual or any organization / business / entity. The information provided is for education and awareness purposes only and is not specific to any business and or situation.

M. Yousuf Faisal

Hey there,

Hope you are doing well. This week’s theme is about:

  • ✍️ Quick updates on my side and the IT-OT CySEAT course.

  • ↪️ Part 2 of The Digital Factory (Hub & Spoke) - Data Lifecycle in 4.0

  • 📘 Few security aspects for Data Flow in 4.0 as part of Cybersecurity Program.

  • ‼️ How CISO’s role have evolved in the context of OT Cybersecurity.

This is Part 2 of “The Digital Factory” series.

In Part 1 - The Digital Factory (Hub & Spoke) we covered and concluded:

  • what is industry 3.0, industry 4.0, digital factory and UNS concepts.

  • concluded that these new approaches, challenges the status quo for industry 3.0 and generates a debate around the “questionable” use of Purdue model for network segmentation - whether its dead or alive, reference network architectures and why Security folks are in a fist fight most of the time with solution architects and or automation professionals.

In this Part we’ll briefly touch base on:

  • industry 4.0 data flow lifecycle, DataOps and security considerations.

In future Part 3, we’ll cover, the reference architectures, the industry debates and few updates.

Ready? let’s dig in.

Yours truly.

— Yousuf.

Together with:

The Daily Newsletter for Intellectually Curious Readers

If you're frustrated by one-sided reporting, our 5-minute newsletter is the missing piece. We sift through 100+ sources to bring you comprehensive, unbiased news—free from political agendas. Stay informed with factual coverage on the topics that matter.

But before we begin, do me a favour and make sure you hit the “Subscribe” button to let me know that you care or liked and keep me motivated to publish more. Thanks!

Quick Update:

Its’ been a better start of the year - compared to 2024. The year has begun with doing few focused reviews / consulting / advisory across IT, OT and data privacy, in different manufacturing sectors and critical infrastructure org, so its been a very busy quarter. Interesting to note the similarities and differences in terms of asset owners approach towards cybersecurity.

In this edition, below, I cover a typical industrial data flow lifecycle, something that took me quite a while to uncover and wrap my head around in understanding the concept, so hoping it will save some good time for you.

To know more, please note that the digital factory series and few other previous ones are included as are part of IT-OT CySEAT Training - an upcoming offer. So if you have enjoyed, hope to see you on the wait-list, before its too late.

Drop in your best email address to subscribe and continue reading the rest of the newsletter edition for free.

Subscribe to keep reading

This content is free, but you must be subscribed to Securing Things Newsletter to continue reading.

I consent to receive newsletters via email. Terms of Use and Privacy Policy.

Already a subscriber?Sign In.Not now

Reply

or to participate.