, , ,

Fiefdom_Meat_SuppliesSeveral years ago I predicted that ICS system management would eventually fall under the CIO.  This prognostication was met with ridicule and denial.  Well today is a different story and I have to say.

HA! I WAS RIGHT! Man that feels good!

So being a OT/IT Convergence Integrator and working with several clients on this tradition I learned from the best.

So for those dinosaurs trying to fight the Convergence efforts here is your guidebook…

BTW – I stole this from www.softpanorama.org


Guidelines for OT Strategic Actions to combat the IT Invasion!

Tactic 1. Strategic Noncompliance.

Agreeing upfront to take action while having no intention of taking that action, or cooperating in order to buy time to find a way of avoiding taking action. When you cannot easily refuse, then the simple response is to say yes then to delay and diminish your delivery. Make excuses, do the wrong thing or become unavailable. You can even band together with others to say ‘no’ in a collaborative voice (this is what Trade Unions can do).

Tactic 2. Information Manipulation.

Withholding or putting a spin on information, or covering up or giving false information. As a manager of information, you first hoard it (not sharing it), for example by gaining expertise in areas that may be of value in the future. You can also gain control of the gateways to that information. When you hold the keys, you can also bluff that you know more than you actually do. The key here is always to use information whilst giving away as little as possible. Information is power, and an information manipulator uses it in any and every way possible. If other people use information against you, you seek to discredit both the person and their information.


Tactic 3. Occupation.

Marking territory, maintaining an imposing physical presence, acting as the gatekeeper for vital information, and monopolizing relationships, resources or information. In this games, your mark out your territory, such as putting your name on everything or grabbing intellectual leadership in a defined area. You then act vigorously to defend your territory, patrolling the borders and guarding the gates. A tiger response to attacks will put off other possible attackers. You can also spend time looking for other areas to occupy.


Tactic 4.Shunning.

Subtly or overtly excluding an individual in a way that punishes him or her, or orchestrating a group’s behavior so that someone is obviously “out-group.” This is the classic game of ostracizing people, ‘sending them to Coventry’ or a host of other ways of casting them out socially. This is a severe punishment for social beings. It can also be done in small ways, such as avoiding eye contact or being ‘unavailable’.


Tactic 5.Discrediting opponents.

Using personal attacks or irrelevant criticisms to create doubt about another person’s competence or credibility. When others have power, you can drain it away by discrediting them. You can find their dark secrets or even create them with seductive traps, then expose them – it’s called ‘entrapment’. Be careful to stay clean yourself, getting others to do your dirty work and using ‘humor’ and ‘truth’ to deflect pointed fingers.


Tactic 6.Intimidation.

“Growling,” yelling, glaring or making threats to scare off an individual. In this game, the objective never to fight by showing how dangerous you can be. Using such tools as sarcasm and cynicism can make you a feared opponent. You may well want to build your reputation as a dragon-slayer. Just a threat from you is enough to make most people back down.


Tactic 7.Filibuster.

Using excessive verbiage to prevent action, out-talk objectors in a meeting or monopolize, and thereby exhaust, meeting time. This is the game played by politicians everywhere, as they grab the talking-stick and then keep talking until there is no time left for anyone else to say anything. It can be a fine delaying tactic if this is necessary.


Tactic 8.Invisible Walls.

Actively instigating actions or creating counterproductive perceptions so that an argued directive will be, if not impossible, extremely difficult to implement. Building invisible walls around your territory makes it difficult for people to find their way in and attack you. Mazes and false pathways help them to get lost, tired and dispirited. You can then be kind and show them the way out.


Tactic 9.Camouflage.

Creating a distraction, emphasizing the inconsequential, sending someone off on a wild goose chase or deliberately triggering someone’s anxiety buttons. This game is about distracting and confusing them to keep them away from your position. It is like the Invisible Wall game but played at a greater distance, hiding yourself before they even come close.


Tactic 10.Powerful Alliances.

Using relationships with powerful people to intimidate, impress or threaten others; engaging in name-dropping and strategic displays of influence over important decision makers. If you do not have power yourself, you can find it in other people who wheedle their way into powerful circles, ingratiate themselves to the brass and use this as a weapon of choice. This also stresses the importance of informal networks, which you can call on in times of need.

Hail Mary Tactic:

Start mumbling words like Vendor Recommendations,  Defense in Depth, Security through obscurity, MODBUS routing and other confusing non related items loudly.  Then refuse to create requirements to support your position and if all else fails….. ASK IT TO DO IT FOR YOU

If any of this seems familiar…… Welcome to Convergence.