BradEgeland.com
  • Welcome
  • Blog
  • Expertise
  • Resume
  • Software / Service Reviews
  • Contact
  • Videos
  • Books / White Papers
  • Mentoring Contact Form
  • Awards/Recognition
  • Templates & Downloads
  • Clients
  • Professional Services
  • Past Survey Results

2022 Trends in Industrial Cybersecurity

5/25/2022

0 Comments

 
In a cybersecurity landscape marked by the pandemic’s upheaval, there’s considerable opportunity for bad actors and a persistent challenge for cybersecurity pros. It’s a dangerous time for critical infrastructure companies that are consistently outmatched by sophisticated and well-funded attackers. Improving industrial cybersecurity in 2022 and beyond requires that several trends and initiatives come to fruition that push back against attacks and protect the public.

Pressure On CISOs Coming From The Top

In response to growing threats and the recent large-scale breaches, company boards are going to drive the need to elevate the CISO role. Over the last few years, there has been an elevated awareness among the media and executives about malware and ransomware incidents that have brought companies to their knees. Boards at critical infrastructure industry providers see the brand and cost impacts of these events and are pushing forward the need for an information security leader with strong decision-making authority. It pushes CISOs to stay on top of the latest threats while maintaining an agile and robust security strategy that aligns with the business’ revenue and growth targets.


There’s also a shift in reporting structures, with the CISO moving out from being under the CIO or the COO. In the future, they’ll report to the CEO, CFO or the board of directors. CISOs need to have fluency in the current threats. If they have board reporting responsibilities, they need a security strategy that demonstrates how a cybersecurity program is both critical function and threat aware. CISOs need to shift the typical model from focusing just on risks and vulnerabilities to a broader track where they are critical function aware. A 2021 Gartner report supports the high-level attention on cybersecurity, stating, “By 2025, 40% of boards of directors will have a dedicated cybersecurity committee overseen by a qualified board member, up from less than 10% today.”

Increase In Skilled Adversary Attacks And Nation-State Involvement

Over the past decade, there’s been an increase in cyber-sabotage against critical infrastructure and companies’ critical functions. These attacks come through both nation-state actors and nonstate actors. Nation-state actors seek to push forward geopolitical actions and disruption and avoid attribution whenever possible to disguise their efforts. Nonstate actors often seek notoriety for their exploits and seek monetary gains. These two groups combine to form an ecosystem of brokers that provide information access and financial channels for those who are willing to pay.

These cyberthreats will continue into 2022. Another factor driving such attacks on critical infrastructure is that there are many more nation-states that will ramp up their activities. Adversarial nations see that Russia is a “safe harbor” for ransomware attacks, and countries like North Korea, China and Iran see this dynamic and will expand their ransomware and malware efforts in the coming years.

For a real-world example, the last few years have seen malware like Petya and NotPetya, which had catastrophic consequences for critical infrastructure companies like Maersk. These types of malware and ransomware have also been linked to infamous attacks.

A significant portion of these attacks come from Russia, whether they are considered direct acts of the state or whether they are state-sponsored through various affiliates.

This presents a considerable challenge for cybersecurity service providers, especially as other nation-states like China, Iran and North Korea emulate the way Russia’s acting. On the protection side, we’ll have to do attributions where there are enough signatures and signals that allow cybersecurity teams to pinpoint where the attacks come from.

An Evolution Toward Mitigation

The global cybersecurity talent shortage reached an estimated 3.5 million workers in 2021, and the shortage of skilled practitioners presents an extraordinary risk for critical infrastructure organizations. It coincides with the evolving threats which damage private industries and the U.S. economy. To combat these threats, organizations in 2022 and ahead will prioritize cybersecurity as a core principle. Firms need robust awareness training to prevent human-based access points and a broader evolution of cybersecurity capabilities that outpaces those of the threat actors. This isn’t happening yet and is often increasing due to accelerating digitization which increases attack points and vulnerabilities. And the bad actors have ready access to qualified people and capital resources as well as a steady slate of exploitable vulnerabilities.

It’s time for critical infrastructure providers and cybersecurity pros to recognize that the current methods aren’t working. They implement safeguards at every substation and plant, patch systems and perform other tasks continually. Despite these efforts, boards, CEOs and CISOs still see a determined adversary can break a company’s defenses and hold them for ransom.

Developed by Idaho National Laboratory to create a new approach, consequence-driven, cyber-informed engineering, or CCE, presents a different way to mitigate risk. It’s the approach taken by third-party firms, like 1898 & Co., who use strategies purpose-built for critical infrastructure. CCE requires accepting that attackers will succeed, especially when they’re determined and well-funded. It’s a philosophy that risks are inherent in human-developed systems, and there are always imperfections.

CCE builds roadblocks, so if there are undetected vulnerabilities in a power company’s infrastructure, an attack won’t cause grid failure. CCE practitioners get organizations to think like their foes, to rank the most vital systems, and then consider how those systems are best shielded from a hacker’s attack. While digitization offers value for customers and shareholders, it’s often enacted without cybersecurity considerations. CCE enables OT cybersecurity teams to prioritize consequences, collect data about systematic interdependencies, find the attack pathways that will achieve the highest impacts and then disrupt these paths if possible.
​
These trends all point to a broader need for an OT-centered approach, more resources directed toward cybersecurity, OT-focused managed services offerings and the usage of CCE to reshape threat recognition and mitigation.
0 Comments



Leave a Reply.

    Author:

    Picture

    Brad Egeland


    Named the "#1 Provider of Project Management Content in the World," Brad Egeland has over 25 years of professional IT experience as a developer, manager, project manager, cybersecurity enthusiast, consultant and author.  He has written more than 8,000 expert online articles, eBooks, white papers and video articles for clients worldwide.  If you want Brad to write for your site, contact him. Want your content on this blog and promoted? Contact him. Looking for advice/menoring? Contact him.

    Picture
    Picture
    Picture
    Picture
    Picture
    Picture

    RSS Feed

    Archives

    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013
    May 2013
    April 2013
    March 2013
    February 2013
    January 2013
    December 2012
    November 2012
    October 2012
    September 2012
    August 2012
    July 2012
    June 2012
    May 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011
    October 2011
    September 2011
    August 2011
    July 2011
    June 2011
    May 2011
    March 2011
    January 2011
    December 2010
    November 2010
    October 2010
    September 2010
    August 2010
    June 2010
    May 2010
    April 2010
    March 2010
    November 2009

    RSS Feed

Powered by Create your own unique website with customizable templates.