74% industrial organisations breached in the last 12 months, Fortinet OT report

5 years ago

Operational technology refers to the hardware and software used to run industrial control systems, such as SCADA, that serve as the foundation of various areas of critical infrastructure. This includes industries that are essential to public safety and well-being, including power plants, manufacturing, water utilities, healthcare, transit, and more. OT differs from traditional IT systems due to the processes and systems that must be incorporated to effectively manage production and resource development systems, including engines, valves, sensors, and even robotics, that are common to critical infrastructure environments but may be absent from traditional IT stacks.

While IT and OT have been managed separately since their inception, there has been a growing movement toward the convergence of these two systems over the past 12 – 18 months. Incorporating IT capabilities such as big data analytics and machine learning into OT systems, along with faster connectivity solutions in order to respond to security and safety events more quickly, has allowed these industries to improve productivity and efficiency, offering a competitive edge to those who combine the systems effectively.

However, it is important for OT teams to consider how this convergence affects the cybersecurity posture of critical infrastructure, especially given the impact that downtime caused by a cyberattack can have on the economy, health, and productivity of the nation. And worse, the potential safety risks to workers and even local communities should a critical system be compromised.

To determine where critical industries may be at risk due to IT and OT convergence, Fortinet has compiled the State of Operational Technology and Cybersecurity Report. To understand the types of threats facing operational technology and how OT teams can mitigate these threats, Fortinet conducted a survey of organisations in critical industries with greater than 2,500 employees. Specifically, we examined plant and manufacturing operations leaders in: manufacturing, energy and utilities, healthcare, transportation.

Their answers revealed where OT is most vulnerable, the types of cyberattacks they regularly face, what their current security tactics are, and where improvement to cybersecurity protocols must be made.

The report revealed that cybersecurity must become a greater focus where operational technology is concerned, as 74% of OT organisations experienced a data breach in the last 12 months. The breaches negatively impacted organisations in a myriad of ways, including a reduction in safety, productivity and revenue, the compromise of business-critical data, and damaged brand reputation. Considering these, it is clear that OT organisations that do not prioritise cybersecurity as part of their IT and OT convergence strategy risk losing all of the benefits of this strategy when they encounter an attack.

The most common types of cyberattacks affecting operational technology are malware, phishing, spyware, and mobile security breaches. The survey results show that these attacks persist as a result of four key reasons:

Lack of visibility

78% of organisations only have partial cybersecurity visibility into operational technology. This makes it difficult for teams to detect unusual behavior, quickly respond to potential threats, and perform threat analysis – all of which are crucial to a successful cybersecurity posture.

Lack of personnel

As we have often seen elsewhere, due to the cybersecurity skills gap the low availability of skilled security professionals is a key concern for operations leaders considering implementing new security tools and controls in the network.

Pace of change

64% of operations leaders note that keeping up with the pace of change is a challenge when it comes to security, and yet, at the same time, slowing digital transformation efforts for any reason can compromise their competitive edge.

Network complexity

OT network environments are complex, with anywhere from 50 to 500 devices to monitor and secure, many of which come from different vendors. This exacerbates the challenges surrounding visibility and personnel, as each device stores different data and has different security configuration needs and requirements.

With these attack vectors and security challenges in mind, there are several steps operations leaders can take to improve the security posture at their organisations and minimise the risks associated with downtime in the wake of an attack.

First, 62% of organisations stated intentions to dramatically increase their cybersecurity budgets this year. Additionally, organisations are also adjusting their cybersecurity strategies, with 70% stating their intention to make the CISO responsible for OT cybersecurity in the next year—currently, just 9% of CISOs overseeing OT security.

In addition to these two changes already underway, organisations can implement several security tactics that have demonstrated success in critical infrastructure industries. As part of this study, Fortinet examined the differences in cybersecurity controls in place between those organisations that experienced zero intrusions over the last 12 months, and similarly-sized organisations with six or more intrusions.

There were several tactics and tools that stood out among those top-tier organisations that those in the bottom-tier lacked, including:

  • Multi-factor authentication
  • Role-based access control
  • Network segmentation
  • Security compliance reviews
  • Management and analysis of security events

As OT and IT systems continue to converge, implementing these essential tactics can help operations leaders and CISOs gain visibility across their OT environments while reducing complexity in their network to reduce cyber risk.

Security threats to operational technology networks, especially in critical infrastructures such as transportation, health, and energy, can have major consequences for ensuring the success of these organisations, as well as for the daily lives of the people those industries support. To help minimise this risk, this latest report provides a critical examination of key areas of vulnerability in order to help OT teams identify more effective ways to improve cybersecurity efforts in the industries they support.


Key takeaways

Strategy

  • OT network environments are complex, with anywhere from 50 to 500 devices to monitor and secure, many from different vendors.

Execution

  • 74% of OT organisations experienced a data breach in the last 12 months.
  • 78% of organisations only have partial cybersecurity visibility into operational technology.

Cash

  • 62% of organisations stated intentions to dramatically increase cybersecurity budgets this year.

People

  • 70% of organisations stating intention to make CISO responsible for OT cybersecurity in the next year.
  • Low availability of security professionals is concern for operations leaders considering implementing new tools.
  • Currently only 9% of CISOs are overseeing OT security.
  • For 64% operations leaders, keeping up with pace of change is a challenge when it comes to security.

Don't Miss

How Cyber Risks Have Become Business Risks

Cyber risk is business risk. Anything that threatens IT threatens the company.
John Maddison, EVP Products and CMO at Fortinet.

Fortinet survey finds 78% of organizations felt prepared for ransomware attacks 

Fortinet, the global cybersecurity leader driving the convergence of networking and security,