Security defences getting stronger as cyber threats remain high

Nozomi Networks has revealed that the SANS 2022 OT/ICS Cybersecurity Report finds ICS cybersecurity threats remain high as adversaries set their sights on control system components. In response, organizations have significantly matured their security postures since last year. In spite of the progress, more than a third (35%) don’t know whether their organizations had been compromised and attacks on engineering workstations doubled in the last 12 months.

  • 2 years ago Posted in

“In the last year, Nozomi Networks researchers and the ICS cybersecurity community have witnessed attacks like  Incontroller move beyond traditional targets on enterprise networks, to directly targeting OT,” said Nozomi Networks Co-founder and CPO Andrea Carcano. “While threat actors are honing their ICS skills, the specialized technologies and frameworks for a solid defense are available. The survey found that more organizations are proactively using them. Still, there’s work to be done. We encourage others to take steps now to minimize risk and maximize resilience.”

 

ICS Cybersecurity Risks Remain High

·       62% of respondents rated the risk to their OT environment as high or severe (down slightly from 69.8% in 2021).

·       Ransomware and financially motivated cybercrimes topped the list of threat vectors (39.7%) followed by nation-state sponsored attacks (38.8%). Non-ransomware criminal attacks came in third (cited by 32.1%), followed closely by hardware/software supply chain risks (30.4%).

·       While the number of respondents who said they had experienced a breach in the last 12 months dropped to 10.5% (down from 15% in 2021), 35% of those said the engineering workstation was an initial infection vector (doubling from 18.4% last year).

·       35% did not know whether their organizations had been compromised (down from 48%) and 24% were confident that they hadn’t had an incident, a 2x improvement over the previous year.

·       In general, IT compromises remain the dominant access vector (41%) followed by replication through removable media (37%).

ICS Cybersecurity Postures are Maturing

·       66% say their control system security budget increased over the past two years (up from 47% last year).

·       56% say they are now detecting compromises within the first 24 hours of an incident (up from 51% in 2021). The majority (69%) say they move from detection to containment within 6 to 24 hours.

·       87.5% have conducted a security audit of their OT/control systems or networks in the past year (up from 75.9% last year) – one-third (29%) have now implemented a continual assessment program.

·       The overwhelming majority (83%) monitor their OT system security. Of those, 41% used a dedicated OT SOC

·       Organizations are investing in ICS training and certification: 83% of respondents are professional control system certification holders – a significant jump from 54% in the last 12 months.

·       Nearly 80% have roles that emphasize ICS operations up from 50% in 2021.

Acquisition of leading DSPM company will bolster Proofpoint’s human-centric security platform...
NTT DATA’s new Managed Detection & Response service powered by Palo Alto Networks Cortex XSIAM...
SPG is enhancing its cybersecurity capabilities in a new partnership with Saviynt, a leading...
Graylog has unveiled significant security advancements to drive smarter, faster, and more...
Datadog has published its new report, the State of Cloud Security 2024. The report found that...
ISACA research shows automating threat detection/response and endpoint security are the most...
Strategic partnership unifies AI-native endpoint security and next-generation firewall protection...
Advanced forms of social engineering are on the rise, though obvious gaps like weak passwords are...