83% of critical infrastructure organizations suffered breaches, 2021 cybersecurity research reveals


Supply chain and third-party risk is a major threat to operational technology

News summary

Overconfidence foreshadows future breaches: 73% of CIOs and CISOs "highly confident" they will not suffer an OT breach in the next year

Cybersecurity is still an afterthought: Cyber insurance is considered a sufficient solution by 40%

Complexity increases risk: 78% of respondents challenged by multivendor complexity

SAN JOSE, Calif., Nov. 12, 2021 /PRNewswire/ — A new research study by Skybox Security found that 83% of organizations suffered an operational technology (OT) cybersecurity breach in the prior 36 months. The research also uncovered that organizations underestimate the risk of a cyberattack, with 73% of CIOs and CISOs "highly confident" their organizations will not suffer an OT breach in the next year.

"Not only do enterprises rely on OT, the public at large relies on this technology for vital services including energy and water. Unfortunately, cybercriminals are all too aware that critical infrastructure security is generally weak. As a result, threat actors believe ransomware attacks on OT are highly likely to pay off," said Skybox Security CEO and Founder Gidi Cohen. "Just as evil thrives on apathy, ransomware attacks will continue to exploit OT vulnerabilities as long as inaction persists."

The new research, Operational technology cybersecurity risk significantly underestimated, unearths the uphill battle that OT security faces – comprised of network complexity, functional silos, supply chain risk, and limited vulnerability remediation options. Threat actors take advantage of these OT weaknesses in ways that don’t just imperil individual companies – but threaten public health, safety, and the economy. 

Skybox Security research finds that organizations with OT environments underestimate the risk of a cyberattack. (PRNewsFoto/Skybox Security)
Skybox Security research finds that organizations with OT environments underestimate the risk of a cyberattack. (PRNewsFoto/Skybox Security)

Key takeaways from the 2021 study include:

  • Organizations underestimate the risk of a cyberattack
    Fifty-six percent of all respondents were "highly confident" their organization will not experience an OT breach in the next year. Yet, 83% also said they had at least one OT security breach in the prior 36 months. Despite the criticality of these facilities, the security practices in place are often weak or nonexistent.
  • CISO disconnect between perception and reality
    Seventy-three percent of CIOs and CISOs are highly confident their OT security system will not be breached in the next year. Compared to only 37% of plant managers, who have more firsthand experiences with the repercussion of attacks. While some refuse to believe their OT systems are vulnerable, others say the next breach is around the corner.
  • Compliance does not equal security
    To date, compliance standards have proven insufficient in preventing security incidents. Maintaining compliance with regulations and requirements was the most common top concern of all respondents. Regulatory compliance requirements will continue to increase in light of recent attacks on critical infrastructure.
  • Complexity increases security risk
    Seventy-eight percent said complexity due to multivendor technologies is a challenge in securing their OT environment. In addition, 39% of all respondents said that a top barrier to improving security programs is decisions are made in individual business units with no central oversight.
  • Cyber liability insurance is considered sufficient by some
    Thirty-four percent of respondents said that cyber liability insurance is considered a sufficient solution. However, cyber liability insurance does not cover costly "lost business" that results from a ransomware attack, which is one of the top three concerns of the survey respondents.
  • Exposure and path analysis are top cybersecurity priorities
    Forty-five percent of CISOs and CIOs say the inability to conduct path analysis across the environment to understand actual exposure is one of their top three security concerns. Further, CISOs and CIOs said disjointed architecture across OT and IT environments (48%) and the convergence of IT technologies (40%) are two of their top three greatest security risks.
  • Functional silos lead to process gaps and technology complexity
    CIOs, CISOs, Architects, Engineers, and Plant Managers all list functional silos among their top challenges in securing OT infrastructure. Managing OT security is a team sport. If the team members are using different playbooks, they are unlikely to win together.
  • Supply chain and third-party risk is a major threat
    Forty percent of respondents said that supply chain/third-party access to the network is one of the top three highest security risks. Yet, only 46% said their organization as a third-party access policy that applied to OT.

Supporting quotes

  • Navistar, Inc., Information Security Manager Robert Lynch: "Some CISOs could have false confidence because even though they’ve already been breached, they have not identified this yet; sometimes hackers are there for a long period establishing their foothold. It is dangerous to be confident as the bad guys are so good."
  • Skybox Security Research Lab Threat Intelligence Lead Sivan Nir: "Our threat intelligence shows that new vulnerabilities in OT were up 46% versus the first half of 2020. Despite the rise in vulnerabilities and recent attacks, many security teams do not make OT security a corporate priority. Why? One of the surprising findings is that some security team personnel deny they are vulnerable yet admit to being breached. The belief that their infrastructure is safe — despite evidence to the contrary — has led to inadequate OT security measures."

To learn more, download the full research study.

Methodology

The research study included responses from 179 OT security decision-makers in the U.S., U.K., Germany, and Australia. The majority of the respondents (152) were from companies with $1B or more in revenue within the manufacturing, energy, and utility industries. 

About Skybox Security

Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybox, we don’t just serve up data and information. We provide the intelligence and context to make informed decisions, taking the guesswork out of securely enabling enterprises at scale and speed. Our unified security posture management platform delivers complete visibility, analytics, and automation to quickly map, prioritize, and remediate vulnerabilities across your organization. The vendor-agnostic platform intelligently optimizes security policies, actions, and change processes across all corporate and cloud environments. With Skybox, security teams can focus on the most strategic business initiatives while ensuring that enterprises remain protected. 

We are Skybox. Secure more, limit less. https://www.skyboxsecurity.com/

Media & analyst contact
????
tobenix.co.kr
??: ??? ??, 010-2331-2120, [email protected] 
??: ??? ??, 010-9000-6873, [email protected] 

2021 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice.

Photo – https://mma.prnasia.com/media2/1682289/Skybox_report.jpg?p=medium600
Logo – https://mma.prnasia.com/media2/1011662/Skybox_Security_logo.jpg?p=medium600  

 

 

Related Links :

http://www.skyboxsecurity.com

TechAdmin

Vince is a tech geek, has a passion for sharing knowledge and loves to tinker with different gadgets. Whenever he gets a new gadget he just open the box and figure out how the gadget works without reading the manual.

Learn More →

Leave a Reply

Your email address will not be published. Required fields are marked *