30% of critical infrastructure organisations to be breached by 2025
Techsense team I 2:57 pm, 5th January
By 2025, 30% of critical infrastructure organisations will experience a security breach that will result in the halting of an operations or mission-critical cyber-physical system, according to Gartner.
Critical infrastructure security has become a primary concern for governments around the world, with the US, UK, EU, Canada and Australia each identifying sectors deemed critical infrastructure, for example, communications, transport, energy, water, healthcare and public facilities. In some countries, critical infrastructure is state-owned, while in others, like the US, private industry owns and operates a much larger portion of it. "Governments in many countries are now realising their national critical infrastructure has been an undeclared battlefield for decades," said Ruggero Contu, research director at Gartner. "They are now making moves to mandate more security controls for the systems that underpin these assets."
A Gartner survey showed that 38% of respondents expected to increase spending on operational technology (OT) security by between 5% and 10% in 2021, with another 8% of respondents predicting an increase of above 10%. However, this may not be enough to counter underinvestment in this area over many years, according to Gartner. "Besides the need to catch up, there is a growing number of increasingly sophisticated threats," Ruggero Contu said. "Owners and operators of critical infrastructure are also struggling to prepare for the coming increased oversight."
Increased risk needs holistic security approach
Over time, the technologies that underpin critical infrastructure have become more digitized and connected - either to enterprise IT systems or to each other - creating cyber-physical systems security risks. The result has been a substantial increase in the attack surface for hackers and bad actors of all kinds.
In critical infrastructure sectors, organisations need to be more concerned about real world hazards to humans and the environment, rather than information theft. Gartner predicts that by 2025, attackers will have weaponised a critical infrastructure cyber-physical system to successfully harm or kill humans.
Gartner recommends that security and risk management (SRM) leaders in critical infrastructure sectors develop a holistic approach to security, so that IT, OT and Internet of Things (IoT) security are managed in a coordinated effort. "SRM leaders should accelerate efforts to discover, map and assess the security posture of all cyber-physical systems in their environment," said Ruggero Contu. "Invest in threat intelligence and join industry groups to stay apprised of security best practices, upcoming mandates and requests for inputs from government entities."
Source: Gartner
Subscribe to our Newsletters

Stay up to date with our latest news
more news

Fausse appli de rencontre utilisée dans une campagne ciblant le Pakistan, découverte par ESET Research
by ESET I 9:51 am, 29th January
ESET Research a découvert une campagne de logiciels espions Android utilisant des techniques d'escroquerie sentimentale pour cibler des individus au Pakistan.Cette campagne exploite le logiciel espion GhostChat, permettant une surveillance discrète de l'appareil, autorisant ainsi les auteurs à surveiller l'activité et à exfiltrer des données sensibles.L'enquête d'ESET a révélé d'autres activités du même auteur : une attaque avec ClickFix, qui incite les utilisateurs à exécuter du code malveillant sur leur ordinateur, et une attaque WhatsApp exploitant la fonctionnalité de connexion à l'appareil de l'appli pour accéder aux messages personnels des victimes.
Submergé(e) de spams ou de scams ? Conseils d’ESET pour les éviter !
by ESET I 11:38 am, 27th January
Les fournisseurs de messagerie sont assez efficaces pour filtrer les spams (messages non sollicités), mais leurs contrôles ne sont pas infaillibles et parfois notre boîte de réception se remplit soudainement de messages indésirables, voire malveillants. Ce déluge peut survenir sans prévenir.
load more