Tripwire, Inc., Portland, Ore., announced the results of a survey examining how organizations are addressing industrial control system (ICS) cyberthreats. The study, conducted by Dimensional Research, San Jose, Calif., in September, surveyed 263 ICS security professionals at energy, manufacturing, chemical, dam, nuclear, water, food, automotive and transportation organizations.
According to the survey, 93% were concerned about cyberattacks causing operational shutdown or customer-impacting downtime. In an effort to prepare against such threats, 77% have made ICS cybersecurity investments over the past two years, but 50% still feel that current investments are not enough.
“Cyberattacks against critical infrastructure and manufacturers pose a real threat to the safety, productivity and quality of operations,” says Kristen Poulos, vice president and general manager of industrial cybersecurity. “In these environments, where virtual and physical converge, cyber events can interfere with an operator’s ability to view, monitor or control their processes. Investing in industrial cybersecurity should be a priority in protecting operations from disruption.”
Of the 50% who felt current investments were not enough, 68% believe it would take a significant attack in order for their organizations to invest more. Only 12% of all respondents expressed a high level of confidence in their ability to avoid business impact from a cyber event.
In assessing industrial organizations’ current set of basic cybersecurity capabilities, the survey found the following:
- Only 52% have more than 70% of their assets tracked in an asset inventory.
- Almost one-third (31%) of organizations do not have a baseline of normal behavior for their operational technology (OT) devices and networks.
- Less than half (39%) do not have a centralized log management solution in place for their OT devices.
“Visibility, although the first step, is commonly the biggest hurdle when it comes to protecting ICS environments from cyberattacks,” Poulos adds. “Organizations can gain visibility of their OT networks without disrupting their processes by following methods that meet the unique needs and requirements of OT devices. This includes passive monitoring of network traffic to identify assets, baselining normal activity to spot anomalies and analyzing log data for indications of cyber events. With that visibility, organizations can effectively implement additional protective controls, such as industrial firewalls to segment critical assets and establish secure conduits.”
Additional findings include:
- About half (49%) said that collaboration between IT and OT has improved over the past two years.
- More indicated that IT is taking the lead on ICS security (44%) vs. OT (14%); 35% said it is evenly split between IT and OT.
- More than three-fourths (79%) say there is a gap in training OT and IT staff on the unique needs and requirements for securing OT environments. Of those who made cybersecurity investments over two years (77%), education and training was the most common investment (82%).