Tripwire has announced the results of a survey examining how organisations are addressing industrial control system (ICS) cyber threats. The survey was conducted by Dimensional Research last month, and its respondents included 263 ICS security professionals at energy, manufacturing, chemical, dam, nuclear, water, food, automotive and transportation organisations.
According to Tripwire’s survey, 93% were concerned about cyberattacks causing operational shutdown or customer-impacting down-time. In an effort to prepare against such threats, 77% have made ICS cybersecurity investments over the past two years, but 50% still feel that current investments are not enough.
“Cyberattacks against critical infrastructure and manufacturers pose a real threat to the safety, productivity and quality of operations,” said Kristen Poulos, vice president and general manager of industrial cybersecurity at Tripwire. “In these environments, where virtual and physical converge, cyber events can interfere with an operator’s ability to view, monitor or control their processes. Investing in industrial cybersecurity should be a priority in protecting operations from disruption.”
Of the 50% who felt current investments were not enough, 68% believe it would take a significant attack in order for their organisations to invest more. Only 12% of all respondents expressed a high level of confidence in their ability to avoid business impact from a cyber event.
In assessing industrial organisations’ current set of basic cybersecurity capabilities, the survey found the following:
Poulos added: “Visibility, although the first step, is commonly the biggest hurdle when it comes to protecting ICS environments from cyberattacks. Organisations can gain visibility of their OT networks without disrupting their processes by following methods that meet the unique needs and requirements of OT devices. This includes passive monitoring of network traffic to identify assets, and baselining normal activity to spot anomalies, and analysing log data for indications of cyber events. With that visibility, organisations can effectively implement additional protective controls, such as industrial firewalls to segment critical assets and establish secure conduits.”
Additional findings include: