The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Given the impacts to ICS/OT, fighting these attacks requires a different set of security skills, technologies, processes, and methods to manage the different risks and risk surfaces, setting ICS apart from traditional IT enterprise networks.
Adversaries in critical infrastructure networks have illustrated knowledge of control system components, industrial protocols, and engineering operations. From the previously observed impactful attacks, such as CRASHOVERRIDE1 in the electric sector, human machine interface hijacking through remote access2 in water management, and ICS-specific ransomware3 in the manufacturing and energy sectors, to the more recent Incontroller/PIPEDREAM4 advanced scalable attack framework targeting multiple ICS sectors, ICS/OT attacks are more disruptive with the possibility of physically destructive capabilities. Threat intelligence supports the fact that industrial security defenders across all sectors must address new challenges and face serious threats.
The 2022 SANS ICS/OT Cybersecurity survey results reveal several changes and significant focus on ICS operational improvements; however, progress in key areas needs more emphasis to defend our critical infrastructure into the future. Industrywide insights from this survey include:
Offered Free by: Cyolo
See All Resources from: Cyolo
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.
Thank you
This download should complete shortly. If the resource doesn't automatically download, please, click here.