FM & TECHNOLOGY
RETHINKING CYBERSECURITY
Remote working has opened up more access points to sensitive operational technology environments. Further rolling outages are inevitable if energy firms don’t protect their critical systems, says Peter Margaris, Head of Product Marketing at Skybox Security.
In May, the UK’s electrical grid was hit by a cyberattack. While the grid emerged relatively unscathed and the country didn’t suffer a NotPetya-esque blackout, the attack has cast a long shadow over energy companies’ ability to withstand future exploits.
This is just one event that underlines the warning shared by the World Economic Forum in April – energy firms are particularly vulnerable to attack and the novel risks introduced by remote working during COVID-19 are making this situation worse.
The exposure of operational technology (OT) networks to external threats has been growing in recent years. These are environments that are difficult, if not impossible, to patch, and are of particular interest to nation-state threat actors. They are also becoming increasingly connected to IT networks and direct third-party risk, as well as attracting new native vulnerabilities. According to Skybox Security’s 2020 Vulnerability and Threat Trends Report Mid-Year Update, the number of new flaws on OT devices has grown by 14% this year.
With remote working opening up more access points than ever to sensitive OT environments, it is wholly possible that we could see rolling outages and safety events at any point if energy firms don’t do more to protect their critical systems.
Legacy systems increase the
complexity of OT security Improving security within OT environments isn’t simple. Many of the systems and devices used by energy companies were designed in an age before cyber threats existed. They were built to be always operational and, until relatively recently, have been shielded from IT threats. But these innate protections are disappearing as time advances and web-derived threats leak from the carpet of HQ’s offices to the concrete of the plant floor. For operations teams, this means now having to incorporate security practices into their jobs while ensuring that they’re still able to ensure continuous uptime.
Part of the struggle here lies in the facilitation of regular scans. Without being able to take their systems offline,
28 | TOMORROW’S FM
twitter.com/TomorrowsFM
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60