New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

The massive impact of vulnerabilities in critical infrastructure

New York Tech Editorial Team by New York Tech Editorial Team
March 15, 2022
in Cybersecurity
0
The massive impact of vulnerabilities in critical infrastructure
Share on FacebookShare on Twitter

In this interview with Help Net Security, Michael Johnson, Board of Directors at Safe Security, talks about the importance of critical infrastructure security, why attacks on critical infrastructure are particularly worrying, and what can be done to thwart these threats.

critical infrastructure security

Recent cyber events have shown how extremely vulnerable critical infrastructure is. What are the biggest security concerns?

In any world conflict, one of the primary threats posed is cyber actors disabling or destroying the core infrastructure of the adversary. Based on the global reaction to the current world conflict, countries fear reprisals. The worry is that there will be collateral damage to the critical infrastructure of other countries not directly involved in the current conflict.

Today, services such as healthcare systems, power grids, transportation and other critical industries are increasingly integrating their operational technology with traditional IT systems in order to modernize their infrastructure, and this has opened up a new wave of cyberattacks. Though businesses are ramping up their security initiatives and investments to defend and protect, their efforts have largely been siloed, reactive, and lack business context. Lack of visibility of risk across the estate is a huge problem for this sector.

The digitalization of critical infrastructure, coupled with increased dependence on third parties, has made it vulnerable to cyberattacks across multiple vectors. Supply chain attacks are becoming increasingly commonplace with several critical infrastructure businesses being compromised as collateral damage. The risks they need to monitor and manage include: employee workforce risk, third, fourth, and nth parties (not just their vendors, but their partners and suppliers’ networks, too), the native technology stack, compliance and regulatory frameworks, and internal policies and processes.

What area of critical infrastructure is most at risk?

Core infrastructure is the most vulnerable in any global crisis due to the massive impacts that an attack or outage would have on citizens. This infrastructure includes the energy, water, transportation, and healthcare systems that are needed every day to survive. The ability to disable and deny access to any of these resources is a massive threat to any country’s economy. In addition to this persistent threat, the cyber side of global conflicts have rapidly evolved in recent years, and companies and other non-involved governments would be wise to educate themselves on what the outcomes of the well-documented cyber-attacks have been to-date.

What could be the consequences of critical infrastructure attacks?

Our way of life could be impacted by a capable attack on critical infrastructure. Transportation, energy, financial, and healthcare services could be impacted. People could be delayed in accessing critical resources, to include energy to their homes, or have access to their bank accounts.

It is conceivable cyberattacks on critical infrastructure could lead to an attacker gaining control over the systems and networks, which could have devastating consequences. For example, attacks on our industrial control systems, healthcare centers, telecommunication providers, global financial markets, power plants, and other critical sectors have the potential to cripple national security, international trade, impact global economies, and international relations. Especially with supply chain issues and COVID-19 still impacting services, we cannot afford to have disruption or degradation of these critical systems.

How to mitigate or even avoid these attacks?

The complexity of the critical infrastructure businesses requires cyber risk management to be continuously and consistently proactive, across various factors and vectors. State and local entities have taken the initiative towards proactively assessing, prioritizing, and managing threats. For example, The Cyber Security Evaluation Tool (CSET) provides a systematic and repeatable approach to assess the cybersecurity posture of ICS networks. Moreover, the U.S. Office of Management and Budget (OMB) is taking notice of the need for automated solutions and is providing funding and guidance to help agencies adopt proactive capabilities.

Both public and private sector organizations are also sharing information and cyber defense best practices in critical infrastructure communities of interest, such as Information Sharing and Analysis Centers. There are also many popular commercially backed exchanges where information can be shared specific to critical infrastructure threats.

While there are a number of tools and security products that exist in the market today, to help boost critical infrastructure security, the fundamental challenge remains that they work reactively to defend against cyberattacks. Critical infrastructure needs real-time visibility into risk posture. Cyber risk quantification, backed by sound data science principles, has a unique opportunity to solve this challenge.

How will critical infrastructure security evolve in the future?

Organizations need to first understand where they stand today, in order to set goals for the future. You cannot manage what you cannot measure.

With the continued rise in nation-state threat actors, supply chain attacks, and attacks on critical infrastructure growing both in sophistication and impact, there are two things all companies and organizations need to focus on. First, organizations need to implement information and technology management best practices, to include network segmentation, multi factor authentication, network access control, etc. Second, organizations need to implement quantitative risk management, ensuring they are able to properly assess, prioritize, and manage cybersecurity risk.

Credit: Source link

Previous Post

Malicious web application requests skyrocketing, bad actors stealthier than ever before

Next Post

Software accessibility startup Kinde banks $10.6 million seed round

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Software accessibility startup Kinde banks $10.6 million seed round

Software accessibility startup Kinde banks $10.6 million seed round

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026
Employee Time Tracking

What is an Employee Time Tracking Solution? A Definite Guide for 2026

March 31, 2026
Voltify founders

Voltify Raises $30 Million Seed Round as It Challenges $1 Trillion Rail Electrification Model

March 31, 2026

Recommended

laptop on glass table

Automat-it Cuts Deployment Friction as Monce Scales AI Order Processing on AWS

April 13, 2026
Lee's Famous Recipe Chicken

Why Lee’s Famous Recipe Chicken Is Betting on Hi Auto to Quietly Rewire the Drive-Thru

April 9, 2026
computer generated image of letters

San Francisco Tribune Lists 11 HumanX Startups Moving AI Closer to the Operating Core

April 8, 2026
Impala CEO and Highrise AI CEO

The Industrialization of AI Infrastructure: What Impala and Highrise AI Reveal About the Next Scaling Frontier

April 7, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated Automat-it AWS B2B marketing Business CISO CISO Whisperer Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech Funding Announcement hi-tech Hi Auto Impala Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media