APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Securing critical infrastructure in an increasingly interconnected world

    Jimmy Yam, Vice President at Eaton

    Tweet
    content-image

    Jimmy Yam, Vice President at Eaton

    As the world speeds towards digitalization, organizations are increasingly exposed to cybersecurity vulnerabilities and risks. Cyberattacks against commercial, industrial, utility and government networks are increasing in frequency over the years -- a recent industry report found that the number of cyberattacks rose by 17% in the first quarter of 2021 compared to the same period last year.

    To combat such attacks, the cybersecurity industry has largely focused on developing solutions to protect information technology (IT) networks, leaving Industrial Control Systems (ICS) or Operational Technology (OT) systems exposed.

    However, businesses can no longer afford to deprioritize ICS security with the rise of Internet of Things (IoT) and the convergence of IT and OT environments.

    Amidst expanding adoption of sensors, machine learning and analytics in industrial environments, malicious cyber actors have turned their attention towards ICS and OT systems that run critical infrastructure. In fact, data collected by IBM indicates that malicious activity targeting OT assets increased 2,000% between 2018 and 2019, while ICS-related vulnerabilities discovered in 2020 saw an year-on-year increase of 49%.

    Shining the spotlight on operational technology

    Attacks on control processes and industrial systems may have risen over the years, but OT security remains less understood amongst technology and business leaders.

    OT uses hardware and software to oversee and control physical devices, and infrastructure. This can be found across a wide range of industries such as manufacturing, power generation, transmission and distribution, oil and gas, transportation and water utilities. In short, OT controls equipment and physical processes while IT or information technology is more focused on data.

    OT has in fact been part of our lives much longer than IT -- it started with the use of electricity-powered machinery and often includes critical infrastructure such as power grids, water treatment plants or healthcare. Thus, OT cybersecurity attacks have the potential to affect not only a single organization but an entire population.

    Historically, OT networks have largely been isolated from IT systems and the internet. But with the rise of digital innovation and IoT, OT systems are increasingly interconnected not only with each other but IT networks as well.

    IDC predicts that by 2025, there will be 55.7 billion connected devices in the world and the vast majority of these devices (75%) will be connected to an IoT platform.While this brings incredible benefits to businesses and lives, the increasing number of connected devices also means that the cybersecurity threats are far greater.

    The true cost of OT cyberattacks

    Unlike IT cybercrimes which tend to focus on data and identity theft, OT attacks target the safety and availability of critical infrastructure such as power and transportation facilities. A breach in OT cybersecurity can have major implications for organizations, including business disruption, information loss, revenue loss, regulatory fines and equipment damage.

    Even large global companies with every resource at hand are not impervious to OT breaches. In 2018, a petrochemical plant in Saudi Arabia was hit by a cyber attack meant to sabotage the firm’s operations and trigger an explosion. Earlier this year, a ransomware attack on the Colonial Pipeline, the largest fuel pipeline in the United States, led to gas shortages across the East Coast. If such large companies are vulnerable, smaller organizations simply cannot afford not to have a comprehensive cybersecurity strategy that ensures that their IT and OT networks are well-defended.

    There is also a large cost in terms of corporate reputation from cyber attacks as an organization’s vulnerabilities are publicly exposed. This can affect customer loyalty and ultimately, the bottom line and stock prices. IBM estimates that the average cost of a cybercrime on a company in 2020 is USD 3.86 million.

    Beyond the organization’s financial and reputational loss, OT cyberattacks can manifest in adverse consequences on people and the environment. A recent report by Gartner predicted that by 2025 cyber attackers will have weaponized OT environments to successfully harm or kill humans, and that the financial impact of attacks using OT resulting in fatal casualties will reach US$50 billion by 2023.

    While this may sound alarmist to some, attacks on industrial control systems have risen over the years, and security breaches on OT networks can result in severe disruptions in the physical world.

    What’s next for businesses

    Organizations need to take a holistic approach to ensure their data, equipment and processes are fully protected. This means implementing cybersecurity solutions that address gaps in increasingly integrated IT-OT networks.

    These solutions need to be “secure by design”, meaning they must ensure their hardware and software vulnerabilities are adequately addressed through implementing safeguards, continuous testing and adopting best practices in the industry.

    Cybersecurity teams also need to carry out regular assessments to understand their organization’s evolving vulnerabilities, ensuring legacy infrastructure are secure and well-integrated with software solutions. Taking afull lifecycle management approach where IT and OT systems are periodically monitored will enable organizations to identify vulnerabilities early on and perform timely interventions.

    Most crucially, businesses need to establish a collaborative culture around cybersecurity. From an organizational standpoint, it may mean appointing a cybersecurity leader who leads a team that looks at cybersecurity holistically across IT and OT.

    After all, organizations that allow a “us versus them” mentality towards cybersecurity to persist will be inviting hackers in not due to the lack of technical due diligence, but due to operational silos.

    tag

    IoT

    Critical Infrastructure

    Information Technology

    Financial

    cyber attack

    Machine Learning

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Why Compliance Needs a Seat at the Strategy Table

    Why Compliance Needs a Seat at the Strategy Table

    David Koh, Head, Legal & Compliance (Singapore) and Operational Risk Management Country Lead, Perpetual Limited
    Streamlining Operations and Empowering Teams in Facilities Management

    Streamlining Operations and Empowering Teams in Facilities Management

    Shaye Rogers, Workflow Support Manager, Cushman & Wakefield
    Technocreativity: The Synergy Of Technology And Creativity

    Technocreativity: The Synergy Of Technology And Creativity

    Tran Nguyen Phi Long, Group Head Of Retail Marketing, Pnj Group
    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Leading It And Digital Transformation At Ikea: Insights From An Industry Veteran

    Sigit Triwibowo, Head Of It And Digital, Chief Technology And Digital, Ikea
    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Executive Leadership And Digital Transformation In The Global Fashion Industry

    Eiko Ando, E-Commerce And Digital Director, Pvh Corporation
    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion
    Driving IT Transformation at Lactalis Australia

    Driving IT Transformation at Lactalis Australia

    Sabina Janstrom, Chief Information Officer, Lactalis Australia
    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    AI Adoption in Hospitality: Striking the Balance Between Innovation, Excellence and Trust

    Phiphat Khanonwet, Head of IT, Onyx Hospitality Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/securing-critical-infrastructure-in-an-increasingly-interconnected-world-nwid-8745.html