Threat Actors Are Increasingly Targeting OT Organizations: Fortinet
Fortinet,
the global cybersecurity leader driving the convergence of networking and
security, today announced the findings from its global 2024 State of
Operational Technology and Cybersecurity Report. The results
represent the current state of operational technology (OT) security and
highlight opportunities for continued improvement for organizations to secure
an ever-expanding IT/OT threat landscape. In addition to trends and insights
impacting OT organizations, the report offers best practices to help IT and OT
security teams better secure their environments.
While this year’s
report indicates that organizations have made progress in the past 12 months
related to advancing their OT security posture, there are still critical areas
for improvement as IT and OT network environments continue to converge.
“Fortinet’s 2024 State of Operational Technology and Cybersecurity
Report shows that while OT organizations are making progress in strengthening
their security posture, teams still face significant challenges in securing
converged IT/OT environments. Adopting essential tools and capabilities to
enhance visibility and protections across the entire network will be vital for
these organizations when it comes to reducing the mean time to detection and
response and ultimately reduce the overall risk of these environments,” John
Maddison, Chief Marketing Officer at Fortinet.
Key findings from the
global survey include:
· Cyberattacks that
compromise OT systems are on the rise. In 2023, 49% of respondents
experienced an intrusion that impacted either OT systems only or both IT and OT
systems. But this year, nearly three-fourths (73%) of organizations are being
impacted. The survey data also shows a year-over-year increase in intrusions
that only impacted OT systems (from 17% to 24%). Given the rise in attacks,
nearly half (46%) of respondents indicate that they measure success based on
the recovery time needed to resume normal operations.
· Organizations
experienced a high number of intrusions in the past 12 months. Nearly one-third
(31%) of respondents reported more than six intrusions, compared to only 11%
last year. All intrusion types increased compared to
the previous year, except for a decline in malware. Phishing and compromised
business email intrusions were the most common, while the most common
techniques used were mobile security breaches and web compromise.
· Detection methods
aren’t keeping pace with today’s threats. As threats grow more
sophisticated, the report suggests that most organizations still have blind
spots in their environment. Respondents claiming that their organization has
complete visibility of OT systems within their central security operations
decreased since last year, dropping from 10% to 5%. However, those reporting
75% visibility increased, which suggests that organizations are gaining a more
realistic understanding of their security posture. Yet more than half (56%) of
respondents experienced ransomware or wiper intrusions—an increase from only
32% in 2023—indicating that there is still room for improvement regarding
network visibility and detection capabilities.
· Responsibility for OT
cybersecurity is elevating within executive leadership ranks at some
organizations. The percentage of organizations that are aligning OT security with
the CISO continues to grow, increasing from 17% in 2023 to 27% this year. At
the same time, there was an increase to move OT responsibility to other C-suite
roles, including the CIO, CTO and COO, to upwards of 60% in the next 12 months,
clearly showing concern for OT security and risk in 2024 and
beyond. Findings also indicate that some organizations, where the CIO is
not outright responsible, there is an upward shift of these responsibilities
from the Director of Network Engineering to the Vice President of
Operations role, which illustrates another escalation of responsibility. This
elevation into the executive ranks and below, regardless of the title of the
individual overseeing OT security, may suggest that OT security is becoming a
higher-profile topic at the board level.
Best Practices
Fortinet’s
global 2024 State of Operational Technology and Cybersecurity
Report offers organizations actionable steps for enhancing their security
posture. Organizations can address OT security challenges by adopting the
following best practices:
· Deploy segmentation. Reducing
intrusions requires a hardened OT environment with strong network policy
controls at all points of access. This kind of defensible OT architecture
starts with creating network zones or segments. Teams should also evaluate the
overall complexity of managing a solution and consider the benefits of an
integrated or platform-based approach with centralized management capabilities.
· Establish visibility
and compensating controls for OT assets. Organizations must be able to see
and understand everything that’s on the OT network. Once visibility is
established, organizations must protect any devices that appear to be
vulnerable, which requires protective compensating controls that are
purpose-built for sensitive OT devices. Capabilities such as protocol-aware
network policies, system-to-system interaction analysis, and endpoint
monitoring can detect and prevent the compromise of vulnerable assets.
· Integrate OT into
security operations and incident response planning. Organizations
should be maturing towards IT-OT SecOps. To achieve this, teams must
specifically consider OT with regard to SecOps and incident response plans. One
step teams can take to move in this direction is to create playbooks that
incorporate the organization’s OT environment.
· Embrace OT-specific
threat intelligence and security services. OT security depends on timely
awareness and precise analytical insights about imminent risks. Organizations
should make sure their threat intelligence and content sources include robust,
OT-specific information in their feeds and services.
· Consider a platform
approach to your overall security architecture. To address
rapidly evolving OT threats and an expanding attack surface, many organizations
use a broad array of security solutions from different vendors, resulting in an
overly complex security architecture. A platform-based approach to security can
help organizations consolidate vendors and simplify their architecture. A
robust security platform that is purpose-built to protect both IT networks and
OT environments can provide solution integration for improved security efficacy
while enabling centralized management to enhance efficiency.
Leave A Comment