Cybersecurity and Infrastructure: Current Trends and Future Developments

Claudio Butticé Claudio Butticé
July 2, 2020 Future of Work

Takeaway: It’s not possible for infrastructure owners and operators to fall behind in the technology race, but together with the broad opportunities brought forward by increased connectivity new cyberthreats are also emerging.

The infrastructure sector is taking its first timid steps in the world of digitalization. New AI trends are being used to optimize energy grids, power plants, oil and gas refineries, and manufacturing plants.

Roads and highways are implementing new technologies to prepare for the imminent arrival of self-driving cars. (Read Are self-driving cars safer than cars driven by humans?)

It’s not possible for infrastructure owners and operators to fall behind in the technology race, but together with the broad opportunities brought forward by increased connectivity new cyberthreats are also emerging.

Public and financial records can be sold on the dark web, and the breach of such records can be quite profitable for hackers. A landscape of unscrupulous agents who breach systems and stealthily maintain access over extended periods of time to perform various hacks (data theft, supply chain attacks, cryptomining, spying, and extortion) are now targeting organizations in the infrastructure sector as well.

With $3.25 billion per year made by hackers just by violating social media, it’s time for those verticals to address these issues, adapt and ultimately evolve.

The Current Cyberthreat Landscape

When a large state-owned energy company is hit by a successful cyberattack, the economy of an entire nation and the wellbeing of thousands of people are at stake. The simplest ransomware attack may cause a disastrous attack if critical data is exposed to malicious actors.

Back in 2015, a single spear phishing email attack in Ukraine took out took out the energy grid for more than 225,000 people. Attacks can strike some of the most vulnerable assets of human society, such as the farming and agricultural business (by blocking farming equipment) or the financial sector (think of the Equifax credit bureau breach).

In some other instances, instead, a single breach may cause massive material damage (examples include nuclear power plants, dams or waste recycling plants).

Even when they are not the primary target, the proliferation of interconnected Internet of Things (IoT) networks means that a single security gap can make factories and plants become a collateral target. Older vulnerabilities never grow stale, as hackers never stop checking whether those doors are still open.

More than half of the vulnerabilities that have been publicly exposed in the last 10 years are still susceptible to attacks even today. Establishing a successful cybersecurity strategy during the digital transformation process is a mandatory step, and may require tens of thousands of operators across hundreds of sites.

Simplifying Cyber Defense Strategies

Infrastructure operators often need to work within significant budget constraints — especially in the public sector. Money is often insufficient, and stakeholders usually prefer to invest it in more “physical” assets such as better materials and machinery than in (apparently) less practical avenues such as cyber defense.

To address this challenge, breach and attack simulation (BAS) platforms such as Cymulate are being currently employed by many organizations.

Companies can use BAS platforms to test various aspects of their cybersecurity defenses for any gaps and vulnerabilities when they are put under stress. Examples range from web gateways to web applications (firewall effectiveness), endpoints (anti-malware effectiveness), and emails (anti-phishing).

Users just need to install a client on one of the endpoints in their networks and the platform can be used to run various tests. Users can even schedule these tests to run automatically in set intervals. BAS comes as a welcome alternative to other testing methods, such as penetration tests and red teams since these are typically carried out by white hat hackers and seasoned security professionals.

Instead of hiring a specialized cybersecurity team, companies can simply retrofit existing IT teams to test possible attack vectors quite comprehensively. BAS reports are also used to identify weak points in the security perimeter or IT infrastructure allowing companies to allocate their investments more strategically.

This evidence-based approach is vital to make stakeholders happy by focusing security budgets on the most evident vulnerabilities.

Mitigating And Remediating

In a sector when even the slightest disruption may have catastrophic consequences, resiliency is mandatory to at least mitigate incoming damage, as well as the ability to quickly restore any impaired services or capabilities.

Fail-safe strategies and backup plans represent a pivotal point in any remediation strategy, highlighting the importance of detection and forensics tools that can identify indicators of compromise. For example, heightened gateway restrictions such as additional firewalls may be enforced to contain the attacker’s ability to move across the network once a section is compromised.

If everything goes south, is nonetheless important to be able to provide quick disclosure to collateral actors which may be involved as well (such as emergency operators, fire and police departments, etc.). Being able to share relevant data into ticketing systems may be critical to accelerate this process. Risk baselines must be determined to know which areas are the most vulnerable and prepare a remediation plan accordingly.

Highly controlled access and authorization management, as well as tidy asset inventory can help minimize the risk linked to the devices connected to the OT network. A robust control system is a passive approach that has already been adopted by the U.S. electricity sector.

It helps reducing the overall risk as well as the root cause analysis phase since it easily pinpoints the source of the issue. It can also be used to enhance mitigation, for example by allowing administrators to close facility doors remotely.

Final Thoughts

Although many organizations in this vertical still lack the maturity to properly handle the full range of cyberthreats that come with the territory, many are taking the necessary steps to improve.

A strong governmental action will also be necessary to establish an adequate regulatory environment mandating compliance to the strictest security strategies.

Otherwise, the material risks of a careless approach are too massive to be dealt with.

  • Experfy Insights

    Top articles, research, podcasts, webinars and more delivered to you monthly.

  • Claudio Butticé

    Tags
    ComplianceCybersecurityFuture DevelopmentsInfrastructureregulatory environmentsecurity strategies
    © 2021, Experfy Inc. All rights reserved.
    Leave a Comment
    Next Post
    Why Is Node.Js the Future of IoT Platforms All Around the Globe?

    Why Is Node.Js the Future of IoT Platforms All Around the Globe?

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    More in Future of Work
    Future of Work
    Where Will, the Future of Work, Take Place? (Office, Remote, or Hybrid)

    Changes in machine learning and advances in automation have already changed work for many industries. Still, the COVID-19 pandemic and recent labor shortages forced many brands to rethink what the future of work will look like going forward. The U.S. Bureau of Labor Statistics recently reported a dropping unemployment rate of 4.2% during the fourth

    4 MINUTES READ Continue Reading »
    Future of Work
    7 Tech Companies Changing the Future of Work

    Much has been reported about the impact of the COVID-19 pandemic in the traditional workplace. The effects of the pandemic are expected to be long-lasting, making it challenging for companies across all industries to keep operations running smoothly. Globally, companies had to be agile and adapt to a new normal, in addition to dealing with

    5 MINUTES READ Continue Reading »
    AI & Machine Learning,Future of Work
    AI’s Role in the Future of Work

    Artificial intelligence is shaping the future of work around the world in virtually every field. The role AI will play in employment in the years ahead is dynamic and collaborative. Rather than eliminating jobs altogether, AI will augment the capabilities and resources of employees and businesses, allowing them to do more with less. In more

    5 MINUTES READ Continue Reading »

    About Us

    Incubated in Harvard Innovation Lab, Experfy specializes in pipelining and deploying the world's best AI and engineering talent at breakneck speed, with exceptional focus on quality and compliance. Enterprises and governments also leverage our award-winning SaaS platform to build their own customized future of work solutions such as talent clouds.

    Join Us At

    Contact Us

    1700 West Park Drive, Suite 190
    Westborough, MA 01581

    Email: [email protected]

    Toll Free: (844) EXPERFY or
    (844) 397-3739

    © 2025, Experfy Inc. All rights reserved.