CIO Influence
CIO Influence News Security

Half of Critical Infrastructure Organizations Are on a Fast Track to Blocking Cyber Attacks; Other Half Risks Falling Behind

Half of Critical Infrastructure Organizations Are on a Fast Track to Blocking Cyber Attacks; Other Half Risks Falling Behind

Concerns with rip-and-replace costs, lack of resources could add years to zero trust implementations

Increased cyber threats and government directives have made cybersecurity a top priority among critical infrastructure organizations. A zero trust security architecture is the gold standard for blocking and containing threats, but there’s been heavy skepticism around the practicality of implementing zero trust in operational technology (OT) environments with the mix of legacy and modern equipment. A study from Wakefield Research, commissioned by Xage, suggests that despite this skepticism, industrial cybersecurity leaders are making significant headway.

The survey conducted among 250 cybersecurity professionals in energy, aerospace, port operations, transportation, pipeline operations, utilities, and retail supply chain & warehousing found that 88% of OT cybersecurity leaders have already taken steps to adopt zero trust. Notably, a little over half (58%) have found a path to zero trust that doesn’t require an equipment overhaul—an otherwise daunting, disruptive and costly undertaking for any industrial operation.

Latest ITechnology News: DataRobot Named a Leader in AI/ML Platforms by Independent Research Firm

“OT, IT, and cybersecurity leaders have had a challenging few years. Being forced to rethink how they approach cybersecurity for operations is not easy, and thinking they need to rip and replace equipment only makes matters worse. Fortunately, this long-running misconception seems to be tailing off,” said Duncan Greatwood, CEO of Xage. “Over half of the industrial sector is realizing that there are better ways forward, but that leaves the other half at risk of falling behind on implementation timelines. Continuing to close this knowledge gap over the most practical ways to implement zero trust will put infrastructure operators, and our nation’s most vulnerable infrastructure, in a much better position.”

Latest ITechnology News: AvePoint Strengthens Security and Streamlines IT Ops for the Modern Workplace

A recap of the study’s key findings is below:

Zero Trust in Operations is Doable, and Inevitable

It’s abundantly clear that operational environments are moving towards zero trust. Some are moving faster than others, with nearly half still viewing a full rip and replace of their existing systems as the only way forward.

  • 100% of OT cybersecurity leaders have plans to adopt zero trust.
  • A majority (58%) have found paths to zero trust that don’t require an equipment overhaul, leaving 42% at risk of slower implementation timelines and higher costs.
  • 93% claim that zero trust adoption is “inevitable.”
  • 88% have already taken steps to adopt a zero trust security posture.

Digital Transformation, User Experience Among the Unexpected Benefits of Zero Trust

The movement to zero trust represents a paradigm shift in this sector’s approach to cybersecurity: from a reactive to a proactive security posture. The benefits of this shift extend beyond security.

  • 61% of respondents agree that reactive attack-detection-centric strategies for OT are not enough to prevent breaches.
  • 64% indicate that they’ve already moved to a proactive security approach to block and contain attacks before they can spread.
  • 55% agree that adopting zero trust accelerates digital transformation.
  • Other top benefits include improved user experience (60%), more efficient operations (52%), and saving time or money (42%).

Helping the Zero Trust Laggards Catch Up

Nearly half (46%) of all respondents still view Zero Trust as an aspiration to be pursued over many years. Fortunately, several tactics are proving helpful for accelerating buy-in and avoiding unnecessary delays.

  • Factors delaying Zero Trust implementation include lack of internal knowledge (52%), conflicting direction from leadership (46%), and a lack of resources (39%).
  • Tactics for accelerating implementations include integrating zero trust into organizational culture (68%); incorporating Identify and Access Management (IAM) practices or tools (66%), while avoiding “rip and replace” of existing networks and systems; setting a formal process to define zero trust goals (60%); assessing weakness in existing OT security architecture (60%).

Latest ITechnology News: Synamedia Acquires Quortex To Add Just-in-time Live Video Streaming And Accelerate Its SaaS Offerings

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Flywheel and HealthMyne Partner To Provide End-to-End Radiomic Data Management And Analysis

CIO Influence News Desk

Mouser Electronics State-of-the-Art Distribution Center Features World’s Largest Installation of Vertical Lift Modules

CIO Influence News Desk

Cisco Announces Intent to Acquire Kenna Security to Deliver Vulnerability Management

CIO Influence News Desk

Leave a Comment