Sectrio

Author name: Prayukth K V

Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defense tactics at close quarters.

prayukth
Sectrio issues major cybersecurity alert for financial services and manufacturing businesses 1

Sectrio issues major cybersecurity alert for financial services and manufacturing businesses

Financial services institutions and manufacturers linked to diverse supply chains should brace themselves for targeted cyberattacks from APT groups. In the last 48 hours, we have seen a significant rise in reconnaissance attacks on firms in these sectors indicating the mobilizations of APT, sub-APT groups, and independent hackers. Here are the key trends we have recorded in our global honeypots over the weekend:  All honeypots have registered a rise in inbound cyberattacks   13 honeypots in Europe across Finland, Germany, Estonia, and Lithuania register the biggest rise in cyberattacks   Most of the attacks are emerging from Western Russia (it is hard to pinpoint the exact geographical location as the epicenter keeps shifting)    Target include payments infrastructure, connected device eco-systems across the shop floors, supply chains, and industrial control systems   Most of the attacks are oriented towards creating large scale disruption of supply chains as well as financial systems to keep regional CERT teams occupied   As we enter March 2022, the potential for a major cyberattack occurring in various parts of the world has grown exponentially. As we had predicted in the 2022 IoT and OT Threat Landscape and Assessment Report, the cyberattacks on manufacturing entities and financial institutions along with oil storage and transportation infrastructure are expected to see a massive spike this week.      We are witnessing a phase of increased adversarial activity across the surface and Dark Web with more than 5 major APT groups working in tandem across 3 continents. All this translates into a need to ramp up internal and external security measures immediately.  Sectrio advises financial services and manufacturing businesses to adopt the following measures immediately:  Conduct a complete audit of their entire digital footprint with a special emphasis on IoT and OT infrastructure including devices and networks that connect.   Deploy multi-factor authentication (MFA) and reduce access and other privileges across the infrastructure for the next 20 days   If any vendors are allowed into the digital perimeters or beyond, such accesses should be monitored or limited   Advise employees to avoid opening any suspicious emails and delete spam mails   Hackers are also expected to circulate spoofed links asking them to revalidate their login credentials through SMS. Ask them not to comply and report such instances   Fragment networks wherever possible to gain greater operational visibility and control   Industrial Control Systems and SCADA systems should be monitored and checked for any unusual network activity   A sudden or even diffused spike in data consumption among IoT devices could point to a potential cyberattack and should be attended to immediately   Limit BYOD access, if possible   Hackers will try and use reply chain phishing in case of previously compromised networks. In case of any suspicious communication activity, employees should be requested to check with the sender and try and validate the communication through a call or other non-email means and share the emails for investigation    Senior leadership could be targeted through LinkedIn or other social media platforms    Lastly, we advise all businesses across sectors to conduct an immediate review of their cybersecurity posture.    For more informational content, subscribe to our weekly updates and be notified at the latest. We promise not to spam you!  Try our rich OT and IoT-focused cyber threat intelligence feeds for free, here: IoT and OT Focused Cyber Threat Intelligence Planning to upgrade your cybersecurity measures? Talk to our IoT and OT security experts here: Reach out to sectrio. Visit our compliance center to advance your compliance measures to NIST and IEC standards: Compliance Center Get access to enriched IoT-focused cyber threat intelligence for free for 15 days  

Sectrio issues major cybersecurity alert for financial services and manufacturing businesses Read More »

8 steps to tackle Security Operations Center fatigue

8 steps to tackle Security Operations Center fatigue  

Stressed out Security Operations Center employees is a reality of the times we live in. Since March 2020 or the onset of the pandemic to be precise, SOC has turned out to be a buzzing beehive of activity and transitions.   Here are the key reasons why Security Operation Centers have turned into stress central:  New compliance mandates that have emerged in the last two years  Unmanageable threat volume: hackers are tiring out Security Operations Center teams using waves of false or low-grade reconissance attacks as a strategy. This is to reduce their efficiency and to keep them tied while they open new surfaces for breaching networks   Many Security Operations Center employees are unable to switch off from work due to constant alerts popping up  SOC analysts are unable to take a break as there is no one to replace them  Detection methods have not evolved to keep pace with the new threats leading to teams struggling to detect and address threats at the right time. Lack of adequate threat intelligence   In some countries, because of regulatory requirements, Security Operations Center teams have been asked to do more audits and conduct more exercises adding to the workload   SOC Analysts are having to collect and analyze more data to discover the stealthy footprint of threat actors   Mismatch of funding. The funding priorities of Security Operations Center teams from a technology, risk management, and operations perspective have again not kept pace with the changes that are happening in the threat environment in cyberspace  Because of high-stress levels, the average tenure of Security Operations Center analysts is coming down  The result of all this has turned Security Operations Centers into Stressful Operations Centers. But it needn’t be so. With a few simple measures, SOC teams can get back on their feet, defeat stress, and focus more on beating cyber adversaries and sophisticated cyberattacks.   Here are a few ways in which your business can beat Security Operations Center stress and improve your overall SecOps efficiency and output quality:  Work with the relevant and contextual cyber threat intelligence to reduce and eliminate false positives and alerts.    Gamify: at the very least some parts of the learning roadmap should involve gamification in some way to enable SOC teams to learn without getting stressed   Along with output KPIs, start measuring the load on each SOC member. Explore ways to ease the load through greater automation   Make their work more rewarding through incentives   Any new compliance mandate or workflow or modification in processes should be implemeted with a proper roadmap so that the team has enough time to adapt and incorporate the new measures  Give them mandatory time off to recuperate   A SOC can be lean as far as processes go but it should always be populated by enough people with adequate skills. Mismatch of skills can add to SOC stress in a big way in addition to reduced utilization of capacity  SOC leadership should step in and encourage, inspire and hear individual members of the team.   Operate through playbooks that are easy to deploy and adhere to and gives clear guidance on how various situations and crisis can be managed    Try our rich OT and IoT-focused cyber threat intelligence feeds for free, here: IoT and OT Focused Cyber Threat Intelligence Planning to upgrade your cybersecurity measures? Talk to our IoT and OT security experts here: Reach out to sectrio. Visit our compliance center to advance your compliance measures to NIST and IEC standards: Compliance Center Get access to enriched IoT-focused cyber threat intelligence for free for 15 days  

8 steps to tackle Security Operations Center fatigue   Read More »

The state of OT and IoT cybersecurity in North America

The state of OT and IoT cybersecurity in North America

Sectrio released the findings of its 5th OT and IoT Cybersecurity Threat Landscape Assessment and Analysis report today. The comprehensive report covers details such as threat actors, malware, breach tactics, at-risk sectors, quantum and quality of cyberattacks, and specific threats to OT and IoT deployments and critical infrastructure around the world.  The section on North America offers some insightful data points on the OT and IoT threat landscape in the region:  Ransom cost per GB of data held by hackers is now $39000   Energy, Healthcare, manufacturing, utilities, maritime, and defense are among the most targeted sectors   Overworked SOC teams and lack of visibility into some of the infrastructure played some businesses right into the hands of hackers   Mining sector could be targeted in 2022 as there is rising hacker interest in this sector  756 major cyber incidents reported in the region in 2021   Highest remote ransom demand $50/70 Mn (Various sources)  Ransom recovered: $6 Mn (Forbes, Nov 2021)   The rise in average ransom demand: 71 percent (Sectrio)  Hack campaign cycles intercepted: 71 (Sectrio)   Hackers are now targeting widespread disruption and huge ransoms through targeted cyberattacks. While the geopolitical motivation in many of these attacks remains at a very high level, the expansion of botnets in Mexico poses a new security risk to businesses in the region. Manufacturing facilities in Mexico are also being subject to high levels of reconnaissance probes by hackers.   Some actors are carrying out localized attacks from within the region using sophisticated phishing kits developed in parts of Eastern Europe and the Middle East. We came across many such kits that were modified to some extent to target businesses in US and Mexico. These kits are now freely available on the web but sophisticated APT groups such as Lazarus and Fancy Bear could be embedding them with trojans to control the networks and data in businesses targeted by these local hackers.   This is a new tactic that APT groups are using to widen their net. By offering free phishing kits, they are allowing other groups to conduct the initial hacking work while they lurk in the background waiting to jump networks or digital assets to reach a target asset which could be a critical infrastructure facility or a defense installation.   In all, the malware load in the traffic analyzed by our team has grown significantly in the last 6 months of 2021. This over-the-board increase will definitely put an additional strain on the already overworked SOC teams managing the security needs of businesses in sectors such as manufacturing, utilities, and others. Hackers are specifically targeting control systems and connected IoT devices. The former to cause disruption and the latter to target third-party infrastructure such as websites, critical servers, and even mobile phones.   Supply chains, the new target  Supply chains are presenting hackers with a moving and lucrative target. In addition to large-scale disruption, such attacks also offer more return on investment. In addition, other factors make supply chains a favorite for hackers:  The opportunity to strike businesses from multiple entry points  Once infected, malware can move across the connected infrastructure crossing not just organizational but even political boundaries   The entry of start-ups with high valuation and risk appetite but with low appetite or patience rather bring systems online in a foolproof way after a cyber incident. This means that these companies may be more susceptible to paying a ransom to get things back on track faster    Workflows, responsibilities, and systems are not aligned towards cybersecurity imperatives today     Hackers may also be aware of zero-day vulnerabilities across vendors that are yet to be discovered   Specific challenges with OT in North America   While investments in IT security have grown, OT cybersecurity investments and attention are still lagging. Businesses that are hosting complex hybrid environments or are connected to IT, OT, and the Internet of Things are now gradually understanding the importance of ramping up their cybersecurity measures to align them with the complexity involved in securing such environments. However, the hackers are miles ahead of them as they are well aware of these cybersecurity gaps than the cybersecurity teams protecting them.   Businesses hosting complex environments without adequate security cover are closer to a massive cyber disruption than they can imagine.   Some businesses have upgraded their OT environments by adding new devices. Such devices are however invisible to standard off-the-shelf vulnerability scanners.   OT vulnerability scans are not done frequently and many businesses fail to fall back on a more disciplined approach that requires regular scans and remediation   The ever-evolving OT and IoT threat landscape throws up new threats including malware that evade detection   Visibility into threat surfaces is not adequate. Some of the solutions used by businesses are prone to misconfiguration and new vulnerabilities.   OT security teams in many instances are less empowered than their IT counterparts and if the same security team is handling both IT and OT cybersecurity, OT doesn’t get as much attention as it should   Such critical gaps in addressing OT cybersecurity across the infrastructure leave the room wide open for hackers or other adversarial entities to exploit.  You can read more about such threats in the 2022 Threat Landscape Assessment and Analysis Report prepared by Sectrio’s research team.   What is the 2022 IoT and OT Threat Landscape Assessment and Analysis Report all about?  The 2022 Threat Landscape Assessment Report prepared by Sectrio’s Threat Research team tracks and documents the evolution of IoT, OT, and IT cyber threats and their implications for businesses across the globe. It answers many questions that are puzzling cybersecurity decision-makers and other stakeholders alike. Where are the threats coming from? Why are certain sectors getting attacked more often? Which groups and countries are behind these attacks and more importantly what tactics are they using and what impact could such attacks have on businesses in 2022?   It is a must-read for everyone who wishes to understand how the cyber OT and IoT threat landscape changes around the world can impact them and their business. You can download the report here.  

The state of OT and IoT cybersecurity in North America Read More »

2022 threat landscape assessment report

Sectrio releases 2022 IoT and OT threat landscape assessment report 

Report documents a staggering rise in cyberattacks on critical infrastructure and supply chains Sectrio today released the latest edition of its Global OT and IoT Threat Landscape Assessment Report covering the evolving cybersecurity environment surrounding sectors such as manufacturing, oil and gas, smart cities, maritime projects, and critical infrastructure. The report prepared by Sectrio’s threat research and analysis team covers data from over 75 cities across the globe covering over a billion attacks and 10,000 (collective and cumulative) hours of analysis of cyberattacks, malware, hacking tactics, network breaches, Dark Web chatter, data leaks, and other important aspects related to enterprise and critical infrastructure cybersecurity.    The comprehensive threat landscape assessment report has analyzed cybersecurity from five perspectives viz., the evolution of threat vectors, mode of attacks, cyberattacks logged, targets attacked, and cybersecurity gaps exploited. It covers the analysis of stolen data released on the Dark Web and other forums as well.   Key findings from the IoT and OT threat landscape assessment report:  To access the IoT and OT threat landscape assessment report, visit this link: The 2022 Threat Landscape Assessment Report To request additional information, visit this link: Contact Us To try our threat intelligence feeds for free, visit this link: Sign up for free threat Intelligence

Sectrio releases 2022 IoT and OT threat landscape assessment report  Read More »

2022 CISO checklist for cybersecurity success

Presenting the 2022 CISO checklist for cybersecurity success

As per the findings of PwC’s recent annual CEO survey, CEOs across the globe have ranked cybersecurity risks as a bigger concern than the ongoing Covid-19 pandemic, economic volatility, or even climate change.  The survey, covering 4,446 CEOs from 89 countries and territories has offered specific data points around Asia-Pacific, India, Mexico, Central, and Eastern Europe, Malaysia, among other countries. The increasing attention that cybersecurity is receiving comes in the backdrop of a steep rise in cyberattacks globally and in the countries mentioned above. Rising cyber concerns are also underscoring the growing role of CISOs across sectors. With increasing geopolitical concerns in Ukraine, UAE, and in other parts of Asia, cybersecurity leaders and CISOs are also dealing with other challenges such as: Rising regulatory requirements Strained budgets Lack of resources   Compartmentalization of security across organizational silos Talent shortages Specific Organizational cybersecurity posture concerns that are not on the Board’s radar  Burn out and overwhelmed by the pandemic and the disruption caused by it The role of CISOs has been evolving over the last few years with businesses giving them a larger say in the way businesses are run and a share of voice in the decisions of the board. However, in many institutions, the post of CISO has just been created or the role functions with many dependencies on other non-c-suite positions leading to a situation where the support they receive is not timely or is inadequate.  What can CISOs do to address such challenges? Democratize cybersecurity: run bug bounty programs and tabletop exercises by involving employees across the organization. Involve more stakeholders across decision-making layers and teams in all cybersecurity programs Pay attention to vulnerabilities: running vulnerability scans in a disciplined manner and taking prompt action on identified weaknesses and gaps can go a long way in increasing the distance between your assets and a cyber adversary. This should go with other measures such as micro segmenting networks, creating zones of digital priority, and maintaining an updated inventory of all assets and their functions. Promote a culture of pro-active compliance: many standards/frameworks proposed by (or that are part of) NIST, NERC-CIP, IEC 62443, and Zero Trust can be implemented with very little effort and by a simple rejig of operating processes, workflows, and inter-device interactions. Such measures can be taken up for immediate execution. (Check out our compliance kits for more information on how to get this done). Such measures should be taken up routinely and ingrained in the culture of the organization. Build and track cybersecurity checklists: across facilities and systems such as SCADA, PLC, industrial control systems, health and safety systems, remote management systems etc. Address institutional inertia: this is especially true of businesses that have been around for a while. Decisions taken to counter emerging threats to critical asserts may get stuck in layers of decision-making within the organization. By the time the decision is taken, it may be a case of too little too late.    IT-OT and IT-IoT convergence zones or other such zones where different tech streams overlap should receive additional cybersecurity attention. Track API usage: while APIs help ease integration challenges, they are among the biggest sources for cyberattacks. Hackers have been known to use APIs as conduits to open target networks. See if APIs used by your organization are leaking data or access   Clearly define tangible risks and provide solutions: CISOs have been doing this for a while. It is now time to take things to a different level. Identify scenarios that could harm institutional credibility and trust and link them to specific weaknesses or cybersecurity gaps and suggest solutions to address each gap See what your peers are up to: learn more about how they are dealing with similar challenges Watch out for regulatory advisories: in the last 3 weeks, there has been a flurry of advisories from various regulators connected with the ongoing Russia-Ukraine crisis. Such advisories can be passed on to all employees and used to generate cybersecurity awareness on the need to stay alert Study the cybersecurity practices of your vendors and supply chain partners: this may provide some fascinating insights into improving your cybersecurity posture while recommending ways to address gaps in the cybersecurity posture of your vendors and partners may help you earn more collaboration in the future when dealing with a cybersecurity event or for meeting a regulatory demand In sectors such as oil and gas, manufacturing, and utilities, cybersecurity audits should be done with the same level of diligence as that which goes into a health and safety and/or environment safety audit. Avoid burnout: delegate tasks beyond your immediate team. Identify cybersecurity champions from across teams and get them to help your team promote a cybersecurity culture of excellence and diligence Try our rich IoT and OT-focused cyber threat intelligence feeds for free, here: IoT and OT Focused Cyber Threat Intelligence Planning to upgrade your cybersecurity measures? Talk to our IoT and OT security experts here: Reach out to sectrio. Visit our compliance center to advance your compliance measures to NIST and IEC standards: Compliance Center Get access to enriched IoT-focused cyber threat intelligence for free for 15 days   Download our CISO IoT and OT security handbook   Access our latest Global Threat Landscape report  

Presenting the 2022 CISO checklist for cybersecurity success Read More »

Cyberattacks on Ukraine what lurks in the depths

Cyberattacks on Ukraine: what lurks in the depths?

The unprecedented cyberattacks on the Ukrainian Army, defense ministry, and two large banks (Privatbank and Oschadbank) in many ways mark the dawn of a new era of geopolitically motivated cyberattacks. Even if it has or has not come from sources originally attributed to, the whole episode presents many reasons for concern. If a non-state actor is involved, then the ease with which the attacks were carried out is certainly surprising If an APT group affiliated with one of the states involved in the crisis has carried out the attack, then the latest cyberattacks are part of a series of attacks that have occurred over the last few months since the crisis began If the attack was carried out by an actor belonging to a country that is not part of the conflict in any way, then this attack that comes during a season of heightened tensions in the region could tip the scales and cause the first shots to be fired in the conflict due to the sheer scale of provocation. Now, that may not happen in this case, but these attacks could provide a sort of a playbook for other states and their APT groups to emulate to create geopolitical tensions quickly   Attacks on financial services and defense websites is clearly part of an act designed to send a message to some stakeholders involved in the conflict Cyberspace has now become a primary frontier where geopolitical adversaries can fire salvos without exchanging bullets or shots on the actual frontlines on the ground. While some may see this as a way of releasing accumulated geopolitical stress, there is a possibility of such acts spiraling into a full-fledged conflict, if left unchecked Cyberattacks have become a tactic for generating added pressure on the defense forces and the economy of an adversarial state. In the case of Ukraine, we have been reporting a rise in inbound cyberattacks since 2019. Reconnaissance attacks carried out during times of peace by APT groups may generate data and weaknesses that could be exploited during times of geopolitical stress or a conflict With expanding definition of critical infrastructure, a range of citizen-facing services will be turned into targets by adversarial states and actors backed by them. Citizens may even be targeted directly Lastly, such attacks can serve to deflect attention from another crisis or challenge that the adversarial entity may be planning to unleash in the short or long term All of the above are possibilities that could play out. So how can such cyberattacks on critical defense and financial services infrastructure be kept at bay? To defang a cyberattack, you need to not just detect these attacks but detect them early enough. What is even better is if you can catch these adversaries red-handed while they attack targets of low value that serve as traps. Large-scale decoys that mimic multiple elements of such infrastructures can be deployed to confuse and trap cybercriminals. They could also deflect sophisticated cyberattacks from APT groups and evolved hackers. The architecture for such decoy and deception technology involves the simultaneous use of simulation and dissimulation. Simulation involves creating a shadow or fake infrastructure through mimicking, inventing, and decoying fake digital infrastructure that appears authentic enough to keep the intruder engaged in the worthless pursuit of data or access to other resources. Dissimulation covers hiding, digitally camouflaging, and masking data and digital assets to hide them from hackers.  Both these measures can help keep critical infrastructure safe by deflecting cyberattacks and confusing the hackers. Sectrio has evolved multiple models to create such decoys at scale. We are today working with financial, industrial, and critical infrastructure operators globally to create scaled decoys that can be launched faster and keep your digital assets safe from cyber adversaries. Try our rich IoT and OT-focused cyber threat intelligence feeds for free, here: IoT and OT Focused Cyber Threat Intelligence Planning to upgrade your cybersecurity measures? Talk to our IoT and OT security experts here: Reach out to sectrio. Visit our compliance center to advance your compliance measures to NIST and IEC standards: Compliance Center Get access to enriched IoT-focused cyber threat intelligence for free for 15 days   Download our CISO IoT and OT security handbook   Access our latest Global Threat Landscape report  

Cyberattacks on Ukraine: what lurks in the depths? Read More »

Evolving traditional ICS threat hunting to detect new threats

ICS threat hunting needs to evolve to detect new threats

What is threat hunting?  Threat hunting refers to the processes and methodologies involved in seeking to identify threats in your network proactively. Threat hunters work by searching for signs of a breach or compromise (indicators of compromise) to indicate the presence of a threat.    In the case of industrial control systems and OT, the hackers can deploy multiple techniques to hide tracks and footprints and pass the digital divide between various systems to launch sophisticated attacks against ICS. While threat hunting in traditional systems is well established and follows a predictable path, in the case of ICS, there are many challenges to be overcome to make threat hunting more effective.    While MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework has been commonly used to identify tactics, techniques, and procedures (TTP) used by a hacker, the use of this framework for detecting threats related to ICS has not been a smooth affair. This is primarily due to the diverging nature of OT networks and controls as also the lack of visibility that IT network managers take for granted.   Further, the traditional threat hunting practices are designed for IT, and they cannot be extrapolated to cover OT and ICS without losing out on sophisticated actors and threats that may just sneak in.   ICS threat hunting challenges   In ICS, threat hunting should necessarily consider unique assets, logging facilities, devices, embedded firmware, and control systems that converse using traditional protocols. Further, a cyber adversary in an ICS environment would use a range of varied tactics (significantly different from that of an adversary targeting IT) for targeting ICS and OT. This will include tactics to degrade defenses, further network persistence, control manipulation, and damage to assets.   ICS threat hunting can turn into a complicated exercise due to a lack of information at various levels (inventory, patch status, operational dynamics, etc.)   The primary security layer when it comes to ICS threat hunting should involve and cover anti-breach solutions (across network and endpoints), network-level security, tamper detection, and port analysis, the secondary layer is where ICS focus comes in. Programmable Logic Controllers (PLCs) or Remote Terminal Units (RTUs) and other control and coordination instruments and gears should come in for specific attention and these could bear the biggest brunt of a cyberattack.   Data collected from these sources should be used to devise a comprehensive threat hunting policy and execution game plan. Cybersecurity posture can be called robust when the infrastructure is protected using a robust and dynamic mechanism that responds to threats as they emerge. This includes active and passive defenses, inventorization of ICS inventory, patch logs, real-time security monitoring, event logging, and cross-facility coverage.      Critical facilities and infrastructure (especially in manufacturing, oil and gas, and utility plants) linked to health and safety systems should get additional attention as their failure could turn into a catastrophic event    ICS threat hunters should have extensive knowledge of all OT systems, protocols, and security practices. Over the years, different facilities within the same organization separated by geography could have evolved different practices to secure their premises. Threat hunting should consider such variations and constantly evolve to cover new and dynamic threats.  OT and ICS protocol coverage for threat hunting is a non-negotiable requirement.     Finally, ICS threat hunting needs to constantly evolve in line with the changing OT threat landscape in cyberspace. Episodes like the attacks on the Ukrainian power grid and on water treatment plants in Florida and San Francisco have clearly shown that hackers are aware of the gaps in OT and ICS cybersecurity and will stop at nothing to exploit these gaps.    Try our rich IoT and OT-focused cyber threat intelligence feeds for free, here: IoT and OT Focused Cyber Threat Intelligence Planning to upgrade your cybersecurity measures? Talk to our IoT and OT security experts here: Reach out to sectrio. Visit our compliance center to advance your compliance measures to NIST and IEC standards: Compliance Center Get access to enriched IoT-focused cyber threat intelligence for free for 15 days   Download our CISO IoT and OT security handbook   Access our latest Global Threat Landscape report  

ICS threat hunting needs to evolve to detect new threats Read More »

Building an improved industrial control systems cybersecurity governance model

Building an improved industrial control systems cybersecurity governance model  

With rising cyberattacks on industrial control systems, ICS security teams are rushing to put in place an ICS security governance model that doesn’t just secure their control systems but amplifies the impact of institutional cybersecurity measures.   The foundation of a good ICS security governance model rests on 3As viz., awareness, accountability, and authority. Teams invested in ICS security should cover all three, to begin with, so that the fundamentals and the execution machinery and goals are aligned to any model that emerges later. Most organizations find their governance models pitted against bureaucratic inertia, misalignment with leadership goals, lack of accountability, evolutionary path, and specific objectives that are understood and accepted by all. Thus, by faltering in the first steps itself, the governance model doesn’t even get a chance to stand, let alone run.   Across industries such as oil and gas, manufacturing, and utilities, the teams tasked with managing ICS security often run into organizational goals that focus on improving employee productivity and output, meeting production schedules, etc. In such instances, ICS security measures added to control systems are perceived to slow down everything and thereby run counter to institutional priorities. We have all been there, haven’t we?  But with the emergence of new threat actors and independent groups targeting OT and ICS infrastructure, businesses need to take up the task of conceptualizing and deploying an ICS governance model in a hurry. Here are a few steps for ICS security that you can take to get this going: Never reinvent organizational culture: instead, bring a security dimension to the culture by making employees more risk and cybersecurity aware. Your organizational culture should be agile enough to incorporate security-related concerns and measures with ease. Creating a whole new culture might take time and resources and considering the rise in cyberattacks, you may not have that kind of time to get things in place.  Empower the CISO: the alignment in terms of budgets, ultimate authority and decision-making power should lie with the CISO. A CISO should be in a decision making rather than an influencing capacity when it comes to the overall cybersecurity posture and functions in the organization. To learn more, get the CISO handbook now. Go by impact view: every control system owner should be aware of the impact of a cyber incident on their respective operations. All resilience measures should also be linked to every unit and control management team in the organization. For instance, the shop floor could have its understanding of an impact of a targeted cyberattack on it but this understanding should be developed in collaboration with the ICS security teams, and if needed budgets can be assigned at this level along with the required accountability as well.  Measure everything: never keep your objectives at a theoretical level (prevent cyberattacks, address vulnerabilities, etc.) Instead, try and formulate a KPI-based (BRAG) scorecard for each parameter and track it separately and collectively (time to detect (detection time and quality as well) and address threats, time to patch, etc.). Each control area should have these KPIs that are tracked.    Conduct audits periodically to get data on opportunities for improvement. Consider frameworks such as NIST CSF, Zero trust, IEC 62443, etc., to improve basic governance parameters     Try our rich IoT and OT-focused cyber threat intelligence feeds for free, here: IoT and OT Focused Cyber Threat Intelligence Planning to upgrade your cybersecurity measures? Talk to our IoT and OT security experts here: Reach out to sectrio. Visit our compliance center to advance your compliance measures to NIST and IEC standards: Compliance Center Get access to enriched IoT-focused cyber threat intelligence for free for 15 days   Download our CISO IoT and OT security handbook   Access our latest Global Threat Landscape report  

Building an improved industrial control systems cybersecurity governance model   Read More »

Getting your basic cybersecurity practices right

Basic IoT and OT security practices that can significantly reduce your cyber risks

[et_pb_section admin_label=”section”] [et_pb_row admin_label=”row”] [et_pb_column type=”4_4″][et_pb_text admin_label=”Text”] When it comes to IoT and OT security, vendors will tell you how important it is to have a cybersecurity solution in place. Yes, one cannot keep hackers at bay using firewalls or air gaps alone. But in addition to a cybersecurity solution, your industrial control systems (ICS), SCADA systems, PLCs, networks, and IoT devices can certainly do with a lot more diligence in formulating and deploying cybersecurity best practices. We are talking about simple practices that can improve your odds in the fight against hackers and cybercrime. We have put together a few of these important IoT and OT security measures here: Improve patch management: this includes automating the discovery of unpatched systems and application of patches as and when they are made available. The entire lifecycle including the discovery of devices and systems, patch approval, distribution of updates, system and device reboot and finally logging of patch status should be automated Your cybersecurity team should ideally track Common Vulnerabilities and Exposures (CVEs) announcements and in case a patch for a vulnerability is not made available immediately, you can reach out to the OEM and ask for it or quarantine the affected systems till the patch is released. Vulnerabilities as old as months and years have been used in recent instances of  ransomware attacks Know what is connected and why: in some oil and gas, and industrial control system deployments, we came across devices that were of 90’s vintage and not only were they unpatched for years together, but the OT operator in this case was not quite sure about the role of some of the devices. Your device and infrastructure inventory has to be updated frequently and these updates should be managed centrally by an inventory management team   Run tabletop exercise, simulate an event: see how various teams respond to a IoT and OT Security incident, and more importantly, figure out how much of your data and infrastructure is at risk. This is not just from a cyberattack, but also missteps or mistakes in decision-making in the aftermath. It is better to have these errors show up during drills rather than during a real cyberattack  Conduct audits at least once a month to ensure that you are adequately prepared to handle an incident from threat detection to neutralization and continuity of business perspective Always pay more attention to health and safety equipment and controls. Ensure that they are tamper-proof and working with adequate levels of IoT and OT security Sensitize employees on the need to be risk aware at all times. Convey a number to indicate the potential loss that the business could incur because of a cyberattack. This number should be based on analyzed data rather than raw assumptions. These small steps can go a long way in securing your business and in raising awareness among employees. Beyond this, you can also look at going for IoT and OT focused threat intelligence, micro segmentation, and employee certification on cybersecurity to improve your overall IoT and OT security posture.   Try our rich IoT and OT-focused cyber threat intelligence feeds for free, here: IoT and OT Focused Cyber Threat Intelligence Planning to upgrade your cybersecurity measures? Talk to our IoT and OT security experts here: Reach out to sectrio. Visit our compliance center to advance your compliance measures to NIST and IEC standards: Compliance Center Get access to enriched IoT-focused cyber threat intelligence for free for 15 days   Download our CISO IoT and OT security handbook   Access our latest Global Threat Landscape report   [/et_pb_text][/et_pb_column] [/et_pb_row] [/et_pb_section]

Basic IoT and OT security practices that can significantly reduce your cyber risks Read More »

Scroll to Top