Dragos, Inc. released "The 2021 State
of Industrial Cybersecurity: The Risks Created by the Cultural Divide Between
the IT & OT Teams" report from the Ponemon Institute. The new annual report
found only 21% of organizations have achieved full maturity of their ICS/OT
cybersecurity program, in which emerging threats drive priority actions and
C-level executives and the board are regularly informed about the state of
their OT security.
As the frequency and severity of attacks increase, organizations
are struggling to keep ahead of these threats, according to the survey of 603
IT, IT security, and OT security practitioners at the managerial, director, and
C-level. The report finds that 63% of organizations had an ICS/OT cybersecurity
incident in the past two years, and it took an average of 316 days to detect,
investigate and remediate the incident. Digital transformation and trends in
Industrial Internet of Things (IIoT) have greatly expanded cyber risk to the OT
and ICS environment according to 61% of respondents who either agree or
strongly agree.
The study reveals a cultural divide between IT and OT teams that
affects the ability to secure both the IT and the ICS/OT environment. Only 43%
of organizations have cybersecurity policies and procedures that are aligned
with their ICS and OT security objectives. Thirty-nine percent have IT and OT
teams that work together cohesively to achieve a mature security posture across
both environments. Just 35% have a unified security strategy that secures both
the IT and OT environments, despite the need for different controls and
priorities.
"Most organizations lack the IT/OT governance framework needed
to drive a unified security strategy, and that begins with the lack of
OT-specific cybersecurity expertise in the organization," said Steve Applegate,
Chief Information Security Officer, Dragos, Inc. "Bridging the cultural divide
between IT and OT teams is a significant challenge. But organizations must not
fall into the trap of thinking that OT can just be tacked onto an existing IT
program or managed under a general IT umbrella. There are fundamental
differences between the problems and goals of a corporate IT environment-data
safety and security-and industrial environments, where human health and safety,
loss of physical production, and facility shutdowns are real risks. Deep domain
expertise as well as ICS/OT-specific technologies are both required to truly
safeguard industrial systems."
"A majority of C-level executives and boards of directors are
uninformed about the efficiency, effectiveness and security of their ICS/OT
cybersecurity programs,'' said Dr. Larry Ponemon, Chairman and Founder, Ponemon
Institute. "If the board isn't keenly aware of the impact a cybersecurity
incident would have on the bottom line, securing the appropriate amount of
budget for OT programs is much more difficult. As evidenced by the report, this
stems from a lack of clear ownership for ICS/OT risk and who reports that to
the board between engineering, IT, and CISOs."
Cultural differences, technical barriers, and lack of clear
ownership are primary challenges for OT and IT collaboration
The findings of the report suggest that misunderstanding between
the groups, rather than conflict, is the significant issue. Only 32% cite
competition between IT and OT for budget dollars and new security projects and
only 27% have difficulty in converging security teams across IT and OT as an
enterprise-wide security program.
- Half of
respondents state that cultural differences between engineers, security
professionals, and IT staff are the main challenge.
- 44% say there are
problematic technical differences between traditional IT-specific best
practices and what is possible in OT environments, such as patch
management and unique requirements of industrial automation equipment
vendors.
- 43% of respondents
say there is a lack of clear "ownership" on industrial cyber risk and
uncertainty around who leads the initiative, implements the controls and
supports the program.
The risks created by the cultural divide between the IT and OT
teams
- The level of
cybersecurity maturity for ICS/OT is inadequate to meet today's
challenges.
Only 21% of respondents say their ICS/OT program activities have achieved
full maturity, where emerging threats drive priority actions and C-level
executives and the board of directors are regularly informed about the
state of their program. Half of organizations are in the early and middle
stages, while the remaining 29% are late-middle stage.
- C-level executives
and the board of directors are not regularly informed about the
efficiency, effectiveness, and security of the program. Only 35% of
respondents say someone responsible for ICS and OT cybersecurity reports
IT and cybersecurity initiatives to the board of directors. Of these
respondents, 41% say such reporting takes place only when a security
incident occurs.
- Many senior
managers lack awareness of the risks and threats to the OT and ICS
environments, resulting in inadequate resource allocation to manage risk. Less than half
(48%) of respondents say their organizations understand the unique cyber
risks and have specific security processes and policies for OT and ICS
environments. Only 43% of respondents say senior management understands
the cyber risks and provides enough resources to defend OT and ICS
environments.
- Reporting
relationships and accountability for OT security are not properly
structured and become deterrents to investing in OT and ICS. Fifty-six percent
of respondents say the reason for blocking investments is that OT security
is managed by the engineering department which does not have security
expertise, and 53% of respondents say OT security is managed by an IT
department without engineering expertise. Only 12% of respondents say the
CISO is most accountable for the security of the ICS/OT program.
Consequences of an OT cybersecurity incident
The loss of confidence in the system was the number one
consequence of a cybersecurity incident, reported by 54%, followed by sustained
process inefficiency (49%), and loss of control availability (47%). Additional
consequences include:
- Loss of visibility
in the physical process; 41%
- Loss of revenues;
40%
- Loss of public
confidence; 32%
- Unintended,
catastrophic process failures; 30%
Despite the challenges, organizations are focused on making
investments to improve the cybersecurity posture of ICS and OT environments.
Investments in areas that assess weaknesses in the security posture of OT
environments are the top priority according to 60% of respondents. Contributing
to the security posture is gathering threat intelligence specific to their
industry, ICS and OT devices, and geography, (56%), and hiring experts in OT
and ICS cybersecurity (49%).
The full Ponemon
Institute report, "2021
State of Industrial Cybersecurity: The Risks Created by the Cultural Divide
Between the IT & OT Teams," is available for download from Dragos
here.