Security Market Segment LS
Wednesday, 18 December 2024 09:23

Nozomi Predictions 2025

By Ammar Hindi, Vice President Asia Pacific, Nozomi Networks
Ammar Hindi, Vice President Asia Pacific, Nozomi Networks Ammar Hindi, Vice President Asia Pacific, Nozomi Networks

GUEST OPINION:  Threat Security

“The threat landscape for industrial control systems (ICS), operational technology (OT), and the Industrial Internet of Things (IIoT) is poised for significant evolution in 2025. It is likely more sophisticated attacks will leverage AI for increased accuracy – rather than using the technology to create malicious code – with the aim of making attacks harder to detect and defend against.

“Geopolitical events will translate into increased targeting of critical infrastructure, particularly in sectors like water/wastewater and utilities, with space/satellite systems also becoming prime targets. And in addition, the rise of wireless connectivity through drones, autonomous systems, and other devices will create more opportunities for exploitation, especially given the potential for misconfigurations and insecure deployments.

“While the adoption of secure remote access and best-of-breed security solutions is a positive trend, cost pressures and the need to scale will likely lead to significant churn in the OT security market. This transition period could introduce new vulnerabilities as organisations switch between solutions.

“Finally, the increasing reliance on hybrid SaaS models, while offering benefits, will also expand the attack surface for threat actors as more OT environments integrate with the cloud. Staying ahead of these evolving threats will require a proactive and adaptable security posture.”

Will the ICS/OT/IIoT industries improve in delivering secure products?

“While there will be some improvements, progress in delivering inherently secure ICS/OT/IIoT products is expected to be slow. Although traditional OT now offers multiple secure options, many repurposed IT/IoT and even consumer-grade devices are still being used in OT environments.

“Regulations and standards like the Cyber Security Act and Security of Critical Infrastructure (SOCI) will now require suppliers to provide a statement of compliance for devices supplied to the Australian market. 

“This will help mitigate some of the risks posed by less secure products, but overall, significant improvement in the inherent security of the products themselves will be gradual.”

Attack Surface Management

“The attack surface in industrial environments will increase. This is due to the growing number of IoT devices being deployed as part of digital transformation initiatives and the increased use of wireless communication. Additionally, as traditional IT environments strengthen their defences, industrial environments become a logical next target for attackers, further contributing to the expanding attack surface.”

Threat IntelligenceWill the importance of threat intelligence change in 2025? 

“The importance of threat intelligence will not diminish, but its application will evolve and become more critical in 2025. Automation in threat intelligence management will streamline analysis, reducing delays caused by manual processes. More accurate and curated IT and OT-specific threat intelligence feeds will further enhance the value of this information by reducing noise and information overload, allowing security teams to focus on actionable threats. As such, threat intelligence will be increasingly impactful as it becomes more efficient and relevant to specific industrial environments.”

Will adversaries attempt to manipulate or "poison" threat intelligence data?

“Adversaries are unlikely to attempt to manipulate or “poison” threat intelligence data in the near term (2025). This type of sophisticated manipulation is a longer-term strategy typically associated with state-sponsored APT groups and is less likely to be profitable for ransomware actors focused on more immediate financial gain.”

Expanding attack surfaces in non-traditional sectors highlight the urgent need for broader cybersecurity awareness and proactive defence:

“Cybersecurity is no longer just for IT. All industries, including entertainment, hospitality, and building management, to name just a few – are increasingly vulnerable. Interconnected systems, even those controlling air conditioning or elevators, are potential attack vectors. Attacks now target reputation as well as operations, and there is an urgent need for broader cybersecurity awareness and proactive security measures, especially for often-overlooked systems.”

Threat intelligence sharing is crucial for effective cybersecurity and requires greater public-private and international collaboration:

“Real-time threat intelligence sharing is crucial as cyber attacks continue to become more sophisticated – leveraging AI for speed and scale. To progress cyber security strategies, sharing intelligence and collaboration is key.

The recent amendments to the Cyber Security Act, states that any impacted entity may voluntarily report information in relation to ‘significant cyber security incidents’. The Australian Government may use any information shared, this could open the doors to greater information sharing between public and private entities.

While progress is being made, greater international collaboration is key. Nozomi contributes by sharing its own threat intelligence and integrating multiple feeds into its Guardian solution.”

Evolving cybersecurity regulations, including recent amendments to the Cyber Security Act, are driving higher global standards and increased international collaboration:

“New Australian cybersecurity regulations such as the Cyber Security Act and the Security of Critical Infrastructure (SOCI) are setting a global standard and will impact organisations worldwide in 2025. Even companies that are not Australian will likely face stricter requirements through supply chain pressure. Early adoption will offer a competitive advantage as global businesses prioritise secure partners.”

OT cybersecurity faces challenges from increasing regulations and budget constraints, but the market continues to grow amidst rising competition:

“Tight budgets, increased regulation, and a crowded vendor landscape are key challenges the OT cybersecurity industry will face in the coming months. Despite this, the market continues to grow, driven by rising cyber risk awareness and a growing attack surface.”

Automation, driven by AI, is crucial for addressing the growing volume of vulnerabilities, but OT adoption faces hurdles:

“Automation is essential for addressing the growing complexity of cybersecurity, and in particular AI-driven solutions in OT. While concerns about operational disruption persist, increasing automation adoption is crucial for managing vulnerabilities and evolving threats. AI should empower, not replace human expertise, and it will increase efficiencies in tasks like threat hunting and vulnerability assessment.”

Rapidly transforming cybersecurity landscape driven by AI, cloud migration, automation, and evolving supply chain risks:

“Generative AI, cloud migration, and the rise of 5G/LoRaWAN are the top three technologies that will reshape the cybersecurity landscape in 2025, creating both opportunities and vulnerabilities. Automated incident response and robust supply chain security will therefore be crucial to address the evolving threat environment. Protecting AI systems themselves is also paramount.”

ADDITIONAL COMMENTS

“Drone and satellite vulnerabilities are rapidly expanding the cybersecurity attack surface. Organisations must incorporate these ‘airspace’ threats into their security strategies. As we enter 2025 and beyond, research into these threat vectors and mitigation strategies is vital.”

Read 1132 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




Maximising Cloud Efficiency - LUMEN WEBINAR 23 April 2025

According to KPMG, companies typically spend 35% more on cloud than is required to deliver business objectives

The rush to the cloud has led to insufficient oversight, with many organisations struggling to balance the value of cloud agility and innovation against the need for guardrails to control costs.

Join us for an exclusive webinar on Cloud Optimisation.

In this event, the team from Lumen will explain how you can maximise cloud efficiency while reducing cost.

The session will reveal how to implement key steps for effective cloud optimisation.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments