Security Market Segment LS
Tuesday, 11 January 2022 02:06

Ransomware, OT/ICS threats remain at ‘all time high’, warns Nozomi Featured

By Staff Writer
Nozomi CEO Edgard Capdevielle Nozomi CEO Edgard Capdevielle

Ransomware and threats to operational technology/industrial control system (OT/ICS) environments remain at an all-time high, as do vulnerability disclosures as we enter the new year, warns Nozomi Networks in its look at what’s in store for the world in 2022.

According to Nozomi Networks CEO Edgard Capdevielle, as the U.S. government cracks down on ransomware gangs, in 2022 expect to see attacks move to Europe and elsewhere as threat actors move to easier targets in countries where there is less threat of government retaliation.

“While we’ll continue to see large, multi-million-dollar ransom bounties, there will likely to be a greater volume of smaller bounties using multiple extortion tactics as threat actors find ways to increase the likelihood of a payout while staying under the public radar,” says Nozomi.

“Expect to see breaches of smaller ICS targets, including those in the food industry, as they have smaller budgets for security but face all of the same challenges as larger ICS installations.”

Nozomi cautions that while threat actors will continue to evolve their tactics, victims will also shift responses. Governments and private enterprises are likely to take more offensive actions as more organisations fight back.

“Law enforcement will strengthen its push to recoup bitcoin and increase bounties for information leading to the arrest of cybercriminals. On the private side, expect to see more organisations take matters into their own hands, hiring cyber sleuths and white hat hackers to find and take down cyber attackers.”

Nozomi says that nation-state attacks will rise and with global pressures tightening, 2022 will be a record year for nation-state attacks in number and severity - with Russia continuing to be a leading actor against the U.S., Ukraine and other nations.

Expect Chinese attacks to grow in volume and aggression as hostilities rise over technology bans, financial pressures and diplomatic boycotts of the Winter Olympics. And, as tensions rise in the Middle East, the likelihood is high that a Stuxnet-like attack will disable or severely damage the Iran nuclear weapons program.

And according to Nozomi, critical infrastructure defences will mature significantly – “thanks in part to progress when it comes to public and private cooperative efforts aimed at tightening defences”.

“Government guidelines, mandates, and legislation in combination with self-governance at the sector level will help establish and enforce a standard baseline for critical infrastructure cybersecurity. Standards and best practices (like ISA and NIST) will get more spotlight. While the needle will move significantly, it still won’t be far enough fast enough to match the innovation of our adversaries.”

Nozomi says public/private sectors efforts will begin to shift the landscape in 2022 – “thanks in part to the significant progress made by Jen Easterly to establish CISA as the central point of collaboration and coordination across the infosec community”. 

“Still, it will take a couple of years to see significant improvements in terms of meaningful defences. One sign of this progress will come in the form of new open solutions for information sharing. That includes options that don’t compromise private data and make it possible for public and private sectors organisations to collectively strengthen defences.

Here’s a rundown on Nozomi’s other thoughts on trends that t says will change the cyber landscape this year.

An evolving Purdue model will embrace Zero Trust.

In 2021 Zero Trust began to pop up in OT conversations — but with no clear definition of what it means or how it will be deployed. In 2022, Zero Trust will become a more strategic discussion in OT cybersecurity as organisations evolve their security frameworks to address a new reality of distributed architectures and IoT. Zero Trust policies will begin to address device restrictions and insecure-by-design PLCs, IoT sensors and controllers. At a minimum, OT cybersecurity vendors will have to address visibility and adherence to Zero Trust policies across all OT and IoT devices. This will transform an evolving Purdue model to a more intentional adoption of Zero Trust.

Hyper convergence and the ever-expanding attack surface.

With the massive adoption of IoT devices, and as IT and OT borders have blurred, the attack surface is only getting larger. In 2022, 5G will begin to make it possible to connect the previously unconnected and will drive even more devices into the network. In turn, we’ll see an increased risk to critical infrastructure and ICS. While cloud adoption will not be universal in OT environments, for many, cloud-based cybersecurity solutions will make their way into the mix as CISOs and security professionals look for ways to build and quickly scale cybersecurity enterprise-wide. Expect more organisations to abandon siloed security strategies and adopt hyper-converged solutions that can effectively bridge IT, OT and IoT toward fully addressing cyber-physical risks.

SBOMs and security certifications will become standard fare.

As 2021 ended with the massive Log4J open-source vulnerability disclosure — and in the wake of monumental SolarWinds and Kaseya software supply chain hacks — all during a record year for ICS-CERT vulnerability disclosures, expect to see the large majority of industrial and critical infrastructure organisations begin to demand greater transparency and higher product security standards – and accountability from their software vendors and other third-party providers. Software Bill of Materials (SBOMs) and greater vendor accountability will become standard fare in RFPs and contracts.

The evolving market will reach new heights.

2021 saw hundreds of millions of dollars invested in a few private companies in the OT/ICS space. 2022 will see continued investment, but it will taper off throughout the year as the top 3 OT industry leaders have separated from the pack. The macroeconomic environment (higher interest rates + inflation) will reinforce this tapering.

IoT vendors will continue to target OT opportunities but will find OT vendors may have more success in expanding to their IoT turf. We will likely continue to see some technology acquisitions to help larger security vendors round out or augment their portfolios.

2022: The Year of the Defender

While there’s no doubt that cyber threats will continue to grow and evolve, in 2022 I’m putting my money on the defenders. Last year we turned an important corner. The threat scenarios we’ve discussed for years – and even ones we hadn’t – became real. At the same time IT and OT organisations have continued to come together and grow stronger. So has their perspective and approach to cybersecurity. Today industrial and critical infrastructure cybersecurity is a top priority that in more and more cases is demanding – and receiving – the resources it needs for success. The private and public sector – and even the vendor community are joining forces to help the cause. While building a secure future is a daunting task, based on our experiences with hundreds of customers, partners and peers. around the world, our global defenders are up for the task.

Critical infrastructure defences will mature significantly – thanks in part to progress when it comes to public and private cooperative efforts aimed at tightening defences.

Government guidelines, mandates, and legislation in combination with self-governance at the sector level will help establish and enforce a standard baseline for critical infrastructure cybersecurity. Standards and best practices (like ISA and NIST) will get more spotlight. While the needle will move significantly, it still won’t be far enough fast enough to match the innovation of our adversaries.

Public/private sectors efforts will begin to shift the landscape in 2022 – thanks in part to the significant progress made by Jen Easterly to establish CISA as the central point of collaboration and coordination across the infosec community. Still, it will take a couple of years to see significant improvements in terms of meaningful defences. One sign of this progress will come in the form of new open solutions for information sharing. That includes options that don’t compromise private data and make it possible for public and private sectors organisations to collectively strengthen defences.

An evolving Purdue model will embrace Zero Trust.

In 2021 Zero Trust began to pop up in OT conversations — but with no clear definition of what it means or how it will be deployed. In 2022, Zero Trust will become a more strategic discussion in OT cybersecurity as organisations evolve their security frameworks to address a new reality of distributed architectures and IoT. Zero Trust policies will begin to address device restrictions and insecure-by-design PLCs, IoT sensors and controllers. At a minimum, OT cybersecurity vendors will have to address visibility and adherence to Zero Trust policies across all OT and IoT devices. This will transform an evolving Purdue model to a more intentional adoption of Zero Trust.

Hyper convergence and the ever-expanding attack surface.

With the massive adoption of IoT devices, and as IT and OT borders have blurred, the attack surface is only getting larger. In 2022, 5G will begin to make it possible to connect the previously unconnected and will drive even more devices into the network. In turn, we’ll see an increased risk to critical infrastructure and ICS. While cloud adoption will not be universal in OT environments, for many, cloud-based cybersecurity solutions will make their way into the mix as CISOs and security professionals look for ways to build and quickly scale cybersecurity enterprise-wide. Expect more organisations to abandon siloed security strategies and adopt hyper-converged solutions that can effectively bridge IT, OT and IoT toward fully addressing cyber-physical risks.

SBOMs and security certifications will become standard fare.

As 2021 ended with the massive Log4J open-source vulnerability disclosure — and in the wake of monumental SolarWinds and Kaseya software supply chain hacks — all during a record year for ICS-CERT vulnerability disclosures, expect to see the large majority of industrial and critical infrastructure organisations begin to demand greater transparency and higher product security standards – and accountability from their software vendors and other third-party providers. Software Bill of Materials (SBOMs) and greater vendor accountability will become standard fare in RFPs and contracts.

The evolving market will reach new heights.

2021 saw hundreds of millions of dollars invested in a few private companies in the OT/ICS space. 2022 will see continued investment, but it will taper off throughout the year as the top 3 OT industry leaders have separated from the pack. The macroeconomic environment (higher interest rates + inflation) will reinforce this tapering.

IoT vendors will continue to target OT opportunities but will find OT vendors may have more success in expanding to their IoT turf. We will likely continue to see some technology acquisitions to help larger security vendors round out or augment their portfolios.

2022: The Year of the Defender

While there’s no doubt that cyber threats will continue to grow and evolve, in 2022 I’m putting my money on the defenders. Last year we turned an important corner. The threat scenarios we’ve discussed for years – and even ones we hadn’t – became real. At the same time IT and OT organisations have continued to come together and grow stronger. So has their perspective and approach to cybersecurity. Today industrial and critical infrastructure cybersecurity is a top priority that in more and more cases is demanding – and receiving – the resources it needs for success. The private and public sector – and even the vendor community are joining forces to help the cause. While building a secure future is a daunting task, based on our experiences with hundreds of customers, partners and peers. around the world, our global defenders are up for the task.


Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

VENDOR NEWS