CDSA

Fortinet: 75 Percent of OT Orgs Hit by Intrusions

Three out of four operational technology (OT) organizations experienced at least one cyber intrusion in 2022, and nearly 100 percent of organizations say OT cybersecurity responsibilities will shift from directors and managers to CISOs within the next year.

That’s according to a global 2023 State of Operational Technology and Cybersecurity Report from Fortinet, which examines the current state of OT security and points to the opportunity for continued improvement for organizations to secure an ever-expanding IT and OT threat landscape.

“Fortinet’s 2023 State of Operational Technology and Cybersecurity Report shows that while OT organizations have improved their overall cybersecurity posture, they also have continued opportunity for improvement,” said John Maddison, EVP of products and CMO for Fortinet. “Networking and IT teams are under extraordinary pressure to adapt and become more OT-aware, and organizations are shifting to find and employ solutions that implement security across their entire IT/OT environment to reduce their overall security risk.”

OT continues to be targeted by cybercriminals at a high rate: while the number of organizations that did not incur a cybersecurity intrusion improved dramatically year over year (from 6 percent in 2022 to 25 percent in 2023), there is still significant room for improvement. In fact, three-fourths of OT organizations reported at least one intrusion in the last year. Intrusions from malware (56 percent) and phishing (49 percent) were once again the most common type of incidents reported, and nearly one-third of respondents reported being victims of a ransomware attack in the last year (32 percent, unchanged from 2022).

Cybersecurity practitioners overestimated their OT security maturity, according to the report. In 2023, the number of respondents who consider their organization’s OT security posture as “highly mature” fell to 13 percent from 21 percent the year before, suggesting growing awareness among OT professionals and more effective tools for self-assessing their organizations’ cybersecurity capabilities. Nearly one-third (32 percent) of respondents indicated that both IT and OT systems were impacted by a cyberattack, up from only 21 percent last year.

The connected device explosion underscores complexity challenges for OT organizations: nearly 80 percent of respondents reported having greater than 100 IP-enabled OT devices in their OT environment, highlighting just how significant a challenge it is for security teams to secure an ever-expanding threat landscape. Survey findings revealed that cybersecurity solutions continue to aid in the success of most (76 percent) OT professionals, particularly by improving efficiency (67 percent) and flexibility (68 percent).

However, report data also indicates that solution sprawl makes it more difficult to consistently incorporate, employ, and enforce policies across an increasingly converged IT/OT landscape. And the problem compounds with aging systems, with the majority (74 percent) of organizations reporting that the average age of ICS systems across their organization are between 6 and 10 years old.

Alignment of OT security under the CISO bodes well for the industry, the report found. While nearly every organization faces an up-hill battle when it comes to finding qualified security practitioners due to the growing cybersecurity skills shortage, report findings suggest OT organizations are continuing to prioritize cybersecurity. A key indicator is that nearly every (95 percent) organization plans on placing the responsibility for OT cybersecurity under a chief information security officer (CISO) in the next 12 months rather than an operations executive or team. The findings also reveal that OT cybersecurity professionals now come from IT security leadership rather than product management, and influence on cybersecurity decisions is shifting away from operations and to other leaders, especially CISO/CSO roles.

Fortinet’s global 2023 State of Operational Technology and Cybersecurity Report indicates ways organizations can strengthen their overall security posture. Organizations can address OT security challenges by adopting the following best practices:

• Develop a vendor and OT cybersecurity platform strategy. Consolidation reduces complexity and accelerates outcomes. The first step is to begin building a platform over time by partnering with vendors that engineer their products with integration and automation in mind to enable organizations to consistently incorporate and enforce policies across an increasingly converged IT/OT landscape. Seek to engage with vendors with a wide portfolio of solutions that can provide the basic solutions of asset inventory and segmentation and more advanced solutions, such as an OT security operations center (SOC) or the ability to support a joint IT/OT SOC.

• Deploy network access control (NAC) technology. Solving challenges associated with securing ICS, SCADA, IoT, BYOD, and other endpoints requires advanced network access control to be part of a comprehensive security architecture. An effective NAC solution also helps to maintain complete control of an organization’s network by managing new devices that want to connect or communicate with other parts of the organization’s infrastructure.

• Employ a zero-trust approach. Implement the basic steps of asset inventory and segmentation, and provide continuous verification of all users, applications, and devices seeking access to critical assets.

• Incorporate cybersecurity awareness education and training. Cybersecurity training remains critical as the cybersecurity battle requires the collective empowerment of all employees to have the knowledge and awareness to work together to protect themselves and their organization’s data. Organizations should consider including nontechnical training targeted toward everyone who uses a computer or mobile device, from teleworkers to their families.
A platform approach, with open APIs and a robust fabric-ready technology alliance ecosystem, designed to deliver OT-aware features to secure OT environments enables CISOs and security teams to reduce complexity, increase efficacy in the prevention and detection of ransomware, and speed incident triage, investigation, and response.