Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Lawmakers have spent the last few years ramping up protections for critical infrastructure assets. Many of those, though, predate the COVID surge. Have they worked? Survey evidence suggests not, especially against cyber-attacks. What’s going on? Read on to find out.
Well, according to the Microsoft Digital Defense Report for last year, cyberattacks targeting critical infrastructure assets jumped from 20 per cent of all nation-state attacks detected to 40 per cent.
What’s behind the trend?
You probably guessed it – the war in Ukraine. The largest increase came as part of Russia’s campaign against Ukraine’s infrastructure, along with its targeting of Ukraine’s allies.
The report also notes Russia’s accelerating attempts to compromise affiliated IT companies, either to disrupt them altogether or gain intelligence from government customers in NATO member countries. Of the 90 per cent of Russian attacks detected, nearly half targeted IT firms in NATO countries.
Nor is Russia alone. The report also cited increased espionage activity from China, Iran, and North Korea. Financial cybercrime is on the rise, as well.
What then can critical infrastructure asset owners and operators do?
For starters, they must consider themselves at risk of attack.
Indeed, the pandemic showed how limited our traditional notion of critical infrastructure was. Now any number of industries – from public health to education to banking – should consider themselves as critical.
Not just that, they should be acting accordingly, by ramping up protections aggressively.
That will entail getting security leaders at these organizations to boost (not relax) their security posture.
Training, here, is key. Too many successful cyberattacks are the product of employee training lapses.
Training, though, isn’t enough.
The digital tools organizations invest in matter, as well.
What can these tools accomplish?
Well, dedicated critical infrastructure protection software technologies can help asset owners and operators (1) adopt and maintain an all-hazards critical infrastructure risk management program, (2) report serious cyber security incidents, and (3) provide ownership and operation information to regulators as required in certain countries and regions.
How so?
Certain features will help asset owners and operators (1) identify and understand risks to their assets, (2) mitigate those risks from becoming incidents, and (3) implement effective governance and oversight processes to ensure continuous improvement.
The relevant features include:
Those features alone don’t scratch the surface of what’s needed in the face of the stark rise in attacks on critical infrastructure assets. For more on the capabilities needed, download our Buyer’s Guide to Critical Infrastructure Protection Technology.