Energy companies have accepted the reality that digital threats can have tangible consequences. This perception is perhaps heightened by recent attacks that were specifically designed to affect physical operations and have proven capable of doing so.In December 2017, FireEye disclosed its discovery of TRITON, an attack framework which is capable of shutting down plant operations as well as producing more serious outcomes. Just six months before that, ESET shed light on Win32/Industroyer, modular malware which can take down ICS systems by speaking to industrial communication protocols and deploying wiper malware. In the survey, 59 percent said their companies increased security investments because of ICS-targeted attacks like Trisis/Triton, Industroyer/CrashOverride and Stuxnet. However, many feel they still don't have the proper level of investment to meet ICS security goals. More than half (56 percent) of respondents to Tripwire's survey felt it would take a significant attack to get their companies to invest in security properly. This may be why just 35 percent of participants are taking a multilayered approach to ICS security - widely recognized as a best practice. Thirty-four percent said they were focusing primarily on network security and 14 percent on ICS device security. Erlin is troubled by these findings:
It's concerning that more than half would wait for an attack to happen before investing properly given what's at stake with critical infrastructure. The energy industry should invest in establishing more robust cybersecurity strategies with a proper foundation of critical security controls and layers of defense.For more detailed findings from the survey: For three steps that can help organizations better protect their ICS resources, click here. Organizations can also learn about how Tripwire's ICS security solutions can help here.