Skip to content
Contact Sales

83% of critical infrastructure organizations suffered breaches, 2021 cybersecurity research reveals

Supply chain and third-party risk is a major threat to operational technology

SAN JOSE, Calif.
November 9, 2021
News Summary
  • Overconfidence foreshadows future breaches: 73% of CIOs and CISOs “highly confident” they will not suffer an OT breach in the next year
  • Cybersecurity is still an afterthought: Cyber insurance is considered a sufficient solution by 40%
  • Complexity increases risk: 78% of respondents challenged by multivendor complexity
  • Download the full report: Operational technology cybersecurity risk significantly underestimated

A new research study by Skybox Security found that 83% of organizations suffered an operational technology (OT) cybersecurity breach in the prior 36 months. The research also uncovered that organizations underestimate the risk of a cyberattack, with 73% of CIOs and CISOs “highly confident” their organizations will not suffer an OT breach in the next year.

“Not only do enterprises rely on OT, the public at large relies on this technology for vital services including energy and water. Unfortunately, cybercriminals are all too aware that critical infrastructure security is generally weak. As a result, threat actors believe ransomware attacks on OT are highly likely to pay off,” said Skybox Security CEO and Founder Gidi Cohen. “Just as evil thrives on apathy, ransomware attacks will continue to exploit OT vulnerabilities as long as inaction persists.”

The new research, Operational technology cybersecurity risk significantly underestimated, unearths the uphill battle that OT security faces – comprised of network complexity, functional silos, supply chain risk, and limited vulnerability remediation options. Threat actors take advantage of these OT weaknesses in ways that don’t just imperil individual companies – but threaten public health, safety, and the economy.

Key takeaways from the 2021 study include:

Organizations underestimate the risk of a cyberattack

Fifty-six percent of all respondents were “highly confident” their organization will not experience an OT breach in the next year. Yet, 83% also said they had at least one OT security breach in the prior 36 months. Despite the criticality of these facilities, the security practices in place are often weak or nonexistent.

CISO disconnect between perception and reality

Seventy-three percent of CIOs and CISOs are highly confident their OT security system will not be breached in the next year. Compared to only 37% of plant managers, who have more firsthand experiences with the repercussion of attacks. While some refuse to believe their OT systems are vulnerable, others say the next breach is around the corner.

Compliance does not equal security

To date, compliance standards have proven insufficient in preventing security incidents. Maintaining compliance with regulations and requirements was the most common top concern of all respondents. Regulatory compliance requirements will continue to increase in light of recent attacks on critical infrastructure.

Complexity increases security risk

Seventy-eight percent said complexity due to multivendor technologies is a challenge in securing their OT environment. In addition, 39% of all respondents said that a top barrier to improving security programs is decisions are made in individual business units with no central oversight.

Cyber liability insurance is considered sufficient by some

Thirty-four percent of respondents said that cyber liability insurance is considered a sufficient solution. However, cyber liability insurance does not cover costly “lost business” that results from a ransomware attack, which is one of the top three concerns of the survey respondents.

Exposure and path analysis are top cybersecurity priorities

Forty-five percent of CISOs and CIOs say the inability to conduct path analysis across the environment to understand actual exposure is one of their top three security concerns. Further, CISOs and CIOs said disjointed architecture across OT and IT environments (48%) and the convergence of IT technologies (40%) are two of their top three greatest security risks.

Functional silos lead to process gaps and technology complexity

CIOs, CISOs, Architects, Engineers, and Plant Managers all list functional silos among their top challenges in securing OT infrastructure. Managing OT security is a team sport. If the team members are using different playbooks, they are unlikely to win together.

Supply chain and third-party risk is a major threat

Forty percent of respondents said that supply chain/third-party access to the network is one of the top three highest security risks. Yet, only 46% said their organization as a third-party access policy that applied to OT.

Supporting quotes

Navistar, Inc., Information Security Manager Robert Lynch:

“Some CISOs could have false confidence because even though they’ve already been breached, they have not identified this yet; sometimes hackers are there for a long period establishing their foothold. It is dangerous to be confident as the bad guys are so good.”

Skybox Security Research Lab Threat Intelligence Lead Sivan Nir: “Our threat intelligence shows that new vulnerabilities in OT were up 46% versus the first half of 2020. Despite the rise in vulnerabilities and recent attacks, many security teams do not make OT security a corporate priority. Why? One of the surprising findings is that some security team personnel deny they are vulnerable yet admit to being breached. The belief that their infrastructure is safe — despite evidence to the contrary — has led to inadequate OT security measures.”

To learn more, download the full research study.

Methodology

The research study included responses from 179 OT security decision-makers in the U.S., U.K., Germany, and Australia. The majority of the respondents (152) were from companies with $1B or more in revenue within the manufacturing, energy, and utility industries.

 

About Skybox Security

Hundreds of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our Continuous Exposure Management Platform delivers complete visibility, analytics, and automation to quickly map, prioritize, and remediate exposures across enterprise networks and cloud environments. Skybox frees security teams to focus on strategic business initiatives while ensuring enterprises remain protected.

We are Skybox. Secure more, limit less.

© 2021 SC Media. CyberRisk Alliance, LLC. All rights reserved. Used under license.

© 2021 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice.

The industry’s most comprehensive and accurate exposure analysis.

Leadership

Our executive team is comprised of seasoned Silicon Valley business leaders and cybersecurity experts.

Company

We pioneered the leading Security Posture Management Platform that powers proactive cybersecurity programs.