Page 218 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 218

identifying threats after they have infiltrated a network, true protection is about preventing unauthorized
            access in the first place, ensuring that cyber threats are stopped before they can cause harm.



            Expanding Cyber Risks

            Over the past decade, the manufacturing industry has rapidly integrated IoT devices, robotics, real-time
            analytics, and cloud-based capabilities into more traditional industrial operations. With these connected
            systems and devices now at the heart of many factories, the attack surface for cyber-threats is wider than
            ever.

            As IT/OT convergence accelerates, attackers can more easily exploit IT vulnerabilities to infiltrate OT
            systems.  Indeed,  increased connectivity and  data  visibility  within  the  manufacturing  ecosystem  –  all
            hastened by the recent explosion of digital connectivity – have made it a prime target for cyberattacks. In
            fact, 2024 was the third consecutive year in which the sector experienced its highest number of attacks,
            comprising 25% of all hacks globally.

            Among the most common OT security blind spots is overreliance on outdated network access solutions.
            These solutions often require only one set of credentials across numerous access points, resulting in
            cases where a single set of shared credentials grant a third-party vendor unrestricted access to critical
            systems.  As a result of maliciousness or simple human error, this level of unintended privileged access
            could lead to catastrophic consequences, far beyond financial loss or reputational damage – consider
            that  a  cyber-attack  affecting  equipment  in  a  manufacturing  facility  can  cause  serious  physical
            consequences for workers on the floor.



            Challenges in Securing OT Environments

            The legacy assets present in many OT environments typically lack built-in authentication or encryption,
            making them easy targets for cyberattacks. But upgrading legacy systems can be costly and disruptive,
            leading to patchwork security solutions that create substantial gaps.

            The risk posed by legacy infrastructure is compounded by the fact that manufacturers frequently depend
            on third-party vendors or external contractors for maintenance, software updates, troubleshooting, data
            storage, and more. Traditional remote access solutions, such as VPNs and jump servers, provide no
            visibility or control after the initial connection. Unless additional controls are implemented, third-party
            users who connect via such tools have veritable free rein once they’re inside the network. An oft-cited
            example is the 2021 Colonial Pipeline breach, a ransomware attack where hackers gained entry through
            a compromised VPN password.

            Many industrial organizations also struggle to maintain real-time inventories of connected assets, and
            this issue will only continue to grow if cross-channel monitoring solutions are not put in place. According
            to a 2024 report from Ponemon Institute and Cyolo, as many as 73% of organizations lack an authoritative
            OT asset inventory.  But asset inventories alone are not enough. Once an organization has full visibility
            into its assets, it must proactively secure them. Knowing what’s connected is only half the battle; fortifying






                                                                                                            218
   213   214   215   216   217   218   219   220   221   222   223