Behind the firewall: a discussion on the evolution of cybersecurity in the utility industry
The utility sector must adapt to a new cybersecurity landscape Image: Matthew Henry on Unsplash
- The utility sector is being transformed - and this process has opened the industry up to a new range of cyber-threats.
- Attacks will continue to escalate in frequency and complexity.
- Here, two industry experts give their views on this new paradigm - and what the sector can do to protect itself and its customers.
The utility industry is undergoing a massive transformation. Everything from the digitalization of critical infrastructure to the relationship between utilities and their customers is in transition. In the past decade, sophisticated organizations have seized on the promise of data from information technology (IT) to optimize operational technology (OT), including legacy power-generation assets, digitally native energy sources and distribution systems. While the push to increase connectivity has helped the utility industry achieve greater efficiency, reduce emissions, and deliver reliable and affordable power to customers, it has also exposed weaknesses in its cyber defenses.
Cyberattacks now threaten the core value proposition for energy companies. Digital OT makes an attractive target for a host of actors whose objectives range from financial gain to sheer disruption - and today, a cyber arms-race is the new normal for utilities and their suppliers. As digital technologies spread through and add value to energy infrastructure, attacks will continue to escalate in frequency and sophistication.
To explore the cyber challenges and opportunities facing the utility industry, Leo Simonovich, Vice President and Global Head of Industrial Cyber and Digital Security at Siemens Energy, and Phil Tonkin, the Principal Security Engineer and Global Head of Cybersecurity Engineering for Operational Technology at National Grid, share their perspectives on the state of the industry.
What is the World Economic Forum doing about making our electricity ecosystem cyber resilient?
Phil, how do you view the evolution of cyber-threats to this industry, and what are you seeing on the ground at National Grid today?
Phil: Over the years, we’ve seen utilities being targeted either for criminal purposes or other nefarious reasons with ever-increasing maturity and an increasing ability to exploit OT systems. The increase in cyber-threats to utilities has grown as attackers and adversaries have become more familiar with the technology that we use. Previously, only cybersecurity professionals working at a utility understood the end products and protocols that were vulnerable to attacks, but now we are moving towards a set of threats which are executed by very talented adversaries who are capable of specifically targeting the industrial sector.
A key reason for this change is that for a long time cybersecurity for the energy sector has been built around the need to improve efficiency by increasing connectivity within organizations. As a consequence, security for utilities was constructed in a way to ensure resilient operations within a very trusted environment. However, as utilities have increasingly adopted digital technologies to improve efficiency and create system-level solutions to balance the grid, companies have unknowingly created new cyber-threats which became very appealing to malicious actors. We’ve seen real movement towards attackers targeting industrial organizations with social or critical infrastructure responsibilities, like us in the energy sector, and also all those in manufacturing, critical healthcare or municipal functions.
Leo, how does Siemens view the cyber-threat to industry?
Leo: At Siemens, we are seeing similar trends. The number of attacks has gone up exponentially, and the sophistication of those attacks is increasing as well. What’s more, these threats are increasingly targeted towards the industrial sector, and in particular towards energy production. The impact of those attacks is what’s really worsened because an attack against the OT environment can result in a shut down - or worse, a safety event.
These attacks are coming increasingly from the convergence of physical and digital worlds. The notion that someone is safe because they’re air-gapped, I think, is largely gone because a significant share of attacks now come from within the plant. Either the attacks are from the office environment into the OT environment – such as a phishing scam – or they are brought in by an intelligent insider carrying malware into the plant environment. This has created a new threat landscape that utilities and operators, as well as OEMs like us, must urgently address. Going forward, solving this problem will require strong partnerships between utilities, like National Grid, and companies like ours that have a long legacy in both manufacturing OT and securing the IT systems that are essential in today’s digital environment.
Don't miss any update on this topic
Create a free account and access your personalized content collection with our latest publications and analyses.
License and Republishing
World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.
The views expressed in this article are those of the author alone and not the World Economic Forum.
Stay up to date:
Cybercrime
Related topics:
The Agenda Weekly
A weekly update of the most important issues driving the global agenda
You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.
More on CybersecuritySee all
Filipe Beato and Jamie Saunders
November 21, 2024