Industry regulations and standards are driving OT security priorities

When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments, according to Claroty.
In Claroty's previous survey conducted in 2021, 32% of ransomware attacks impacted IT only, while 27% impacted both IT and OT. Today, 21% impact IT only, while 37% impact both IT and OT - a significant 10% jump for the latter in just two years.
This trend speaks to the expanding attack surface area and risk of operational disruption that comes with IT/OT convergence.
On top of the growing operational impact of ransomware, the staggering financial impact persists.
Of the 75% of respondents whose organizations were targeted by ransomware attacks in the past year, 69% paid the ransom, and 54% of those who paid the ransom suffered financial ramifications of $100,000 USD or more.
As a likely result, demand for cyber insurance is high among respondents.
80% of organizations have cyber insurance policies and 49% have opted for policies with coverage of half a million dollars or more.
The pressure of combating increased threats as well as financial loss comes as new technologies are being integrated into OT environments.
61% of respondents are currently utilizing security tools that leverage generative AI and an alarming 47% say that it raises their security concerns.
In light of these challenges brought on by combating ransomware and integrating new technology, governments have recognized the need for industry regulations and standards, which are now driving OT security priorities and investments.
45% of respondents say that TSA Security Directives have had the most significant impact on their organization's security priorities and investments, followed by CDM DEFEND and ISA/IEC-62443.
Progress and advancements in processes and technology.
While implementing generative AI may be giving some pause, progress and advancements are being made to close gaps in processes and technology.
The pace of vulnerability disclosures and patch releases are outpacing organizations' ability to address them; as a result, organizations are exploring a variety of risk scoring methods to help prioritize.
The most popular methods are the Common Vulnerability Scoring System, used by 52% of global respondents, followed by existing security solutions' risk scores, the Exploit Prediction Scoring System, and the Known Exploited Vulnerabilities Catalog.
The top OT security initiatives that respondents plan to implement in the next year are risk assessment, followed closely by asset, change, and/or lifecycle management and vulnerability management.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 13 Dec 2023 04:13:05 +0000


Cyber News related to Industry regulations and standards are driving OT security priorities

Making the Law Accessible in Europe and the USA - Earlier this month, the European Union Court of Justice ruled that harmonized standards are a part of EU law, and thus must be accessible to EU citizens and residents free of charge. While it might seem like common sense that the laws that govern us ...
3 months ago Eff.org
Navigating eSIM Policies and Regulations - As eSIM technology becomes more widely adopted, we can expect to see even more devices and carriers offering support for this new generation of SIM cards. eSIM, which stands for embedded SIM, is a new generation of SIM card technology that's soldered ...
6 months ago Hackread.com
How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance - Based on the author's more than 25 years of experience of management in the aluminum industry, this article sets out replicable ways of dealing with and harmonizing competing priorities. Currently within the purview of the Department of Homeland ...
2 months ago Cyberdefensemagazine.com
Industry regulations and standards are driving OT security priorities - When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments, according to Claroty. In Claroty's previous survey conducted in 2021, 32% of ransomware attacks impacted IT only, while 27% impacted ...
6 months ago Helpnetsecurity.com
Securing the Digital Frontier - As we navigate through a world brimming with data, understanding the evolving landscape of data protection is not just a necessity but a responsibility. This intricate dance among technology, societal norms, and regulatory frameworks shapes our ...
5 months ago Feeds.dzone.com
Understanding The Impact of The SEC's Cybersecurity Disclosure Regulations - Corporate security and compliance teams are scrambling to understand the implications of the U.S. Security and Exchange Commission's recently announced cybersecurity disclosure and reporting regulations. While the need to report 'material ...
6 months ago Cyberdefensemagazine.com
What Is a SaaS Security Checklist? Tips & Free Template - SaaS security checklists are frameworks for protecting data and applications in cloud-based environments. These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee ...
2 months ago Esecurityplanet.com
A Solution to Discover and Remediate Data Security Risks in Hybrid Multicloud Environments - PRESS RELEASE. SANTA CLARA, Calif., Nov. 27, 2023 - Fortanix® Inc., a leader in data security and pioneer of Confidential Computing, today announced Key Insight, a new industry-first capability in the Fortanix Data Security Manager TM platform ...
7 months ago Darkreading.com
The reality of hacking threats in connected car systems - The automotive industry faces new cybersecurity challenges as vehicles become more connected. All parties in the manufacturing supply chain should follow key principles for vehicle cybersecurity, such as organizational security, risk assessment and ...
5 months ago Helpnetsecurity.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
1 year ago Securityweek.com
Cybersecurity Standards vs Procedures vs Controls vs Policies - Four interrelated terms used in cybersecurity are Policies, Procedures, Standards, Guidelines, and Controls. Policies are at the top, Standards and Guidelines add detail to policies, Controls are the measured outcome of standards in use, and ...
5 months ago Securityboulevard.com
REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL CERTIFICATION - The Certified Cloud Security Professional is a highly respected cybersecurity certification that addresses the needs of professionals and employers for robust and adaptable cloud security expertise. As cyber threats continue to escalate, the demand ...
5 months ago Cybersecurity-insiders.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 month ago Blog.checkpoint.com
Gaining Insights on the Top Security Conferences - A Guide for CSOs - Are you a CSO looking for the best security events around the world? Well, you have come to the right place! This article is a guide to the top security conferences that offer essential security insights to help make informed decisions. Security ...
1 year ago Csoonline.com
Latest Information Security and Hacking Incidents - According to 25% of participants in an IBM study conducted in September 2022 among 3,000 companies and tech executives worldwide, security worries stand in the way of their ability to achieve their cloud-related goals. Nowadays, a lot of ...
6 months ago Cysecurity.news
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
6 months ago Securityzap.com
Salt Security Delivers API Posture Governance Engine - PRESS RELEASE. PALO ALTO, Calif., Jan. 17, 2024 /PRNewswire/ - Salt Security, the leading API security company, today announced multiple advancements in discovery, posture management and AI-based threat protection to the industry leading Salt ...
5 months ago Darkreading.com
Social Distortion: The Threat of Fear, Uncertainty and Deception in Creating Security Risk - In offensive security, there are a range of organization specific vulnerabilities that create risk, from software/hardware vulnerabilities, to processes and people. While Red Teams can expose and root out organization specific weaknesses, there is ...
1 month ago Securityweek.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com
Cybersecurity in the Healthcare Industry: Protecting Patient Data - In the rapidly advancing era of technology, the healthcare industry faces a critical challenge: protecting patient data from cyber threats. This article will emphasize the significance of cybersecurity in the healthcare industry and explore the ...
5 months ago Securityzap.com
A Comprehensive Look at the Financial Firms in European Union and Their Rules on Cloud-Based Services - Today's technology has opened up a world of possibilities for financial firms, especially with cloud-based services. Financial institutions are now able to access a great deal of information over the internet in an efficient and timely manner. ...
1 year ago Tripwire.com
How Smart Car is Probably Tracking You? - According to ExpressVPN, there's a concerning number of car manufacturers that collect data on their drivers, and an impressive 84% of them then share or sell this data. Connected to the car's Wi-Fi network, modern smart cars' infotainment systems ...
6 months ago Cybersecuritynews.com
Top 3 Priorities for CISOs in 2024 - As the new year begins, CISOs gather with their security teams and corporate management to scope out top priorities for 2024 and how to address these issues. This year - with a multitude of new privacy laws, Securities and Exchange Commission ...
5 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)