{"id":3107,"date":"2022-01-10T07:51:57","date_gmt":"2022-01-10T07:51:57","guid":{"rendered":"https:\/\/itegriti.com\/staging\/?p=3107"},"modified":"2022-01-11T12:33:25","modified_gmt":"2022-01-11T12:33:25","slug":"working-with-cni-requires-your-employees-to-be-on-top-of-security","status":"publish","type":"post","link":"https:\/\/itegriti.com\/staging\/2022\/managed-services\/working-with-cni-requires-your-employees-to-be-on-top-of-security\/","title":{"rendered":"Working With CNI Requires Your Employees to Be on Top of Security"},"content":{"rendered":"<p>[fusion_builder_container hundred_percent=&#8221;no&#8221; hundred_percent_height=&#8221;no&#8221; hundred_percent_height_scroll=&#8221;no&#8221; hundred_percent_height_center_content=&#8221;yes&#8221; equal_height_columns=&#8221;no&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; status=&#8221;published&#8221; background_position=&#8221;center center&#8221; background_repeat=&#8221;no-repeat&#8221; fade=&#8221;no&#8221; background_parallax=&#8221;none&#8221; enable_mobile=&#8221;no&#8221; parallax_speed=&#8221;0.3&#8243; video_aspect_ratio=&#8221;16:9&#8243; video_loop=&#8221;yes&#8221; video_mute=&#8221;yes&#8221; border_style=&#8221;solid&#8221; type=&#8221;legacy&#8221; admin_toggled=&#8221;no&#8221;][fusion_builder_row][fusion_builder_column type=&#8221;1_1&#8243; layout=&#8221;1_1&#8243; spacing=&#8221;&#8221; center_content=&#8221;no&#8221; link=&#8221;&#8221; target=&#8221;_self&#8221; min_height=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; class=&#8221;&#8221; id=&#8221;&#8221; background_color=&#8221;&#8221; background_image=&#8221;&#8221; background_image_id=&#8221;&#8221; background_position=&#8221;left top&#8221; background_repeat=&#8221;no-repeat&#8221; hover_type=&#8221;none&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; border_position=&#8221;all&#8221; border_radius=&#8221;&#8221; box_shadow=&#8221;no&#8221; dimension_box_shadow=&#8221;&#8221; box_shadow_blur=&#8221;0&#8243; box_shadow_spread=&#8221;0&#8243; box_shadow_color=&#8221;&#8221; box_shadow_style=&#8221;&#8221; padding_top=&#8221;&#8221; padding_right=&#8221;&#8221; padding_bottom=&#8221;&#8221; padding_left=&#8221;&#8221; margin_top=&#8221;&#8221; margin_bottom=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221; last=&#8221;true&#8221; border_sizes_top=&#8221;0&#8243; border_sizes_bottom=&#8221;0&#8243; border_sizes_left=&#8221;0&#8243; border_sizes_right=&#8221;0&#8243; first=&#8221;true&#8221;][fusion_text columns=&#8221;&#8221; column_min_width=&#8221;&#8221; column_spacing=&#8221;&#8221; rule_style=&#8221;default&#8221; rule_size=&#8221;&#8221; rule_color=&#8221;&#8221; content_alignment_medium=&#8221;&#8221; content_alignment_small=&#8221;&#8221; content_alignment=&#8221;&#8221; hide_on_mobile=&#8221;small-visibility,medium-visibility,large-visibility&#8221; sticky_display=&#8221;normal,sticky&#8221; class=&#8221;&#8221; id=&#8221;&#8221; margin_top=&#8221;&#8221; margin_right=&#8221;&#8221; margin_bottom=&#8221;&#8221; margin_left=&#8221;&#8221; font_size=&#8221;&#8221; fusion_font_family_text_font=&#8221;&#8221; fusion_font_variant_text_font=&#8221;&#8221; line_height=&#8221;&#8221; letter_spacing=&#8221;&#8221; text_color=&#8221;&#8221; animation_type=&#8221;&#8221; animation_direction=&#8221;left&#8221; animation_speed=&#8221;0.3&#8243; animation_offset=&#8221;&#8221;]<\/p>\n<p>The US Critical National Infrastructure (CNI) has experienced a surge of cyber-attacks in the past two years. The Colonial Pipeline incident is a fine example of how far-reaching the impact of these attacks can be. The employees working in these vertical industries are in danger of being targeted by threat actors, and therefore need to stay on top of their game to help prevent any unnecessary disasters.<\/p>\n<h2>In the President\u2019s words<\/h2>\n<p>Every nation\u2019s CNI is the backbone of society and the national economy. They provide energy to power our homes, schools, hospitals, businesses, and vehicles; maintain our ability to connect, and ensure that we have reliable access to safe drinking water.<\/p>\n<p>\u201cThe cybersecurity threats posed to the systems that control and operate the critical infrastructure on which we all depend are among the most significant and growing issues confronting our Nation,\u201d reads the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/28\/national-security-memorandum-on-improving-cybersecurity-for-critical-infrastructure-control-systems\/\" target=\"_blank\" rel=\"noopener\">Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems<\/a>.\u00a0 \u201cThe degradation, destruction, or malfunction of systems that control this infrastructure could cause significant harm to the national and economic security of the United States.\u201d<\/p>\n<p>\u201cRecent cybersecurity incidents such as SolarWinds, Microsoft Exchange, and the Colonial Pipeline incident are a sobering reminder that U.S. public and private sector entities increasingly face sophisticated malicious cyber activity from both nation-state actors and cybercriminals,\u201d says the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\" target=\"_blank\" rel=\"noopener\">Fact Sheet<\/a> of the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Executive Order on Improving the Nation\u2019s Cybersecurity<\/a>.<\/p>\n<p>To raise awareness on the necessity to defend CNI, <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/10\/29\/a-proclamation-on-critical-infrastructure-security-and-resilience-month-2021\/\" target=\"_blank\" rel=\"noopener\">President Biden proclaimed November 2021 to be Critical Infrastructure Security and Resilience Month<\/a>. In his statement, the President highlighted that \u201cThe threats against our critical infrastructure are increasingly complex and nuanced, and we all must be prepared to better protect ourselves from malicious actors threatening our cyber and physical security.\u00a0 That means staying vigilant, investing in new security measures, being prepared to respond to threats, and collaborating more with our partners.\u201d<\/p>\n<h2>What is the status of CNI security?<\/h2>\n<p>According to a <a href=\"https:\/\/bwc-www-uploads.s3.amazonaws.com\/uploads\/2021\/02\/Bridewell-Consulting_CNI_Report.pdf\" target=\"_blank\" rel=\"noopener\">study by Bridewell Consulting<\/a>, \u201cthe vast majority (86%) of critical national infrastructure (CNI) organizations have experienced cyber-attacks on their operational technology (OT) and industrial control systems (ICS) in the past 12 months,\u201d while \u201cnearly a quarter (24%) have experienced more than 5 successful attacks.\u201d<\/p>\n<p>A key factor impacting the security posture of CNI facilities is the long lifecycles of OT systems. According to the Bridewell Consulting report, \u201ca third (34%) rely on systems that are between 11-20 years old, while 79% use systems aged between six-20 years.\u201d<\/p>\n<p>The convergence of IT and OT technology and exposure of legacy OT systems to the internet is expanding the attack surface for CNI organizations. 84% of the survey respondents confirmed that their OT\/ICS environments are accessible from corporate networks. Coupled with the increased sophistication of adversaries and the work-from-home trends, it is no wonder why attacks against CNI are growing in volume and impact.<\/p>\n<p>A recent <a href=\"https:\/\/applied-risk.com\/resources\/press-release-architecting-the-next-generation-for-ot-security-report-released\" target=\"_blank\" rel=\"noopener\">survey by Applied Risk and Ponemon Institute<\/a> reveals the most common factors that keep the CNI leadership and security teams awake at night.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-3110 size-large\" src=\"https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-1880x1280.jpg\" alt=\"\" width=\"1880\" height=\"1280\" srcset=\"https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-200x136.jpg 200w, https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-400x272.jpg 400w, https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-600x408.jpg 600w, https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-768x523.jpg 768w, https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-800x545.jpg 800w, https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-1200x817.jpg 1200w, https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-1536x1046.jpg 1536w, https:\/\/itegriti.com\/staging\/wp-content\/uploads\/2022\/01\/itegriti_blog76_image1-1880x1280.jpg 1880w\" sizes=\"(max-width: 1880px) 100vw, 1880px\" \/><\/p>\n<p><em>Figure 1: Image courtesy of Applied Risk.<\/em><\/p>\n<h2>What about the people factor?<\/h2>\n<p>People, processes, and technology are the pillars of any effective security program. However, without empowered people, or lacking people, the security foundation is destined to collapse. Despite the importance of people, CNI organizations admit they face critical shortcomings.<\/p>\n<p>The Bridewell Consulting report indicates that \u201ca third (32%) of CNI organizations have reduced their security budgets since the start of the COVID-19 pandemic, which has led to 85% of IT and security teams feeling growing pressure to improve cybersecurity controls for their OT\/ICS environment.\u201d<\/p>\n<p>Under-resourced teams are only one side of the coin. The other challenging side is the lack of skills combined with the increasing responsibilities. In fact, \u201c84% of CNI organizations believe they will be impacted by a critical cyber-skills shortage in the next three to five years.\u201d<\/p>\n<p>The Applied Risk survey findings highlight that lack of understanding of the risk (54%), lack of skilled personnel (51%), and insufficient resources (35%) are among the top pain points that make the management of CNI security difficult. Coupled with the use of unreliable manual processes (51%) and the lack of enabling technologies in the OT networks (59%) it is easy to understand why CNI organizations have become a favorite target of criminals and state adversaries.<\/p>\n<h2>Invest in your people<\/h2>\n<p>The answer to the above concerns and pain points is an investment. Not just in money or time. CNI organizations need to invest in building processes that are fit for the digital era, and they also need to invest in technology that will enable them to detect, isolate and respond promptly against attacks.<\/p>\n<p>But above all, they need to empower their employees to be on top of security. Upskilling and reskilling your people is the best defense against the sophisticated tactics used by attackers. Criminals are no longer targeting technology, rather they target the people of the enterprise. Phishing attacks and impersonation attacks are the top vectors employed by attackers to find their way into the corporate network.<\/p>\n<p>Bridewell Consulting notes in their recommendations that \u201cPerhaps most worrying is the evident lack of cyber security skills that decision-makers openly admit will become a growing problem in the next five years despite many also stating they have the right skills in place. With lack of knowledge\/skills, increase in responsibilities, and burnout identified as the top challenges facing security teams today, organizations will need to invest in improving cyber skills and resources.\u201d<\/p>\n<p>Applied Risk and Ponemon offer the same piece of advice: \u201cMore effort will be needed to develop the OT Security skill pool. There is a growing demand for professionals with OT Security skills. These do not all need to be OT Security specialists, but OT Security needs to be embedded in the profiles of managers, engineers, operators, procurement specialists, and others. Workforce development will be one of the most important means of achieving this goal.\u201d<\/p>\n<h2>How ITEGRITI can help<\/h2>\n<p>ITEGRITI has an excellent, <a href=\"https:\/\/itegriti.com\/staging\/managed-services\/\">comprehensive set of programs<\/a> designed to make your employees less likely to be the root cause of any potential incident. We perform background checks, personnel risk assessments (PRAs), provide end-user training, manage and report user training, and more. Our <a href=\"https:\/\/itegriti.com\/staging\/gsd\/\">experience<\/a> is our token of proof.<\/p>\n<p>If you want to learn how ITEGRITI can help you empower your people, <a href=\"https:\/\/itegriti.com\/staging\/contact\/\">contact our experts<\/a>.<\/p>\n<p>[\/fusion_text][\/fusion_builder_column][\/fusion_builder_row][\/fusion_builder_container]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US Critical National Infrastructure (CNI) has experienced a surge of cyber-attacks in the past two years. The Colonial Pipeline incident is a fine example of how far-reaching the impact of these attacks can be.<\/p>\n","protected":false},"author":10,"featured_media":3113,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[],"_links":{"self":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/3107"}],"collection":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/comments?post=3107"}],"version-history":[{"count":5,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/3107\/revisions"}],"predecessor-version":[{"id":3116,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/posts\/3107\/revisions\/3116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media\/3113"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/media?parent=3107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/categories?post=3107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/staging\/wp-json\/wp\/v2\/tags?post=3107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}