Cyber threats consolidated their position as a high impact and high likelihood risk in this years World Economic Forum Global Risk Report and securing critical Infrastructure featured as a major discussion point. As a result, protecting critical infrastructure from cyber attacks is increasingly becoming a nation security concern and it is essential to put effective plans in place to address the problem.
Andrea Carcano, Co-Founder and Chief Product Officer at Nozomi Networks:
“The World Economic Forum Global Risks Report 2019 saw cyber risks consolidating their position in the global risk landscape as a high impact and high likelihood risk. Attacks against critical infrastructure are increasing becoming a national security concern, demonstrated this year in the GPRS by the second most frequently citied risk interconnection being the pairing of cyber-attacks with critical information infrastructure breakdown. With cyber threats like GreyEnergy, Industroyer and WannaCry along with other types of cyberattacks targeting critical infrastructure growing in frequency and sophistication, it is imperative to put plans in place to address the problem.
With each incursion, both successful but also those that are thwarted, the attackers learn what works, what doesn’t, and what can be improved for the next try. The next attack on critical infrastructure systems could be just around the corner and the potential consequences of not investing in industrial cybersecurity technologies could be numerous and severe. However, as more vulnerabilities and security issues are brought into the open a larger cyber security community is forming that is sharing its expertise and knowledge with a common goal to identify, raise awareness, and provide solutions to cybersecurity challenges. In addition, the innovation and implementation of advanced cybersecurity technologies, such as machine learning and artificial intelligence, are an important step toward safe and reliable critical infrastructure.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.