Security managers working with ICS are increasingly concerned about security Security managers working with industrial control systems are increasingly concerned about security, and worried about insufficient information sharing in the industry, according to a new survey.This year, 67 percent of respondents said that the threats to the control systems were moderate to severe, up from 43 percent last year, said Derek Harp, director of ICS global programs at Bethesda, MD-based SANS Institute, one of the authors of the report.“It’s a trend driven by a problem that’s been getting worse,” he said. “There are more incidents being reported, and more awareness at the senior levels of the companies about what their exposures are.”In fact, according to a report released by Booz Allen last week, the number if incidents reported to US authorities increased by 20 percent from 2014 to 2015. Spearphishing attacks, in particular, rose by 160 percent. Spearphishing was the initial attack vector for Operation Clandestine Wolf, one of the biggest attack campaigns of 2015, and attacks on a German steel mill and Ukrainian electricity distributors, the report said. According to the SANS report, 27 percent of respondents said that they had a security breach, while 52 percent said that they were not aware of a breach — only 13 percent said they were sure that they had not been infiltrated.“Knowledge is a big problem here,” said Harp. “There are a lot of undetected problems. It’s widely held that most systems have had some sort of probing, but it’s really hard to know if someone was in there.” These companies are being targeted by a wide variety of attackers, he said, including cybercriminals motivated by financial gain, disgruntled insiders and former employees, and nation states searching for proprietary information.Meanwhile, the number of respondents who said they got intelligence information from industry information-sharing partnerships went down from 45 to 41 percent, and the number who said they got information from government agencies dropped even more, from 44 to 34 percent.This could be an issue of perception, said Harp, and doesn’t necessarily mean that less sharing is actually happening.“People are starved for more information,” he said. “They know that that’s the way to move forward, to understand what’s going on, but not be getting the information they want to be getting.”Meanwhile, there have been efforts to increase information sharing between the public and private sector, he added.However, there are also obstacles to greater openness, he added. “There are forces that work against exposure.” They include worries about damaging a company’s reputation or stock price, and about losing their jobs.But the most disappointing statistic that came out of the survey was that 31 percent of organizations hadn’t completed a security assessment in the last 12 months — and 16 percent of responds said that their organizations have never done a security assessment of their control systems.“People have to step up,” Harp said. “This is a foundational piece. Regardless of what security strategies you might pursue, you pursue them after you have your baseline.”Harp and his colleagues will be presenting the full report at a SANS webinar on Wednesday, June 29. Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe