{"id":16941,"date":"2021-10-04T10:02:03","date_gmt":"2021-10-04T09:02:03","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=16941"},"modified":"2021-10-04T10:12:52","modified_gmt":"2021-10-04T09:12:52","slug":"what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/","title":{"rendered":"What are the trends and challenges in industrial cybersecurity in 2021?"},"content":{"rendered":"\n<p class=\"MsoNormal\"><span lang=\"EN-US\">This first edition of Wavestone&#8217;s Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.<\/span><\/p>\n<h2><span lang=\"EN-US\">What is the state of the threat to industrial information systems?<\/span><\/h2>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">In 2011, the cybersecurity of industrial information systems, suddenly came to the forefront with the Stuxnet attack and the discovery of a state level threat against Operational Technologies (OT). For a decade, Advanced Persistent Threats (APTs) were considered the biggest threat to industrial system security, through impressive and complex attacks, such as the series of &#8220;Black Energy&#8221; attacks against the Ukrainian power grid between 2007 and 2014, or the &#8220;Triton&#8221; attack against the safety systems of a chemical plant in Saudi Arabia in 2017.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">However, the Snake\/EKANS case in 2020 allows us to point out a trend that has been continuously increasing for the past few years: the appearance of ransomware in ICS. These ransomwares are the result of opportunistic attacks on vulnerable systems or are side effects of attacks targeting the corporate IS, as in the case of Colonial Pipeline in May 2021.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">With the ransomware business model becoming sustainable on one hand, and the emergence of increasingly connected industrial IS on the other hand, it is realistic to expect a large increase in opportunistic attacks and ransomware side effects on industrial information systems.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Faced with an increasing threat, companies must implement cybersecurity measures on industrial systems and define coherent strategic goals, but this requires a real investment. Therefore, we have worked on listing ICS cybersecurity domains and the solutions to secure them. This radar is not exhaustive, but it aims to clarify the topic by giving a high-level vision. <\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: center;\" align=\"center\"><span lang=\"FR\"><!-- [if gte vml 1]><v:shapetype id=\"_x0000_t75\"\n coordsize=\"21600,21600\" o:spt=\"75\" o:preferrelative=\"t\" path=\"m@4@5l@4@11@9@11@9@5xe\"\n filled=\"f\" stroked=\"f\">\n <v:stroke joinstyle=\"miter\"\/>\n <v:formulas>\n  <v:f eqn=\"if lineDrawn pixelLineWidth 0\"\/>\n  <v:f eqn=\"sum @0 1 0\"\/>\n  <v:f eqn=\"sum 0 0 @1\"\/>\n  <v:f eqn=\"prod @2 1 2\"\/>\n  <v:f eqn=\"prod @3 21600 pixelWidth\"\/>\n  <v:f eqn=\"prod @3 21600 pixelHeight\"\/>\n  <v:f eqn=\"sum @0 0 1\"\/>\n  <v:f eqn=\"prod @6 1 2\"\/>\n  <v:f eqn=\"prod @7 21600 pixelWidth\"\/>\n  <v:f eqn=\"sum @8 21600 0\"\/>\n  <v:f eqn=\"prod @7 21600 pixelHeight\"\/>\n  <v:f eqn=\"sum @10 21600 0\"\/>\n <\/v:formulas>\n <v:path o:extrusionok=\"f\" gradientshapeok=\"t\" o:connecttype=\"rect\"\/>\n <o:lock v:ext=\"edit\" aspectratio=\"t\"\/>\n<\/v:shapetype><v:shape id=\"Image_x0020_3\" o:spid=\"_x0000_i1026\" type=\"#_x0000_t75\"\n style='width:451.5pt;height:312.5pt;visibility:visible;mso-wrap-style:square'>\n <v:imagedata src=\"file:\/\/\/C:\/Users\/ALEXAN~1.MAZ\/AppData\/Local\/Temp\/msohtmlclip1\/01\/clip_image001.jpg\"\n  o:title=\"\"\/>\n<\/v:shape><![endif]--><!-- [if !vml]--><!--[endif]--><!-- [if gte vml 1]><v:shape id=\"Image_x0020_4\"\n o:spid=\"_x0000_i1025\" type=\"#_x0000_t75\" style='width:430.5pt;height:298pt;\n visibility:visible;mso-wrap-style:square'>\n <v:imagedata src=\"file:\/\/\/C:\/Users\/ALEXAN~1.MAZ\/AppData\/Local\/Temp\/msohtmlclip1\/01\/clip_image003.jpg\"\n  o:title=\"\"\/>\n<\/v:shape><![endif]--><!-- [if !vml]--><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-16942 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/3.jpg\" alt=\"\" width=\"1040\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/3.jpg 1040w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/3-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/3-56x39.jpg 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/3-768x532.jpg 768w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-16944 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/4.jpg\" alt=\"\" width=\"1040\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/4.jpg 1040w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/4-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/4-56x39.jpg 56w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/4-768x532.jpg 768w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\" \/><!--[endif]--><\/span><\/p>\n<h2>\u00a0<\/h2>\n<h2><span lang=\"EN-US\">Methodology<\/span><\/h2>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">For <b>five months<\/b>, this radar was built with <b>five experts <\/b>in cybersecurity of Industrial IS, in addition to the hundred consultants of Wavestone&#8217;s industrial cybersecurity offer.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">This radar has two parts (we will call them dials): one is presenting cybersecurity <b>products<\/b> specialized in industrial IS and the other is presenting the different <b>domains<\/b> of industrial IS cybersecurity, sorted by maturity level.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Industrial cybersecurity <b>products<\/b> are identified as such according to the following criteria:<\/span><\/p>\n<ul>\n<li class=\"MsoListParagraphCxSpFirst\" style=\"text-indent: -18.0pt; mso-list: l1 level1 lfo1;\"><span lang=\"EN-US\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/span><!--[endif]--><span lang=\"EN-US\">They meet a need in the process of securing industrial information systems<\/span><\/li>\n<li class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -18.0pt; mso-list: l1 level1 lfo1;\"><span lang=\"EN-US\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/span><span lang=\"EN-US\">They are adapted to an industrial environment in terms of hardware and software:<\/span><\/li>\n<\/ul>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 72.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l1 level2 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-US;\">\u00b7<span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><!--[endif]--><span lang=\"EN-US\">The hardware is rugged to withstand harsh conditions and\/or has a long service life<\/span><\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 72.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l1 level2 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-US;\">\u00b7<span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><!--[endif]--><span lang=\"EN-US\">Network security products consider industrial protocols<\/span><\/p>\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 72.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l1 level2 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: EN-US;\">\u00b7<span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><!--[endif]--><span lang=\"EN-US\">Terminal security products are compatible with obsolete systems.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">The cybersecurity <b>domains<\/b> are also selected and evaluated based on the <\/span><span lang=\"FR\"><a href=\"https:\/\/lu.wavestone.com\/en\/insight\/industrial-sites-cybersecurity-benchmark-on-40-assessments\/\"><span lang=\"EN-US\" style=\"color: #7030a0; mso-ansi-language: EN-US;\">observations<\/span><\/a><\/span> <span lang=\"EN-US\">of our consultants in the field, with various customers in varied industrial domains, but in the French context.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">The rest of this article highlights some of the important ICS domains, from the most mature to the most emerging. This analysis echoes and updates our <\/span><span lang=\"FR\"><a href=\"https:\/\/lu.wavestone.com\/en\/insight\/the-protection-and-security-of-ics\/\"><span lang=\"EN-US\" style=\"color: #7030a0; mso-ansi-language: EN-US;\">2019 publication<\/span><\/a><\/span> <span lang=\"EN-US\">presenting feedbacks on ICS protection and security. Indeed, if the main topics remains the same (e.g. IT\/OT separation), the players and their maturity evolve quickly, bringing new issues and transforming the old ones.<\/span><\/p>\n<h2><span lang=\"EN-US\">Which basis should be used to secure an industrial network?<\/span><\/h2>\n<h3><span lang=\"EN-US\">People, procedures, and resilience<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">The strengths and weaknesses of industrial IS and management IS are different. To implement effective cybersecurity measures in an industrial IS, one must first understand the levers already present in Industrial IS that can be useful for cyber security.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">First, the operators in industrial production networks are very familiar with the processes and the usual functioning of the production system. In addition, procedures in the event of an incident are much more developed than in corporate IS. Together, these elements give a capacity to detect malfunction and to respond efficiently. A clever way to improve this <\/span><span lang=\"FR\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/cyber-resilience-in-an-industrial-environment\/\"><span lang=\"EN-US\" style=\"color: #7030a0; mso-ansi-language: EN-US;\">resilience capacity<\/span><\/a><\/span> <span lang=\"EN-US\">is to add cyber incident detection procedures based on the teams&#8217; current knowledge.<\/span><\/p>\n<h3><span lang=\"EN-US\">Network knowledge<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Knowing your network makes it easier to secure the IS and maintain it in secure conditions by allowing risk analysis, network segmentation, vulnerability and patch management, regulatory compliance, etc.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">It is possible to carry out this exhaustive inventory by hand on a regular basis, especially by using industrial maintenance tools. To go further, it is possible to automate the task with free mapping tools (Dragos CyberLens, GrassMarlin). Finally, probes (Nozomi, Claroty, Dragos, etc.) can go much further by automating the detection of anomalies on the network or even by helping with incident response.<\/span><\/p>\n<h3><span lang=\"EN-US\">Backup and recovery<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">The best resilience weapon against ransomware is the systematic and, if possible, offline backup of critical data for the production system. This practice is more and more implemented in OT systems. <\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">However, additional conditions are necessary for backups to be truly useful. First, all the data needed for the system to function must be identified. This data can be either technical data (machine configuration for example) or business data. A risk analysis allows you to identify it efficiently. Finally, you must ensure that you are able to restore a functional system from the backups made, especially for certified systems.<\/span><\/p>\n<h2><span lang=\"EN-US\">What are the opportunities in 2021?<\/span><\/h2>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Our study has enabled us to highlight effective measures to greatly increase the security level of an industrial IS.<\/span><\/p>\n<h3><span lang=\"EN-US\">Segmenting your network<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Network segmentation has been around for several years. However, it is still an important step in securing your industrial network. Having a segmented network allows to efficiently prevent the propagation of an attack and therefore its impact.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">In addition to the use of appropriate firewalls, a network segmentation project requires competent architecture and integration teams with sufficient time and resources. Network segmentation is a balance between security and business needs. The use of new &#8220;Software Defined&#8221; network technologies allows to perform segmentation in a more agile way.<\/span><\/p>\n<h3><span lang=\"EN-US\">Separate the management network from the industrial network<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">The connection of industrial IS to corporate IS is necessary today, but it is also a vector of risk.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">The solutions to be implemented depend on the criticality of the industrial network and the necessary flows between the two networks. However, a single interface between the two networks must always be favored to maintain control over this particularly critical interface.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">A complete range of products exists, from firewalls to data diodes. A good practice is to assemble several of these solutions within a DMZ, to control the services that can communicate between the two networks.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Nevertheless, IT\/OT separation goes far beyond the network issue discussed above. In terms of identity, the separation of the Active Directory (AD) between the management network and the industrial network must also be addressed. From a security perspective, it is best, if the resources are available, to separate these two ADs to avoid the spread of attacks. However, the ADs can also be linked by closely controlling authorized flows and\/or providing remediation if one of the two ADs is compromised.<\/span><\/p>\n<h3><span lang=\"EN-US\">Identify network users<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">A particularity of identity management in ICS is the strong presence of shared workstations. In this situation, an adapted solution must allow several users to work on the same machine in an authenticated way, thus allowing to identify the actions of each one.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">In this case, the model where each user has his own Windows session is not adapted. A possible solution is to set up a generic Windows session on which the user authenticates himself in a simple and fast way thanks to a badge and a Fast Switching software.<\/span><\/p>\n<h2><span lang=\"EN-US\">What are the next major cybersecurity projects for industrial IS?<\/span><\/h2>\n<h3><span lang=\"EN-US\">SOC<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Several Managed Security Services Providers (MSSP) are starting to propose ICS specialized Security Operation Centers (SOC). However, these SOCs should not be considered as miracle solutions: it is above all by knowing your business and all its particularities that the SOC can be effective.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">A key aspect when setting up an industrial SOC is to clearly define a scope that is correlated with the cyber maturity of the IS. In an industrial cyber SOC, only cyber incidents should be dealt with, without considering purely operational events, which are already handled by the supervision system.<\/span><\/p>\n<h3><span lang=\"EN-US\">Third party security<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Supply chain management, both in IT and OT, is becoming one of the most important cyber topics. REvil&#8217;s attack on Kayesa and its customers in July 2021 gives an idea of the possibilities of a supply chain attack: the attacks reach a new scale and can affect hundreds or even thousands of organizations at once. Obviously, industrial IS also involves third parties and are therefore not immune. For example, the compromise of a PLC vendor could impact numerous customers.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Third party attacks can take different forms, including the following examples:<\/span><\/p>\n<ul>\n<li class=\"MsoListParagraphCxSpFirst\" style=\"text-indent: -18.0pt; mso-list: l0 level1 lfo2;\"><span lang=\"EN-US\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/span><!--[endif]--><span lang=\"EN-US\">Access to the IS by using a software update with a trojan inside<\/span><\/li>\n<li class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -18.0pt; mso-list: l0 level1 lfo2;\"><span lang=\"EN-US\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/span><!--[endif]--><span lang=\"EN-US\">Theft of data stored by a third party<\/span><\/li>\n<li class=\"MsoListParagraphCxSpLast\" style=\"text-indent: -18.0pt; mso-list: l0 level1 lfo2;\"><span lang=\"EN-US\"><span style=\"font-variant-numeric: normal; font-variant-east-asian: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/span><!--[endif]--><span lang=\"EN-US\">Access to the IS via a remote access, for example used by the third party to perform maintenance<\/span><\/li>\n<\/ul>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Protecting oneself from supply chain attacks is particularly complex. However, tools exist. First, it is essential to know your supply chain and the risk related to each third party. Third parties at risk can then be subject to measures to reduce the chances of compromise such as a Security Assurance Plan (SAP) or regular audits. <\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Remote access to the IS can be controlled by using Bastions or privileged access management (PAM) solutions, which monitor all actions made by the third party and finely manage their rights. However, this solution can become a constraint for the user, therefore it is advised to focus on the user&#8217;s needs to propose the most relevant solutio.<\/span><\/p>\n<h3><span lang=\"EN-US\">Cloud<\/span><\/h3>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Still mainly confined to secondary functions such as inventory and supply management, the cloud is gradually making its way into industrial IS with the development of <\/span><span lang=\"FR\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/02\/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects\/\"><span lang=\"EN-US\">Industry 4.0<\/span><\/a><\/span><span lang=\"EN-US\">. By doing so, it allows, for example, global IoT terminals management in production sites or optimizing server sizing.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">But this change also raises security issues. Some of these issues have already been addressed with the democratization of the cloud in management information systems, but others have yet to be resolved. How to manage the security of IoT devices? How can cloud systems be integrated into critical environments, which are highly regulated? Who stores the data and what regulations apply?<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This first edition of Wavestone&#8217;s Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the&#8230;<\/p>\n","protected":false},"author":1358,"featured_media":16935,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3977,3274],"tags":[2943,3466,3201],"coauthors":[3253,3988],"class_list":["post-16941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-focus","category-manufacturing-industry-4-0-en","tag-ics","tag-industry","tag-radar-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the trends and challenges in industrial cybersecurity in 2021? - RiskInsight<\/title>\n<meta name=\"description\" content=\"This first edition of Wavestone&#039;s Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the trends and challenges in industrial cybersecurity in 2021? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"This first edition of Wavestone&#039;s Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-04T09:02:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-04T09:12:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benoit Bouffard, Leo Pernet-Mugnier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benoit Bouffard, Leo Pernet-Mugnier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/\"},\"author\":{\"name\":\"Benoit Bouffard\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/76fd6a2a167c6311c91a613ee6c9fe9f\"},\"headline\":\"What are the trends and challenges in industrial cybersecurity in 2021?\",\"datePublished\":\"2021-10-04T09:02:03+00:00\",\"dateModified\":\"2021-10-04T09:12:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/\"},\"wordCount\":1776,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg\",\"keywords\":[\"ICS\",\"Industry\",\"radar\"],\"articleSection\":[\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/\",\"name\":\"What are the trends and challenges in industrial cybersecurity in 2021? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg\",\"datePublished\":\"2021-10-04T09:02:03+00:00\",\"dateModified\":\"2021-10-04T09:12:52+00:00\",\"description\":\"This first edition of Wavestone's Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg\",\"width\":780,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the trends and challenges in industrial cybersecurity in 2021?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/76fd6a2a167c6311c91a613ee6c9fe9f\",\"name\":\"Benoit Bouffard\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/benoit-bouffard\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the trends and challenges in industrial cybersecurity in 2021? - RiskInsight","description":"This first edition of Wavestone's Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/","og_locale":"en_US","og_type":"article","og_title":"What are the trends and challenges in industrial cybersecurity in 2021? - RiskInsight","og_description":"This first edition of Wavestone's Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/","og_site_name":"RiskInsight","article_published_time":"2021-10-04T09:02:03+00:00","article_modified_time":"2021-10-04T09:12:52+00:00","og_image":[{"width":780,"height":520,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg","type":"image\/jpeg"}],"author":"Benoit Bouffard, Leo Pernet-Mugnier","twitter_misc":{"Written by":"Benoit Bouffard, Leo Pernet-Mugnier","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/"},"author":{"name":"Benoit Bouffard","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/76fd6a2a167c6311c91a613ee6c9fe9f"},"headline":"What are the trends and challenges in industrial cybersecurity in 2021?","datePublished":"2021-10-04T09:02:03+00:00","dateModified":"2021-10-04T09:12:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/"},"wordCount":1776,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg","keywords":["ICS","Industry","radar"],"articleSection":["Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/","name":"What are the trends and challenges in industrial cybersecurity in 2021? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg","datePublished":"2021-10-04T09:02:03+00:00","dateModified":"2021-10-04T09:12:52+00:00","description":"This first edition of Wavestone's Industrial Control Systems (ICS) Cybersecurity Radar comes at a very special time. On one hand, the health and economic crisis context is considerably weakening the companies that manage critical infrastructures. On the other hand, the cyber threat is increasing, with ransomware affecting critical systems more and more often. It is no longer enough to ask the question of how to prevent cyber-attacks: one must also plan how to react in case of a crisis, how to quickly isolate a critical industrial system and how to quickly restore a compromised system.In this article, we expose our vision of the market and the maturity of cybersecurity for industrial information systems (IS), as well as our convictions and analysis on the subject.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1.jpg","width":780,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/what-are-the-trends-and-challenges-in-industrial-cybersecurity-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"What are the trends and challenges in industrial cybersecurity in 2021?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/76fd6a2a167c6311c91a613ee6c9fe9f","name":"Benoit Bouffard","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/benoit-bouffard\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/16941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1358"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=16941"}],"version-history":[{"count":16,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/16941\/revisions"}],"predecessor-version":[{"id":16965,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/16941\/revisions\/16965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/16935"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=16941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=16941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=16941"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=16941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}