Dragos’ Lee Advocates for Strengthened IT Cybersecurity to Protect Essential OT Infrastructure

Published:

The Critical Divide: IT vs. OT Cybersecurity in the Age of Rising Threats

In an era where cyberattacks are increasingly targeting operational technology (OT) infrastructure, Robert Lee, CEO of the industrial cybersecurity firm Dragos, has raised a crucial alarm. He warns that relying solely on information technology (IT) cybersecurity measures to protect OT environments can significantly jeopardize industrial organizations. This distinction is vital as the world witnesses a surge in cyber threats against critical infrastructure, including sectors such as energy, water, and manufacturing.

Understanding the Distinction: IT vs. OT Cybersecurity

Lee emphasizes the need for CEOs and board members to recognize the fundamental differences between IT and OT cybersecurity. While IT cybersecurity focuses on protecting data and information systems, OT cybersecurity is concerned with the safety and efficiency of physical processes and equipment. The latter is essential for the operation of critical infrastructure, which impacts nearly every aspect of modern life. As of 2022, critical infrastructure provided electricity to 91% of the global population and clean drinking water to 74%.

The misconception that IT security measures can adequately protect OT systems leads to a false sense of security. Lee argues that this oversight leaves the operational technology that drives revenue production vulnerable to cyber threats. By understanding the unique requirements of OT environments, executives can make informed decisions and hold their teams accountable for implementing effective cybersecurity controls.

The Rising Threat Landscape

Recent incidents underscore the urgency of Lee’s warnings. Cyberattacks targeting programmable logic controllers (PLCs) in water facilities, chemical plants, and manufacturers have become alarmingly common. The espionage threat posed by state actors, such as the Volt Typhoon campaign, continues to loom over critical infrastructure sectors, including energy and transportation. Furthermore, the emergence of malware like FrostyGoop has disrupted heating systems in Ukraine and poses a threat to over 46,000 internet-enabled industrial control system (ICS) devices worldwide.

The World Economic Forum (WEF) has highlighted the escalating risks associated with cyber threats, particularly in light of geopolitical tensions and the ongoing conflict in Ukraine. These attacks often focus on disrupting control systems and compromising data, revealing the vulnerabilities inherent in OT infrastructure.

The Importance of Specialized OT Cybersecurity Measures

To safeguard OT systems, Lee advocates for the implementation of specialized cybersecurity measures tailored to industrial environments. This includes developing incident response plans, building defensible architectures, and ensuring network visibility and monitoring. The SANS Institute has outlined five critical controls for OT cybersecurity, which serve as a roadmap for organizations seeking to enhance their defenses.

  1. Develop an ICS Incident Response Plan: Preparation is key. Organizations must have a clear plan in place to respond to potential cyber incidents.

  2. Build a Defensible Architecture: A robust architecture can help mitigate risks and protect against potential breaches.

  3. Gain ICS Network Visibility and Monitoring: Understanding what is happening within the network is crucial for identifying and responding to threats.

  4. Use Secure Remote Access: As OT systems become more interconnected, secure remote access is essential to prevent unauthorized entry.

  5. Conduct Risk-Based Vulnerability Management: Prioritizing vulnerabilities based on their potential impact on industrial processes is vital for effective risk management.

The Broader Implications of OT Disruptions

The consequences of cyberattacks on OT systems can be dire. Disruptions can lead to outages, shortages, safety hazards, halted production, and significant financial losses. For instance, a cyberattack on a water system can render drinking water unsafe or unavailable, while attacks on energy infrastructure can cause widespread power outages and economic disruption. The ripple effects extend to food processing plants, chip manufacturers, and pharmaceutical companies, threatening public health and global supply chains.

Lee points out that while executives are right to question their chief information security officers (CISOs) about the protection of enterprise data, they must delve deeper into the unique challenges posed by OT environments. Cybersecurity investments often prioritize data protection over the safeguarding of industrial processes, which operate on a massive scale and have specific requirements for availability.

The Path Forward: Embracing Cyber Resilience

As the landscape of cyber threats continues to evolve, Lee underscores the importance of prioritizing cyber resilience as a strategic leadership issue. Organizations must adopt a proactive approach to OT cybersecurity, ensuring that systems can withstand and quickly recover from incidents. The WEF’s Global Cybersecurity Outlook 2025 report emphasizes the need for organizations to enhance their resilience in the face of escalating threats.

Lee concludes that while OT cybersecurity is a newer discipline compared to IT security, it has evolved with a focus on continuity and recovery. By incorporating strategies that protect against cyber threats and ensure operational resilience, industrial organizations can better navigate the complexities of the modern threat landscape.

In summary, as cyber threats to critical infrastructure grow in sophistication and frequency, the distinction between IT and OT cybersecurity becomes increasingly critical. By recognizing this divide and implementing specialized measures, industrial organizations can enhance their defenses and safeguard the vital systems that underpin our modern society.

Related articles

Recent articles

New Products