When we think about critical infrastructures, we tend to think about energy. Whether electric power lines or supplies to oil and gas, cut off access to energy, and our worlds go dark. Though you can certainly argue that other industries are just as criticalâpharmaceuticals, food supply and othersâit is the energy sector that seems to be most aware of the need to secure its underlying infrastructure.
It is also the sector that is most likely to come under attack from nation state threats, according to Barak Perelman, co-founder and CEO of cybersecurity company Indegy. âWhen thinking about critical infrastructure, you and I think of energy,â he says. âThe same thing goes for the adversaries. Theyâre targeting the energy sector.â
The right direction
The cybersecurity trend is positive in the energy sector, but still a bit too slow, Perelman says. âCompared to the financial sector, 10 years ago, they started being hacked more and more. In a year or two, they started building all the walls and protection measures,â he describes. âFive years from now, the energy sector will be well protected. Many of the stakeholders are trying to push the inevitable. We can have everything set up a year or two from now. Unfortunately, it will be more like five years from now.â
Itâs not for a lack of available technology in the marketplace, Perelman insists. Budget is often a problemâsometimes no margins to work with, and every dollar meticulously calculated, he says. Also, itâs often the small cybersecurity companies with the cutting-edge technologies, but end users can be reluctant to work with small companies.
Indegy, for one, has been trying to gain more visibility in the market, and has been putting more emphasis on working with large partnersâpromising announcements in the coming months about collaborations with giants in the sector.
The company was founded with a strong understanding of how industrial control systems operate as well as cybersecurity. Its founders were all part of the Israeli Defense Force (IDF) previously, and understand the physical as well as psychological ramifications of cyber attacks targeting the energy sector.
Help from IT
A key development that Perelman has seen over the past three or four years is that more and more IT executives for end usersârefineries, midstream and upstream oil and gas operations, power generationâare seeing the need to protect the operations side. He comments, âThree years ago, there was a lot of confusion: Should we protect that? Who should be responsible? Facilities? IT people?â
But as those questions shake out, itâs typically from the board level that the requirements come to provide security for the industrial environment. âItâs the board putting that on the agenda in the energy sector,â Perelman says. âAnd when the board puts it on the agenda, they prefer to have the CIO or CISO lead that practice.â
Thatâs why, while the Offshore Technology Conference (OTC) was going on last month at NRG Park in Houston, Perelman was scheduled to speak across town at the CIO Energy Summit. IT leaders at manufacturing companies need to learn whatâs required when it comes to protecting the industrial control systems (ICS). âIn the past 10 years, heâs only been dealing with IT systems. Now he has to protect all these new components that heâs not familiar with,â Perelman says.
True, there are plenty of facility engineers who donât want the IT folks anywhere near their equipment. But some things are turning around in that respect. âThe engineers understand that eventually theyâre making their own job harder by keeping IT out. If they do get the ticket of dealing with security, itâs just another thing on the table that keeps them from doing their day jobs,â Perelman says. âThe engineers are happy with it. They canât blame engineers if something happens. Itâs in our nature.â
Some organizations are taking an approach in which a new group is created under the CISO to deal with ICS security, Perelman says. âThey took engineers from the refinery sector, pipelines, oil rigs, and trained them in security and best practices in that area. Now a year later, that group has 20 years of engineering background, but understands security as well,â he says, adding that this tends to be the most successful route. âWith everything thatâs going on in the cyber realm, itâs still easier to be taught cybersecurity practices than engineering practices.â
Everybody else
But getting back to the argument that other industries could be considered just as critical as the energy sector⌠There are a few important factors to ponder before you decide that your operations arenât critical enough for attack.
First, other manufacturing industries use pretty similar underlying systemsâwith the same types of controls from the same big automation suppliers. So a bad actor might have a particular target in mind, but think nothing of whoever else he catches in his net. âHe might want to target oil and gas refineries. But if the attack is designed to shut down any Honeywell or Siemens system they see, non-critical systems will be hurt just the same,â Perelman says. âThey can be collateral damage even if theyâre not the target specifically.â
Second, as noted earlier, you could argue that other industries are just as critical as energy. âWhen you look at food and beverage manufacturing, you can hardly say that these are not critical,â Perelman says. âAttacking a dairy producer is just as risky as attacking a grid line. The way that they produce milk, very simple changes can make milk toxic. Itâs very, very frightening, and definitely should be also under the umbrella of critical infrastructure.â
Finally, as weâve heard repeatedly, the attack from within is actually more likely than the attack from withoutâwhether because of a disgruntled employee or just a negligent one. âTheyâre cyber incidents, not just cyber attacks,â Perelman emphasizes âIt doesnât matter if you think youâre a target or not; you need to deal with security.â
About the Author
Aaron Hand
Editor-in-Chief, ProFood World

Leaders relevant to this article:
