sb-au logo
Story image

Cybersecurity should be priority in US$8b smart utility spend

23 Aug 2018

The modernisation of utility infrastructures is enabling increased efficiencies and reliability through digitisation, connectivity, and IT-based approaches.

Smart cyber assets are transforming both power and water grids, allowing operators to deploy and leverage a new generation of functionality and customer services.

However, smart utilities are also highly vulnerable to cyberthreats and security is a primary concern, states ABI Research, a market-foresight advisory firm.

Unfortunately, digital security remains largely unimplemented during utility modernisation due to cost, resource, and time constraints.

This is exasperated by issues with adapting cybersecurity to operational technology (OT) environments and an overall lack of knowledge and expertise in bridging these divides.

Further, public sector efforts have petered out since 2012-2013, when both the United States and European Union were actively driving national cybersecurity strategies.

The current US administration seems to have dropped cybersecurity from its list of priorities, and the European Commission is struggling to get its NIS Directive off the ground and obtain adequate funding for ENISA to fulfill its mandate.

Most of the EU member countries have not taken the NIS directive to cyber-secure critical infrastructure seriously.

With the continuing growth of connected cities, it could be concerning if local governments follow the US and EU’s example.

“It seems that the United States and the European Union have forgotten that cybersecurity needs to be a continuous effort, not a one-time announcement to tick all the boxes,” said  ABI Research digital security research director Michela Menting.

The lack of sustained public support sends a deflated message to operators in the field about the importance of cybersecurity.

“Worryingly, both power and water utilities have reported advanced persistent threats which exploit flaws in industrial control systems. More critically, run-of-the-mill cyberthreats such as ransomware and DDoS attacks are increasingly affecting operator’s cyber-assets, both on the back and front-end. Cybersecurity must be a concerted effort by all stakeholders, including the public. With only partial support, the risks intensify.”

While power and water grid stakeholders will spend over US$8 billion globally on cyber-securing utility infrastructures in 2018, only a small portion of that will be dedicated to operational technologies and smart systems.

Savvy local security providers could leverage this opportunity by approaching regional governments.

Grid modernisation efforts are an ideal time to start designing and integrating digital security and provide an opportunity for adapting existing mechanisms and processes to the OT space - from industrial control systems to smart meters.

“Operators and other stakeholders should remain firm in their commitment to cybersecurity, despite the backseat public support,” Menting adds.

Story image
Internet outages drastically increased during COVID-19 lockdowns, report finds
Global internet disruptions increased 63% in March, with internet service providers hit the hardest. This is according to the 2020 Internet Performance Report from ThousandEyes, the internet and cloud intelligence company.More
Link image
Rapid response: The best way to detect and respond to traffic anomalies
Metadata is a must-have security practice that allows analysts to parse through more devices, more communications and more data in less time.More
Link image
Nine developer enablement practices to achieve DevOps at enterprise scale
Senior software engineering leader with experience at multiple Fortune 500 companies shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.More
Story image
Major changes to Australian internet legislation needed says report
We look at the a recent indepenedent report into the controversial legislation that Australian Security agencies use to intercept digital communicationsMore
Story image
Cyber-attacks thrust IT compliance to the top of the business agenda
If an organisation is running on the cloud, its ecosystem has to be compliant with industry standards and frameworks. Here are some tips on how to ensure compliance processes are fit for purpose.More
Download image
How do your workforce capabilities compare to industry standards?
Managing today’s workforce-related challenges requires a comprehensive security and risk management approach that includes capabilities to meet many different objectives.More