Claroty’s latest research, titled “The Global State of Industrial Cybersecurity 2023,” reveals that 75% of the 1,100 surveyed IT and OT security professionals in critical infrastructure sectors were targeted by ransomware in the past year. This report explores the challenges faced by the industry, their effects on OT security initiatives, and future priorities.

The study shows that, when it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments. In Claroty’s previous survey conducted in 2021, 32% of ransomware attacks impacted IT only, while 27% impacted both IT and OT. Today, 21% impact IT only, while 37% impact both IT and OT—a significant 10% jump for the latter in just two years. This trend speaks to the expanding attack surface area and risk of operational disruption that comes with IT/OT convergence. 

On top of the growing operational impact of ransomware, the staggering financial impact persists. Of the 75% of respondents whose organizations were targeted by ransomware attacks in the past year, 69% paid the ransom, and more than half (54%) of those who paid the ransom suffered financial ramifications of $100,000 or more. As a likely result, demand for cyber insurance is high among respondents. A large majority (80%) of organizations have cyber insurance policies and about half (49%) have opted for policies with coverage of half a million dollars or more. 

The pressure of combating increased threats as well as financial loss comes as new technologies are being integrated into OT environments. For example, 61% of respondents are currently utilizing security tools that leverage generative AI and an alarming 47% say that it raises their security concerns. 

“Our study shows that there is clearly no shortage of challenges facing OT security professionals, but we also found tremendous room for opportunity and appetite to mature security posture across industrial environments,” says Yaniv Vardi, CEO at Claroty. “Organizations are already working to bolster their risk assessment, vulnerability management and network segmentation practices, in order to be highly proactive in their defense of cyber-physical systems.” 

While implementing generative AI may be giving some pause, progress and advancements are being made to close gaps in processes and technology: 

  1. Network Segmentation: 77% describe their approach to network segmentation as “moderate” or “mature,” which is essential for restricting the lateral movement of cyberattacks through the network, including from IT to OT. 
  • Vulnerability & Risk Management: 78% described their approach to identifying vulnerabilities as “moderately” or “highly” proactive, a notable increase from 66% in 2021. However, the pace of vulnerability disclosures and patch releases are outpacing organizations’ ability to address them; as a result, organizations are exploring a variety of risk scoring methods to help prioritize. The most popular methods are the Common Vulnerability Scoring System, used by 52% of global respondents, followed by existing security solutions’ risk scores (49%), the Exploit Prediction Scoring System (46%), and the Known Exploited Vulnerabilities Catalog (45%).  
  • Future Initiatives: The top OT security initiatives that respondents plan to implement in the next year are risk assessment (selected by 43% of respondents), followed closely by asset, change, and/or lifecycle management (40%) and vulnerability management (39%).   
     

To access the full set of findings and analysis, click here