Securing critical infrastructure is crucial for businesses

Concept art representing cybersecurity principles
Nytt DDoS-rekord (Image credit: Shutterstock / ZinetroN)

Food, transport, financial services, energy, information systems, and healthcare are indispensable to everyday life. Cybercriminals are aware that critical infrastructure – physical, cyber, and human assets – underpin these socioeconomic functions. It could be a minor disruption, a long-standing conflict zone, or a mere rumor of something amiss in these critical services. But it can bring individuals, organizations, governments, and entire economies to their knees.

Energy companies, healthcare providers, government bodies, train systems, and ports in Europe have all come under cyberattack. These attacks underline the importance of safeguarding critical infrastructure while being resilient to continue operations with minimal discomfort.

Vishal Salvi

Vishal Salvi is SVP, CISO and Head of the Cyber Security Practice at Infosys.

Understanding the threats to critical infrastructure and their impact

Today, cyber threats to critical infrastructure and resilience can manifest as a data breach, ransomware, supply chain attack or political disruption. These threats do not always occur in isolation. For instance, a large bank might experience a data breach and ransomware attack simultaneously.

Today, when economic and digital ways of disruptions increasingly displace conventional warfare in the global arena and power struggles, data holds immeasurable value (directly and indirectly) for the cyber criminals and terrorists and is therefore an alluring target. Organized and targeted data breaches are becoming more sophisticated than the average unauthorized data collection. For example, certain bank employees have privileged access to SWIFT international transfers involving authorization codes. If a cybercriminal through social engineering, gets hold of the code as a privileged user and conducts fraudulent transactions, the bank (and even the customers or larger economy) could lose billions.

The Ferrari data breach was a great example of hackers launching ransomware attacks on car owners who are typically HNIs and were the intended target. Similarly, every sector owns valuable data and trade secrets. When the target is an organization or a nation, the impact is much more extensive.

Supply chain attacks are also a serious concern for businesses relying on several suppliers that could lead to disruptions in critical infrastructure. While manufacturers might adhere to necessary security protocols, every vendor must also follow supply chain risk/third-party risk management protocols, and this need to be baselined and tracked with regular corrective or preventive actions – during onboarding, offboarding and ongoing operations. Otherwise, any of them can be a weak link and bring down the entire chain. Recently, for instance, train services in Denmark were disrupted due to a supplier experiencing a cyberattack.

Then there are physical threats. A manufacturer’s physical systems are driven by operations technology (OT) which are often proprietary and legacy, developed long before IT systems reached their current state of maturity. Here, the level of security differs greatly from typical IT. Securing OT systems and its touch points with modern IT systems is critical especially when there’s a high level of digitization and automation. Back-door access must be prevented at all costs to avoid its misuse.

These trends signal larger implications beyond crippling IT systems as cyberattacks become disturbingly common and sophisticated, with potential for a wider community impact including loss of lives – cases in point were the incidents observed in the CNI space like the Colonial Pipeline attack or Florida water plant hacking. Securing critical infrastructure in this complex scenario is not easy and it must be prioritized.

The defense-in-depth approach

Every organization must identify the infrastructure most critical to its existence and operations. IT assets of the organization across locations and departments must be first inventoried, then classified based on business criticality - including potential impact to financial position/reputation, the country’s economy, and other criteria. Classified assets must then be fortified at multiple levels with a defense in depth approach, ensuring the most valuable ones receive maximum protection. Multiple levels of protection are more cost-effective and practical than providing uniform level of protection to all assets.

The AI Act and implications for cybersecurity

Advanced AI-based security tools can sort through piles of historical data to pick behavioral patterns. These can correlate various data points, find loopholes, and arrive at probable suspects behind an attack as well as predict its likelihood.

However, applying AI needs to be balanced with compliance with privacy laws and rights. Europe has a strong stance on protecting individual rights while giving due attention to organizational and national security. As uncontrolled data analytics and AI carry the potential of being misused by individuals, organizations or rogue nations with nefarious intentions, the European AI Act (in progress) classifies assets based on four levels of risk identified, namely, unacceptable risk, high-risk, limited risk, and minimal or no risk, and recommends a discretionary risk-based approach for using AI, with hefty fines for non-conformity – up to 30M EUR or 6% of global annual turnover, which is much higher than even the GDPR.

Organizations leveraging AI-based tools, especially in cyber threat management functions must factor in these sensitivities and regulations while implementing cybersecurity measures for their critical infrastructure.

We've featured the best encryption software.

Vishal Salvi is Senior Vice President, Chief Information Security Officer and Head of the Cyber Security Practice at Infosys. He is responsible for the overall information and cyber security strategy and its implementation across Infosys Group.

Read more
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Fortifying the UK’s energy sector: The cybersecurity imperative in an AI-driven future
Security padlock in circuit board, digital encryption concept
Rising cost of breaches forces organizations to rethink cybersecurity
Closing the cybersecurity skills gap
The critical need for watertight security across the IT supply chain
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
security
The true cost of a security breach
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
The importance of understanding your minimum viable operations
Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in Opinion
Polar Pacer
Polar's latest software update might have finally convinced me to ditch my Garmin
An image of the Samsung Display concept games console
Forget the Nintendo Switch 2 – I want a foldable games console
Image of Naoe in AC Shadows
Assassin's Creed Shadows is hands-down one of the most beautiful PC ports I've ever seen
Apple CEO Tim Cook
Forget Siri, Apple needs to launch a folding iPhone and get back on track
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Concept art representing cybersecurity principles
Navigating the rise of DeepSeek: balancing AI innovation and security