{"id":17842,"date":"2022-01-05T08:09:45","date_gmt":"2022-01-05T08:09:45","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=17842"},"modified":"2022-01-05T08:09:47","modified_gmt":"2022-01-05T08:09:47","slug":"gartner-predicts-30-of-critical-infrastructure-organizations-will-experience-a-security-breach-by-2025","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/gartner-predicts-30-of-critical-infrastructure-organizations-will-experience-a-security-breach-by-2025\/","title":{"rendered":"Gartner Predicts 30% Of Critical Infrastructure Organizations Will Experience A Security Breach By 2025"},"content":{"rendered":"\n<p>By 2025, 30% of critical infrastructure organizations will experience a security breach that will result in the halting of an operations- or mission-critical&nbsp;<a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/develop-a-security-strategy-for-cyber-physical-systems\">cyber-physical system<\/a>, according to Gartner, Inc.<\/p>\n\n\n\n<p>Critical infrastructure security has become a primary concern for governments around the world, with the&nbsp;<a href=\"https:\/\/www.cisa.gov\/critical-infrastructure-sectors\">U.S.<\/a>,&nbsp;<a href=\"https:\/\/www.cpni.gov.uk\/\">U.K.<\/a>&nbsp;<a href=\"https:\/\/www.spear2020.eu\/News\/Details?id=120\">EU<\/a>,&nbsp;<a href=\"https:\/\/www.publicsafety.gc.ca\/cnt\/ntnl-scrt\/crtcl-nfrstrctr\/index-en.aspx\">Canada<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.homeaffairs.gov.au\/nat-security\/files\/cic-factsheet-what-is-critical-infrastructure-centre.pdf\">Australia<\/a>&nbsp;each identifying sectors deemed &#8216;critical infrastructure&#8217;, for example, communications, transport, energy, water, healthcare and public facilities. In some countries,&nbsp;critical infrastructure&nbsp;is state-owned, while in others, like the U.S., private industry owns and operates a much larger portion of it.<\/p>\n\n\n\n<p>&#8220;Governments in many countries are now realizing their national critical infrastructure has been an undeclared battlefield for decades,&#8221; said&nbsp;<a href=\"https:\/\/www.gartner.com\/en\/experts\/ruggero-contu\">Ruggero Contu<\/a>, research director at Gartner. &#8220;They are now making moves to mandate more security controls for the systems that underpin these assets.&#8221;<\/p>\n\n\n\n<p>A Gartner survey* showed that 38% of respondents expected to increase spending on&nbsp;<a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/operational-technology-ot\">operational technology<\/a>&nbsp;(OT) security by between 5% and 10% in 2021, with another 8% of respondents predicting an increase of above 10%.<\/p>\n\n\n\n<p>However, this may not be enough to counter underinvestment in this area over many years, according to Gartner.<\/p>\n\n\n\n<p>&#8220;Besides the need to catch up, there is a growing number of increasingly sophisticated threats,&#8221; Contu said. &#8220;Owners and operators of critical infrastructure are also struggling to prepare for the coming increased oversight.&#8221;<\/p>\n\n\n\n<p><strong>Increased risk needs holistic security approach<\/strong><\/p>\n\n\n\n<p>Over time, the technologies that underpin critical infrastructure have become more digitized and connected \u2014 either to enterprise IT systems and\/or to each other \u2014 creating cyber-physical systems security risks.&nbsp;The result has been a substantial increase in the attack surface for hackers and bad actors of all kinds.<\/p>\n\n\n\n<p>In critical infrastructure sectors, organizations need to be more&nbsp;concerned about real world hazards to humans and the environment, rather than information theft. Gartner predicts that&nbsp;<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-07-21-gartner-predicts-by-2025-cyber-attackers-will-have-we\">by 2025, attackers will have weaponized a critical infrastructure cyber-physical system<\/a>&nbsp;to successfully harm or kill humans.<\/p>\n\n\n\n<p>Gartner recommends that security and risk management (SRM) leaders in critical infrastructure sectors develop a holistic approach to security, so that IT, OT and Internet of Things (IoT) security are managed in a coordinated effort.<\/p>\n\n\n\n<p>&#8220;SRM leaders should accelerate efforts to discover, map and assess the security posture of all cyber-physical systems in their environment,&#8221; said Contu. &#8220;Invest in threat intelligence and join industry groups to stay apprised of security best practices, upcoming mandates and requests for inputs from government entities.&#8221;<\/p>\n\n\n\n<p>*Note to editors:&nbsp;The 2021 Gartner IT\/OT Alignment and Integration Survey was conducted online from April -May 2021 among 401 respondents from industries in North America, Western Europe and Asia\/Pacific. Respondents were knowledgeable about decisions of their organization&#8217;s OT-related activities.<\/p>\n\n\n\n<p>Gartner clients can read more in&nbsp;<a href=\"https:\/\/www.gartner.com\/document\/4008351\">&#8220;Predicts 2022: Cyber-Physical Systems Security \u2014 Critical Infrastructure in Focus.&#8221;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By 2025, 30% of critical infrastructure organizations will experience a security breach that will result in the halting of an operations- or mission-critical&nbsp;cyber-physical system, according to Gartner, Inc. Critical infrastructure security has become a primary concern for governments around the world, with the&nbsp;U.S.,&nbsp;U.K.&nbsp;EU,&nbsp;Canada&nbsp;and&nbsp;Australia&nbsp;each identifying sectors deemed &#8216;critical infrastructure&#8217;, for example, communications, transport, energy, water, healthcare [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17844,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[2],"tags":[],"class_list":["post-17842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",900,598,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",900,598,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",900,598,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1-150x150.jpg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1-300x199.jpg",300,199,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",900,598,false],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",900,598,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",900,598,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",632,420,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2022\/01\/Ruggero-Contu-1.jpg",100,66,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/news\/\" rel=\"category tag\">news<\/a>","rttpg_excerpt":"By 2025, 30% of critical infrastructure organizations will experience a security breach that will result in the halting of an operations- or mission-critical&nbsp;cyber-physical system, according to Gartner, Inc. Critical infrastructure security has become a primary concern for governments around the world, with the&nbsp;U.S.,&nbsp;U.K.&nbsp;EU,&nbsp;Canada&nbsp;and&nbsp;Australia&nbsp;each identifying sectors deemed &#8216;critical infrastructure&#8217;, for example, communications, transport, energy, water, healthcare&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/17842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=17842"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/17842\/revisions"}],"predecessor-version":[{"id":17845,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/17842\/revisions\/17845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/17844"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=17842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=17842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=17842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}