- Home >
- Services >
- Access to Knowledge >
- Trend Monitor >
- Type of Threat or Opportunity >
- Trend snippet: Two drivers that increase cybersecurity compliance for Operational Technology (OT)
Trends in Security Information
The HSD Trendmonitor is designed to provide access to relevant content on various subjects in the safety and security domain, to identify relevant developments and to connect knowledge and organisations. The safety and security domain encompasses a vast number of subjects. Four relevant taxonomies (type of threat or opportunity, victim, source of threat and domain of application) have been constructed in order to visualize all of these subjects. The taxonomies and related category descriptions have been carefully composed according to other taxonomies, European and international standards and our own expertise.
In order to identify safety and security related trends, relevant reports and HSD news articles are continuously scanned, analysed and classified by hand according to the four taxonomies. This results in a wide array of observations, which we call ‘Trend Snippets’. Multiple Trend Snippets combined can provide insights into safety and security trends. The size of the circles shows the relative weight of the topic, the filters can be used to further select the most relevant content for you. If you have an addition, question or remark, drop us a line at info@securitydelta.nl.
visible on larger screens only
Please expand your browser window.
Or enjoy this interactive application on your desktop or laptop.
Two drivers that increase cybersecurity compliance for Operational Technology (OT)
1. By implementing rules and regulations, such as NIS2, organisations have to take responsibility in OT cybersecurity. For instance, through applying fines.
2. By providing to possibility to reduce cyber insurance premiums, organisations are incentivised to increase their cybersecurity efforts.
3.1 Compliance
A clear driver for organizations to take action is compliance and regulations. For Europe, the NIS2 should become active in the last quarter of 2024, although local implementations by member states might take some more time.
On a high level, one might say that the NIS2 follows the same implementation process as the GDPR in 2016. Where GDPR focuses on data protection and privacy with the assurance of confidentiality and applying the need to know/need to have principles, the NIS2 will cover breaches to logical IT and OT networks in general on all security aspects, like safety, availability, integrity, and confidentiality (see 5.1).
The NIS2 forces organizations to take responsibility by applying fines when negligent. It not only stimulates organizations to improve their own security posture but also to pay proper attention to the area of vendor management from a security perspective, reducing the risk of supply chain attacks.
3.2 Cyber Insurance
Another stimulation comes from the opportunity to reduce cyber insurance premiums. Insurance companies have learned over the years that the average security posture of OT environments is low and have increased their premiums. Often, premiums can be reduced when an organization can prove to have taken adequate security measures, reducing the likelihood and impact of successful cyber-attacks.
Some organizations have experienced cyber insurance not covering damages in certain conditions, for example, when the cyberattack turned out to be an act of war. This was the case with the NotPetya malware in 2017, as its origin led back to a state actor. Most organizations that were hit by NotPetya were not targeted but collateral damage by the supply chain.