Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical SecuritySecurity & Business ResilienceInfrastructure:Electric,Gas & Water

A case for market-driven cybersecurity in critical infrastructure

By Ian Bramson
cyber security

Image from Unsplash

October 11, 2022

Protecting critical infrastructure from cyber threats has never been more important. With Fortinet reporting that 9 out of 10 organizations experienced some sort of cyber incident within the past year, the problem is not going away.

Attacks like the one against the Oldsmar water treatment plant in 2021 have laid bare the susceptibility of operational technology (OT) to those looking to disrupt the economy, earn a ransom, or cause chaos. Government regulators have taken steps to regulate cybersecurity for critical infrastructure operators, but that will not be enough to protect against the growing threat of compromised OT environments. Unfortunately, government-imposed regulations lead to a compliance-based approach to security — and mere compliance will not cut it against the highly motivated and technologically advanced adversaries the industry now faces.

The fact that government agencies are addressing the need for cybersecurity standards is positive, however the regulations that have been introduced often fall short in the marketplace. Many of these regulations are created without input from industry and focus on encouraging only the most basic cyber hygiene standards. It’s not without reason. These regulations encourage the practices with the fewest barriers to entry, allowing the widest possible range of organizations to get up to speed.

The July 2021 TSA requirements for pipeline owners are a perfect example of the problem with this approach. The Transportation Security Administration (TSA) developed a set of cybersecurity requirements for pipeline operators along with input from industry and federal partners. These regulations, which some believe created more confusion than security, didn’t fully account for the distinction between information technology (IT) and OT environments. In practice, these standards may be more likely to disrupt the industry than protect it from an attack.

What’s wrong with compliance?

Compliance is all about ticking boxes. Once the basic guidelines are met, there is little motivation to go beyond that standard — after all, if a company complies with the regulations, then they are protected from an attack, right? Not so much. There is no one-size-fits-all approach to cyber hygiene practices. What works for one company may not work for another, and compliance-based regulations can often miss that nuance. The compliance-based approach can create a false sense of security. It allows operators to believe that being compliant means they don’t need to look for the holes that may be exploited by threat actors, but that couldn’t be further from the truth.

Hackers are quickly evolving. When attacks like the one on Oldsmar are successful, they can serve as a beacon to attackers looking for new ways to disrupt operations. The best way to combat this kind of advanced threat is for the industry to come together to demonstrate its commitment to cyber resilience by building adherence to cybersecurity best practices into the very core of their business. There should be a market-driven motivation to keep up with attackers’ progress and safeguard our critical infrastructure.

Maturity models: A way to benchmark cybersecurity

A rating system — where those that have invested in and committed to sound cybersecurity practices are prioritized over those that do not — could offer companies financial motivation to improve their cybersecurity processes. The rating could help organizations accurately assess the risk of partnering with manufacturers, contractors or suppliers. Instead of ticking off regulatory boxes, this approach encourages companies to go above and beyond to show their commitment to security. If they don’t, their contracts could be on the line. As a result, cyber programs would have to move at the speed of business — not government — when addressing cyber issues. That’s a very different pace.

A successful rating system should be created by an independent organization with a deep knowledge of cyber practices in OT. As opposed to an external checklist, ratings should be based on in-depth internal assessments conducted alongside operators. The idea is to take a more nuanced view, looking beyond whether a company has a specific policy in place to how effectively that policy is being implemented. 

Companies that demonstrate their commitment to good cyber hygiene will be rewarded with better ratings, which can make them more competitive when bidding on contracts. It could be used by organizations when choosing suppliers and to help insurance companies set cybersecurity insurance rates. Organizations committed to good cyber practices would have a way to show off their ability to keep themselves and their partners in the supply chain safe — and they’d show that they are helping to safeguard communities from the catastrophic events that can result from flaws in OT systems.

A rating system that scores companies on their cybersecurity efforts could usher in a new era of security and accountability within critical infrastructure. By taking a built-in, market-driven approach, a rating system could drive companies beyond compliance. Integrating a cyber maturity rating system into the day-to-day business of industrial organizations would create a competitive landscape for those looking to secure our critical infrastructure and motivate companies to step up their cybersecurity practices. 

With attackers advancing their operations by the day, it’s time that critical infrastructure operators do the same. The industry should come together to create a market-driven solution that can push organizations to move at the speed of cyber, rather than compliance.

KEYWORDS: compliance critical infrastructure cybersecurity cyber security legislation manufacturing operational security supply chain

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ian Bramson is the Global Head, Industrial Cybersecurity at ABSG Consulting Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • power plant

    Increasing cybersecurity awareness in critical infrastructure

    See More
  • Domestic critical infrastructure is arguably now more at risk than at any point in living memory, and certainly in a peacetime context.

    Protecting critical infrastructure and distributed organizations in an era of chronic cybersecurity risk

    See More
  • critical-infrastructure-freepik

    Shoring up cybersecurity in critical infrastructure and the nation's defense supply chain

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!