Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

The Colonial Pipeline cyberattack exposed the soft underbelly of U.S. critical infrastructure

  • GlobalData
  • May 11, 2022
Courtesy: CFE Media
Courtesy: CFE Media
Total
0
Shares
0
0
0
0

It has been one-year since the high-profile ransomware attack on energy pipeline operator Colonial Pipeline, which led to widespread fuel shortages along the East Coast. Add to that the later news that the U.S. Department of Transportation’s Pipeline and Hazardous Materials Safety Administration (PHMSA) found management failings at the company, resulting in a possible $1 million civil penalty, and it’s likely time to look back and see what can be learned from the incident. 

David Bicknell, Principal Analyst in the Thematic Intelligence team at GlobalData, a leading data and analytics company, provided some insights on the lessons of Colonial Pipeline:

“The Colonial Pipeline ransomware attack was more than a wake-up call to U.S. critical infrastructure. It was a sharp, well-placed dig to the ribs that highlights the threat of a cyberattack bridging the traditional corporate information technology network and the operational technology systems that control industrial equipment. In the case of Colonial Pipeline, the systems that manage the flow and distribution of fuel through the company’s pipelines.

“Colonial Pipeline exposed the soft underbelly of U.S. critical infrastructure, which quickly got the White House’s attention and led to tighter rules on breach notification. The attack made it crystal clear how a single, well-targeted cyberattack can create chaos and cause devastating impacts on government, business and the public.

“Some organizations are still relying on the hopeful (but fatal) thought: “It won’t happen to me.” For example, a GlobalData survey in the U.K. found that 29% of small-medium businesses cancelled their cyber insurance policies in 2021. However, most boards and C-suites are now more cyber aware than they were before.

“Perhaps the biggest lesson learned from the Colonial Pipeline attack is that critical infrastructure owners and operators must assume that experiencing an attack is inevitable, and understand that the ability to recover quickly is critical to both the safety of operations and, ultimately, the financial stability of the business.”

GlobalData’s report, Cybersecurity – Thematic Research highlights that the global cybersecurity industry will grow from $125.5 billion in 2020 to $198 billion in 2025. The report urges that no one — not even security providers themselves — is safe from attack. Securing hybrid working, coping with ransomware and continuing supply chain threats, and moving to a zero-trust security model as a long-term solution to data breaches are expected to drive strong security growth over the next three years.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

GlobalData

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
  • Threats & Vulnerabilities

Throwback attack: Lack of cyberliteracy cripples Marshall Islands’ telecommunication service

  • Tyler Wall
  • May 6, 2022
Read More
Next Article
  • Threats & Vulnerabilities

Throwback Attack: Careto malware attacks more than 30 countries

  • Christina Miller
  • May 12, 2022
Read More
You May Also Like
Courtesy of: CFE Media and Technology
Read More

Throwback attack: The U.S. hits Russia with the first logic bomb attack

Cybersecurity Locks
Read More

Throwback attack: Kevin Poulsen wins a Porsche (and hacks the U.S. government)

Read More

Throwback Attack: Hacker steals source code for Half-Life 2 video game

Courtesy: CFE Media
Read More

Throwback Attack: Petya, the red skull of ransomware

Test 2 Alt Text
Read More

Throwback Attack: ILOVEYOU, a love letter no one wanted

Read More

Throwback Attack: The Morris Worm launches the first major attack on the internet

Image courtesy: Brett Sayles
Read More

Throwback Attack: Teamsters refuse to pay after Labor Day cyberattack

Read More

I’m sorry, we’re closed: Why most ransomware attacks happen out of hours

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT