Cyber security needs to keep pace with Australia’s energy transition. As the nation’s energy landscape transforms at high speed, adding new types of generation, battery energy storage systems and smart grid technologies, the importance of cybersecurity has never been more pronounced. Businesses in the sector must not only embrace innovation but also fortify their defences against evolving cyber threats.
Every company in every sector is suffering from an expanding attack surface, with remote work and complex technology ecosystems creating a proliferation of emails, end points, identities, cloud apps and workloads. Energy organisations have to contend with all of this, plus the realities of a decarbonising electricity environment.
A smart grid powered by renewable energy, and all the assets within it, presents a massive and growing attack surface. For distributors, the energy transition has introduced a two-way flow of energy and information between renewable generators and batteries, solar rooftops and the grid, and a host of other connections.
Everything that enables reliable electricity delivery in a renewable energy environment – end-to-end connectivity, automated asset management, and continuous data and feedback – also increases vulnerability to attack. Every user, device and interaction is a potential threat and must be continuously authenticated, monitored and validated. Cybersecurity functions are finding it challenging to collaborate effectively with the managers who control operational assets. Original equipment manufacturers and legacy operational technology environments are also obstacles to change.
Against this backdrop, we are entering an era where the physical consequences from cyber are inevitable. The rapid convergence of IT with OT/IoT is blurring the boundaries between cyber risks and the physical world. Gartner is predicting that, by 2025, cyber attackers will have weaponised operational environments to successfully harm or kill humans. Viewed through this lens, it’s fair to say that most current visibility and monitoring are inadequate.
Cyber teams are also working in an environment where the velocity of the threat landscape is outstripping organisations’ ability to execute. WhiteHat Security estimates that two-thirds of all applications used by utilities had at least one exploitable vulnerability open throughout the year. Threat actors, including Wizard Spider, Electrum, Gold Southfirld, Dymalloy, Xenotine, Darkside and Parasite, are increasingly targeting utilities.
Cyber teams must consider a growing plethora of threats and risks, including ransomware on IT or OT networks, SCADA system and IoT compromise, credential disclosure, data theft, denial of services, zero-day attacks and web application hijacking.
Research finds room for improvement
The energy industry is well aware of these risks and has ramped up investment in cybersecurity in recent years. Globally, 44% of energy organisations are spending more than USD50 million per annum on their cyber capabilities. Cybersecurity budgets as a percentage of IT spend have increased significantly in the last year. Two-thirds of energy organisations now spend between 11%-20% of their IT budget on cybersecurity.
Energy’s status as critical national infrastructure has led to tightening regulatory and compliance pressures to ensure resilience against attacks and failures. Cybersecurity technology offerings have also improved significantly, helping energy firms to efficiently identify vulnerabilities and develop key controls like privileged access management, threat detection and response.