Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • Digital issues
    • Podcasts
    • Suppliers
    • Webinars
    • Events
  • Videos
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
  • Magazine
  • Advertise
  • Subscribe

Study: Energy sector IT pros overconfident in cyber security capabilities as attacks increase

By Paul Dvorak | September 22, 2016

Tripwire, Inc., a provider of security and compliance solutions for enterprises and industrial organizations, announced the results of an extensive study conducted for Tripwire by Dimensional Research. The study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber attack in progress. Study respondents included 763 IT professionals from various industries, including 100 participants from the energy sector.

tripwire-breach-survey-energy-infographicAccording to the Department of Homeland Security, the energy sector faces more cyber attacks than any other industry. Despite the frequency in attacks, energy IT professionals participating in Tripwire’s survey were very confident in their ability to collect the data needed to detect a cyber attack. For example, 72% of energy respondents believe they could detect configuration changes to endpoint devices on their organization’s network within hours, but over half (52%) said their automated tools did not pick up all the necessary information, such as the locations, department and other critical details, needed to quickly identify unauthorized configuration changes to endpoint devices that can indicate an attack in progress.

“These results show that most security professionals are assuming they are doing the right things to secure their environments, but lack real world data to back up their assumptions,” said Travis Smith, senior security research engineer for Tripwire. “This highlights the importance of testing security controls to ensure they are functioning as expected. It’s not enough to install security tools throughout the environment. You must test the policies and procedures to be confident the controls in place will stop or detect real-world intrusions.”

Additional findings from the study include:

  • 73% of energy respondents believe they could detect unauthorized software added to the organization’s network within hours, but only fifty-nine% know exactly how long the detection process would actually take.
  • 84% of energy respondents believe they would receive alerts within hours if their vulnerability scanning systems detected unauthorized devices. However, over half (fifty-two%) did not know how long it took to generate these alerts.
  • 44% of energy sector respondents said that less than eighty% of patches succeed in a typical patch cycle.
  • 40% of the respondents did not know how long it took to generate an alert if a system fails to log properly, however ninety-five% assumed a report would be generated within hours

“The energy sector has made significant improvements in securing their slice of the nation’s critical infrastructure, but broader adoption of security best practices is still lacking,” said Tim Erlin, director of IT security and risk strategist for Tripwire. “While dedicated security staff are intimately familiar with the deployed capabilities and gaps, IT at large is often working on assumptions of protection.”

Tripwire’s study is based on seven key security controls required by a wide variety of compliance regulations, including PCI DSS, SOX, NERC CIP, MAS TRM, NIST 800-53, CIS Top 20 and IRS 1075. These controls also align with the United States Computer Emergency Readiness Team (US-CERT) recommendations and international guidance, such as the Australian Signals Directorate’s Strategies to Mitigate Targeted Cyber Intrusions.

Recommendations and guidance include:

  • Accurate hardware inventory.
  • Accurate software inventory.
  • Continuous configuration management and hardening.
  • Comprehensive vulnerability management.
  • Patch management.
  • Log management.
  • Identity and access management.

When implemented across an organization, these controls deliver specific, actionable information that is necessary to defend against the most pervasive and dangerous cyber attacks. Before any damage is done, it is vital for organizations to identify indicators of compromise quickly so that appropriate action can be taken.

For more on this study:
http://www.tripwire.com/it-resources/are-energy-sector-it-pros-overconfident-in-data-breach-detection-skills/


Filed Under: Cybersecurity
Tagged With: tripwire
 

About The Author

Paul Dvorak

Related Articles Read More >

Ardexa updates remote renewable operations toolkit with upped security
The winds of change: The future of predictive analytics in wind farm reliability
ISA announces Global Cybersecurity Alliance members
NARUC releases two new manual resources on cybersecurity risks to utilities

Podcasts

Wind Spotlight: Looking back at a year of Thrive with ZF Wind Power
See More >

Windpower Engineering & Development Digital Edition Archive

Digital Edition

Explore the full archive of digital issues of Windpower Engineering & Development, presented in a high-quality, user-friendly format. Access current and past editions, clip, share, and download valuable content from the industry’s leading wind power engineering resource.

Windpower Engineering & Development
  • Wind Articles
  • Solar Power World
  • Subscribe to Windpower Engineering
  • About Us/Contact Us

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising

Search Windpower Engineering & Development

  • Home
  • Articles
    • Most recent posts
    • News
    • Featured
  • Resources
    • Digital issues
    • Podcasts
    • Suppliers
    • Webinars
    • Events
  • Videos
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
  • Magazine
  • Advertise
  • Subscribe