Critical Infrastructure Security
Lessons from LOCKED SHIELDS 2024 cyber exercise

Parham Eftekhari, Executive Vice President of Communities at CyberRisk Alliance, attended the LOCKED SHIELDS 2024 cyber exercise last week. What follows are his takeaways from the event.On April 18, FBI Director Christopher Wray warned national security and intelligence experts that the risk the government of China poses to U.S. national and economic security are “upon us now”—and that U.S. critical infrastructure is a prime target. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to induce panic and break America’s will to resist,” he said during his remarks at the Vanderbilt Summit on Modern Conflict and Emerging Threats in Nashville. To neutralize this threat, Wray and other national security leaders have called for stronger partnerships between governments, commercial, and academic institutions.Building interagency, intergovernmental, and multinational cyber protection and response relationships. Sharing innovative best practices in cyber defense. Recruiting and training the next generation of cyber professionals while promoting STEM careers within the Department of Defense. Strengthening mission-critical infrastructure protection efforts through collective action. Energy, Oil and gas, The finance sector, and The defense industrial base As we noted in a related CISO Stories eBook, organizations are so focused on computers, smartphones and artificial intelligence that we often forget about the physical technology that generates the electricity, assembles the hardware and transports the engineers and specialists that computer systems need in order to operate.Yet this "operational technology" needs cybersecurity too. That's because factories, pipelines, power plants, transit systems and even cars and trucks are managed and regulated by computerized industrial control systems or embedded digital devices.Unfortunately, the digital security of operational technology lags years, even decades, behind that of traditional information technology. Attackers have learned to exploit this security gap, but in response, industry and government authorities are crafting new guidelines and frameworks to protect OT systems, especially those having to do with critical infrastructure.The Achilles' heel of operational-technology security is time. Computers and smartphones have short lifespans, with older models being replaced every three to eight years. Except for some "big iron" servers, the cybersecurity industry assumes that IT hardware and personal devices will completely turn over at least every 10 years. Google stops updating Pixel phones after three, five or seven years, depending on the model; Microsoft's Windows 11 won't run on PCs built before 2017.Anything older is a "legacy" system. Physical technology, on the other hand, needs to run for decades. Commercial airliners are built to last 25 or 30 years. The New York City subway system is still replacing switching and signaling systems that date back to the 1930s. Even regular passenger vehicles, once considered disposable after three or four years, are now expected to last seven, 10 or 12 years before being replaced.OT networks are often unsegmented, allowing intruders free rein once past the perimeter; communications protocols are weakly encrypted or plaintext; administrative passwords are often unchanged from the defaults (as any SHODAN scan will reveal), or may be shared among several individuals; remote access is often set up without the proper safeguards.LOCKED SHIELDS 2024 exercises focused on such vulnerabilities and how different agencies and private organizations can work together to mitigate risk and blunt the force of any future attack.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds