Research Hub > Protecting OT and Critical Infrastructure in an Evolving Threat Landscape | CDW
White Paper
12 min

Protecting OT and Critical Infrastructure in an Evolving Threat Landscape

A trusted partner can help boost security and resilience for critical infrastructure and organizations that rely heavily on operational technology.

IN THIS ARTICLE

Historically, industrial control systems have largely been isolated from broader networks. However, the rise of emerging technologies such as the Internet of Things has blurred these boundaries, leading to the convergence of operational technology and IT. This interconnection opens the door to powerful capabilities, but it can also expose organizations to potentially catastrophic cybersecurity risks. Ransomware attacks can halt production, nation-state actors may target critical infrastructure with sophisticated campaigns, and insider threats can open organizations to devastating breaches. Protecting OT environments requires a comprehensive security strategy that includes thorough assessments of existing infrastructure, deliberate implementation of robust security controls designed for industrial systems and ongoing management to keep OT networks safe. Given the complexity of securing these environments — and the consequences of failure — many organizations turn to a trusted partner such as CDW to design, deploy and manage OT security solutions that adapt to evolving threats.

CDW can help secure operational technology, Internet of Things devices and critical infrastructure.

Historically, industrial control systems have largely been isolated from broader networks. However, the rise of emerging technologies such as the Internet of Things has blurred these boundaries, leading to the convergence of operational technology and IT. This interconnection opens the door to powerful capabilities, but it can also expose organizations to potentially catastrophic cybersecurity risks. Ransomware attacks can halt production, nation-state actors may target critical infrastructure with sophisticated campaigns, and insider threats can open organizations to devastating breaches. Protecting OT environments requires a comprehensive security strategy that includes thorough assessments of existing infrastructure, deliberate implementation of robust security controls designed for industrial systems and ongoing management to keep OT networks safe. Given the complexity of securing these environments — and the consequences of failure — many organizations turn to a trusted partner such as CDW to design, deploy and manage OT security solutions that adapt to evolving threats.

CDW can help secure
operational technology,
Internet of Things devices
and critical infrastructure.

mkt84028-ot-iot-wp-secondary

Securing Critical Infrastructure and OT: What’s at Stake?

The federal Cybersecurity and Infrastructure Security Agency (CISA) defines critical infrastructure as assets so vital “that their incapacitation or destruction would have a debilitating effect” on security, the economy, public health, public safety or any combination thereof.

It is easy to see how cyberattacks on operational technology assets can have catastrophic consequences that extend far beyond the typical impacts of IT breaches. While data theft and system downtime are serious concerns for any enterprise, attacks on OT can present a direct threat to essential services and even physical human safety. For example, attackers may attempt to tamper with water treatment processes, disrupt power distribution or cause manufacturing equipment to shut down. Even in industries not traditionally considered critical (retail, for example), an attack on OT systems can bring operations to a halt, resulting in significant financial losses.

Troublingly, organizations are reporting both more frequent OT intrusions and more severe impacts. In 2024, 33% of organizations experienced six or more OT intrusions, according to Fortinet. That’s up from just 11% the year before. More than half of survey respondents said these intrusions led to operational outages that affected productivity, revenue or degradation of brand awareness. And more than 40% said OT intrusions put physical safety at risk, caused a failure to meet compliance requirements or led to a loss of business-critical data.

Organizations face a number of significant challenges as they seek to safeguard their OT and critical infrastructure. Often, physical infrastructure is connected by legacy systems that can be difficult and expensive to upgrade or fully integrate with modern technology. This was less of a problem before OT and IT environments began to merge. But now that OT environments are more closely entwined with IT networks — and now that those networks are under constant bombardment by malicious actors — weak security measures expose physical assets to unacceptable levels of risk.

74%

The percentage of OT security leaders who say AI-enabled attacks on infrastructure are already a critical issue, with machine translation and generative AI making it easier to carry out attacks

The rise of emerging technologies such as the Internet of Things and artificial intelligence is exacerbating these challenges. Unlike many connected OT assets of the past, IoT networks tend to have significant north-south data traffic, which increases the risk that attacks will spread throughout an organization. Although AI is making it easier for organizations to sort through potential threats, it has also given attackers a powerful new tool in their efforts to compromise OT and critical infrastructure.

Organizations safeguarding OT and critical infrastructure cannot afford to wait to be attacked before protecting their networks of physical assets. The consequences of failure are simply too great.

CDW can help secure
operational technology,
Internet of Things devices
and critical infrastructure.

Securing Critical Infrastructure and OT: What’s at Stake?

The federal Cybersecurity and Infrastructure Security Agency (CISA) defines critical infrastructure as assets so vital “that their incapacitation or destruction would have a debilitating effect” on security, the economy, public health, public safety or any combination thereof.

It is easy to see how cyberattacks on operational technology assets can have catastrophic consequences that extend far beyond the typical impacts of IT breaches. While data theft and system downtime are serious concerns for any enterprise, attacks on OT can present a direct threat to essential services and even physical human safety. For example, attackers may attempt to tamper with water treatment processes, disrupt power distribution or cause manufacturing equipment to shut down. Even in industries not traditionally considered critical (retail, for example), an attack on OT systems can bring operations to a halt, resulting in significant financial losses.

Troublingly, organizations are reporting both more frequent OT intrusions and more severe impacts. In 2024, 33% of organizations experienced six or more OT intrusions, according to Fortinet. That’s up from just 11% the year before. More than half of survey respondents said these intrusions led to operational outages that affected productivity, revenue or degradation of brand awareness. And more than 40% said OT intrusions put physical safety at risk, caused a failure to meet compliance requirements or led to a loss of business-critical data.

Organizations face a number of significant challenges as they seek to safeguard their OT and critical infrastructure. Often, physical infrastructure is connected by legacy systems that can be difficult and expensive to upgrade or fully integrate with modern technology. This was less of a problem before OT and IT environments began to merge. But now that OT environments are more closely entwined with IT networks — and now that those networks are under constant bombardment by malicious actors — weak security measures expose physical assets to unacceptable levels of risk.

The rise of emerging technologies such as the Internet of Things and artificial intelligence is exacerbating these challenges. Unlike many connected OT assets of the past, IoT networks tend to have significant north-south data traffic, which increases the risk that attacks will spread throughout an organization. Although AI is making it easier for organizations to sort through potential threats, it has also given attackers a powerful new tool in their efforts to compromise OT and critical infrastructure.

Organizations safeguarding OT and critical infrastructure cannot afford to wait to be attacked before protecting their networks of physical assets. The consequences of failure are simply too great.

74%

The percentage of OT security leaders who say AI-enabled attacks on infrastructure are already a critical issue, with machine translation and generative AI making it easier to carry out attacks

CDW can help secure
operational technology,
Internet of Things devices
and critical infrastructure.

AI and OT Security

As the list of AI use cases continues to grow, the tech is also becoming a prevalent tool for both cyberattacks and cyber defense. Hackers are now using it to develop more sophisticated and pervasive methods of intrusion, while cybersecurity teams are finding AI can be leveraged to minimize response times and reduce risk.

79%

The percentage of respondents who say AI-enabled security solutions such as automated patching and incident response will be critical for detecting and stopping attacks against their OT infrastructure

55%

The percentage of OT security leaders who believe that AI will “help hackers more than it will help security teams in OT environments”

47%

The percentage of respondents who say that the use of AI in OT security solutions will reduce the number of security professionals their company needs to hire

AI and OT Security

As the list of AI use cases continues to grow, the tech is also becoming a prevalent tool for both cyberattacks and cyber defense. Hackers are now using it to develop more sophisticated and pervasive methods of intrusion, while cybersecurity teams are finding AI can be leveraged to minimize response times and reduce risk.

79%

The percentage of respondents who say AI-enabled security solutions such as automated patching and incident response will be critical for detecting and stopping attacks against their OT infrastructure

55%

The percentage of OT security leaders who believe that AI will “help hackers more than it will help security teams in OT environments”

47%

The percentage of respondents who say that the use of AI in OT security solutions will reduce the number of security professionals their company needs to hire

cdw

The Evolving OT Threat Landscape

CISA notes that industrial control systems can have lifecycles that extend up to 30 years, and that they are largely “purpose-built, stand-alone systems designed for reliability rather than security.” Historically, CISA points out, risks to these systems primarily arose from human error, accidents, natural disasters and acts of physical sabotage. However, the convergence of OT and IT networks means that physical infrastructure is now vulnerable to the same sorts of cybersecurity threats that have traditionally plagued enterprise IT systems. Often, these attacks are launched by malicious actors who have a specific interest in controlling or sabotaging critical infrastructure.

THE RISE OF RANSOMWARE: According to Fortinet, 56% of OT networks experienced ransomware or wiper intrusions in 2024. (“Wiper” attacks are malware-based attacks that can permanently delete or corrupt data, rendering systems inoperable.) That number represents a steep increase from the year before, when just 32% of organizations reported experiencing ransomware intrusions. In 25% of ransomware attacks against manufacturing companies, Fortinet notes, the ransom demanded is at least $1 million. However, the potential impacts can extend far beyond an initial ransom payment. It has become fairly common for attackers to accept ransom payments and then disappear without granting organizations access to their data and systems. Even when organizations regain this access, hackers sometimes sell their data on the dark web, potentially leading to regulatory infractions, intellectual property leaks or subsequent attacks.

HACKTIVISM AND NATION-STATE ATTACKS: OT and critical infrastructure make particularly attractive targets for both activist hackers (or “hacktivists”) and attacks sponsored by hostile nation-states. Hacktivist groups target industrial organizations to draw attention to environmental and social causes, while nation-states may infiltrate infrastructure to gather intelligence and prepare for potential future conflicts. Nation-state attacks can be incredibly sophisticated, destructive and wide-ranging due to the vast resources of those launching them. To take one example: From January through April of 2024, the federal government reported, a pro-Russia hacktivist had remotely manipulated industrial control systems inside five water and wastewater systems throughout the U.S. Threat actors were able to gain access via interfaces that had public-facing IP addresses, subsequently causing damage to water pumps at the facilities.

Click Below to Continue Reading

INSIDER THREATS: While external attackers pose significant risks to IT environments, organizations must also guard against threats from within. Occasionally, these threats come from disgruntled current or former employees, but they are more often the result of unwitting internal users being tricked by social engineering attacks. In fact, phishing emails are now the most common intrusion type experienced by organizations’ OT networks, as attackers have grown much more adept at impersonating executives, suppliers and financial institutions. In a 2024 study, Fortinet reported that 76% of organizations had experienced OT intrusions due to phishing. Additionally, half of all OT intrusions in 2024 involved an unintentional insider breach, while 13% involved an internal “bad actor.”

ADVANCED AND EVOLVING ATTACKS: Threat actors are using increasingly sophisticated techniques to breach OT environments. Advanced persistent threats provide long-term access to networks to attackers, who sometimes use fileless “living off the land” attacks that leverage legitimate tools and processes to avoid detection. Because LOTL attacks take advantage of tools that are already present in the target environment (such as PowerShell or Windows Management Instrumentation), they are far more difficult to detect — especially for organizations that still rely on security tools that search for malware scripts or files. The Pipedream malware framework, believed to have been developed by state-level APT actors, is a set of tools that can identify and compromise certain industrial control systems and SCADA devices.

CDW can help secure
operational technology,
Internet of Things devices
and critical infrastructure.

Buck Bell, Jill Klein, Torbin Lancaster, Oscar De Leon, Mitch Powers, Jeremy Weiss

CDW Contributors
CDW Experts