nancy

What the Iberian Blackout Teaches About OT Security

While cybersecurity wasn’t the root cause of this incident, its awareness and measures can greatly affect outcomes when system controls are stressed or disrupted. For operators of critical assets, the relevance lies in the system-level lessons around visibility, coordination, and control integrity.

Physical Layer Isolation in OT: When Security Becomes Architecture

Operational technology (OT) environments were historically designed around reliability and determinism, not cybersecurity. Systems such as SCADA, energy management, and industrial control networks assumed limited connectivity and trusted operators. As these systems increasingly connect to enterprise networks, cloud platforms, and remote monitoring tools, the security model must evolve without compromising operational stability.

Internet-exposed ICS remain a prime cyber target

In October 2025, the Canadian Centre for Cyber Security issued an Alert warning CISO and decision makers of increasing cyber-attacks exploiting internet-accessible industrial control systems (ICS). Reported incidents included tampering with water pressure values, triggering false alarms in an oil & gas facility, and manipulating temperature and humidity levels in a grain drying silo. These individual companies may not be direct targets of adversaries but have become victims of opportunity to gain media attention and undermine public trust.

Growing and persistent threats from hacktivists targeting critical infrastructure

In a joint advisory, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and partners detailed ongoing cyber activity targeting industrial control systems (ICS). To cause disruption and gain publicity, hacktivists often target critical infrastructure, ranging from water treatment facilities to oil well systems. They exploit exposed services, weak authentication, and poor network segmentation in legacy operational technology (OT). Although these hacktivists are generally unsophisticated and mostly cause only temporary loss of view, they show lack of consideration for human safety and incur substantial labor costs associated with operational downtime and network remediation.

Bridging the IT/OT gap for cyber resilience in critical infrastructure

For networking operators in factories, utilities, and government agencies, the convergence of Information Technology (IT) and Operational Technology (OT) is no longer a theoretical concept—it’s reality, and fraught with increasing cybersecurity risks that exploit the gap in between, exposing critical infrastructure to sophisticated threats.

Scroll to Top