Cyber Warfare holds a grave hazard of striking national infrastructure while circumventing traditional defense systems. Israel has developed a unique legal and regulatory model for critical national infrastructure protection and has implemented it since late 2002. The Israeli approach appears to be highly successful. The nation continues to be a world‐class ICT power and to provide cyber security for its critical infrastructure and beyond, while balancing conflicting interests and fostering cooperation between public, security, academic and private sectors. The Israeli approach to Critical Infrastructure Protection and beyond, fostering cooperation between public, security, academic and private sectors, appears to be successful. This study of the evolution of the Israeli Critical Infrastructure Protection policy may assist policy-making in other countries.
The frequency and scale of cyberattacks on energy facilities are rising, and many countries are seeking new and efficient methods for protecting critical resources such as water, electricity, and gas, as well as the facilities that produce, dispense, and store energy. According to a 2020 report by the World Economic Forum, cyberattacks on critical infrastructure facilities rank fifth in terms of level and number of threats.
Critical national infrastructure is a prime target for cyber attackers. Industrial control networks employ unique, legacy devices and use proprietary ICS/SCADA protocols. Therefore, these networks require specialized security technologies. While several solutions have been developed to address these unique challenges, they all focus on the Operational Technology (OT) network and OT devices. However, OT networks and IT networks are converging. IT applications such as Human Machine Interfaces (HMIs) interconnect with OT devices and networks. Attackers take advantage of this vulnerability to initiate the attack on the IT network and use it as the gateway to the sensitive OT network.
Let’s have a look at how some of Israel’s Security companies that can protect your Critical Infrastructure;
1) ReSec: Resec’s Zero Trust platform eliminates all known and unknown (“Zero Day”) file-based malware threats at the organization’s gateway.
2) CyberSixGill: Cybersixgill brings agility to threat intelligence by introducing the Continuous Investigation/Continuous Protection™ (CI/CP) approach to security. CI/CP uses automation tools that empower security teams to collect, analyze, research, and respond after each intel development as seamlessly as possible. In order to focus on maximum security readiness at any given time, Continuous Protection is coupled with Continuous Investigation.
3) Sepio Cyber: Our mission is to provide our customers with the highest level of visibility, policy enforcement, and Rogue Device Mitigation capabilities, which will allow them to better control the access to their hardware assets.
4) IX Den: IXDen introduces a novel hardware-free/software-based approach to industrial IoT cybersecurity. Leveraging ‘biometric’ IoT device identity allowing multifactor authentication, we achieve utmost sensor data integrity on a device and sensor level.
5) SCADA Fence: SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security.