Intelligent CIO Africa Issue 71 | Page 23

INFOGRAPHIC
• While the number of respondents who said they had experienced a breach in the last 12 months dropped to 10.5 % ( down from 15 % in 2021 ), 35 % of those said the engineering workstation was an initial infection vector ( doubling from 18.4 % last year )
• 35 % did not know whether their organisations had been compromised ( down from 48 %) and 24 % were confident that they hadn ’ t had an incident , a 2x improvement over the previous year
• In general , IT compromises remain the dominant access vector ( 41 %) followed by replication through removable media ( 37 %)
ICS cybersecurity postures are maturing
• 66 % say their control system security budget
increased over the past two years ( up from 47 % last year )
• 56 % say they are now detecting compromises within the first 24 hours of an incident ( up from 51 % in 2021 ). The majority ( 69 %) say they move from detection to containment within 6 to 24 hours
• 87.5 % have conducted a security audit of their OT / control systems or networks in the past year ( up from 75.9 % last year ) – one-third ( 29 %) have now implemented a continual assessment program
• The overwhelming majority ( 83 %) monitor their OT system security . Of those , 41 % used a dedicated OT SOC
• Organisations are investing in ICS training and certification : 83 % of respondents are professional control system certification holders – a significant jump from 54 % in the last 12 months
• Nearly 80 % have roles that emphasise ICS operations up from 50 % in 2021 .
To learn more about the latest trends in OT / ICS cybersecurity :
Download : The State of OT / ICS Cybersecurity in 2022 and Beyond p
www . intelligentcio . com INTELLIGENTCIO AFRICA 23