A physical attack, jointly with a cyber attack, can produce disastrous effects

Interview with Agustín Solís, Director of Security Systems, Thales España
Terrorism, economic interests or geopolitical conflicts. There can be many causes behind an attack on a critical infrastructure. Knowing that the risk can be minimized but never eradicated, it is essential to be prepared to respond to any incident, explains the Thales España expert and director of Security Systems Agustín Solís.
WHAT RISKS ARE BEING TAKEN BY COMPANIES WORKING IN CRITICAL INFRASTRUCTURES?
IS THERE A CALENDAR THAT DEFINES HOW ASPECTS STILL PENDING IMPLEMENTATION WILL BE ENCOMPASSED? IS AN ADEQUATE BUDGET BEING ALLOCATED?
WHICH ARE THE CHALLENGES THALES IS FACING AS A SECURITY PROVIDER?
WHICH IS THE COMMON DENOMINATOR IN THE DEVELOPMENT OF TECHNOLOGICAL SOLUTIONS FOR THESE INFRASTRUCTURES?
But conceptually there are components of the solution that are common to any type of asset. For example, a sensorization layer is always required, via perimeter video or intrusion surveillance, although a healthcare centre in an urban area is not the same as a refinery in the desert. The case studies are infinite when we go down to the detail and the implementation.
The same applies to cybersecurity. Each information system has its own characteristics, but there are rules applicable to different cases. We have to be able to cover the entire circle, from threat analysis to attack response preparation, to provide the right solution at the level of risk we consider it appropriate to maintain, since zero level is very difficult to attain.
HOW IS A CRITICAL INFRASTRUCTURE PROTECTED AND WHAT COULD HAPPEN IF A LINK IN THE CHAIN FAILS?
The same is the case for cybersecurity. But it is not easy for an attack through cyber means (malware or malicious software) to cause damage in the physical world, because this would require great in-depth knowledge of industrial control technologies and their application to the specific infrastructure they are seeking to attack.
Fortunately, the necessary capabilities (knowledge-related, technological, financial and organizational) to prevent this type of damage are very considerable. Even so, we should be prepared. While the systems may be technologically secure, the human link in the chain tends to be the weakest and subject to being violated. A large proportion of attacks come from the inside. In cybersecurity, we are dealing with passive assailants; employees are used and duped.
For example, they receive an email, click on a link and, involuntarily, facilitate entry of malicious software that spreads across the company. This is why awareness-raising and training are important.
WHICH PROPOSALS IS THE PRIVATE SECTOR MAKING TO THE EUROPEAN REGULATOR?
Among others, establishing a quality seal, with a voluntary certification and labelling process by cybersecurity providers; promoting a design-led security approach, incorporating the requirements from the moment a product is conceived; an international framework that balances security and privacy; information protection; sectoral analysis and sharing centres; and measures to reduce market fragmentation and thus create European leaders in cybersecurity that compete with the major international actors.