Posted on Leave a comment

From grid to code: Why good cybersecurity will help deliver net zero

Digital technologies are indispensable in the race to net zero, with projections from the World Economic Forum estimating that such technologies could reduce global emissions by up to 20 per cent by 2050. Everything from AI and advanced analytics, to smart grids and the Internet of Things (IoT) will be increasingly used as energy infrastructure seeks to improve efficiencies, circularity and reduce emissions.

In particular, the Asia Pacific region is expected to maintain a 50 per cent share of global primary energy demand until 2050, playing a pivotal role in the global energy future. The proliferation of interconnected devices and distributed energy resources, including energy storage systems and electric vehicles, are critical to the region’s energy transition but are also new points of vulnerability and risk, which history tells us bad actors will aim to exploit through cyberattack and disruption. Disruption will increase costs, reduce efficiency, consume energy, and delay net zero.

This means that building strong cyber defences and resilient digital energy infrastructure will be essential to protecting tomorrow’s energy infrastructure, helping to prevent attacks and, when there is an incident, ensuring we can recover quickly from it. We all have a role to play in protecting this new digital energy ecosystem, so cooperation should be a top priority.

This means governments, industry, and solution providers coming together to ensure critical national energy infrastructure, so vital to achieving net zero, will have the necessary resilience and protections built in.

Building resilience into our digitalised energy ecosystem

Energy infrastructure cyber disruptions will be a significant risk factor in the future, so we must be thinking about the solutions today. Energy infrastructure is the backbone of economies and societies, and regrettably, it is already the target of frequent cyberattacks.

Also Read: Demystify cybersecurity: EPP vs EDR vs MDR vs XDR

A research study by Rockwell Automation ‘Anatomy of 100+ Cybersecurity Incidents in Industrial Operations’ found that 39 per cent of critical infrastructure attacks are targeted at the energy sector, a rate that is three times higher than the next most frequently attacked verticals, critical manufacturing (11 per cent) and transportation (10 per cent).

This is why robust cybersecurity regulation and frameworks, continuous improvement to stay ahead of evolving risks, and adequate resource allocation towards cybersecurity infrastructure are all key steps to help safeguard the digital energy transition. As the digital energy transition accelerates, so will the risks, particularly in an increasingly distributed infrastructure and a more sophisticated threat landscape.

It is reassuring to see that countries across the Asia Pacific region are well aware of the cybersecurity risks facing critical energy infrastructure. Although the respective states have adopted different approaches to cybersecurity, there is a growing trend towards tackling the risks associated with mission-critical operational environments and systems.

In Singapore, for instance, the government recently passed a new law mandating owners of critical information infrastructure to report a wider range of incidents, including those occurring within their supply chain.

The development of international standards will be essential to navigating and protecting the decentralised and globally interconnected digital energy ecosystem of the future. In turn, industry must actively engage in bolstering cyber resilience by implementing robust cybersecurity defences ahead of evolving trends in the cyber threat landscape, and allocating adequate resources towards cybersecurity infrastructure.

A key line of defence against cyber threats lies within the digital solution’s built-in cybersecurity defences itself. This requires a multifaceted approach, encompassing both proactive and reactive measures. Central to this is the cybersecurity accreditations and certifications, which are key to ensuring that digital solutions are robust, resilient, and continuously updated to mitigate emerging threats and safeguard against potential cyberattacks.

Also Read: What if cybersecurity included everyone it protects?

For instance, the adoption of the Secure Lifecycle Development Process (SSDLC) for energy solutions means that product developers are able to ensure a high level of security and resilience throughout the entire product life cycle. The SOC 2 attestation, a valid third-party assessment of a company’s controls against the five Trust Service Criteria, as well as international cybersecurity standards such as ISO 27001 and IEC62443, are equally important to reinforce the integrity of digital solutions against cyber threats.

The path forward in the pursuit of a renewable energy future

In navigating the transition from traditional grids to digital ecosystems, cybersecurity has emerged as a critical cornerstone in ensuring the reliability, resilience, and sustainability of our energy infrastructure.
Achieving true cybersecurity resilience however will be contingent upon collaboration and cooperation.

With Asia Pacific poised to be a key player in the renewable energy transition, it is vital that all stakeholders in the ecosystem remains vigilant regarding cybersecurity threats and practices.

Government and industry must work hand in hand to ensure that we remain on course in our path towards a greener future by safeguarding critical energy infrastructure. Ultimately, good cyber security will deliver good progress on net zero.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Join our e27 Telegram groupFB community, or like the e27 Facebook page.

Image credit: Canva

The post From grid to code: Why good cybersecurity will help deliver net zero appeared first on e27.

Leave a Reply

Your email address will not be published. Required fields are marked *