In this article, researchers at IIM-C and MIT discuss four action items for managers on the most effective ways of using AI as a defence tool to improve APT cyber-risk management in critical infrastructure
Digital systems over the cloud, IoT improves business KPI efficiency, customer experience, investor ROI, productivity, and cost efficiency, it also significantly amplifies the cyber threat space for cybersecurity professionals to cope with.
Image: Shutterstock
Critical infrastructure serves as the backbone supporting the essential daily services of (to name a few) energy, healthcare, finance, transportation, and communications that keep civilisation moving. These services are so critical that their disruption would have a debilitating effect on the national economy, security, public health and safety, or any combination thereof. For example, much of the $25 trillion-plus US economy relies on critical infrastructure services. According to views reported by economists to the Council of Foreign Relations (CFR), delays caused by traffic congestion alone cost the US economy over $90 billion a year in the last five years, whereas flight delays resulted in the US economy incurring losses of over $35 billion a year for the last five years.
Much of modern critical infrastructure in developed and developing nations is driven by digital systems over the cloud, IoT, operational technology (OT), the Internet, and recently by the AI revolution. While this improves business KPI efficiency, customer experience, investor ROI, productivity, and cost efficiency, it also significantly amplifies the cyber threat space for cybersecurity professionals to cope with. This challenge of thwarting the winds of unknown threats across every IT/OT domain before adversaries compromise critical infrastructure via the standard cyber kill chain (CKC) is similar to untying the Gordon knot. In other words, it has been proven (via researchers at MIT CAMS) that, let alone humans, even the world's most powerful computers working together might not be able to untie this knot. This is precisely the reason the world has seen (and will continue to see) cyber-attacks on critical infrastructure such as Colonial Pipeline, SolarWinds, Log4j, Capital One Data Breach, Kaseya, EKANS, NotPetya, and the WannaCry attacks. Add to this an entire family of reportedly non-malicious IT/OT/cloud misconfiguration issues that can hamper societal ecosystems – an example of such incidents being the recent CrowdStrike cyber outage of 2024.
Hackers and cybercriminals mostly use sophisticated and stealthy attack mechanisms called Advanced Persistent Threats (APTs) to
(i) initially gain unauthorised access and foothold into critical infrastructure (CI) systems of an enterprise (e.g., via phishing or open RDP ports);
(ii) subsequently explore the threat space stealthily and persistently via command and control malware spread mechanisms and
[This article has been published with permission from IIM Calcutta. www.iimcal.ac.in Views expressed are personal.]