Connect with us

Health

How To Manage GenAI Cyber Risk In Industrial Control Systems – Forbes India

Published

on

How To Manage GenAI Cyber Risk In Industrial Control Systems – Forbes India


Image: Shutterstock

A bustling city awakens to familiar routines: commuters head to work, children trek to school, and businesses open their doors. Unseen, a silent storm brews: malware quietly infiltrates the city’s power grid, water supply, and transportation networks. Then, in a coordinated strike, traffic lights fail, blackouts spread, and water supplies falter. Businesses close, hospitals switch to emergency power, and airports fall silent.

How could such a massive disruption happen without warning? AI is reshaping cyber warfare, enabling malware to blend into everyday operations, learn system weaknesses, and strike with precision. With (Gen)AI, even amateurs could orchestrate attacks once reserved for sophisticated actors.

As we face this new reality, understanding the role of (Gen)AI in cyberattacks and defences and the opportunity costs of security decisions is critical. Each choice carries trade-offs that influence the Cyber Kill Chain, and preparing for AI-driven threats is now a societal imperative, essential to protecting the stability of our interconnected world.

Industrial Control Systems are Vulnerable

Industrial Control Systems (ICSs) are the backbone of critical infrastructure, managing operations in sectors like power, water, oil, telecommunications, and nuclear facilities. These systems use sensors, actuators, and PLCs to automate and monitor industrial processes, enabling real-time data collection, efficiency, and scalability. Without ICSs, operations would rely on manual monitoring, leading to slower responses, more downtime, and increased risk of failure. Disruptions to ICSs can have serious implications for public safety, economic stability, and national security.

Despite the critical functions ICSs provide for society, ICSs remain one of the most vulnerable systems in terms of cybersecurity. This vulnerability arises from various factors, all ultimately linked to the opportunity costs involved in managing and securing these systems.

  1. ICSs are littered with legacy systems: Infrastructure upgrades are often delayed due to the high operational costs and the immediate and wide-reaching impacts of downtime, forcing organisations to weigh the immediate opportunity cost of disruptions against the long-term risk of unpatched vulnerabilities.
  2. OT systems have poor visibility: Ensuring full visibility of OT systems’ hardware, software, and firmware levels requires significant investment in monitoring tools and integration with IT systems. However, the opportunity cost of achieving this visibility is the potential diversion of resources from other critical areas, such as maintaining or upgrading physical infrastructure, underscoring the trade-off between comprehensive security monitoring and the efficient use of limited resources.
  3. IT/OT convergence leads to attack spillover: While IT/OT convergence boosts efficiency through real-time data sharing and automation, it expands the attack surface, exposing critical systems to IT vulnerabilities. The opportunity cost here involves the decision to integrate these systems for enhanced functionality versus the increased security risks that come with such integration. This leads to a complex trade-off between innovation and security.
  4. Lack of security awareness: Budget constraints often lead to underinvestment in employee training, increasing susceptibility to phishing, ransomware, and breaches—risks whose costs can far exceed initial training expenses.

Also read: Importance of boosting insurance-driven cyber resilience in the Generative AI world

(Gen)AI amplifies existing ICS security challenges and introduces new ones. It enables low-skill attackers to launch sophisticated, automated, and scalable attacks, quickly exploiting known vulnerabilities—especially in legacy systems with weak passwords, poor visibility, and unpatched software. IT/OT convergence further broadens the attack surface. (Gen)AI also enhances phishing by mimicking writing styles, leaving untrained employees vulnerable. By adapting to defences and refining each stage of the Cyber Kill Chain, (Gen)AI makes threats faster, stealthier, and harder to counter.

Figure 1: How attackers and defenders can leverage (Gen)AI at each step of the CKC.

How (Gen)AI empowers attackers

(Gen)AI empowers the attackers at each step of the Cyber Kill Chain. While each step of the CKC is crucial for understanding and responding to cyber threats, we focus on select steps—reconnaissance, weaponisation, command and control—to emphasise the importance of the interplay between (Gen)AI and the CKC. (Gen)AI enables adversaries to execute more sophisticated and evasive attacks, posing significant challenges to traditional cybersecurity defences. Importantly, the use of (Gen)AI by attackers comes with no significant opportunity cost—rather, it only serves to enhance their capabilities, making their operations more efficient and effective while saving time and without sacrificing other methods or resources.

Reconnaissance: In the first stage of a cyber attack, attackers gather information to identify vulnerabilities. (Gen)AI enhances this process: convolutional neural networks can analyse satellite imagery to map physical security features like cameras or guard towers, while other AI tools can mine forums and documentation for SCADA vulnerabilities, default passwords, configuration tools, etc. GenAI excels at synthesising this data, generating rapid summaries of potential targets using NLP and deep learning.


Weaponisation: In the weaponisation stage, attackers craft malware to exploit vulnerabilities found during reconnaissance. (Gen)AI is increasingly used to generate such malware– examples include AI-generated code for stealing files, installing remote access tools, or encrypting machines [6]. As (Gen)AI advances, we can expect it to become capable of writing code that targets specific ICS components such as ensors, PLCs, actuators, etc. With ICSs’ long lifespans, limited visibility, and poor patching, known vulnerabilities remain plentiful and easily weaponised by AI.

Also read: How should managers use AI for critical infrastructure risk management?


Command and Control (C2): In the command-and-control (C2) stage, malware establishes a remote channel for attacker control. To avoid detection, (Gen)AI can generate realistic network traffic that mimics normal operations, such as energy consumption or grid control data, and align C2 activity with high-traffic periods by learning typical timing patterns, making malicious communications harder to detect.


In summary, (Gen)AI enhances attackers’ capabilities across the Cyber Kill Chain by automating and improving the efficiency of reconnaissance, malware creation, and targeted attacks, posing significant challenges to traditional cybersecurity defences. Publicly available (Gen)AI platforms, such as ChatGPT or Claude, are easily accessible tools for attackers to formulate malicious behaviours without imposing significant resource requirements.

(Gen)AI empowers defenders

While we have highlighted the various ways attackers can use (Gen)AI, there are also many opportunities for defenders to fight back using (Gen)AI. Understanding how attackers may strike at key stages of the CKC allows for better insights into establishing an effective defence. However, for defenders, there is an opportunity cost in deploying (Gen)AI—resources, time, and focus must be carefully allocated to ensure that AI defences are effective and efficiently integrated into existing security measures.


Reconnaissance: Defenders can utilise AI-powered firewalls and honeypots to prevent attackers from snooping around a system and reaping information about system architecture, software, and more. AI algorithms harness insights from network traffic behaviours, autonomously generating rules and adapting to real-time, evolving threats. Fortinet’s FortiGate Rugged Firewall specialises in defending OT. Using AI, the firewall continuously and automatically assesses and responds to threats, with deep packet inspection for various OT applications and protocols. Honeypots, on the other hand, can act as decoys for attackers seeking information about systems. GenAI can generate false data and reports about critical infrastructure architecture that deceive attackers. However, deploying these AI-driven defences involves an opportunity cost—investing resources in reconnaissance can divert attention and funding away from enhancing incident response capabilities. This shift may lead to slower response times during an actual attack, as defenders may lack the necessary tools or skills to effectively respond to threats had they focused on other incident response measures.


Weaponisation: While defenders cannot detect adversaries building malware, they can take steps to prevent exploitation. For example, the Dragos Platform monitors and defends ICS environments by acting as an OT security incident and event management system. Harnessing the power of AI, the Dragos Platform assesses vulnerabilities by identifying weaknesses in software or configurations. The platform also employs risk prioritisation mechanisms that evaluate the potential impact of vulnerabilities on critical processes and help organisations focus on the most critical threats. By actively working to patch vulnerabilities, adversaries may find it challenging to weaponise against the system effectively. The opportunity-cost trade-off for implementing such a proactive defence is that human resources and attention must be allocated to continuously monitor and update the system, which might otherwise be used for other operational needs.

Also read: How systemic cyber risk management in software supply chains works with BOMs


Command and Control (C2): At this stage, network monitoring tools should be used to detect unusual traffic patterns indicative of command and control activities. One such tool is ScadaShield, which uses AI/ML to enhance ICS cybersecurity by monitoring network traffic, amongst other functionalities. ScadaShield thoroughly analyses network packets to detect OT and IT attack vectors. Additionally, ScadaShield uses ML to determine a “normal” state, during which traffic and configurations are compared; if the system deviates from this baseline, alerts are triggered. However, an opportunity cost is associated with deploying and maintaining such a tool, as human hours must be allocated to manage the system and respond to its alerts.


In summary, defenders can leverage (Gen)AI to counter (Gen)AI-powered attacks by anticipating, detecting, and neutralising threats. AI-powered tools hinder reconnaissance, detect advanced threats, and automate incident response, thereby strengthening ICS security. However, investment decisions must be made carefully, as there are costs associated with implementation, maintenance, and the need to train personnel to use the tool effectively.

[This article has been published with permission from IIM Calcutta. www.iimcal.ac.in Views expressed are personal.]



Source link

Continue Reading
Comments

Health

It is time to protect India’s workers from the heat

Published

on


In the first week of April 2025, Delhi crossed a dangerous threshold: the temperature soared above 41°C, and nights offered little relief. These extreme conditions are no longer outliers but part of a new, deadly normal. With climate change intensifying year after year, Indian cities have become the epicentre of a growing crisis.

And while heatwaves affect everyone, it is India’s millions of urban informal workers who are bearing the brunt of this slow-moving disaster. The Reserve Bank of India has pointed out, in 2024, that extreme heat threatens the health and livelihoods of occupationally exposed people, potentially causing a projected 4.5% loss to India’s GDP. Despite their considerable contribution, essential roles and sheer numbers, they are consistently excluded from the planning and implementation of urban heat response strategies. This exclusion has deadly consequences.

Key challenges in current Heat Action Plans

Many Indian cities now have Heat Action Plans (HAPs), inspired by pioneering efforts as in Ahmedabad. These plans, guided by the National Disaster Management Authority (NDMA), are meant to prepare cities for increasingly frequent and intense heatwaves. Yet, more than a decade later, most HAPs remain perfunctory, underfunded and poorly coordinated.

A review of HAPs across India reveals a consistent worrying pattern: informal workers are largely invisible. Worse, most treat heatwaves as temporary — short-term disasters instead of the symptoms of a deeper climate crisis that demands long-term, structural responses. The NDMA’s 2019 heat wave guidelines do not mention informal workers explicitly, but generally, under the category of outdoor workers and vulnerable groups. At the State level, most HAPs lack protocols for occupational safety, hydration, cooling spaces, shade provision or even a mention of compensation for lost work. City-level plans take a generalised public health and awareness approach, neglecting livelihood impacts. HAPs in India also suffer from fragmented governance and institutional silos. The Ministries of Labour, Environment, Urban Affairs and Health operate independently in the absence of guidelines at the central level, resulting in disjointed and inconsistent protections for workers. Moreover, city HAPs often remain short term, immediate for summer months, crisis-oriented documents. City heat actions rarely integrate long-term strategies such as urban cooling, heat-resilient infrastructure, working conditions, flexible work norms, or worker-focused social protection

Globally, cities are adopting worker protections against rising heat. In the U.S., California and Oregon mandate employers to provide water, shade, rest breaks, and heat safety training. France’s “Plan Canicule” requires work adjustments, hydration during heat alerts, and opened public buildings and spaces to the public for cooling off. In Qatar and Australia, outdoor work is restricted during peak heat, and employers are obligated to assess and mitigate heat risks. India, too, offers examples. Ahmedabad’s HAP introduced adjusted working hours and shaded rest areas. Odisha mandates a halt to outdoor work during peak hours. These good practices and innovations do offer replicable, worker-centric models for adapting urban livelihoods to extreme heat.

Towards a worker-centric response

We urgently need a new kind of urban heat response: one that is worker-centred, just, and grounded in lived realities.

First, the NDMA’s 2019 Heat Guidelines must be updated to explicitly include informal workers. A revised framework must map occupational vulnerabilities distinctly for varied workers —whether it is for construction workers, street vendors, waste pickers, gig workers or rickshaw pullers — and provide actionable protocols for city and State governments that may use them contextually. This includes defining safe working hours, mandatory rest breaks, access to water, and emergency response mechanisms.

Second, is the mandate for worker participation in the creation of city and State HAPs. These cannot remain top-down exercises. Every municipal body must engage worker collectives, unions, and worker welfare boards in co-creating occupation-specific plans. Constituting civil society and community coordination groups at the city level is key. Local wisdom and the involvement of workers’ associations in co-producing solutions makes policies more realistic, responsive, and respected.

Third, informal workers deserve the right to shade, rest, and cooling. We need to establish shaded rest zones, hydration points and community cooling centres in key locations — markets, transport hubs, public spaces, labour chowks, construction sites. Open public buildings, malls and open spaces as cooling centres. These must be accessible, gender-sensitive, and co-maintained by workers and the local community. It is time to develop norms, guidelines, institutionalise protections and allocate dedicated budgets for this.

Fourth, innovative financing — through corporate social responsibility, or dedicated city development budgets —must support local solutions as adaptations. Health insurance must be expanded to cover heat-related illnesses, especially for those in informal occupations who are typically excluded from mainstream schemes. And yes, community-neighbourhood contribution and involvement are a must and should be woven in action plans. Cool roofs, shaded walkways and passive ventilation must become standard practices, not just pilots.

As a part of city design and governance

Fifth, this leads to a bigger shift: embedding heat resilience and worker safety into how we design and govern our cities. Heat adaptation and worker inclusion must be legally written into master plans, building bye-laws, and infrastructure codes. Cities must promote natural shade through urban forests and tree corridors, while also planning blue networks such as water bodies and public resting spaces. Informal workspaces such as vendor markets, waste depots and labour chowks must be retrofitted with materials and design strategies that ensure thermal comfort.

Sixth, at the national level, we need an inter-ministerial task force on climate and work, bringing together the Ministries of Labour and Employment, Housing and Urban Affairs, Environment, Forest and Climate Change and Health, with of course NDMA, and State Disaster Management Authorities. This task force must develop an integrated road map linking climate resilience with worker protection and labour codes. It must guide cities, coordinate efforts, and ensure accountability. Every city and district must appoint a dedicated heat officer — someone empowered to manage and monitor heat response measures and work across departments.

For informal workers, the climate crisis is not a distant threat. It is a present and daily struggle. The cost of inaction is no longer measured only in degrees — it is measured in lives, in lost livelihood and poor health, and, in burdened futures.

Aravind Unni is an urban practitioner and researcher working on building resilience for informal workers and urban communities. Shalini Sinha is Asia Strategic Lead, Urban Policies Program, Women in Informal Employment: Globalizing and Organizing (WIEGO)



Source link

Continue Reading

Health

‘India’s healthy life expectancy lags a decade behind total lifespan’

Published

on


Experts at the Indian Institute of Public Health during the convocation ceremony of Masters of Public Health batch on Friday.
| Photo Credit: Special Arrangement

India’s life expectancy stands at approximately 73.4 years, the healthy life expectancy is almost a decade shorter, said K. Srinath Reddy, honorary distinguished professor at the Public Health Foundation of India (PHFI).

Speaking at the convocation ceremony of the Master of Public Health (MPH) programme at the Indian Institute of Public Health (IIPH) in Hyderabad on Friday, Dr. Reddy highlighted the need for a sustained approach to public health. A total of 38 students from the 2022-24 MPH batch graduated on Friday.

“The loss of healthy years is not confined to the final decade of life, it is the cumulative result of health burdens across the entire life course. This calls for corrective measures through public health interventions, which must engage not only the health sector but also education, housing, environment, and transportation,” he said.

Echoing this sentiment, Zelalem Tafesse, Chief of UNICEF’s Field Office for Telangana, Andhra Pradesh, and Karnataka, reminded graduates that public health is deeply intertwined with economics, governance, gender equity, climate change, and infrastructure.

“Even the national budget and market trends influence health outcomes,” Tafesse said, warning that misinformation in the digital age has become a serious public health threat.

Highlighting the growing role of digital technologies and Artificial Intelligence in shaping the future, Tafesse encouraged graduates to harness their digital fluency to drive solutions. “You are better equipped than my generation to thrive in this digital era. Let your public health knowledge grow with the tools of tomorrow,” he said.

Addressing the graduates, IIPH-H Director Anil Kaul underscored the increasing significance of their chosen field. “You are stepping into a world grappling with global health crises and complex challenges. Your work has never been more important. This field demands innovation, resilience, and a commitment to equity and justice,” he said.



Source link

Continue Reading

Health

IPL, Interrupted: Looking Back At The Tournament’s Past Disruptions – Forbes India

Published

on


Cricket fans stand outside the Ekana Cricket Stadium in Lucknow on May 9, 2025, after the Indian Premier League (IPL) Twenty20 cricket tournament was suspended for a week following the cross-border tensions between India and Pakistan. Image: Arun SANKAR / AFP

As India-Pakistan border tensions rise, the BCCI has put the IPL on hold for a week. While 58 matches have been completed in the season, the plan for the remaining 12 in the business end “will be announced in due course in consultation with relevant authorities and stakeholders”, Devajit Saikia, the honorary secretary of the BCCI, said in a press release.

This is not the first time, though, that the IPL has been disrupted. In its 18-year history, the tournament has been shifted out of the country four times, faced scrutiny over match-fixing, and has seen two of its teams being banned. Add to that the fact that Lalit Modi, the former IPL commissioner, who is known to have masterminded the tournament, was ousted and barred for life by the BCCI following allegations of corruption and misappropriation of funds.

Here’s a timeline capturing IPL’s restive journey:

  • 2008: IPL launched
  • 2009: Moved to South Africa due to the Lok Sabha elections
  • 2010: Lalit Modi, then IPL commissioner, investigated for corruption, suspended
  • 2012: Kochi Tuskers terminated after one season due to financial issues
  • 2013: Allegations of spot-fixing and betting surface—three RR players and a top CSK official arrested; BCCI bans Lalit Modi for life over earlier allegations; Pune Warriors terminated after three seasons following financial issues;
  • 2014: 20 matches played in the UAE as the tournament coincided with the general elections
  • 2015: RR and CSK banned as allegations of spot-fixing proved; Pune SuperGiants and Gujarat Lions replace them for 2016 and 2017 seasons
  • 2020: Played in the UAE due to Covid restrictions
  • 2021: First phase played in April-May suspended due to Covid, concluding phase held in the UAE in Sept-Oct
  • 2025: Suspended for a week due to escalating India-Pak tensions



Source link

Continue Reading

Trending

Copyright © 2025 Republic Diary. All rights reserved.

Exit mobile version