NEWS AND EVENTS

Digitalization: Opportunities and New Risks

Back to News & Events

Digitalization offers enormous opportunities for efficiency, but it also introduces new risks. When OT systems (Operational Technology) are connected to the internet, vulnerability to attacks increases—attacks that threaten not only data, but also lives, health, and critical societal functions.

As a member of the Confederation of Norwegian Enterprise’s Security Council (NSR), we hosted a webinar today focusing on the threat landscape for OT in Norway. Below are our key takeaways.

An Escalating Threat Landscape

The Norwegian Police Security Service’s (PST) annual threat assessment shows a clear shift: from a “low probability” of sabotage against Norwegian critical infrastructure in 2023, to “elevated” in 2024, and “likely” by 2025.

At the same time, cybercrime has become the world’s third-largest economy. A professional, commercial “Cybercrime-as-a-Service” industry has emerged, offering services such as extortion, data theft, and espionage.

Criminals follow the money, and willingness to pay is highest where the consequences of downtime are severe—such as in manufacturing and energy supply. Internationally, there is a clear trend toward an increasing number of attacks targeting OT systems. One example is the car manufacturer Jaguar, which was forced to halt production for over a month, resulting in the loss of 1,000 unproduced vehicles per day.

We also see a significant rise in hacktivism, often linked to geopolitical conflicts. Following the outbreak of war in the Middle East, several attempted attacks have been observed where hackers exploit internet-exposed equipment and simple system vulnerabilities.

When OT Becomes the Target

Traditionally, OT systems have been “air-gapped,” meaning physically isolated from the internet. This strategy is becoming increasingly difficult to maintain.Digitalization and remote access enable data to flow between IT and OT, suppliers connect remotely for maintenance, and system owners often have limited visibility into what is happening within their environments.

The incident at the Bremanger hydropower plant is one such example: hackers managed to open valves that remained open for several hours before the attack was detected and handled.

Legal Requirements and Increasing Expectations

Norway has now enacted the Digital Security Act, which came into force on October 1 this year. The legislation is based on the EU’s NIS Directive from 2016 and imposes requirements on organizations within sectors such as energy, transport, healthcare, water supply, and finance.

In addition, the NIS2 Directive expands the scope to include important private sectors such as food production and the chemical industry.

In short: societal expectations are tightening, and it is wise to begin the work early.

Typical Challenges in OT Environments

OT systems are often complex and outdated. They typically feature:

  • High availability requirements – systems cannot be taken offline without serious consequences
  • Long lifecycles – many systems are 10–20+ years old and were built before OT cybersecurity became a concern
  • Dependence on vendors for operation, maintenance, and upgrades
  • Limited visibility into internal processes, often perceived as “black boxes”

In addition, we see organizational challenges where IT and OT are managed by different teams with different routines and cultures. This creates grey areas where no one takes full responsibility for security.

Best Practice: Build Security on OT’s Terms

Many cybersecurity frameworks are designed for IT and must be adapted for OT environments. The international IEC 62443 standard is specifically tailored for OT and, when combined with the Norwegian National Security Authority’s (NSM) fundamental principles, provides a strong foundation.The four core principles from NSM are also relevant for OT:

  • Identify and map – gain an overview of OT assets and communication patterns
  • Protect and sustain – build a secure architecture that separates critical and non-critical systems and controls data flows between zones
  • Detect – establish monitoring and alerting systems adapted to each facility
  • Respond and recover – integrate operational and security functions for effective incident response

New Systems and Retrofitting Existing Facilities

New investments provide a prime opportunity to define clear security requirements. By applying principles from IEC 62443, systems can be structured using zone and conduit models, security levels can be defined, and requirements can be imposed on suppliers already during the tender process.For existing facilities, the work should begin with mapping:

  • What equipment and communication exist?
  • Which vulnerabilities are most critical?
  • What can be attacked, and what are the consequences?

The outcome of this assessment should be documented in a security roadmap that includes both quick wins and measures aligned with long-term objectives.

Situational Awareness Is Key

No security measure is effective if you cannot see what is happening. Real-time monitoring of OT systems enables organizations to detect and respond to incidents before they lead to physical consequences.

OT security is no longer just about technical barriers—it is about understanding the interplay between operations, technology, and people. With increasing digitalization, stricter regulations, and a more complex threat landscape, Norwegian organizations must take OT security seriously.

Nina Hesby Tvedt
Chief Strategy & Operations Officer
13.02.2026
Follow us on LinkedIn
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Insights from Norway’s cybersecurity experts

March 3, 2026

See More. Fear Less. – Securenok Reveals Its New Brand Identity

For the past five months, we’ve been deeply engaged in redefining the visual identity and communication strategy of Securenok.

Read more
March 1, 2026

Industrial Security Conference 2025

This year’s conference highlighted that many organizations have made significant progress in terms of plans, policies, and documentation, yet there remains a gap between what is planned and what is actually implemented in OT environments.

Read more
February 13, 2026

How Does Secure-NOK Help Food Manufacturers Manage Cyber Risk?

Download our white paper “Cybersecurity in the Food Industry” for free and gain practical guidanceon how to secure continuity and regulatory compliance in your production environment.

Read more
February 13, 2026

Stricter Security Requirements for Critical Services from 1 October 2025 under theDigital Security Act

O nFriday, 20 June, the Norwegian government decided in a Council of State meeting that the Digital Security Act will enter into force on 1 October 2025. At the same time, the Digital Security Regulation was adopted, entering into force concurrently with the Act.

Read more
February 13, 2026

What does NIS2 require from owners of OT systems to become compliant?

The NIS 2 Directive is the European Union’s updated and strengthened framework for managing cybersecurity risks across critical and important service providers.

Read more
February 13, 2026

Bremanger Breach: Lessons from a Norwegian Dam Hack

Earlier this year, unidentified hackers breached the control system of a Norwegian dam  at Risevatnet, in Bremanger. The hackers discovered that the dam had a Human Machine Interface (HMI) exposed on the Internet and was able to gain access by exploiting a weak password.p

Read more