Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Admitad Launches OEM Advertising Division to Drive Mobile Growth throu...
Navigating blockchain adoption amid rising security challenges
Scattered Spider: still spinning phishing webs on corporate land?
TaiPei-based Hong Tong Technology Acquires Initio’s Entire Encry...
Do not let hackers halt your plant: Checklists for reviewing OT cyber ...
LOGIN REGISTER
CybersecAsia
  • Conference 2025
  • Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
    • Featured

      MSPs the first line of defense for APAC SMEs

      MSPs the first line of defense for APAC SMEs

      Tuesday, April 15, 2025, 1:30 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Conference 2025
  • Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
    • Featured

      MSPs the first line of defense for APAC SMEs

      MSPs the first line of defense for APAC SMEs

      Tuesday, April 15, 2025, 1:30 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning
News

How challenging is ensuring cybersecurity in digitalizing operational technology environments?

By CybersecAsia editors | Tuesday, April 29, 2025, 8:23 AM Asia/Singapore

How challenging is ensuring cybersecurity in digitalizing operational technology environments?

According to a small survey, 39.3% of respondents had cited cybersecurity as a key barrier.

Based on a survey* commissioned in 2025* of 250+ Operational Technology (OT) and IT decision-makers from industries including energy, utilities, transportation, logistics, and manufacturing, a cybersecurity firm has disclosed some findings on OT cybersecurity challenges.

First, 39.3% of respondents had identified cybersecurity as a key barrier to digitalizing OT environments, with 45% of respondents from the Asia Pacific region* reporting this concern, compared to a global average of 39.3% across all respondents.

Second, 46.6% of respondents had cited inadequate security measures, and 46.6% had noted insufficient budgets or personnel for OT cybersecurity.

Other findings:

  • 42.7% of respondents reported challenges with regulatory compliance, and 41.7% highlighted complexities in IT/OT integration. Among respondents from APAC, 68% cited security gaps, 56% lacked sufficient resources, and 35% faced compliance issues.
  • 31.1% of respondents cited relying on manual processes or were beginning digitalization; 22.7% had integrated some connected digital technologies; and 63.6% cited they had aimed for full digital transformation within two years.
  • In respondents representing APAC in the surveys, 36% of respondents citing using multiple connected technologies, 33% cited achieving full digital integration, 9% cited reaching digital maturity, and 22% were still using traditional processes or starting digitalization.

According to Andrey Strelkov, Head of Industrial Cybersecurity Product line, Kaspersky, the firm behind the survey/white paper: “As connectivity and reliance on digital technologies continues to grow, the potential for cyber threats rises as well. It is crucial for industrial organizations to adopt robust cybersecurity solutions to ensure that while they implement new OT systems, and enhance their overall efficiency: they simultaneously mitigate potential cyber risks that could result in significant disruptions and financial losses.”

*No detailed methodological disclosures have been supplied, such as respondent selection criteria, country-level breakdowns, or sampling processes. Notably, there is no mention of US participants or data despite the paper’s findings and conclusions made as globally representative. Readers should interpret the survey findings with these limitations and non-disclosures in mind.

Share:

PreviousTencent Cloud Big Data-WeData: An Integrated Data + AI Intelligent Platform
NextContrasting Indonesian consumers’ high trust levels in RTP systems amid escalating scam incidents

Related Posts

Are low-volume targeted attacks such as spear-phishing dangerous?

Are low-volume targeted attacks such as spear-phishing dangerous?

Monday, June 19, 2023

SMEs beware: DeathStalker is waiting to get you

SMEs beware: DeathStalker is waiting to get you

Thursday, August 27, 2020

Safeguarding elections amid growing cyberthreats and disinformation

Safeguarding elections amid growing cyberthreats and disinformation

Tuesday, April 22, 2025

Knowing and doing Zero Trust practices are separate trends: APAC survey

Knowing and doing Zero Trust practices are separate trends: APAC survey

Monday, October 18, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.