Intelligent CISO Issue 87 | Page 41

expert

OPINION
ILYA LEONOV, REGIONAL DIRECTOR FOR MENA, POSITIVE TECHNOLOGIES NEW
In this Q & A, Ilya Leonov, Regional Director for Positive Technologies in the MENA region, discusses the surge in OT-targeted attacks and the increasing weaponisation of AI, warning that outdated defences leave a growing surface open to highly strategic adversaries.

Why OT security is becoming a key priority for Positive Technologies

t GISEC Global 2025, one thing was

A clear – traditional defences no longer protect systems against growing attacks on operational technology( OT) and application environments.

There needs to be a growing focus on embedding security earlier in the software development lifecycle.
It is crucial to adopt DevSecOps practices to mitigate long-term risks and address a growing skills gap that even the most advanced tools cannot compensate for.
This message is particularly resonant in the Middle East. According to a recent Gartner report, nearly 14 % of organisations in the UAE – particularly in the energy, government, finance and infrastructure sectors – are ramping up investment in proactive cyberdefence strategies.
UAE cybersecurity spending is set to rise by 14 % in 2025 – what’ s driving this growth?
The primary driver is the rapid Digital Transformation taking place not only in the UAE but across the Middle East. We’ re witnessing an unprecedented integration of IT into virtually every aspect of daily life – whether cloud-based services, IoT applications, remote access platforms or smart infrastructure.
The threat landscape increases with every new technology layer – new vulnerabilities, attack surfaces and intrusion methods. While not unique to the region, the GCC has seen a sharp rise in adopting digital platforms, creating a need for stronger cybersecurity protocols.
In response, governments in the region – especially the UAE – are stepping in with progressive regulations and national cybersecurity frameworks. These are compliance checkboxes and well-structured, future-focused strategies to ensure resilience in an increasingly complex threat environment.
It is reactive and proactive – addressing today’ s vulnerabilities while building long-term national cyberdefences.
With OT attacks on the rise, what’ s needed to secure critical infrastructure better?
For years, Cybersecurity has focused almost exclusively on IT – corporate networks, endpoints and software systems. OT, by comparison, was often
WWW. INTELLIGENTCISO. COM 41