Feb 26, 2026

Peter Busk

Cybersecurity in regulated industries

Introduction

A cyber attack on a pharmaceutical company is not just annoying downtime or data loss. It can mean:

  • Compromised patient data with GDPR fines in the millions

  • Sabotage of production processes with potential patient risk

  • Theft of intellectual property worth billions

  • Loss of compliance and production stops

At Hyperbolic, we work with cybersecurity both in the pharmaceutical industry and general software development. Regulated industries face unique challenges: Security must be balanced with compliance, legacy systems are often vulnerable, and the consequences of breaches are catastrophic.

The Regulatory Landscape

GxP and Cybersecurity: The FDA has made it clear that data integrity includes protection against cyber threats. EU GMP Annex 11 explicitly requires that computerized systems are protected against unauthorized access.

GDPR: The pharmaceutical industry handles enormous amounts of personal data from clinical trials and patient programs. GDPR fines can reach up to 4% of global revenue.

NIS2 Directive: The EU's Network and Information Security Directive 2 classifies the pharmaceutical industry as a "critical entity" with heightened cybersecurity requirements starting in 2024.

Unique Challenges in Regulated Industries

Challenge 1: Legacy Systems

Production lines in the pharmaceutical industry can operate for over 20 years. Equipment and software from the 1990s are not uncommon.

The Problem:

  • Windows XP or older operating systems without security updates

  • Embedded controllers with hardcoded passwords

  • Proprietary protocols without encryption

  • No network isolation

The Solution:

  • Network Segmentation: Isolate legacy systems on separate VLANs

  • Bastion Hosts: Restricted access through hardened intermediary systems

  • Application Whitelisting: Only allow approved applications to run

  • Compensating Controls: When direct update is not possible

At Hyperbolic, we implemented network segmentation for a manufacturing facility: Legacy SCADA systems isolated on air-gap networks, data transferred via a one-way diode to the corporate network for reporting.

Challenge 2: Validation vs. Updating

Traditional IT: "Update quickly, ask questions later." GxP IT: "Is this update validated?"

The Problem: Security updates can change system behavior. In GxP, it may require revalidation. But waiting to update increases security risks.

Best Practices:

Critical Updates (active exploitation):

  • Emergency change process

  • Risk assessment: Higher risk of NOT updating

  • Shortened testing focused on critical functions

  • Implementation within days

Important Updates:

  • Standard change process

  • Regression testing of GxP functionalities

  • Implementation within 30 days

Routine Updates:

  • Aggregate in scheduled maintenance windows

  • Full regression testing

  • Quarterly or semi-annual implementation

Challenge 3: Third-party Access

The pharmaceutical industry relies on vendors for equipment maintenance, often via remote access.

Risks:

  • Vendor security may be weak

  • Remote access can be abused

  • Lack of visibility into vendor activities

Solution - Vendor Access Management:

  • Just-in-time Access: Accounts activated only as needed

  • Privileged Access Management: All vendor sessions monitored and recorded

  • Network Isolation: Vendors can only access their own equipment

  • Two-factor Authentication: Required for all remote access

  • Session Recording: Video of all vendor activity for auditing

Practical Security Framework

Layer 1: Network Security

Segmentation: Divide networks into zones based on GxP impact and trust level:

  • Production Zone: GxP-critical systems, high isolation

  • Laboratory Zone: LIMS, analytical instruments

  • Corporate Zone: Email, file sharing, ERP

  • DMZ: Systems accessible from the Internet

Firewall Rules: Default deny, explicitly allow only necessary traffic between zones.

Implementation: During a facility migration, we implemented micro-segmentation with Palo Alto firewalls. Each production line on a separate VLAN. Lateral movement between lines not possible.

Layer 2: Identity and Access Management

The Principle of Least Privilege: Users are granted only the access they need for their jobs.

Role-Based Access Control:

  • Define roles based on job functions

  • Assign rights to roles, not individual users

  • Regular access reviews (minimum quarterly)

Two-Factor Authentication:

  • Required for all remote access

  • Required for privileged accounts

  • Implement for all users where possible

Password Policy:

  • Minimum 12 characters (14+ better)

  • Complexity requirements

  • 90-day expiration for standard accounts, 60 days for privileged

  • No password reuse (last 12 passwords)

  • Account locking after 5 failed attempts

Layer 3: Endpoint Protection

Antimalware: Enterprise-class, centrally managed. But challenge in GxP: Cannot automatically update definitions without validation.

Solution:

  • Separate update plan for GxP vs non-GxP

  • Test updates in a validation environment first

  • Rapid implementation process for critical threats

Endpoint Detection and Response: Beyond traditional antivirus, this solution monitors behavior and can detect zero-day attacks.

Application Whitelisting: On critical systems, only allow approved applications. Blocks unknown malware by default.

Layer 4: Data Protection

Encryption:

  • At Rest: All databases and file systems containing sensitive data

  • In Transit: TLS 1.2+ for all network communication

  • Backups: Encrypted before external storage

Data Loss Prevention: Monitor and block attempts to remove sensitive data via email, USB, cloud storage.

Backup and Recovery:

  • The 3-2-1 Rule: 3 copies, 2 different media types, 1 offsite

  • Immutable Backups: Cannot be altered or deleted, protects against ransomware

  • Regular Testing: Quarterly recovery testing, annual disaster exercise

Layer 5: Monitoring and Incident Response

Security Information and Event Management: Centralized logging and correlation of events across all systems.

Key Use Cases:

  • Failed login attempts (potential brute force)

  • Privilege escalation

  • Access outside normal working hours to critical systems

  • Patterns of data exfiltration

  • Malware detections

Security Operations Center: For larger organizations, 24/7 monitoring.

Alternatives for Smaller Organizations:

  • Managed Security Service Provider: Outsourced Security Operations Center

  • Part-Time Monitoring: Daily review of alerts

  • Automated Alerts: Critical incidents trigger immediate response

Incident Response Plan:

  1. Recognition: How are incidents identified?

  2. Containment: Isolate affected systems

  3. Eradication: Remove threat

  4. Recovery: Restore systems

  5. Lessons Learned: Post-incident review

GxP-Specific Additions:

  • Impact Analysis: Does the incident affect data integrity?

  • Regulatory Notification: When should the FDA/EMA be informed?

  • Deviation: Is the incident a GxP deviation?

Common Attack Vectors in the Pharmaceutical Industry

Phishing and Social Engineering

Tactics: Emails that appear legitimate from suppliers, colleagues, or supervisors.

Defense:

  • Security Awareness Training: Quarterly for all employees, phishing simulations

  • Email Filtering: Block known malicious senders, suspicious attachments

  • DMARC/SPF/DKIM: Email authentication to prevent spoofing

  • Reporting Mechanism: Easy way for users to report suspicious emails

Ransomware

Consequences: Encryption of critical data with ransom demands. Can halt production for days or weeks.

Defense:

  • Immutable Backups: Primary defense, can recover without paying

  • Network Segmentation: Limits spread

  • Application Whitelisting: Blocks unknown ransomware

  • User Education: Do not open suspicious attachments

Example: A customer was hit by ransomware. Thanks to daily immutable backups, they were operational again within 36 hours without paying. Estimated cost of paying the ransom plus downtime during recovery: 1.5 million kroner. Actual cost: 400,000 kroner (primarily IT overtime).

Supply Chain Attacks

Tactics: Compromise software from trusted suppliers.

Example: SolarWinds hack (2020) where hackers infiltrated software updates from a major vendor.

Defense:

  • Vendor Security Assessment: Due diligence before onboarding

  • Software Composition Analysis: Scan for known vulnerabilities in third-party components

  • Isolated Update Testing: Test updates in a sandbox environment before implementation

Internal Threats

Types:

  • Malicious: Disgruntled employee sabotages or steals data

  • Negligent: Careless actions create vulnerabilities

Defense:

  • Least Privilege: Limit the damage an insider can do

  • User Behavior Analysis: Log abnormal activity

  • Separation of Duties: No single person has full control

  • Offboarding Procedures: Immediate revocation of access upon termination

Compliance and Audits

What Inspectors Look For:

Policies and Procedures:

  • IT Security Policy

  • Access Control Procedures

  • Incident Response Plan

  • Business Continuity Plan

  • Backup and Recovery Procedures

Technical Controls:

  • Demonstrate access controls (show user provisioning)

  • Review of audit trails (who accessed what and when)

  • Update management process

  • Status of malware protection

Testing and Exercises:

  • Results of penetration tests

  • Vulnerability scans

  • Documentation of disaster drills

  • Incident response exercises

Training Records: All users trained in security awareness.

Preparedness:

  • Gap Assessments: Internal or external

  • Gap Analysis: Compare current state to regulatory requirements

  • Remediation Tracking: Documented action plans for gaps

Example: Comprehensive Security Modernization

Background: Mid-sized biotech company, rapid growth, security was ad-hoc. FDA pre-approval inspection impending.

Findings from Initial Assessment:

  • No network segmentation (flat network)

  • Weak password policy (no complexity requirements)

  • No two-factor authentication

  • Inconsistent updates

  • Limited logging

  • No incident response plan

18-Month Transformation:

Phase 1 (Months 1-6) - Foundation:

  • Implemented network segmentation

  • Rolled out enterprise antivirus and endpoint protection

  • Enforced strong password policy

  • Rolled out two-factor authentication for all remote access

  • Established security information management with basic applications

Phase 2 (Months 7-12) - Maturity:

  • Implemented privileged access management

  • Established formal update management process

  • Developed incident response plan

  • Conducted tabletop exercise

  • Expanded applications for security information management

Phase 3 (Months 13-18) - Optimization:

  • Third-party penetration test

  • Remediated findings

  • Disaster exercise

  • Security awareness training program

  • Completed policies and procedures

Outcome of FDA Inspection: Zero security-related findings. Inspector praised mature security posture.

Cost vs. Breach

Investment in Security: 3.5 million kroner over 18 months (tools, consulting, employee time).

Cost of Potential Breach:

  • Average data breach in the pharmaceutical industry: 35 million kroner (IBM Security report)

  • Potential GDPR fine: Up to 400 million kroner+ (4% of revenue)

  • Production downtime: 750,000 kro­ner+ per day

  • Reputational damage: Incalculable

Return: Even without a breach, improvements in uptime and efficiency often justify the investment.

New Threats

AI-Driven Attacks: Sophisticated phishing with AI-generated content, automated exploitation of vulnerabilities.

Defense: AI-driven defense, behavior-based detection.

IoT Vulnerabilities: Medical devices, sensors, connected equipment often have weak security.

Defense: Network isolation, regular firmware updates, vendor security requirements.

Cloud Misconfigurations: As the pharmaceutical industry moves to the cloud, misconfigurations create exposure.

Defense: Cloud security posture tools, infrastructure-as-code with built-in security.

Conclusion

Cybersecurity in regulated industries requires a balance between protection and operational efficiency, between rapid response and validated changes.

Key Principles:

  1. Defense in Depth: Multiple layers of security

  2. Risk-Based Approach: Focus resources where the risk is greatest

  3. Compliance Integration: Security and GxP hand in hand

  4. Continuous Improvement: Threats evolve, so must your defense

At Hyperbolic, we help companies build security programs that both protect and enable the business.

Contact us for a cybersecurity assessment.

By

Peter Busk

CEO & Partner