• Research
  • Strategic Europe
  • About
  • Experts
Carnegie Europe logoCarnegie lettermark logo
EUUkraine
  • Donate
{
  "authors": [
    "Nidhi Singh"
  ],
  "type": "commentary",
  "centerAffiliationAll": "",
  "centers": [
    "Carnegie Endowment for International Peace",
    "Carnegie India"
  ],
  "englishNewsletterAll": "",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie India",
  "programAffiliation": "",
  "programs": [],
  "projects": [
    "Technology and Society"
  ],
  "regions": [
    "India"
  ],
  "topics": [
    "Technology"
  ]
}

Source: iStock

Commentary
Carnegie India

Safeguarding Critical Infrastructure: Key Challenges in Global Cybersecurity

Fueled by AI and rising state-sponsored threats, cyberattacks on critical infrastructure have become more frequent and sophisticated, and traditional defenses are proving inadequate. A closed-door session at the Global Technology Summit 2025 examined these evolving risks. This article distills four key challenges identified in the discussion, highlighting the urgent need for real-time defense and international coordination.

Link Copied
By Nidhi Singh
Published on Jul 24, 2025
Project hero Image

Project

Technology and Society

This program focuses on five sets of imperatives: data, strategic technologies, emerging technologies, digital public infrastructure, and strategic partnerships.

Learn More

Cyberattacks against critical infrastructure (CI) have evolved from isolated incidents to coordinated campaigns by both state and non-state actors. Cyber threats have become increasingly sophisticated and frequent, particularly those that leverage artificial intelligence (AI). Technologists have noted that AI-powered cyberattacks can bypass traditional defenses, with recent breakout times as short as fifty-one seconds, illustrating the rapid evolution of these threats.[1] These advancements are further exacerbated by China’s increasing offensive cyber capabilities that pose rising threats to CIs, thereby shrinking response windows and making real-time defense capabilities essential.

A closed-door discussion titled “Safeguarding Cybersecurity of Critical Infrastructure” was organized at the Global Technology Summit 2025, co-hosted by Carnegie India and the Ministry of External Affairs, Government of India. The event brought together cybersecurity experts from Australia, Germany, the Netherlands, and France, along with industry leaders, legal experts, academics, and senior Indian policymakers. The discussion aimed to identify vulnerabilities in CI protection, discuss ways to enhance national cybersecurity resilience through international cooperation for incident response, and deliberate coordination required between government, the private sector, and international partners for protecting CI. Based on the discussion, this essay outlines four key challenges: varying definitions of CI across countries, gaps in international cooperation for norm enforcement, difficulties in public-private information sharing, and vulnerabilities in the hardware supply chain.

Defining Critical Infrastructure

Participants unanimously agreed that the fundamental issue underpinning the difficulty in securing CI against cyber threats was the lack of a shared understanding of what constitutes CI.

Inconsistencies in the definition of CI across countries persist because each nation prioritizes and protects different sectors based on its own frameworks and threat perceptions. This creates challenges for a coordinated crisis response, as illustrated during the 2017 NotPetya attack. When the attack stopped container transport at Rotterdam’s port, city authorities struggled to respond effectively because Maersk’s APM Terminals, despite being vital to port operations, was not classified as CI. This definitional gap prevented national support mobilization and delayed crisis coordination. While this example illustrates challenges for national responses, it poses an even greater challenge at the international level, where varying definitions of CI could hinder aligned threat assessment, mutual aid, and collective response efforts.

Another factor that contributes to the varying definitions of CI is that attackers often define CI based on its potential to cause maximum disruption, while official government definitions fail to reflect real-world vulnerabilities and attack trends. It is therefore difficult for states to rely on a fixed definition of CI. This underscores the importance of adopting a flexible and adaptive approach to defining CI. Recognizing this and the recent advancements in technology, experts emphasized the need to formally include data storage and processing systems as part of CI, given the growing centrality of data in modern societies. Going forward, achieving greater international alignment on dynamic, threat-informed CI definitions will be critical to enabling coordinated cybersecurity responses and building global resilience.

International Cooperation and Fragmented Norms

Most states and international organizations agree that existing international laws apply to cyberspace just as they do offline.[2] For example, the Geneva Conventions of 1949 still provide established legal foundations relevant to cyber warfare to protect civilian infrastructure during conflicts.

Participants noted that while there have been some challenges in enforcing existing laws, new international processes like the Global Digital Compact (GDC) and the Open-ended Working Group on security of and in the use of information and communications technologies are being formed. These emerging processes aim to develop norms focused on protecting CI by discouraging attacks on another state’s CI, enhancing national cyber resilience, and fostering mutual assistance and solidarity among nations.

Participants also talked about adopting mechanisms such as public attribution of cyberattacks at global forums, like the UN, and the creation of tools like digital emblems for labelling vital online services as CI, to prevent cyberattacks. An example of this is the EU Cyber Diplomacy Toolbox, which allows countries in the EU to coordinate responses in the region using public or private attribution and sanctions.  

Critical Gaps in Public-Private Coordination

Experts highlighted the need for states to proactively engage with the private sector to bolster the cybersecurity of CI. For example, MasterCard’s use of generative AI to prevent cyberattacks and its ability to identify compromised cards can be helpful for states to tackle emerging cybersecurity threats in the financial sector. Experts agreed that leveraging private sector intelligence and expertise, particularly in threat detection and incident response, is essential for a nation’s comprehensive cybersecurity strategy.

Supply Chain Vulnerabilities and Technology Sovereignty

Supply chain vulnerabilities, especially those related to Chinese IT products used in CI, are a significant concern. Hardware risks are challenging because end-users often lack visibility in the manufacturing processes, making it hard to identify backdoors or compromised firmware that could facilitate cyberattacks. Experts stressed the need for common standards and certifications to ensure product security and limit engagement with risky vendors. Collaborating with vendors from allied countries and developing secure domestic manufacturing capabilities are essential steps for ensuring supply chain integrity and reducing dependency on potentially compromised hardware sources.

Industry representatives also underscored the importance of creating indigenous intellectual property and investing in domestic technologies to enhance security and reduce dependence on foreign solutions. They also recommended adopting zero-trust approaches to hardware security, which involve continuous verification of hardware integrity, device authentication, regular firmware checks, and network segmentation to prevent breaches.

The roundtable revealed that safeguarding CI requires coordinated responses across multiple dimensions. While definitional inconsistencies, international cooperation gaps, public-private coordination challenges, and supply chain vulnerabilities represent significant barriers, ongoing efforts by various countries and organizations demonstrate growing recognition of these challenges and commitment to building more resilient cybersecurity frameworks.

[1] Insights from a roundtable on cybersecurity for critical infrastructure at the Global Technology Summit 2025, organized by Carnegie India and the Ministry of External Affairs, Government of India, on April 11, 2025.

[2] Most states and several international organizations, including the UN General Assembly’s First Committee on Disarmament and International Security, the G20, the European Union, ASEAN, and the OAS, have affirmed that existing international law applies to the use of information and communication technologies (ICTs) by states.

Nidhi Singh
Senior Research Analyst and Program Manager, Technology and Society Program
Nidhi Singh
TechnologyIndia

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Europe

  • Commentary
    Strategic Europe
    The EU and India in Tandem

    As European leadership prepares for the sixteenth EU-India Summit, both sides must reckon with trade-offs in order to secure a mutually beneficial Free Trade Agreement.

      Dinakar Peri

  • Commentary
    Strategic Europe
    Corporate Geopolitics: When Billionaires Rival States

    Tech giants are increasingly able to wield significant geopolitical influence. To ensure digital sovereignty, governments must insist on transparency and accountability.

      Raluca Csernatoni

  • Commentary
    Five Pillars for Europe in the Second Trump Era

    The second Trump administration has shifted the cornerstones of the liberal international order. How the EU responds will determine not only its global standing but also the very integrity of the European project.

      • Rym Momtaz

      Rym Momtaz

  • Democracy tech citizenship
    Paper
    Rethinking EU Digital Policies: From Tech Sovereignty to Tech Citizenship

    The EU’s pursuit of tech sovereignty has often sidelined the role of democracy in the digital sphere. The union should adopt a tech citizenship strategy that promotes citizen engagement, democratic innovation, and accountability.

      Richard Youngs

  • Commentary
    Can the EU Achieve Its Tech Ambitions?

    The EU’s quest for strategic autonomy in the digital domain is challenged by national interests. Brussels can set a bold direction on tech sovereignty, but its success will require a robust framework and delicate compromises.

      Raluca Csernatoni, Sinan Ülgen

Get more news and analysis from
Carnegie Europe
Carnegie Europe logo, white
Rue du Congrès, 151000 Brussels, Belgium
  • Research
  • Strategic Europe
  • About
  • Experts
  • Projects
  • Events
  • Contact
  • Careers
  • Privacy
  • For Media
  • Gender Equality Plan
Get more news and analysis from
Carnegie Europe
© 2026 Carnegie Endowment for International Peace. All rights reserved.