<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2233467260228916&amp;ev=PageView&amp;noscript=1">

How Cegal protect critical infrastructure from daily cyber threats

Editorial staff
06/18/2025 |

Every day, cybercriminals try to gain access to the systems and applications of the largest energy companies. They want to steal information, extort money from businesses, or, in the worst case, sabotage critical infrastructure. Cegal offers a robust cybersecurity service that prevents these threats and keeps your infrastructure safe.

"This is organized," says Roald Dreggevik, Product Manager at Cegal. He oversees Cegal's security services and discusses the global networks of cybercriminals. "I don't know if they have pension agreements, but some people work within clear organizational structures, as if they worked in a normal company. The threats come from large, global networks that run big business," continues Dreggevik.

Cybercrime bigger than drugs

The importance of IT security is rising due to the increasing threats and the ongoing digitalization of society. According to the security company Fortinet, cybercrime now surpasses drug crime in global revenue generation. Moreover, threats from national actors are increasing: "The world has not become safer over the past year. There is still war and conflict in Ukraine and the Middle East. Cooperation between authoritarian states is increasing. The use of force is escalating. Democracies are under pressure and unity is being challenged," writes the National Security Authority (NSM) in the report Risk 2025.

Cyber threats are typically categorized into four distinct groups:

1. Mafia and criminal network environments: The goal is financial gain through extortion (ransomware), espionage, information theft, etc.
2. State actors: Countries or governmental organizations carry out cyber attacks in other countries to obtain information, sabotage, or carry out other targeted actions.
3. Hacktivism: Digital activism to sabotage, influence, and advance ideological or political goals.
4. Internal threats: Employees (knowingly or unknowingly). Employees may accidentally open the door to digital intrusion or deliberately wish to harm the company.

Cegal Cetegra SOC Service: Proactive protection with a local presence

We stands as a premier technology provider for the energy sector, serving numerous major energy companies in the Nordic region and globally

Our customers face an increasing number of digital intrusion attempts and cyber attacks daily.  Therefore, IT security is integrated into every Cegal delivery. This ensures that the technologies and applications provided by us are rigorously tested and come with fundamental IT security integrated.

In addition, and as part of IT operations deliveries, we can deliver SOC - Security Operations Center. This greatly enhances IT security by implementing a security framework that prevents, detects, and alerts against potential cyber attacks.

Cegal Cetegra SOC Service is built on Mnemonic Argus MDR (Managed Detection & Response), recognized as the leading security monitoring platform in the market. Combined with our industry expertise and local service desk, this provides a unique and all-encompassing solution:

  • 24/7 monitoring of the entire IT infrastructure
  • Rapid response to security incidents
  • Protection of OT (operational technology) and IOT 
  • Tight link to business-critical processes

Cegal Cetegra SOC Service provides businesses with a centralized point of contact, locally grounded, to support all IT services. This service acts as a comprehensive hub for all the IT solutions a business requires.

NIS2 brings new IT security requirements

NIS2 (Network and Information Security Directive 2) is the EU's new security directive that imposes stricter cybersecurity requirements on companies operating in critical infrastructure. This includes companies in the energy, transportation, and healthcare sectors. The NIS2 directive requires companies to have systems for risk management, incident management, and continuous monitoring. It also gives authorities greater opportunities to supervise and impose sanctions. Several customers have chosen Cetegra SOC Service to meet NIS2 requirements and to ensure safe operations.

Read the aticle: What is NIS2 and what does it mean for you as a manager?>

"So far, we haven't had any serious cybersecurity incidents at our Cetegra SOC Service customers. We've stopped the attacks before they've had a chance to develop. It's like blocking the front door," says Roald Dreggevik, Product Manager at Cegal.

He cites an example: "You can see on a check that a login has arrived from a country that is not safe, which is registered as an insecure login. Context is then automatically built around this insecure login: Is someone on vacation, traveling, what systems have they tried to access, and so on? We collect as much information as possible and have to find the balance between blocking real threats and allowing people to access systems when traveling and logging in from unusual locations. A CEO needs to be able to show a spreadsheet with macros in an external meeting. 

Despite extensive automation, the ultimate decisions are always made by security specialists," continues Dreggevik.

Cetegra SOC Service continuously monitors the company's IT network and infrastructure. In addition, the security solution receives intelligence data from over 200 external sources. Information flows seamlessly between Mnemonic and Cegal, and all serious incidents are followed up by Cegal's 24-hour service center.

Cetegra SOC Service is delivered both as an integrated part of Connect@Plant and as a standalone delivery. The SOC service is flexible and can be adapted to the company's size and IT security needs.

Cetegra SOC Service should be like a football referee who does a good job. Then the referee doesn't get noticed.

Roald Dreggevik, Product Manager at Cegal

 

Related articles

Cyber Security Digitalization
Daily digital threats to the power industry
Editorial staff
arrow
Cyber Security Digitalization Energy
What is NIS2 and what does it mean for you as a manager?
Ingrid Løvseter Business Consultant | Cyber Security...
arrow
Cyber Security
Connect@Plant – Do you want to improve your security strategy?
Glenn Arild Haugland Glenn Arild Haugland is a Product...
arrow