All industries
Industry deep dive

Utilities — NIS2 essential operators

Continuous offensive validation, traffic-side intrusion detection, and NIS2 Title 13 evidence packaging — one appliance for the European utility operating-model.

NIS2 came into force across EU member states in 2024, and the Italian decreto legislativo of October 2024 made every essential energy, water and telecommunications operator personally accountable for "appropriate, proportionate, effective" cybersecurity measures. The ACN Q1 2026 bulletin reports a 41% YoY rise in destructive (not merely extortive) attacks on critical infrastructure operators across the EU. The combination of state-aligned offensive activity, AI-augmented ransomware affiliates targeting OT environments, and a regulator that now expects continuous evidence — not annual reports — has turned the security posture of a utility from a budget line into a fiduciary obligation for the board.

What is on the CISO's desk right now

NIS2 Title 13 incident reporting

24h early warning, 72h notification, 1-month final report. Every minute of detection latency translates into regulatory exposure. The clock starts at "should have known", not at "did know".

Continuous controls evidence

ACN guidance is explicit that measures must remain effective over time, not at one point in time. A clean pentest report from last year does not satisfy the obligation.

OT/IT convergence

Energy and water operators run mixed Modbus / DNP3 / IEC 60870 estates next to IT systems. The 2026 attack pattern is to land via IT and pivot to OT — exactly the path most security stacks are blind to.

Supply-chain attack on security vendors

CERT-EU 2025-2026 advisories on third-party SOC providers made every CISO question SaaS security tooling. Procurement is increasingly forbidding vendor-cloud touch points on production telemetry.

How Zero Hunt maps to the utility operating model

Pillar 1 — Generative Pentest

Continuous generative pentest covering IT + OT segments

The 10-agent swarm runs on schedule and on change-detection, exercising both IT and OT segments. The AI Gym backtest corpus includes Vulhub OT/ICS modules. Findings are generated, not catalogued — keeping pace with the AI-augmented offensive activity actually observed against utilities.

Pillar 2 — AI Traffic Analysis

Deep-packet AI traffic analysis on the OT boundary

Wire-speed 4-head ML model running on the appliance GPU at 2.7+ Gbit/s baseline. Detects ransomware staging traffic on IT, anomalous Modbus / DNP3 patterns on OT, and the lateral pivot between the two — the canonical 2026 utility attack chain.

Pillar 3 — Automatic Compliance

Auto-mapped NIS2 Title 13 evidence + 72h notification timeline

Every finding, every detected event, every remediation is ECDSA-signed at write time and mapped to NIS2 controls. The 24h / 72h / 1-month timeline becomes a query, not a fire drill. Trust Center exports the auditor bundle in one click.

Capability emphasis for utilities

  • Sensor placement across multi-subnet IT, DMZ and OT segments
  • OT/ICS protocol coverage in the AI Traffic model (Modbus, DNP3, IEC 60870, BACnet)
  • Air-gap deployment for classified or generation-asset segments
  • ECDSA-signed chain-of-custody on every artefact (NIS2 audit defensibility)
  • Full integration with existing SIEM/SOAR via REST + WebSocket + webhook

Who buys this in a utility

CISO sponsoring; SOC manager validating; OT security lead co-signing; procurement vetting against ACN essential-operator requirements; CFO authorising on the basis that the appliance replaces 1-2 FTE-equivalent of pentest contractor cost plus the NIS2 reporting infrastructure.

Go deeper on the regulations

Want to see this against your environment?

A 30-minute technical demo runs Zero Hunt against a recorded slice of your stack, scoped to the regulatory regime you operate under.