Why climate risks and biotechnology are becoming the next big topic in cybersecurity.
In an increasingly networked world, cyber threats are no longer just digital attacks on applications, databases or networks.
(Image: AI-generated)
In an increasingly networked world, cyber threats are no longer just digital attacks on applications, databases or networks. Two previously underestimated risk drivers are now on the agenda of security managers: climate-related instabilities in critical infrastructures and digitally networked biotechnology. They not only pose technological challenges, but also force a reorientation of traditional cybersecurity approaches - from risk analysis and system architecture to incident response management.
Climate Risks: Blackouts as a Cyber-Physical Threat
Extreme weather events such as heatwaves and severe storms are increasing worldwide. Climate change is not only causing ecological and economic damage, but is also increasingly affecting the stability of technical infrastructures. For example, power grids come under pressure when high temperatures lead to an overload of lines and transformers or the cooling system of energy-intensive systems reaches its limits. This has a direct impact on data centers and digital services: rising temperatures increase the need for cooling, while local water resources for thermal regulation dwindle. This can result in reduced computing capacity, network instability or even power outages - events that no longer need to be assessed as isolated cases but as systemic risks.
While traditional IT security strategies focus primarily on networks, endpoints and applications, the influence of climatic factors requires cyber risks to be considered in the context of physical infrastructure. Resilience - the ability of a system to become functional again after a disruption - thus becomes the central goal of cyber defense. Energy suppliers and operators of critical facilities must therefore protect their systems not only against hackers, but also against the combination of physical failure and the resulting digital instability.
In addition, the digitalization of electricity grids with intelligent sensors, automated control systems and IoT components is expanding the attack surface. Although these smart grids are more efficient, they are also more complex and therefore more susceptible to coordinated attacks that could exploit or amplify physical failures. At the same time, it is recognized at an institutional level that climate risks go far beyond environmental and energy issues. National risk assessments link climate change directly to security issues and emphasize that the impacts on infrastructure, the economy and society are profound and interlinked.
Cyberbiosecurity: The Digital Threat Posed by Networked Biotechnology
Parallel to the challenges in the energy sector, a new, interdisciplinary field of risk is emerging: cyber biosecurity. This term describes the interface between cyber security and biosecurity and addresses risks that arise when biological systems, data and biotechnological processes are digitally controlled, networked or analyzed. These include automated laboratory information systems, digitized biomedical research facilities or the storage and processing of genetic data.
The digitalization of the life sciences promises enormous progress: accelerated drug development, automated diagnostics and precise genome research. However, these advances also open up areas of attack: unauthorized access to genomic data can not only lead to data breaches, but also pose risks to individuals or entire populations. Controlled biological systems can develop malfunctions or falsify results if manipulated by cyberattacks.
A related field concerns networked medical devices and implants that are operated as part of the "Internet of Medical Things" (IoMT). These devices - from insulin pumps and implantable pacemakers to smart infusion systems - are increasingly connected via networks and can be the target of cyberattacks. Studies on IoMT show that network and communication weaknesses, inadequate authentication and a lack of update mechanisms not only put data at risk, but can also have a direct physical impact on patients.
Classic examples from security research and industrial practice show how medical devices can be compromised. In such "MedJack" attacks, vulnerabilities in medical devices are exploited to first infiltrate networks and then compromise downstream systems. The scientific community therefore emphasizes that a holistic approach is required: the security of devices and systems must be considered right from the design phase ("security by design"), accompanied by standardized risk analyses, continuous monitoring and strict regulatory frameworks.
The New Risk Landscape Requires Integrative Strategies
Both climate-related instabilities and digital biotechnology show that traditional cybersecurity models are reaching their limits. Cyberattacks are no longer limited to digital artifacts, but also interact with physical processes and biological systems. Resilience, interdisciplinarity and a system-wide risk analysis are therefore essential. For companies, this means Their security strategies must go beyond traditional IT and also include physical infrastructure, ecological factors and biotechnology. This includes
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
Holistic risk analysis: modeling scenarios that map climate events, system failures and digital attacks simultaneously.
Resilient architecture: redundancies, micro-grids or secure, energy self-sufficient systems to maintain critical services.
Security by design: anchoring security in the product development of biological systems and medical devices.
Regulatory integration: Cooperation with institutions, standards and authorities to create robust framework conditions for new fields of technology.
Power grids, biological data and digital devices are inextricably linked. Cybersecurity is therefore no longer an isolated defense. It is an integral part of social and digital resilience.