Cyber in Rail - Roundtable discussion
23 April 2025

On 18 March 2025, Ashurst hosted a select roundtable discussion on Cyber in Rail (including representatives from Amey, Hitachi Rail, Keolis-MHI, a leading rail freight operator, and a leading rail investor and developer) from which the following key themes emerged.
Cyber security risks are made more challenging by the increasing complexity of the threat landscape. The roundtable discussion centred around agreement that the future of cyber threats to the rail industry is perhaps more likely to come in the form of large-scale disruption incidents, rather than data theft. Threat actors seem to be shifting their focus to exploit the vulnerabilities at the interface between IT to OT systems, allowing for more significant, public facing disruption.
With this particular kind of threat in mind some attendees reported increased concern in maintaining IT and OT systems separation, noting that OT often relies on older and more vulnerable systems. A key question for threat management is how far away is the industry from experiencing a significant incident that impacts an OT system, resulting in a sustained period of suspension and a long period of disruption, and how this level of threat can best be managed.
The rapid growth of AI capabilities adds complexity to the threat landscape, accelerating a threat actor's ability to infiltrate IT systems by sheer volume of attacks, as well as the potential to outpace the technical capabilities of companies and their boards.
Attendees agreed that industry players may in fact welcome further regulation of the rail sector, if such regulation can help companies to prepare for and focus resources towards cyber readiness. This might help to unlock budget/spending to prepare for and mitigate cyber security threats.
Regulation presented as 'guidance' has long been a challenge for the industry, leaving companies in charge of both interpreting rules and regulations, as well as operationalising these principles. This 'principles based' approach to regulation has been a challenge to the rail industry, with companies often left to determine their own risk factors and implement guidance accordingly. Attendees hope that the UK's upcoming Cyber Security and Resilience Bill will make it clear which guidance documents should be prioritised/followed.
Attendees discussed the approach and possible impact of the UK's Cyber Security and Resilience Bill on the rail industry. Initial discussion suggested that the bill might place obligations on suppliers and subcontractors further down supply chains. This suggested that the UK government was beginning not only to acknowledge the significant threat of cyber attacks on Critical National Infrastructure (including the rail industry), but also the likelihood that risks can arise from sub-suppliers even where a 'customer's' system is otherwise relatively secure. However, from a policy statement (issued on 1 April after the roundtable discussion) it now appears that the focus will be on the importance of simple and clear reporting requirements, with supply chain risk likely to be relegated to secondary legislation. The policy statement also confirms the Bill will broadly follow Europe's approach in the European Network and Information Security Directive 2 (NIS2) which means it will reach to rail infrastructure.
Discussion also touched on how public procurement processes may develop to encompass a company's 'cyber readiness'. Some attendees expect more oversight in procurement and bidding processes as to proof of robust cyber security controls, rather than simply relying on a company to assess its own risk and operationalise mitigations.
Attendees agreed that, although rail counts as critical infrastructure, the industry suffers from a lack of coverage in publicly available threat intelligence and reporting. This means it is often difficult for companies to provide accurate threat landscape reports to send to company boards. Attendees discussed that it is often manageable to evaluate the potential impact of a cyber attack, but visibility and a true understanding of the threat landscape, potential actors and their capabilities is difficult to express to boards. Approaches to effective communication with boards around cyber risk can include, as discussed, (i) extrapolating from public intelligence in other sectors, as there is often cross-industry applicability and (ii) beginning with a base level risk assessment which is then frequently updated as a better understanding of threat actors and their capabilities develops.
Attendees explored the evolving role of AI in the cyber threat landscape. AI is increasingly being leveraged by threat actors to enhance the volume and impact of cyber-attacks, and whilst AI is not yet capable of generating significant attacks independently, its role in facilitating more believable and harder-to-detect phishing and malware attacks cannot be disputed. This democratisation of cyber-attack capabilities means that even less experienced actors can now launch effective attacks. The market is experiencing an increase in deep fake fraud and other AI-driven cyber threats, highlighting the need for robust cyber readiness strategies.
Attendees discussed the increased use of AI within their own organisations and how the risk landscape is continuously evolving. Data poisoning, where malicious actors deliberately alter training sets for AI systems, is one of the leading threats from increased use in AI systems. This can lead to compromised AI models that favour the outcomes desired by attackers. Further, continually learning AI systems can be manipulated over time to develop biases that benefit threat actors, posing a significant risk to businesses relying on AI for cybersecurity. Businesses must proactively address these emerging threats by incorporating AI risks and controls into their cyber readiness strategies and ensuring board members are engaged in cybersecurity discussions.
This is the first in what we hope will be a series of small roundtable discussions on Cyber in Rail alongside our focus on AI in Rail. Throughout 2025, we hope to cover the topics below and would appreciate your views on what would be of most relevance:
We are also keen to discuss your specific AI and Cyber opportunities and challenges with you and your colleagues separately where we can provide individual support as appropriate. Please do let us know if this would be useful.
Ashurst Risk Advisory Pty Ltd is a proprietary company registered in Australia trading under ABN 74 996 309 133 and is part of the Ashurst Group.
The Ashurst Group comprises Ashurst LLP, Ashurst Australia and their respective affiliates (including independent local partnerships, companies or other entities) which are authorised to use the name "Ashurst" or describe themselves as being affiliated with Ashurst. Some members of the Ashurst Group are limited liability entities.
The services provided by Ashurst Risk Advisory Pty Ltd do not constitute legal services or legal advice, and are not provided by Australian legal practitioners acting in that capacity. The laws and regulations which govern the provision of legal services in the relevant jurisdiction do not apply to the provision of non-legal services. For more information about the Ashurst Group, which Ashurst Group entity operates in a particular country and the services offered, please visit www.ashurst.com.
This material is current as at 22 April 2024 but does not take into account any developments after that date. It is not intended to be a comprehensive review of all developments in practice, or to cover all aspects of those referred to, and does not constitute professional advice. The information provided is general in nature, and does not take into account and is not intended to apply to any specific issues or circumstances. Readers should take independent advice. No part of this publication may be reproduced by any process without prior written permission from Ashurst. While we use reasonable skill and care in the preparation of this material, we accept no liability for use of and reliance upon it by any person.
The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to.
Readers should take legal advice before applying it to specific issues or transactions.