What is Cyberbiosecurity?



Cyberbiosecurity can be defined as the emerging discipline dedicated to identifying, assessing, and mitigating risks that arise where biological systems and digital technologies converge. It encompasses the protection of biological data, research, processes, and infrastructure from cyber threats that could compromise their confidentiality, integrity, or availability. This includes threats such as unauthorized access to genomic databases, manipulation of laboratory automation systems, and cyber-enabled disruption of biomanufacturing or synthetic biology platforms.

Unlike traditional cybersecurity or biosafety alone, cyberbiosecurity is inherently interdisciplinary. It merges principles from cybersecurity, biosecurity, biosafety, and risk management to address the unique vulnerabilities that arise when biological research and production are digitally integrated. Its scope includes both technical safeguards and governance frameworks.


Cyberbiosecurity, biosecurity, biosafety. Which is the difference?

In the evolving landscape of global risk, the concepts of biosecurity and biosafety have moved from the periphery of scientific and medical discourse into the core of enterprise risk management, compliance frameworks, and national security considerations. As global threats become increasingly transdisciplinary, legal, risk, and compliance experts must be well-versed in these domains, not merely as abstract health or environmental concerns, but as actionable, operational risks with legal, regulatory, and reputational consequences.

Biosafety refers to the principles, technologies, and practices implemented to prevent the unintentional exposure to or release of biological agents and toxins. It is primarily concerned with protecting individuals, communities, and the environment from harm caused by handling, storing, transporting, or disposing of potentially hazardous biological materials. Biosafety measures are typically embedded in laboratory protocols, healthcare facilities, and biotechnological processes where microorganisms, viruses, genetically modified organisms, or biological toxins are present. One core objective of biosafety is the prevention of biological incidents, such as laboratory-acquired infections, environmental contamination, or cross-contamination in research settings.

In contrast, biosecurity addresses the prevention of the deliberate misuse of biological agents and toxins. It is focused on protecting biological materials from theft, sabotage, diversion, or malevolent use, particularly in the context of bioterrorism, state-sponsored biological warfare, or insider threats. Biosecurity is less about laboratory safety and more about risk intelligence, access control, background checks, secure supply chains, and the governance of dual-use research (research that can be used for both beneficial and harmful purposes).

From a compliance and legal perspective, biosecurity intersects with export control laws, anti-terrorism statutes, and international treaties such as the Biological Weapons Convention. Organizations involved in biotechnology, pharmaceuticals, agriculture, and defense are particularly exposed, as they may possess materials or knowledge with dual-use potential. For these entities, the risk of a breach in biosecurity is not limited to criminal liability but may extend to sanctions, reputational damage, and loss of government contracts.

The distinction between biosafety and biosecurity, while conceptually clear, is often blurred in practice. Both share the ultimate aim of protecting life and maintaining societal stability, and both rely on overlapping infrastructures of governance, education, and oversight. However, their core assumptions differ: biosafety assumes good intent but guards against error, while biosecurity assumes the possibility of hostile intent and guards against exploitation.

For legal, risk, and compliance professionals, this distinction carries significant implications. Biosafety compliance failures are typically treated as operational deficiencies, remediated through improved training, process redesign, or infrastructure upgrades. Biosecurity failures, by contrast, may lead to criminal investigations, counterintelligence scrutiny, and high-level political consequences. In a world of increasing bioeconomic complexity, the lines between innocent research and dangerous capability become increasingly porous.

The COVID-19 pandemic underscored the necessity of treating biosafety and biosecurity as integral components of national and corporate resilience. While the origins of the virus remain debated, the event served as a global stress test for both regimes. Biosafety protocols were revealed to be inconsistently enforced across regions, and biosecurity weaknesses, particularly the lack of transparency in high-risk labs and insufficient global oversight, became apparent.

Cyberbiosecurity is a domain that demands attention and strategic response. Understanding cyberbiosecurity, and how it differs from but relates to biosafety and biosecurity, is essential to designing resilient systems, avoiding regulatory failures, and defending against both current and future threats.

Biosafety and biosecurity are largely concerned with the physical world, the biological agent itself, the infrastructure in which it is housed, and the people with authorized access to it. Cyberbiosecurity, by contrast, addresses the unique vulnerabilities that arise at the intersection of cyberspace and biological sciences. It includes the protection of digital systems that store, transmit, or analyze biological data, as well as the security of computational platforms used to design, synthesize, or manipulate biological materials. This includes genomic databases, DNA synthesis services, artificial intelligence models used in drug development, and software-controlled laboratory automation. In cyberbiosecurity, the target is often digital, but the consequence can be profoundly biological. A successful cyberattack may result in the theft of genetic blueprints, the remote manipulation of biofabrication processes, or the corruption of data used in diagnostics or epidemiological modeling.

To make it clear, the difference between cyberbiosecurity and traditional biosecurity lies in the threat vector. Biosecurity typically assumes a human actor attempting to access biological materials through physical means, such as unauthorized entry to a lab. Cyberbiosecurity deals with threats that originate in the digital domain. These include state-sponsored espionage, ransomware attacks on pharmaceutical facilities, the exploitation of software vulnerabilities in biomanufacturing equipment, and the infiltration of cloud-based platforms used to store sensitive genomic data.

For legal, risk and compliance professionals, the implications are profound. Data protection regulations, or national genomic laws intersect directly with cyberbiosecurity risk. An attack on a genomic database is not only a cybersecurity breach but potentially a violation of laws. Furthermore, if a synthetic biology company unknowingly receives manipulated digital sequences and produces dangerous organisms, the liability may extend across jurisdictions and regulatory regimes, touching upon export controls, biosafety violations, and criminal negligence.

Cyberbiosecurity also challenges existing compliance paradigms because it straddles disciplines that traditionally operate in silos. IT security teams may not be trained to assess biological risk. Laboratory managers may be unaware of the vulnerabilities of cloud platforms or machine learning tools they rely on. Even within national governance structures, cyber risk and bio risk are often handled by entirely different agencies. This creates systemic gaps where novel threat actors, including cybercriminals, terrorist networks, or hostile state actors, can exploit the seams between sectors.

Moreover, as DNA synthesis and editing technologies become cheaper and more accessible, the risk of "digital-to-biological conversion" increases. DNA sequences can now be transmitted as digital code and printed as physical biological material. If a malicious actor compromises the digital design files of a DNA synthesis company, they could potentially introduce harmful agents into the production line. The once abstract concept of a “cyber-attack leading to a bio-incident” is no longer theoretical, it is operationally feasible.

From a governance perspective, cyberbiosecurity requires a multilayered response. It is not sufficient to simply apply cybersecurity principles to biological contexts. Rather, organizations must implement integrated risk assessment models that consider the full range of potential exploitations, from cyber intrusions that affect data integrity to insider threats that bridge the cyber and physical realms. Risk officers must work closely with both chief information security officers and laboratory directors to assess vulnerabilities in areas such as device firmware, laboratory automation, and third-party software integrations.

Cyberbiosecurity represents the frontier of biological risk in the digital age. It is not simply a new form of cybersecurity, nor a digital extension of biosecurity. It is an independent and urgent risk domain, defined by its hybrid nature and characterized by its potentially cascading consequences.


What is AI-driven bioengineering and why is cyberbiosecurity so important?

Bioengineering is an interdisciplinary field that applies principles of engineering, biology, and physical sciences to design, develop, and optimize systems, devices, and technologies for biological and medical applications. It bridges the gap between engineering and life sciences, enabling the creation of solutions that address challenges in healthcare, biotechnology, agriculture, environmental sustainability, and more.

At its core, bioengineering involves the analysis and manipulation of biological systems, such as cells, tissues, organs, or entire organisms, to achieve specific functional outcomes. This includes the development of medical devices (e.g., prosthetics, implants, diagnostic tools), tissue engineering and regenerative medicine, synthetic biology (designing organisms to produce pharmaceuticals or biofuels), genetic engineering, and bioprocess engineering for large-scale production of biological products.

AI-driven bioengineering refers to the application of artificial intelligence (AI) techniques, such as machine learning, deep learning, and neural networks, to design, optimize, and accelerate processes in biological engineering. It combines computational power with biological insight to enhance the development and manipulation of biological systems, from gene editing and metabolic pathway design to synthetic biology and biomanufacturing.

In this context, AI algorithms analyze vast datasets from genomics, proteomics, imaging, and experimental outputs to identify patterns and make predictions that would be impractical or impossible for humans to discern alone. This enables faster drug discovery, precision medicine development, optimized enzyme design, and predictive models for gene expression or cellular behavior. For example, AI can simulate the impact of genetic modifications in engineered organisms.

AI-driven bioengineering significantly improves speed, accuracy, and scalability across the life sciences, but it also introduces novel risks. These include data integrity concerns, model manipulation, intellectual property theft, and the potential misuse of engineered biological systems, making it a key area of focus within cyberbiosecurity and compliance frameworks.

The fusion of artificial intelligence and bioengineering is revolutionizing the life sciences. However, this transformative power comes with equally transformative risks. As AI becomes embedded in bioengineering pipelines, the attack surface for cyber threats expands dramatically, introducing a new category of hybrid vulnerabilities that fall squarely within the domain of cyberbiosecurity. These vulnerabilities are not theoretical. They are already being targeted by hostile state actors, cybercriminal groups, and industrial spies seeking strategic, economic, or geopolitical advantage.

One of the most critical threats arises from espionage targeting AI models and proprietary biological data. AI-driven platforms in bioengineering rely heavily on large volumes of high-value datasets (genomic sequences, proprietary metabolic pathways, experimental outputs, clinical trial data, and algorithmic models that guide synthetic biology designs). These assets are not only commercially sensitive but, in many cases, have national security implications. For instance, a nation-state actor compromising the AI models used in mRNA vaccine development or gene therapy design could steal intellectual property worth billions, or worse, subtly alter outputs to introduce flaws or vulnerabilities.

Data poisoning and model manipulation represent another class of cyberbiosecurity threats unique to AI-driven systems. If an attacker gains access to training data or cloud-based model infrastructure, they can introduce malicious inputs that degrade the accuracy of predictions, undermine research integrity, or misdirect biological experiments. In a high-stakes setting such as drug discovery or bio-defense, corrupted AI outputs could result in wasted resources, flawed clinical decisions, or even public health emergencies.

Supply chain infiltration is also a growing concern. AI-bioengineering systems often rely on cloud-based tools, third-party APIs, outsourced data processing, and integrated hardware such as DNA synthesizers or lab robotics. This interconnected ecosystem creates multiple points of entry for cyber intrusion. A vulnerability in a seemingly unrelated vendor's software could become the access vector for compromising an entire bioengineering facility’s digital infrastructure, AI models, or sensitive project files.

Espionage in this context is increasingly subtle, persistent, and multi-dimensional. State-sponsored groups may combine cyber intrusion with human intelligence (HUMINT), using insiders to exfiltrate AI training sets, algorithm source code, or experimental design strategies. In a competitive biotechnology landscape, where strategic advantage can hinge on the efficiency of an AI model or the structure of a proprietary protein, such thefts are economically and strategically devastating.

From a compliance and risk management perspective, these developments call for urgent adaptation. Traditional information security frameworks must be expanded to address bio-algorithmic integrity, AI model governance, genetic data protection, and digital trustworthiness in biological experimentation. Regulatory regimes are not yet fully equipped to handle this convergence, leaving gaps that both threat actors and negligent insiders can exploit.

Organizations operating at the intersection of AI and bioengineering must therefore take a proactive approach to cyberbiosecurity-by-design. This includes securing AI pipelines, validating training data provenance, applying access controls across collaborative platforms, and conducting threat modeling that includes espionage scenarios. Board-level awareness is critical, as these risks extend beyond IT to affect corporate strategy, regulatory compliance, and even geopolitical exposure.

As artificial intelligence becomes an integral enabler of biological innovation, safeguarding the digital components of that innovation is a matter of national security, competitiveness and biosafety. The age of AI-driven bioengineering demands not only smarter science but also smarter security.


What is genomics and why is cyberbiosecurity so important?

Genomics is the branch of molecular biology focused on the comprehensive study of genomes (the complete set of DNA, including all of an organism’s genes). It involves the sequencing, analysis, interpretation, and comparison of genomes to understand the structure, function, evolution, and mapping of genetic material.

Unlike traditional genetics, which often examines individual genes or small groups of genes, genomics takes a holistic approach. It explores how all genes interact with each other and with the environment, influencing traits, diseases, and biological processes at the systems level. Genomics encompasses various subfields, including functional genomics (studying gene expression and regulation), comparative genomics (comparing genomes across species), and epigenomics (examining chemical modifications that affect gene activity without altering the DNA sequence).

Genomics is foundational to advances in personalized medicine, biotechnology, agriculture, and epidemiology. As this data becomes increasingly digitized, shared across networks, and stored in cloud environments, it also becomes a prime target for cyber threats. In this context, cyberbiosecurity is critical to protect the confidentiality, integrity, and availability of genomic assets.

Cyberbiosecurity in genomics focuses on safeguarding both the digital infrastructure and the biological data at the core of modern genomic science. This includes securing genomic databases, genome sequencing platforms, bioinformatics pipelines, and AI-driven analytics. The attack surface is broad, encompassing laboratory information systems (LIS), cloud-based storage, sequencing equipment with embedded software, and research platforms integrated with third-party tools. The high sensitivity and potential misuse of genomic data, especially in contexts like healthcare, national identity, and biotechnology, make it an attractive target for cyberespionage.

Cyberespionage targeting genomics is no longer speculative; it is a documented and growing threat. State-sponsored actors, cybercriminal groups, and competitors are increasingly attempting to infiltrate genomic research institutions, biotech companies, and national health systems. The motivations vary: some seek to steal intellectual property for competitive advantage in drug development or diagnostics; others aim to collect genetic information for long-term strategic use, including population surveillance, bioeconomic manipulation, or even future bioengineering applications.

One major concern is the targeting of national genomic databases and precision medicine initiatives. These databases often contain genomic profiles of millions of individuals and are valuable not only for medical research but also for geopolitical leverage. A breach of such a repository could expose individuals to genetic discrimination, threaten public trust, and undermine national research competitiveness. The theft of ethnic or population-specific genomic data may also have implications for military and intelligence planning in the context of emerging biological warfare technologies.

Cyberespionage may also focus on bioinformatics platforms and proprietary genomic algorithms, which are often poorly protected, especially in academic and research settings. If a malicious actor compromises the AI models used to interpret genomic data, they could manipulate research outcomes, introduce backdoors into automated sequencing tools, or exfiltrate results from sensitive medical studies. Such breaches could undermine scientific integrity, delay medical innovations, or give rival nations access to strategic biomedical insights.

To address these risks, genomics organizations must adopt cyberbiosecurity measures tailored to their specific threat landscape. This includes encryption of genomic data at rest and in transit, multifactor authentication for system access, network segmentation in sequencing environments, validation of software supply chains, and continuous monitoring for anomalous activity. Legal and compliance frameworks must also evolve. While regulations such as the GDPR and HIPAA address data protection, they often lack the specificity required to cover the intersection of genomics and cybersecurity. There is a pressing need for international coordination on standards, incident reporting, and enforcement mechanisms that reflect the convergence of biological and digital risks.

In an era where data is as valuable as oil and as sensitive as state secrets, the intersection of genomics, cyberbiosecurity, and cyberespionage is not merely a technical challenge, it is a matter of strategic resilience, requiring coordinated action by governments, institutions, and the private sector.


The Legal Void: The Absence of Harmonized Definitions and Frameworks for Cyberbiosecurity

Cyberbiosecurity does not have a harmonized legal definition codified in international treaties or national legislation, reflecting both the novelty of the field and the complexity of its cross-sectoral nature. While the risks it addresses are real and growing, legal systems have been slow to recognize and formally define cyberbiosecurity as a distinct regulatory category. This is partly due to the interdisciplinary scope it encompasses, bridging cybersecurity, biosecurity, biotechnology, and national security, each of which has its own legal frameworks, standards, and terminologies.

Existing laws in most jurisdictions tend to treat the components of cyberbiosecurity in isolation. For example, cybersecurity laws may address the protection of data and network infrastructure, but they typically do not account for the unique vulnerabilities of biological data, lab automation systems, or synthetic biology platforms. Conversely, biosafety and biosecurity regulations are primarily concerned with controlling physical access to biological agents and preventing the misuse of research involving pathogens or genetic engineering, but they often neglect digital threats, such as the remote manipulation of DNA synthesis machines or the exfiltration of genomic data through cyber intrusion.

Efforts to regulate genomics and biological data under privacy and health laws also fall short of capturing the broader risks inherent in the digital-bio convergence. These laws focus primarily on personal data protection and consent, without adequately addressing threats to research integrity, national bioeconomy infrastructure, or the deliberate sabotage of bioengineering processes via cyber means.

International organizations have acknowledged the emerging challenge but have not yet reached a consensus on regulatory definitions or frameworks. Bodies such as the World Health Organization (WHO), the Organisation for Economic Co-operation and Development (OECD), and the National Academies in various countries have published reports and guidance documents highlighting the importance of cyberbiosecurity. However, these efforts remain largely advisory and conceptual, lacking the legal force to impose obligations or harmonize practices across jurisdictions.

In the absence of formal legal definitions, the understanding of cyberbiosecurity is currently shaped by academic discourse, policy reports, and operational guidance from select agencies, such as the U.S. Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS), which have started to collaborate with the synthetic biology and bioinformatics communities to promote awareness and voluntary safeguards. Similarly, national strategies on biotechnology or bioeconomy often make passing reference to the importance of digital security, but without developing detailed compliance requirements or enforcement mechanisms.

For legal, risk, and compliance professionals, this regulatory ambiguity creates significant challenges. Without clear statutory mandates, organizations must rely on internal risk assessments, industry best practices, and a patchwork of cybersecurity and biosecurity protocols. It also complicates international collaboration, export controls, and incident response coordination when a cyberbiosecurity breach occurs across borders or involves data originating in multiple jurisdictions.

As cyber-physical threats to biology escalate, driven by geopolitical competition, there is growing pressure for governments and institutions to develop more cohesive, binding, and forward-looking legal frameworks. Until then, proactive compliance strategies and cross-disciplinary governance remain the most effective tools to manage the risks inherent in this rapidly evolving domain.


George Lekatis

This website is developed and maintained by Cyber Risk GmbH as part of its professional activities in the fields of risk management and regulatory compliance.

Cyber Risk GmbH specializes in supporting organizations in understanding, navigating, and implementing complex European, U.S., and international risk related regulatory frameworks.

Content is produced and maintained under the professional responsibility of George Lekatis, General Manager of Cyber Risk GmbH, a well known expert in risk management and compliance. He also serves as General Manager of Compliance LLC, a company incorporated in Wilmington, NC, with offices in Washington, DC, providing risk and compliance training in 58 countries.

Cyber Risk GmbH, some of our clients