Cybersecurity in the era of Industrial Digitalization
The digitalization of industry and the advent of the fourth industrial revolution are opening new horizons to enterprise competiveness in areas such as manufacturing, logistics, oil & gas and energy production processes. In particular, the deployment and use of cyber physical systems in production plans, enables digital automation, highly flexible production lines, along with quality improvements and efficiencies in the shopfloor. Furthermore, it is expected to lead to unprecedented optimizations in the supply chain, as plants are gradually becoming digitally connected, which facilitates seamless flow of information and enables novel collaborative models of production. Nevertheless, this new era of digitization comes with a host of security challenges that relate to the cyber security of a plant’s digital elements and to the trustworthiness of the supply chain interactions across plants.
As production systems become connected between themselves and with IT systems, they are becoming more vulnerable and susceptible to cybersecurity attacks. It is no accident that during the last couple of years, cybersecurity incidents in factories are on the rise. For example, recent reports underline that approximately 48% of manufacturers have suffered cyber-attacks, while half of these attacked organizations suffered considerable financial and business loss. According to the same reports, manufacturing is currently the fourth-most targeted industry, behind only finance, technology, and business services. The monetary value of these losses for 2016 has been estimated to more than $3B and appears increased during the last two years. As a prominent example, pharmaceutical manufacturer Merck payed a price of more than $310M due to a shutdown in production following a cyber-security attack.
One of the main reasons why manufacturers and other operators of industrial plants are vulnerable to cyberattacks is the fact that they employ old versions of IT systems, which do not have the latest security patches. For example, old fashioned Windows XP systems are commonly found in industrial PCs within production plants. Some of these systems can hardly be updated to resist modern cybersecurity attacks.
From a business perspective, adversaries main target is to steal intellectual property and trade secrets, which fall in the realm of espionage and cyber-crime. This is for example a primary goal of the vast majority of malware attacks against factories, which attempt to steal secrets or proprietary data. In this context, cybersecurity attacks can have severe consequences on the business: Stolen IPR has usually catastrophic effects for a brand. For instance, stolen IPR opens a backdoor for counterfeit products that damage both the manufacturer’s revenues and its reputation.
In order to alleviate cyber-threats and to avoid cyber-crime, plant owners have to implement a proper security policy for their production facilities and for their supply chain interactions with other plants. To this end, the following guidelines should be taken into account:
Overall, as production systems and facilities get connected, the cybersecurity challenges to be addressed increase in number and sophistication. State of the art cyber security solutions when used “out of the box” cannot sufficiently address the challenges of collaborative production environments. Industrial organizations cannot however afford to ignore these security challenges. Rather they have to invest in novel, more integrated and decentralized solutions that address physical and cybersecurity concerns at the same time. Fortunately, state-of-the-art security technologies such as analysis of security related BigData and blockchain based approaches for securing decentralized systems could be two of main pillars of such decentralized solutions.
Surviving Cybercrime in 2021: Guidelines for Effective Cybersecurity Investments
Anti-Money Laundering in the Era of Digital Finance
U.S vs. Iran: The Cyberwarfare Implications
Is Privacy Possible in 2020?
Do Smart Cities have Smart Security?
Hyperautomation: The Basics you need to Know
Outsourcing: How to Pick the Right Partner and Location
Digital Twins: A Vehicle for Safer, Trusted and More Efficient Industrial Processes
Seven Ideas for the Future of Work
We're here to help!
No obligation quotes in 48 hours. Teams setup within 2 weeks.
If you are a Service Provider looking to register, please fill out this Information Request and someone will get in touch.
Outsource with Confidence to high quality Service Providers.
If you are a Service Provider looking to register, please fill out
this Information Request and someone will get in
Enter your email id and we'll send a link to reset your password to the address
we have for your account.
The IT Exchange service provider network is exclusive and by-invite. There is
no cost to get on-board;
if you are competent in your areas of focus, then you are welcome. As a part of this exclusive