OT Leaders Reveal Top 5 Cybersecurity Challenges
You’ve done all you can to fine-tune your factory floor by maximizing its dependability and its efficiency. Perhaps you’ve even taken steps toward Industry 4.0, a revolution defined by data- and internet-connected technologies that drive performance optimization and cost savings. It requires a delicate mix of the “new” integrated with your legacy devices, protocols & infrastructure.
But how do you protect this mix against a surge of cyber-based attacks targeting operational technology (OT) environments? An infected USB, compromised laptop, or a demilitarized zone (DMZ) misconfiguration can expose your facility, bringing your model of efficiency to a crashing halt. Now, more than ever, cyber risk is business risk.
During 2020, there was a 2,000% rise in incidents
targeting OT and industrial control systems. The 2022 IBM Security X-Force Threat Intelligence Index
reported that manufacturing had become the world’s most attacked industry — outpacing finance and insurance for the first time in five years. Perhaps just as concerning, research by Make UK, a manufacturers' organization, and BlackBerry revealed that when confronted by successful cyberattacks, 65% of the UK’s manufacturers
in the study experienced production stoppages.
“No business can afford to ignore this issue, and failing to get this right could cost the manufacturing industry billions of pounds and put thousands of jobs at risk,” notes Stephen Phipson, CEO of Make UK.
“While cost remains the main barrier to companies installing proper cyber protection, the need to increase the use of the latest technology makes mounting a proper defense against cyberthreats essential.”
Here are some of the key challenges that IT/OT leaders face, and some first steps we recommend they take toward an operationally resilient organization:
The Top 5 OT Security Concerns of Manufacturers
Findings from the report, Cybersecurity in UK Manufacturing, show that maintaining legacy information technology is the most prolific IT and cybersecurity challenge, followed by the cybersecurity skills gap. Here is a look at the top five concerns:
- Maintaining legacy IT (44.6%)
- Limited cybersecurity skills within the business (37.5%)
- Providing access to third parties for remote monitoring and maintenance (33%)
- Understanding IT security versus OT security (26.8%)
- No single tool or sensor can provide visibility into all threats (25%)
Other concerns include an enlarged attack surface linked to OT convergence, a lack of visibility into the technology in use on the manufacturing floor, and an inability to address security issues for a variety of reasons.
Image: Horizontal bar chart illustrating the main operational technology security concerns of manufacturers (Source: MakeUK)
In answer to these pressing concerns (which I touched on in my previous blog, Manufacturing and Cyberattacks: New Research Reveals Work Stoppages), it’s time for industry management to bring in the “big guns” of preventative cybersecurity, to protect against vulnerabilities from insider breaches, hacktivists, cybercriminals, and nation-state actors that target the industrial IoT. It’s time for the “self-defending” manufacturing floor.
What is a Self-Defending Manufacturing Floor?
Defining the idea of a self-defending factory floor requires some context. For starters, we know that far too many manufacturing environments are at least partially “un-patched” against known vulnerabilities and are therefore insecure and present soft targets for threat actors.
The antidote to this is a manufacturing floor that is equipped to detect and block the vast majority of cyberattacks before they can execute and disrupt your production. However, this must be done with lightweight security technology that will not interfere with manufacturing, that works even on legacy equipment, and protects any air-gapped devices or systems that are rarely if ever connected.
This is why many manufacturers are now moving to cybersecurity powered by artificial intelligence (AI). It helps manufacturers maintain continuous operation, improves security, and features proven ROI. Organizations with fully deployed cybersecurity AI report they experienced “a 74-day shorter breach lifecycle and saved an average of $3 million (USD) more than those without.” However, AI and machine-learning (ML) models used in cyberattack prevention products vary tremendously in their maturity and ease of use, as the best-informed CISOs will attest.
Questions To Ask When Considering AI Security Solutions for OT Environments
If you’re considering adding an AI-enabled cybersecurity solution to protect a production environment, such as your factory floor, here are some questions you may want to ask:
Will the solution have a measurable performance impact on your operational technology?
Does the vendor offer on-prem, hybrid and cloud-native deployment models? This affects whether the solution can enable modernization efforts as your company evolves — without the need to “rip and replace.”
How many legacy operating systems in your environment does the solution support?
Does the solution require regular signature updates that might disrupt production?
BlackBerry recommends adding a modern cybersecurity solution like CylancePROTECT®, powered by Cylance® AI, into your technology stack to protect the lifeblood of your organization — your critical operational infrastructure — from disruption.
Whether your operational technology systems are air-gapped, connected, or somewhere in between, now is the time to reduce the risk of a cyberattack that can disrupt your production.
It will free your organization to fully embrace further digitalization when the timing is right — and to do so securely. The Make UK and BlackBerry study found that nearly one-third of IT leaders surveyed responded that “vulnerability to cyberattack (real or perceived) inhibits my company from investing in technological advances through interconnectivity.” This challenge can now be overcome through battle-tested, AI-powered, cybersecurity.
For similar articles and news delivered to your inbox, subscribe to the BlackBerry Blog.