Sustaining Industrial Manufacturing Cybersecurity

March 22, 2019
As cyber attacks emerge and evolve, the enterprise will need to look beyond cybersecurity to become cyber-resilient.

Many industrial companies have made progress in heading off cyber attacks. But, with new threats emerging and evolving, they will require greater resilience that combines cybersecurity capabilities with something more.

A cyber-resilient business brings cybersecurity capabilities together with business and enterprise resilience. Such an approach allows industrial manufacturers to respond quickly to threats so they can minimize damage and operate under attack if necessary. Moreover, industrial companies need to continue transforming and embedding this high level of security throughout their organization and its extended ecosystem to build a strong, enduring defense.

Focusing on maintaining a resilient infrastructure for the foreseeable future will be essential. According to Accenture research, automotive manufacturers alone are experiencing 160 targeted cyber attacks each year on average. However, they have been largely successful in fending off significant breaches by embracing such an approach.

Their efforts reflect those of other forward-thinking companies that also are closing the gap on attacks. Our research shows that, though targeted attacks more than doubled in the space of only one year—232 on average in 2018 vs. 106 in 2017—respondents from all of the industries we surveyed were able to prevent 87 percent of them vs. only 70 percent in 2017. This is encouraging, but obviously there is room for improvement.

Accenture analysis finds that by investing in the right cybersecurity capabilities, industrial manufacturers can achieve a sustainable level of cyber resilience.

Forging resilience

There are five steps industrial companies can take to support their goal toward greater cyber resilience:

  1. Build a foundation: Identify high-value assets that are critical to operations, such as assets subject to regulatory penalties or that are important to trade secrets that differentiate the organization in the marketplace. Also, make it as difficult and as costly as possible for adversaries to access assets. Limit any damage they can cause. Prioritize protection of high-value legacy assets. Create a crisis management plan.
  2. Pressure-test resilience: Coach data breach simulation teams to identify potential weaknesses and bring a new level of realism to testing defenses. Then, analyze what worked and what did not in order to develop a list of recommendations that will help improve the company’s overall cyber defense strategy. Make this an ongoing practice.
  3. Automate defense: Leverage the intelligence capabilities of breakthrough technologies, such as artificial intelligence (AI), Big Data analytics and machine learning to give your company the ability to identify, assess and respond in real time to threats and changes in risk levels. Also, practice advanced identity management techniques to stop, minimize or slow cyber adversaries. AI and robotics also can provide a reliable, consistent and automated way to give the right person access to critical data.
  4. Proactively use intelligence and data: Employ advanced threat intelligence to help the organization’s users better anticipate potential attacks. This requires establishing a sustainable threat intelligence program that collects and curates strategic and threat intelligence to monitor suspicious activity, including malicious insider threats which are among the most frequent types of attacks.
  5. Elevate the CISO role: The next-generation chief information security officer should be both business-adept and tech-savvy. This includes an understanding of what must be done to ensure future cyber resilience, including identifying needed management talent and matching the right skills with the right functions to optimize the effort. Instituting an enterprise-wide exposure and risk monitoring program to gauge success also will be critical.

Protecting the future

Identifying breaches and solving immediate issues, while remaining operational, is fundamental to sustaining cyber resilience success. Many security teams are getting more effective at finding breaches more quickly. It is taking less time to detect a security breach from months and years to just days and weeks. Industrial manufacturers that can produce this depth of protection can achieve a sustainable level of cyber resilience.

>>Brian Irwin, [email protected], is managing director of Industrial North America for Accenture.

Sponsored Recommendations

Why Go Beyond Traditional HMI/SCADA

Traditional HMI/SCADAs are being reinvented with today's growing dependence on mobile technology. Discover how AVEVA is implementing this software into your everyday devices to...

4 Reasons to move to a subscription model for your HMI/SCADA

Software-as-a-service (SaaS) gives you the technical and financial ability to respond to the changing market and provides efficient control across your entire enterprise—not just...

Is your HMI stuck in the stone age?

What happens when you adopt modern HMI solutions? Learn more about the future of operations control with these six modern HMI must-haves to help you turbocharge operator efficiency...

AVEVA™ System Platform: Smarter, Faster Operations for Enhanced Industrial Performance

AVEVA System Platform (formerly Wonderware) delivers a responsive, modern operations visualization framework designed to enhance performance across all devices with context-aware...