Key cybersecurity considerations for Industrial manufacturing companies
In today's rapidly evolving digital landscape, industrial manufacturing companies face unique cybersecurity challenges. To stay ahead of potential threats and protect their operations, these companies must consider key factors that will shape their cybersecurity strategies in 2024 and beyond.
Here are three crucial considerations:
Global businesses are operating within an increasingly complex cyber and privacy regulatory space. National interests are playing out, leading to diverse regulatory requirements over information sovereignty, supply chain security, transparency of cyber controls compliance, and incident reporting. Businesses should seek to calibrate their regulatory reporting for an increasingly borderless world but also maintain security controls that can be tailored to local requirements. Organizations should be prepared to respond quickly to changing requirements.
1
As common patterns and approaches emerge in the global regulatory landscape, organizations can begin to develop harmonized frameworks to organize governance of cybersecurity, privacy, and AI, and meet global obligations.
2
With technological advancement in industrial manufacturing, the “shift left” approach offers opportunities to embed security measures at the onset of solution design and service delivery.
3
International conversations can improve collaboration in digital security, providing repeatable leading practices and enhancing interorganizational cooperation across various markets and regions.
Many organizations’ current approach to third-party and supply chain security does not align with the reality of today’s complex and interdependent ecosystem of partner organizations. Traditional models were built around the assumption that third parties provide services on a transactional basis. That view does not reflect today’s intricate network of application programming interfaces (APIs) and processes tethered by a complex set of software-as-a-service dependencies.
Organizations are encouraged to establish more strategic supplier partnerships focused on continuously monitoring and managing the evolving risk profiles of these suppliers to strengthen operational resilience.
1
Supply chain integration
Integrating cyber considerations into engineering and procurement processes presents a huge opportunity for organizations to minimize risks emerging from supply chain compromises. This proactive approach can strengthen enterprise positioning.
2
Ensuring that all suppliers meet contractual and regulatory requirements via assessments, control testing, and reporting requirements will ensure that an organization does not run afoul of its supply chain regulatory requirements and help to avoid fines, penalties, and loss of business.
3
Continual monitoring and inventory assessment of frequently used suppliers and/or software can help organizations better understand providers’ security structures and identify potential risks. Sharing information can enhance supply chain relationships and solidify leading practices.
4
Improving ongoing visibility into changing supplier risk profiles can help build a sustainable and scalable forward-looking third-party program.
5
Encouraging the crowdsourcing of intelligence within your organization and with trusted third parties can provide collective cybersecurity insights, enhancing threat detection and response capabilities with increased instances of supply chain disruptions, industrial manufacturers investing in comprehensive risk management need to have a clear, continuous view of an ever-expanding third-party ecosystem. With today’s complex global dynamics, it is crucial to evolve toward a cybersecurity posture that encompasses businesses and the vendor ecosystem.
During a cyber incident, organizations need a response measured in minutes and hours, not days and weeks. In today’s volatile environment, resilience has become a common theme for organizations across the industrial manufacturing sector, with executives focused on resilience and recovery across key organizational systems if preventative controls fail.
Resilience should seamlessly align with cybersecurity, emphasizing protection, detection, and rapid response and recovery. Cyber resilience is vital for maintaining business operational capabilities, safeguarding customer trust, and reducing the impact of future attacks. These disciplines should work in tandem to help organizations manage risk.
1
Industrial manufacturers can build trust with key internal and external stakeholders by building resiliency into the culture with robust planning, testing, and management of response and recovery processes.
This will help ensure rapid response and recovery and minimal business disruption.
2
Outdated infrastructure presents serious cybersecurity risks since end-of-life software cannot be patched by the manufacturer and thus open vulnerabilities will not be patched. Organizations should work to update any software or systems running software that is no longer supported by the manufacturer as quickly as possible.
3
Develop a strategic approach to securing IoT/OT environments, including identifying and engaging expert vendors, and establishing resiliency measures to ensure business continuity in the event of an incident involving IoT or OT technologies.
4
It is critical for an organization to assess, understand, and evaluate the risks it faces to strategically prioritize cybersecurity investment and improve organizational resilience. This risk management should include Identifying asset criticality and enabling enhanced resiliency measures on an organization’s most critical assets.
Companies in the industrial manufacturing sector are increasingly facing cybersecurity and regulatory risks because of their extensive reliance on digital channels and global operations. Unauthorized network access can lead to substantial financial losses, reputational impacts, compliance penalties, legal action, and erosion of customer trust.
A major defense contractor acquired a new business with operations across several countries, including the United States and the United Kingdom. This introduced challenging data sovereignty issues as the United States and the United Kingdom have data sovereignty laws limiting the flow of applicable data across borders. As a result, the company needed to adhere to complex data security requirements and identity management rules across multiple countries and environments.
To resolve these issues, KPMG is helping the company to carefully navigate global regulatory requirements and manage most operations within national borders. KPMG is building an identity and access management program to ensure that access to sensitive data elements is restricted to authorized individuals located within appropriate jurisdictions.
A major manufacturer with extensive use of IoT/OT recently surfaced issues with its IoT/OT risk management, supplier risk management, incident detection and response, and vulnerability management. Vulnerability scanning, patching, and log management are all more difficult in IoT/OT environments due to rare operating systems and niche environments. Suppliers can also use insecure remote access methodologies. These challenges increase cybersecurity risks for IOT/OT components.
To remedy, KPMG helped the company to develop an IoT/OT strategy that included network segmentation to contain potential cyber incidents and reduce risk, network detection and response for rapid identification of potential cybersecurity incidents, and improved access controls, especially with respect to third-party vendor access to IOT/OT infrastructure.
A major auto manufacturer struggled to manage supply chain security and experienced several supply chain incidents that impacted production and manufacturing of vehicles. The company lacked visibility into the security of its manufacturing suppliers.
To remedy, KPMG helped the company to develop a manufacturing cybersecurity supplier program. KPMG developed a framework for assessing suppliers to ensure adequate cybersecurity and led a pilot program with 30 onsite assessments for the most critical suppliers. KPMG also developed policies, standards, methodologies, and related tools such as residual risk assessment questionnaires.
KPMG professionals can assist with assessing cybersecurity programs, aligning them with business priorities, developing digital solutions, advising on risk implementation and monitoring, and designing responses to cyber incidents. They offer innovative strategies and solutions such as cyber cloud assessments, privacy automation, third-party security optimization, AI security, managed detection, and response.
1Source: The International Traffic in Arms Regulations (ITAR website): Article – DDTC Public Portal
Cyber Considerations 2024
Download PDFCyber security insights
Turn risk into advantage. Learn how you can anticipate better, move faster, and get an edge with technology that is secure.
Cybersecurity considerations 2024
Technology innovations demand strategic pragmatism.
The latest news and updates on how organizations can manage risk in today's environment.