Industry Coverage icon

Understand Modern Cybersecurity Solutions for Manufacturing IT & OT

Use intelligent defense software and continuous monitoring to maintain operational integrity.

Unlock a Free Sample
  • Manage the increasing complexity of the technology ecosystem as you integrate connectivity options and smart technologies.
  • Protect enterprise and customer data from unauthorized access in compliance with regulations.
  • Secure the attack surface across complex supply chains and prevent breaches in supplier/vendor/partner-side operations.
  • Balance the need for advanced cybersecurity technologies with the cost of implementing and operating these technologies.

Our Advice

Critical Insight

CIOs need to champion proactive cybersecurity strategies and advanced software solutions so that manufacturing firms can safeguard their assets, elevate their market standing, and attract investor and customer trust through measurable security enhancements.

Impact and Result

  • Info-Tech recognizes the role of CIOs in safeguarding smart factories. This research aims to empower CIOs with the knowledge and tools necessary to respond to immediate threats, anticipate and neutralize potential vulnerabilities, and secure a competitive advantage for their organizations.
  • Info-Tech will provide:
    • A comprehensive guide explaining the integration of cybersecurity measures and technologies into the design and operation of smart factories.
    • A tool to help you assess cybersecurity risk across manufacturing operations including production lines, IT/OT networks, data storage areas, and supply chain interfaces.

Understand Modern Cybersecurity Solutions for Manufacturing IT & OT Research & Tools

1. Understand Modern Cybersecurity Solutions for Manufacturing IT & OT Storyboard – A comprehensive guide on implementing effective cybersecurity measures using advanced software technologies in smart factories.

This research documents in detail the attack surface spanning IT and OT that manufacturing CIOs must protect and the necessary tools to manage attack vectors effectively.

2. Manufacturing Cybersecurity Risk Assessment Tool – A questionnaire to identify your cybersecurity strengths and areas for improvement.

This tool is designed to help manufacturing organizations assess their current cybersecurity risks, identify potential vulnerabilities, and receive targeted recommendations for improvement.

Unlock a Free Sample

Understand Modern Cybersecurity Solutions for Manufacturing IT & OT

Use intelligent defense software and continuous monitoring to maintain operational integrity.

Analyst Perspective

Use intelligent defense software and continuous monitoring to maintain operational integrity.

Shreyas Shukla

Technologies such as IoT, AI, machine learning, AR/VR/XR, big data analytics, and digital twins are revolutionizing manufacturing by enabling increased automation, connectivity, and efficiency. However, a rapid advancement in technology, combined with the presence of legacy systems, has created a landscape fraught with cyber-vulnerabilities. Legacy systems, and most factories, were never designed for connectivity or cybersecurity in the first place.

Consider recent incidents: a leading forklift and truck manufacturer fell victim to a crippling cyberattack; a major aerospace company was targeted in a sophisticated cyber-espionage campaign; and a top automotive manufacturer faced a ransomware attack that brought production lines to a standstill. These three examples highlight a growing trend where the very innovations driving progress are also introducing significant cybersecurity risks.

In this environment, the role of CIOs is crucial. They are now at the forefront of ensuring that the adoption of smart technologies does not compromise the security and integrity of manufacturing operations. This research dives deep into the specific vulnerabilities brought about by next-generation technologies and offers strategic insights on building a robust cybersecurity framework. By integrating advanced solutions and adopting a proactive approach, CIOs can protect their enterprises from imminent threats, ensuring the resilience and reliability of their smart manufacturing operations.

Shreyas Shukla

Principal Research Director, Industry Practice
Info-Tech Research Group

Executive Summary

Your Challenge

Manage the increasing complexity of the technology ecosystem as you integrate connectivity options and smart technologies with existing legacy systems.

Protect enterprise and customer data from unauthorized access in compliance with regulations.

Secure the attack surface across complex supply chains and prevent breaches in supplier/vendor/partner-side operations.

Balance the need for advanced cybersecurity technologies with the cost of implementing and operating these technologies.

Common Obstacles

Most existing plant IT and OT increase the cyberattack surface once brought online.

Finding and retaining personnel with specialized cybersecurity skills is a challenge due to high demand from other sectors.

Protecting data in compliance with laws across different regions requires constant vigilance and updates to security protocols.

Exercising control over third-party vendors' security practices and vulnerabilities is challenging.

Prioritizing significant investments in cybersecurity over other initiatives is a strategic exercise.

Info-Tech’s Approach

Info-Tech recognizes the role of CIOs in safeguarding smart factories. This research aims to empower CIOs with the knowledge and tools necessary to respond to immediate threats, anticipate and neutralize potential vulnerabilities, and secure a competitive advantage for their organizations.

Info-Tech will provide:

  • A comprehensive guide explaining the integration of cybersecurity measures and technologies into the design and operation of smart factories.
  • A tool to help you assess cybersecurity risk across manufacturing operations including production lines, IT/OT networks, data storage areas, and supply chain interfaces.

CIOs need to champion proactive cybersecurity strategies and advanced software solutions so that manufacturing firms can safeguard their assets, elevate their market standing, and attract investor and customer trust through measurable security enhancements.

Manufacturers are prioritizing investments in smart technologies and connected OT

Smart technologies are leading to greater efficiencies.

“…manufacturers expect that their investments in smart factories will drive a 27% increase in manufacturing efficiency over the next five years which would add $500 billion in annual added value to the global economy.”

– Capgemini, 2017

Investments in smart technologies are continuing to grow.

The global smart manufacturing market value will top $200 billion by 2025.

– Versacall Technologies, 2020

Manufacturers are focused on productivity and the bottom line.

74% of manufacturers invest in smart technologies to improve productivity while 70% stated that ROI was a critical factor.

– FourJaw, 2022

Manufacturers believe smart technologies will alleviate their challenges.

95% of manufacturers are evaluating smart manufacturing technologies.

– “9th Annual State of Smart Manufacturing Report,” Rockwell Automation, 2024

Manufacturers struggle to compete due to a lack of skilled workforce.

94% of manufacturers expect to hire more workers or repurpose workers to new or different roles.

– “9th Annual State of Smart Manufacturing Report,” Rockwell Automation, 2024

Smart Technologies are transforming manufacturing.

83% of manufacturers believe that smart factory solutions will transform the way products are made in the next five years.

– Smart Industry, 2024

Smart technology is disrupting every part of the manufacturing value chain

Manufacturers continue to make investments in technology-led transformation across the value chain, opening them up to new vulnerabilities. Prior to the pandemic, the main objective of most manufacturers was top-line growth. This transformed into effective planning and inventory management strategies during the pandemic. Now, the focus is on operational efficiency and bottom-line optimization. However, the most vulnerable areas still do not see enough investment in cybersecurity.

Order of operations from source to ship cycle versus the order of individual process steps. Each process step is colour coded by investments made in smart technologies from highest to lowest relative dollar value.

Source: Contributor Interviews, 2024

Enterprise cybersecurity continues to be the top priority for manufacturers

Cybersecurity continues to be the biggest concern/roadblock manufacturers report when adopting new digital services and software. Additionally, AI enablement and use continues to be of interest to manufacturers and will likely rise in priority over the next two years.

Top 8 priorities for Manufacturers from 2020 to 2025. Each priority has a score from 1 to 11.

Absence of cybersecurity consideration is a barrier to successful implementation of emerging technology.

“…many industries and manufacturing plants remain limited at the proof-of-concept stage, often because cybersecurity was not initially considered in these pilot projects.”

– Barbara Frei, Schneider Electric, as quoted in “How Advanced Manufacturing Can Improve Supply Chain Resilience and Cybersecurity,” World Economic Forum, 2024

Cybersecurity is top of mind for manufacturers considering investments in IoT solutions.

Eighty-four percent of manufacturers custom-built their IoT solutions because they felt IT security considerations could be better addressed with that approach.

Of the companies who adopted off-the-shelf IoT solutions and used a systems integrator (comprising 42% of those surveyed), 100% shared that a solid IT security track record or reputation was either very important or important.

Source: IoT Analytics, 2024

Manufacturers urgently need solutions to protect their IT/OT environments

The way manufacturers operate has changed significantly since the COVID-19 pandemic. Rapid digital transformation, hybrid work models, connecting stranded machines, and infusing new technologies and partnerships has significantly increased the potential attack surface that manufacturers need to contend with.

Manufacturers are having to deal with significant operational changes due to accelerating digital transformation efforts and the race to bring OT online…

Digital Transformation

Manufacturers have accelerated digital transformation efforts. Merging previously isolated OT and IT systems has broadened the attack surface, providing cybercriminals new ways to exploit these environments.

Legacy Devices

Legacy devices are being connected to the internet as part of digital transformation efforts, exposing them to new cyberthreats. These devices and machines were designed without cybersecurity features, hence updating or replacing them is not an option.

Workforce Modernization

The shift to remote and hybrid working models has intensified security concerns for manufacturers, forcing them to update critical infrastructure and legacy systems.

Remote Access

Manufacturers have had to enable remote access to assets for maintenance by internal and third-party personnel. Improper management of these channels can significantly expand the attack surface and introduce new cyberthreat entry points.

Regulatory Requirements

Regulatory bodies have established minimum cybersecurity standards, mandating that manufacturers implement specific protective measures. Complying with these regulations is complex and costly, posing significant challenges for manufacturers of all sizes.

Cyberattacks are increasingly impacting both IT and OT.

32% of manufacturers report that a cyberattack impacts both IT and OT systems.

33% or more of ransomware attacks reported to the FBI last year targeted organizations in a critical infrastructure sector.

68% of organizations expect to face more cyberattacks due to increased remote working.

Source: “The Ultimate Buyer’s Guide for Industrial Cybersecurity Platforms,” Claroty, 2023

Manufacturers face many challenges in trying to secure their IT/OT environments

As IT and OT technologies and responsibilities converge, IT teams face a multitude of challenges in securing a complex, connected, growing, and critical OT environment. While attacks on corporate IT often spill over to industrial control systems, compromised OT devices pose severe risks, including physical damage and threats to human safety.

IT teams are finding it extremely challenging to secure connected manufacturing environments

IT/OT Convergence

Attackers can exploit visibility gaps and vulnerabilities to move between converged IT/OT ecosystems, making comprehensive visibility across both IT and OT critical for security.

Impact from Corporate IT

Cyberattacks on corporate IT systems end up impacting industrial operations by penetrating industrial control systems, resulting in operational shutdowns and compromising critical infrastructure.

IOT Integration

Integration of IoT devices into traditional industrial control systems significantly expands the attack surface making manufacturers more vulnerable.

Transitioning to Cloud

The pandemic forced SCADA control to the cloud. Convergence of OT with IT in the cloud comes with increased risks including questions on reliability, availability, and security.

Regulations & Compliance

Manufacturers must stay informed on evolving cyber regulations and train regularly to adhere to industry-specific compliance requirements.

Source: Darktrace, 2023

Manufacturers face significant financial impacts from cyberattacks.

Manufacturing is the industry most commonly targeted by cybercriminals.

The global average total cost of a breach was $4.88 million in 2024, while the average cost of a breach in the manufacturing sector was $4.73 million in 2023.

Source: IBM, 2023; IBM, 2024

Manufacturing IT/OT Cybersecurity Playbook

Smart technologies deliver significant benefits to manufacturers

Smart Technology Investments and Benefits examples.

Manufacturers are increasing their smart technology investments.

“Prompted by inflationary pressures and rising energy costs, manufacturers are stepping up technology investment to counter risks…Technology investment up 30% year-over-year…”

– “9th Annual State of Smart Manufacturing Report,” Rockwell Automation, 2024

Smart Technology

Benefits

1: Industrial Internet of Things (IIoT) Connects devices for real-time monitoring, efficiency, and predictive maintenance.
2: Supervisory Control and Data Acquisition (SCADA) Monitors and controls systems for centralized control, data, and safety.
3: Programmable Logic Controllers (PLCs) Automates processes for reliability, precise control, and efficiency.
4: Manufacturing Execution Systems (MES) Tracks production for efficiency, real-time tracking, and quality control.
5: Human-Machine Interfaces (HMIs) Interfaces operators with systems for user-friendly control and real-time data.
6: Robotics Automates tasks for increased productivity, precision, and safety.
7: Additive Manufacturing (3D Printing) Creates objects from digital files for customization, reduced waste, and prototyping.
8: Automated Guided Vehicles (AGVs) Transports materials autonomously for improved logistics, efficiency, and cost savings.
9: Augmented Reality (AR) Overlays digital info for enhanced training, real-time data, and maintenance.
10: Cloud Computing Delivers services online for scalability, cost savings, and accessibility.
11: Artificial Intelligence (AI) Simulates human intelligence for decision-making, automation, and analytics.

Smart technologies make manufacturers susceptible to many cyberattack vectors

In smart manufacturing environments, understanding the diverse attack vectors that threaten IT and OT systems is crucial for implementing effective cybersecurity measures. Below is a categorized list of potential attack vectors, highlighting those that target IT, OT, and both IT and OT systems, to help organizations better prepare and protect their critical infrastructure.

IT Focused Attack Vectors

  • Phishing Attacks
  • Spear Phishing
  • SQL Injection
  • Distributed Denial of Service (DDoS)
  • Industrial Espionage

OT Focused Attack Vectors

  • SCADA/ICS Exploits
  • IoT Device Exploits

IT & OT Focused Attack Vectors

  • Ransomware
  • Credential Theft
  • Insider Threats
  • Physical Security Breaches
  • Supply Chain Attacks
  • USB and Removable Media
  • Exploiting Unpatched Vulnerabilities
  • Advanced Persistent Threats (APTs)
  • Social Engineering
  • Wireless Network Attacks
  • Remote Access Trojans (RATs)
  • Zero-Day Exploits
  • Man-in-the-Middle (MitM) Attacks

Human error drives breaches.

Internal vulnerabilities, primarily due to human error, account for 70% of breaches in manufacturing, underscoring the importance of comprehensive cybersecurity training.

– Data Guard, 2024

IT assets can be breached in several ways (1/3)

IT Assets & Breach Methods

Workstations

  • Malware and ransomware
  • Phishing
  • Unpatched software
  • Unauthorized physical access

Switches, Routers, Firewalls

  • Firmware vulnerabilities
  • Configuration errors
  • Denial of service
  • Man in the middle
  • Weak passwords

Servers

  • Software vulnerabilities
  • Brute force attacks
  • SQL injection
  • Distributed Denial of service
  • Stolen credentials

Virtual Machines

  • Hypervisor vulnerabilities
  • Unsecure configurations
  • Guest OS vulnerabilities
  • Data/credential theft

Software

  • Unpatched vulnerabilities
  • Supply chain attacks
  • Malware
  • Weak authentication
  • Buffer overflow

Mobile Devices

  • Malware
  • Phishing
  • Man in the middle
  • Lost/stolen devices
  • OS vulnerabilities

Cloud Assets

  • Configuration error
  • Credential theft
  • Denial of service
  • App vulnerabilities
  • Insider threats

Note: This is representative and not exhaustive

Source: Office of Cybersecurity, Energy Security, and Emergency Response, 2022

IT assets can be breached in several ways (2/3)

OT Assets & Breach Methods

Computing Devices

  • Malware and ransomware
  • Phishing
  • Unpatched software
  • Unauthorized access
  • Brute force attacks
  • SQL injection
  • DDoS
  • Hypervisor vulnerabilities

Software

  • Unpatched vulnerabilities
  • Malware
  • Weak authentication
  • Buffer overflow

Programmable Logic Controllers

  • PLC exploits
  • Malware
  • Unauthorized access
  • Unpatched firmware

Remote Terminal Units

  • Network intrusions
  • Unauthorized access
  • Firmware vulnerabilities

Industrial Control Systems

  • Network intrusions
  • SCADA/ICS exploits
  • Malware
  • Configuration errors

Safety Instrumented Systems

  • Firmware vulnerabilities
  • Unauthorized access
  • Network intrusions
  • Manipulation of safety settings

Physical Access Control Devices

  • Unauthorized access
  • Tampering
  • Credential theft
  • Exploitation of weak authentication mechanisms

Note: This is representative and not exhaustive

Source: Office of Cybersecurity, Energy Security, and Emergency Response, 2022

IT assets can be breached in several ways (3/3)

Data Assets & Breach Methods

Business Data

  • Data leaks
  • Improper access
  • Insider threats

IP

  • Theft
  • Cyber- espionage
  • Insider threats

Customer Data

  • Data leaks
  • Phishing
  • Improper access

Contracts

  • Improper access
  • Data leaks
  • Insider threats

Security Logs

  • Tampering
  • Improper access
  • Data corruption

Metadata

  • Data leaks
  • Improper access
  • Tampering

Set Points

  • Manipulation
  • Improper access
  • Config. errors

Operations Data

  • Data leaks
  • Improper access
  • Tampering

Financial Records

  • Data leaks
  • Fraud
  • Improper access

Historian

  • Data breaches
  • Improper access
  • Tampering

Config. Files

  • Tampering
  • Improper access
  • Errors

Note: This is representative and not exhaustive

Source: Office of Cybersecurity, Energy Security, and Emergency Response, 2022

Consider technologies, attack vectors, and case studies while planning your security posture

Most common types of cyber incidents in global manufacturing sector 2022:

Most common types of cyber incidents in global manufacturing sector 2022: Malware, Network and application anomalies, System anomalies, Account anomalies, Policy violations, and Social engineering.

Source: Statista, 2022

Manufacturers typically don’t implement compliant cybersecurity solutions.

“…only 50% of firms comply with standard cybersecurity protocols, indicating a significant gap in security implementation.”

– Data Guard, 2024

Major global manufacturers have faced cyberattacks over the last few years.

Clorox

Clorox was victim to an unknown cyberattack in 2023 that took its systems offline.

Cost: $356 million

Applied Materials

Applied Materials faced a supply chain attack in 2023 that disrupted shipments.

Cost: $250 million

Mondelez

Mondelez was hit by NotPetya malware in 2017 damaging servers and laptops.

Cost: $100 million

Brunswick Corp.

Brunswick Corp. was hit by an unknown cyberattack that disrupted operations.

Cost: $85 million

Norsk Hydro

Norsk Hydro was hit by LockerGoga ransomware in 2019, forcing its plants offline.

Cost: $70 million

Johnson Controls

Asian offices of Johnson Controls were breached by ransomware in 2023.

Cost: $27 million

JBS

JBS was hit by Revil ransomware in 2021, halting operations at its plants.

Cost: $11 million

Toyota

Toyota factories and data were breached in 2022 and 2023.

Cost: Unknown

Bridgestone

Bridgestone lost their North American systems to LockBit ransomware in 2022.

Cost: Unknown

Simpson Mfg.

Simpson Mfg. was hit by a cyberattack in 2023 that took its systems offline.

Cost: $11 million

FANUC

Vulnerabilities identified in FANUC robot controllers, allowing for DDoS attacks.

Cost: Unknown

Airbus

Airbus’ confidential data was stolen in a 2023 hack through a partner airlines’ account.

Cost: Unknown

Sources: Arctic Wolf, 2024; CPO Magazine, 2023; Cybersecurity Help, 2021

Manufacturers must now contend with complex cybersecurity laws and frameworks

Manufacturers are seeing increasing regulations targeting both IT and OT to protect the interconnected nature of modern systems where data flows between informational and operational spheres. The specific business processes, data types, and technologies used by a manufacturer will dictate what regulations and frameworks they have to comply with.

Regulations and frameworks that manufacturers have to contend with.

Cybersecurity software offers significant potential to protect manufacturers (1/2)

Leading cybersecurity software use cases for manufacturers

Cybersecurity software offers significant potential to protect manufacturers (2/2)

Leading cybersecurity software use cases for manufacturers

A broad range of technologies exist to protect manufacturing environments from cyberthreats

The manufacturing cybersecurity solutions landscape includes asset discovery, vulnerability management, network security, and secure remote access, among other critical technologies. These solutions are integral in protecting both IT and OT environments from evolving cyberthreats, ensuring the safety, reliability, and efficiency of industrial operations. This section delves into each solution, highlighting their importance and application in the industrial sector.

Cybersecurity Technology & Solutions Landscape

  • Asset Discovery & Vulnerability Management
  • Cyber-Physical Security & Operational Systems Health
  • Network Security Monitoring & Anomaly Detection
  • Operational IT/OT Endpoint Security & Patch Management
  • Perimeter Security, Segmentation & Zones Enforcement
  • IIoT Device Security
  • Product, Software & Supply Chain Security
  • Secure Remote Access
  • Risk Management, Governance & Compliance
  • Identity & Access Management
  • Social Engineering & Phishing Security

Cybersecurity Services Landscape

  • Assessments & Testing
  • Deployment Implementation & Managed Services
  • Incident Planning, Response & Recovery
  • Program Development
  • Supply Chain & Product Security
  • Training & Education

Source: “Industrial Cybersecurity Vendor and Services Landscape,” Takepoint Research, 2024

How to use this section: Manufacturing cybersecurity considerations

Manufacturing Cybersecurity Considerations template example.

Solution Options

This area indicates options from the Technology & Solutions landscape, or the Services landscape listed in detail.

Scenarios

This area lists scenarios typically representative of organizational objectives. These objectives help define the specific direction and approach that your cybersecurity program must take.

Considerations

This area describes in detail the threat vectors, potential attack surfaces, and recommended standards to adopt for each of the scenarios applicable to that section.

Solution Components

This area represents one of two major solution components for cybersecurity consideration: either Technology & Solutions or Services.

Use intelligent defense software and continuous monitoring to maintain operational integrity.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Author

Shreyas Shukla

Contributors

  • Balu Chandrasekaran, Architecture Lead, Global Lifesciences Company
  • Himanshu Jha, Cybersecurity Specialist, Global POS Technology Company
  • Nathanael Brian, Cybersecurity Analyst, Global Consulting Firm
  • Parthiban Dhakshnamurthy, Professor, Supply Chain, Humber College
  • Puneet Rajpal, Cybersecurity Lead, Independent Expert
  • Sudhakar Padmanabhan, Engineering Lead, Independent Expert
  • Suvro Biswas, Technical Program Manager, Global Consulting Firm
  • Anonymous, Lead, Technology Operations & Reliability, Global Lifesciences Company
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019