SlideShare a Scribd company logo
1 of 11
Download to read offline
Cybersecurity for
Manufacturing:
Five practical steps
Cyber threat is holding companies back from
investing in digital technologies.
How can your manufacturing firm understand its
exposure to security risk, and start to take
practical steps to address weaknesses?
6dg.co.uk/manufacturing
48%around half of which resulted in financial loss or
operational difficulties.
So what makes manufacturing the third most
targeted sector in the UK for cyber-attacks?
Cybercrime is one of the most significant threats facing businesses today.
of manufacturing firms
have suffered a
cybersecurity incident*
*Source: https://www.eef.org.uk/resources-and-knowledge/research-and-intelligence/industry-reports/cyber-security-for-manufacturers
The truth is that there are a number of factors…
 Phishing, DDoS and ransomware attacks are common across all industries.
But manufacturers face the additional risk of cyber-attacks targeting operational technology.
 Interconnectivity and AI brought about through Industry 4.0 introduces risk and
increases complexity.
 This, combined with lower regulation when compared to sectors like government and
finance, makes manufacturing an attractive target for cybercriminals.
 It’s also worth considering the motives behind cyber-attacks on manufacturing firms.
Whilst many cyber-attacks are launched to cause disruption or for financial gain,
attacks on manufacturers often focus on obtaining intellectual property or
internal operational information.
So, the stage is set: manufacturers are under attack.
Without taking practical cybersecurity steps, today’s manufacturing firms risk not only financial,
operational and reputational damage, but also the loss of intellectual property and – ultimately –
competitive advantage.
STEP ONE
Understand your
security maturity
Manufacturing firms often struggle to understand their risk
exposure. By benchmarking your security maturity you can
make prioritised, actionable cybersecurity decisions that will
protect you from cyber-attacks.
Cybersecurity for Manufacturing: Five Practical Steps
STEP TWO
Engage with security risks
at board level
Cybersecurity is complex and technical, but without proper
board-level engagement you won’t gain the appropriate
operational and financial focus. Make cybersecurity tangible
and understandable in order to give yourself the best possible
chance of progressing your security strategy.
Cybersecurity for Manufacturing: Five Practical Steps
STEP THREE
Review the relationship
between operational technology
and information systems
Information systems can offer a back door to operational
technology, which may be older and outside of support. In a
famous – and terrifying – example of the physical damage a
cyber-attack can cause, hackers accessed a German steel
mill’s operational technology through its business network,
preventing the mill from shutting down a blast furnace and
resulting in “massive” damage.
Cybersecurity for Manufacturing: Five Practical Steps
STEP FOUR
Step up your
patch management
Many manufacturers invest in firewall and antivirus, but
neglect regular security patching. Unpatched systems are a
key attack vector for cybercriminals. Implement a robust
patch management program, with scope for both scheduled
and emergency patching, and make sure to stick to it.
Cybersecurity for Manufacturing: Five Practical Steps
STEP FIVE
Implement secure
connectivity
Manufacturers operating in multiple locations should utilise
appropriate connectivity and next generation firewalls to
ensure there are no weaknesses in the network that can be
exploited by cybercriminals.
Cybersecurity for Manufacturing: Five Practical Steps
So, first of all the bad news…
Your manufacturing firm is a target for cybercriminals, and due to the nature of your
business you face a unique set of risks.
But the good news is that…
If you take the right steps to improve your security posture, you can significantly reduce
the chances of becoming a victim of cybercrime.
At Six Degrees, we work with manufacturing firms to understand, engage with and
mitigate the cybersecurity risks they face.
Unfortunately there is no silver bullet to protecting yourself from cyber-attack, and every
business has different risk appetites and threat vectors, but these five practical steps are
a great place to begin your cybersecurity journey.
Six Degrees can support you throughout your cybersecurity
journey, from benchmarking your security maturity and representing
you at board level, through to implementing and managing secure
IT systems and processes.
Find out more at 6dg.co.uk/manufacturing
or call us on 0800 012 8060
Download our Minimising IT Risk
in Manufacturing report
to benchmark the level of risk in
your business and discover how
other mid-sized manufacturing firms
are mitigating IT-related risks.
Cybersecurity for manufacturing - Five practical steps, by Six Degrees

More Related Content

What's hot

RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
Securing chemical production and digital networks
Securing chemical production and digital networksSecuring chemical production and digital networks
Securing chemical production and digital networksSleepros
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilienceaccenture
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware Sanyog Chandra
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016Tripwire
 

What's hot (20)

RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Securing chemical production and digital networks
Securing chemical production and digital networksSecuring chemical production and digital networks
Securing chemical production and digital networks
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016Industry Insights from Infosecurity Europe 2016
Industry Insights from Infosecurity Europe 2016
 

Similar to Cybersecurity for manufacturing - Five practical steps, by Six Degrees

SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfEnterprise Insider
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Take a Holistic Approach to Securing Connected Manufacturing
Take a Holistic Approach to Securing Connected ManufacturingTake a Holistic Approach to Securing Connected Manufacturing
Take a Holistic Approach to Securing Connected ManufacturingInsight
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?ManojAgrawal74
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 

Similar to Cybersecurity for manufacturing - Five practical steps, by Six Degrees (20)

SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
16231
1623116231
16231
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Take a Holistic Approach to Securing Connected Manufacturing
Take a Holistic Approach to Securing Connected ManufacturingTake a Holistic Approach to Securing Connected Manufacturing
Take a Holistic Approach to Securing Connected Manufacturing
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 

More from Six Degrees

Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?Six Degrees
 
Four Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition JourneyFour Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition JourneySix Degrees
 
Five Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The CloudFive Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The CloudSix Degrees
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationSix Degrees
 
Microsoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in FinanceMicrosoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in FinanceSix Degrees
 
Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Six Degrees
 
Six Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentationSix Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentationSix Degrees
 

More from Six Degrees (8)

Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?Six Degrees Aegis - What's your cybersecurity maturity score?
Six Degrees Aegis - What's your cybersecurity maturity score?
 
Four Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition JourneyFour Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition Journey
 
Five Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The CloudFive Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The Cloud
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
 
Microsoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in FinanceMicrosoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in Finance
 
Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)
 
Six Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentationSix Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentation
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Cybersecurity for manufacturing - Five practical steps, by Six Degrees

  • 1. Cybersecurity for Manufacturing: Five practical steps Cyber threat is holding companies back from investing in digital technologies. How can your manufacturing firm understand its exposure to security risk, and start to take practical steps to address weaknesses? 6dg.co.uk/manufacturing
  • 2. 48%around half of which resulted in financial loss or operational difficulties. So what makes manufacturing the third most targeted sector in the UK for cyber-attacks? Cybercrime is one of the most significant threats facing businesses today. of manufacturing firms have suffered a cybersecurity incident* *Source: https://www.eef.org.uk/resources-and-knowledge/research-and-intelligence/industry-reports/cyber-security-for-manufacturers
  • 3. The truth is that there are a number of factors…  Phishing, DDoS and ransomware attacks are common across all industries. But manufacturers face the additional risk of cyber-attacks targeting operational technology.  Interconnectivity and AI brought about through Industry 4.0 introduces risk and increases complexity.  This, combined with lower regulation when compared to sectors like government and finance, makes manufacturing an attractive target for cybercriminals.  It’s also worth considering the motives behind cyber-attacks on manufacturing firms. Whilst many cyber-attacks are launched to cause disruption or for financial gain, attacks on manufacturers often focus on obtaining intellectual property or internal operational information. So, the stage is set: manufacturers are under attack. Without taking practical cybersecurity steps, today’s manufacturing firms risk not only financial, operational and reputational damage, but also the loss of intellectual property and – ultimately – competitive advantage.
  • 4. STEP ONE Understand your security maturity Manufacturing firms often struggle to understand their risk exposure. By benchmarking your security maturity you can make prioritised, actionable cybersecurity decisions that will protect you from cyber-attacks. Cybersecurity for Manufacturing: Five Practical Steps
  • 5. STEP TWO Engage with security risks at board level Cybersecurity is complex and technical, but without proper board-level engagement you won’t gain the appropriate operational and financial focus. Make cybersecurity tangible and understandable in order to give yourself the best possible chance of progressing your security strategy. Cybersecurity for Manufacturing: Five Practical Steps
  • 6. STEP THREE Review the relationship between operational technology and information systems Information systems can offer a back door to operational technology, which may be older and outside of support. In a famous – and terrifying – example of the physical damage a cyber-attack can cause, hackers accessed a German steel mill’s operational technology through its business network, preventing the mill from shutting down a blast furnace and resulting in “massive” damage. Cybersecurity for Manufacturing: Five Practical Steps
  • 7. STEP FOUR Step up your patch management Many manufacturers invest in firewall and antivirus, but neglect regular security patching. Unpatched systems are a key attack vector for cybercriminals. Implement a robust patch management program, with scope for both scheduled and emergency patching, and make sure to stick to it. Cybersecurity for Manufacturing: Five Practical Steps
  • 8. STEP FIVE Implement secure connectivity Manufacturers operating in multiple locations should utilise appropriate connectivity and next generation firewalls to ensure there are no weaknesses in the network that can be exploited by cybercriminals. Cybersecurity for Manufacturing: Five Practical Steps
  • 9. So, first of all the bad news… Your manufacturing firm is a target for cybercriminals, and due to the nature of your business you face a unique set of risks. But the good news is that… If you take the right steps to improve your security posture, you can significantly reduce the chances of becoming a victim of cybercrime. At Six Degrees, we work with manufacturing firms to understand, engage with and mitigate the cybersecurity risks they face. Unfortunately there is no silver bullet to protecting yourself from cyber-attack, and every business has different risk appetites and threat vectors, but these five practical steps are a great place to begin your cybersecurity journey.
  • 10. Six Degrees can support you throughout your cybersecurity journey, from benchmarking your security maturity and representing you at board level, through to implementing and managing secure IT systems and processes. Find out more at 6dg.co.uk/manufacturing or call us on 0800 012 8060 Download our Minimising IT Risk in Manufacturing report to benchmark the level of risk in your business and discover how other mid-sized manufacturing firms are mitigating IT-related risks.