CREATING A SECURE FUTURE:








Zero-day vulnerability, DDoS Attack, Ransomware, Phishing, and SQL Injection — if you don’t know what these terms mean as a leader in industry, consider yourself lucky. These are the most common avenues of cyberattacks against the manufacturing industry, responsible for a whopping $46 billion in losses from 2018 to 2023.
The blissful days of a one-and-done solution for cybersecurity are over. Manufacturing systems operating on an Industrial Internet of Things brings a new level of OT and IT complexity, requiring cybersecurity systems to evolve alongside. More so, employers have inherited with technological progress a heavy responsibility to educate themselves and their workforce on new cyber threats. Over 80% of cyber attacks stem from human error.
The risk extends to the business model as well: Cyber criminals, aware of manufacturing’s terse deadlines and expensive downtimes, see the industry as a ripe target for exploitation. Data demonstrates this, showing 60% of manufacturers in 2023 were willing to pay the ransom in a ransomware attack. This contributes to a vicious cycle of more bad actors focusing on attacking the manufacturing industry for monetary gain. Another area of the manufacturing industry ripe for
cyber-attacks is its supply chain and workflow. With so much data shared between companies and continents, cyber-attacks are becoming more adept at infiltrating larger organizations through their supply chain.
Leaders in industry must ask themselves what will be the tipping point where they buck the fear of competition to collaborate on solutions that will address these issues? Automation Alley in partnership with Kelly plans to kickstart this discourse, fostering a space where cybersecurity issues can be discussed freely and with consideration among manufacturers, academia, and government.
This playbook aims to identify major cybersecurity threats and routes of attack, develop a game plan to incorporate cybersecurity strategies that protect companies from inside and outside attacks, and explore new strategies in training and educating the workforce at large in cybersecurity.
We are honored to take on this responsibility and provide the platform for this important dialogue. Creating a stronger cybersecurity future will not happen in silos. An industry-wide problem requires an industry-wide solution. Let us forge the first steps together.
TOM KELLY EXECUTIVE DIRECTOR & CEO AUTOMATION ALLEY
DAVE KELLY CO-FOUNDER AND CHIEF TECHNOLOGY OFFICER SENSCY
JEFF SMITH CHIEF TECHNOLOGY OFFICER DYNICS
PAVAN MUZUMDAR COO, AUTOMATION ALLEY CEO, PROJECT DIAMOnD
KATELYN KOTNEY PROGRAM MANAGER AUTOMATION ALLEY
ERIC KERKES DIRECTOR OF GROWTH SENSCY
MARK LANGILLE PRODUCT MARKETING MANAGER, NETWORK-CYBERSECURITY PHOENIX CONTACT
MARCO SANTANA OWNER SMT AUTOMATION
MICHAEL BAKER VICE PRESIDENT AND CISO KELLY
SARAH TENNANT SENIOR SECTOR DEVELOPMENT DIRECTOR & CYBER ADVISOR MEDC
ROCHELLE FREEMAN BUSINESS AND ECONOMIC DEVELOPMENT DIRECTOR CITY OF SOUTHFIELD
YUANBO GUO CEO VULTARA, INC
DR. DARRIN M. HANNA PROFESSOR OF ENGINEERING OAKLAND UNIVERISTY
VINH NGUYEN ASSISTANT PROFESSOR, MECHANICAL ENGINEERING MICHIGAN TECHNOLOGICAL UNIVERSITY
JOHN MAHER PRESIDENT INDUCTOHEAT, INC.
DONALD 'CHIP' REMBERT SALES DIRECTOR DETROIT MANUFACTURING SYSTEMS
SCOTT SCHAFER SYSTEMS ENGINEERMICHIGAN/OHIO VALLEY ARISTA NETWORKS
With rapid advancements in technology, particularly Artificial Intelligence (AI), the Internet of Things (IoT), and blockchain, comes a new era of business we could not have even imagined a decade ago. However, these near-limitless opportunities ahead are paired with first-of-a-kind risks. It is a reality that necessitates 360-degree security that goes beyond data protection. Working securely in this new age will require iterative cybersecurity acumen from all employees, and vigilance for evolving threats beyond simple phishing emails. Cybersecurity is no longer a ‘set it and forget it’ measure satisfied with a firewall — it is a state of mind with contingency protocols.
At Automation Alley's recent cybersecurity roundtable, we discussed the pressing issue of cybersecurity in the age of AI and IoT. Our roundtable participants, comprised of experts from various industries, share their insights on the current situation and what we can expect in the future.
What makes good cybersecurity today and what made good cybersecurity ten years ago are two vastly different things. Back in 2014, it was all about having the right firewalls, anti-virus software, and strong passwords. While these are still important aspects of cybersecurity now, they are no longer enough to protect against what may lurk in the coding shadows.
AI mimicry has advanced tenfold in the past year alone. Before, a common cyberattack via email mimicked a boss or colleague’s text communication demanding a wire transfer or money order. Now AI can mimic their voice, their writing style, and their face at a video conference. The power of AI to threaten cybersecurity is already on display: Recently, a person utilizing multiple AI deep fakes of board members at a fake company board meeting convinced a finance worker to wire $25 million to a fradulent account.
And it is not just small companies that are falling for evolving cyber threats. It's estimated that more than 2,200 cyber attacks happen to organizations ranging from healthcare to retail each and every day.
Manufacturing is among the hardest hit sectors, having faced the highest share of cyber-attacks among leading industries worldwide in 2022. The third quarter of 2023 saw a 15% increase in incidents from the year prior and that trend is only expected to continue as time goes on.
“We’re all connected and the tech in our advanced manufacturing lines only grows bigger and bigger, the analytics as well become bigger and bigger,” said Michael Baker, Kelly VP and Chief Information Security Officer. “We’ve seen attacks that used to take days to accomplish come down to minutes when they hijack a machine.”
The resulting reality is an online world that has outpaced its own security, making businesses that benefit from new technology bear the risks of it as well. Continued on next page >>
A joint study published by Manufacturers Alliance and Fortinet states that more than 90% of manufacturers say they are focused on implementing innovative solutions to address risks specifically affecting Operational Technology (OT). Bringing legacy systems into the digital age is an important first step. Yet, the most common enabler of attacks remains overlooked.
Human staff will be an integral part of manufacturing facilities. Even as Industry 4.0 comes to fruition, companies recognize that their most valuable resource is still people. The challenge is balancing evolving technical training with cybersecurity in mind.
“Your first line of defense is your employees,” Baker said. “Cybersecurity is in everyone’s job description now.”
Over 80% of cybersecurity breaches are caused by human error. Clicking on malicious links, falling for phishing scams, or even just using weak passwords are often the biggest vulnerabilities in an organization's cybersecurity. Employees cannot become complacent with new technology by assuming it is advanced enough to keep things safe on its own. The importance of cyber hygiene still applies to entry-level and managerial team members alike.
However, addressing the human element of cyber risk in manufacturing is also a matter of changing workplace culture. The industry must avoid shaming the victims that fall prey to cyberattacks as this produces a counterproductive culture that serves cyber attackers by masking their moves. This problem reaches the c-suite as well. A survey conducted by cybersecurity specialist Artic Wolf on 1,400 global tech and industry leaders found over half concealed a data-breach in 2021.
Ergo, comprehensive cybersecurity training is necessary in today's digital landscape. It should be part of the onboarding processes for new hires and mandatory for all current employees.
If that sounds expensive, consider that 96% of manufacturing industry cyberattacks are motivated by financial gain of the attacker, according to Verizon’s 2024 Data Breach Investigations Report. Regarding ransomware attacks, one of the most popular in manufacturing, 29% of those attacked decided to pay a ransom to unlock their data.
“Cyber is about culture change within the company. It’s about helping owners realize cybersecurity is a business risk,” said Dave Kelly, CoFounder/Chief Technology Officer, SensCy.
“It doesn’t have to be expensive – basic cyber hygiene can be put in place today.”
Cybersecurity training should cover the basics of cyber hygiene, such as creating strong passwords, recognizing phishing attempts, and understanding the dangers of using personal devices for work purposes. It should also include specific protocols and procedures for handling sensitive data and responding to potential security breaches.
As risks evolve with technology, employers will be responsible for keeping up. Regular refresher courses and updates are crucial to staying ahead of potential threats.
Staying abreast of current digital threats is an ongoing job that requires dedicated effort from employers. If an organization is big enough, it might benefit from hiring a dedicated security team or even a Chief Information Security Officer (CISO).
Cybersecurity is a uniquely daunting challenge for manufacturers, who, unlike their office-based counterparts, rely on more than just desktop computers to get things done. Today's factories are equipped with connected technology capable of being compromised remotely.
“A lot of the systems didn't need to pass data, and that is where the landscape changed in recent years. You have all these networks among multiple organizations working together like designers, system integrators and manufacturers at once,” said Vinh Nguyen, Michigan Technological University Assistant Professor of Mechanical Engineering-Engineering
Mechanics. “Now there is a need for multiple networks. Now you have to secure multiple aspects, and there is a need for resources to do that.”
A cyber-secure organization in manufacturing is one that prioritizes protecting its digital assets and information against unauthorized access, use, or destruction. It has systems in place to defend against cyber-attacks and continuously monitors for potential vulnerabilities. This might include things like 24/7 security monitoring, regular software updates and patches, employee cybersecurity training, data encryption techniques, and more.
However, for manufacturers with complex supply chains involving multiple organizations, the challenge of strengthening cybersecurity becomes even greater. With so many different entities involved in the creation and distribution of a product, it can be difficult to ensure that all parties are on the same page when it comes to cybersecurity practices.
This difficulty is exploited by bad actors with cyberattacks aimed at infiltrating OEM targets through vendors in the supply chain.
Data exchange agreements are small but incredibly important steps that manufacturers can take to mitigate this risk. These agreements outline the responsibilities and expectations for how data will be collected, stored, and shared throughout the supply chain. Clearly defining these processes and procedures reduces confusion between organizations and strengthens overall cybersecurity efforts.
“On the defense side, there are a lot of reference materials, frameworks and compliances that people need to meet. What we've seen in recent years is a big expansion. How do we keep up with that and how do we manage all of that? Stakeholders and organizations may not have the resources to,” Nguyen added.
Another key factor in securing supply chain cybersecurity is vendor management. Manufacturers must carefully vet and monitor the security practices of their vendors, especially those with access to critical systems or sensitive data. This might include conducting regular audits, requiring compliance with specific standards, and implementing stringent security requirements in vendor contracts.
“Cyber needs to be a priority across the product life cycle,” said Jeff Smith, Chief Technology Officer, DYNICS. “Being good at recovery is money well spent.”
Industry-wide standards and regulations can serve as a guiding light, as well. Standards such as ISO 27001 provide guidelines for implementing an information security management system, while regulations like the European Union's General Data Protection Regulation (GDPR) establish standards for data storage and protection.
The U.S. National Institute of Standards and Technology (NIST) recently released an Cybersecurity Practice Guide intended to help manufacturers maintain system integrity amidst evolving threats.
NIST Special Publication (SP) 1800-10, Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector, outlines several measures organizations can take against unauthorized software installation, unauthorized use of systems, malware tools, and more. But cybersecurity is an evolving threat. Stay abreast of industry trends by following NIST’s latest cybersecurity releases.
As manufacturing continues to digitize and embrace emerging technologies, the threat landscape for cyber-attacks only becomes more complex. From supply chain disruptions to intellectual property theft, the consequences of a successful cyber-attack can be catastrophic for manufacturers. It is crucial for businesses to prioritize cybersecurity and implement comprehensive strategies that encompass all aspects of their operations, from data protection to employee training, if they are to conduct business unimpeded in the future.
“Cyber needs to be a priortity across the product life cycle. Being good at recovery is money well spent.”
- Jeff Smith DYNICS
Automation Alley conducted a poll in March 2024 of roundtable participants in the technology and manufacturing ecosystem on the topic of cybersecturity in the industry. This is how the industry responded at a glance.
How confident are you in your organization's ability to detect and respond to cyber threats in real-time?
What are the primary challenges your organization faces in implementing effective cybersecurity measures?
Which cybersecurity investment do you believe has the most significant impact on enhancing your company's cyber resilience?
In your opinion, what emerging cyber threat vectors pose the greatest risk to your company's operations and intellectual property?
In the era of Industry 4.0, the interconnectedness of digital technologies has revolutionized manufacturing processes, offering unprecedented opportunities for efficiency and innovation. However, along with these advancements comes an increased risk of cyber threats and vulnerabilities. As cyberattacks and data breaches continue to rise in frequency and sophistication, manufacturers of all sizes must prioritize cybersecurity to safeguard their operations and critical assets. By implementing robust defense strategies and fostering a culture of cybersecurity awareness, industry players can mitigate risks and capitalize on the benefits of digital transformation.
Manufacturers should implement a multi-layered defense approach to protect their digital infrastructure and sensitive data from cyber threats. This includes deploying next-generation firewalls, intrusion detection and prevention systems, endpoint protection solutions, and data encryption mechanisms. Regularly updating and patching software and firmware is essential to address known vulnerabilities and minimize the risk of exploitation by malicious actors. Additionally, implementing network segmentation and access controls helps limit the impact of potential breaches and unauthorized access to critical systems.
According to the Verizon.com report, 74% of breaches happen due to human error, so ongoing cybersecurity training is necessary. Foster a culture of cybersecurity awareness among employees by providing comprehensive training programs and resources. Educate staff on the importance of recognizing common cyber threats such as phishing attacks, malware infections, and social engineering tactics. Encourage employees to adopt best practices for password management, data handling, and device security. Conducting regular cybersecurity drills and simulations can help reinforce training and ensure employees are prepared to respond effectively to security incidents. Furthermore, establish clear policies and procedures for reporting security incidents and encourage a proactive approach to risk mitigation and incident response.
Recognize the interconnected nature of supply chains and the potential for cyber threats to propagate across partners and vendors. Collaborate with suppliers and third-party service providers to establish minimum cybersecurity standards and requirements. Conduct regular assessments and audits to evaluate the security posture of supply chain partners and ensure compliance with established standards. Implement secure communication channels and data exchange protocols to protect sensitive information shared within the supply chain. By strengthening supply chain security practices, manufacturers can minimize the risk of supply chain disruptions and mitigate the impact of cyberattacks on their operations.
Automation companies have an increased risk of a cyber-attacks due to the nature of the industry. Production lines rely heavily on the Internet of Things (IoT) and dozens, if not hundreds, of devices connected to the cloud. Each device is a portal outside hackers can use to enter the system, steal data, or upload malicious malware designed to shut down production. A step toward prevention is learning how these attacks are perpetrated. The Cybersecurity Infrastructure Security Agency (CISA) created the Known Exploited Vulnerabilities catalog (KEV), a database of known threat activities that aid companies in prioritizing weaknesses to build up their defenses.
74% of breaches happen due to human error, so ongoing cybersecurity training is necessary.
Cybersecurity weaknesses are further broken down into a list of Common Vulnerabilities and Exposures (CVE), which are publicly listed on the National Vulnerability Database and created by The MITRE Corporation, a nonprofit and federally-funded development organization.
MITRE vets each vulnerability reported to determine the viability of the threat and if it qualifies to make the catalog listing. Once approved, a CTE's exploitability and impact metrics are assigned based on publicly available information and the guidelines of the specification, and potentially vulnerable software and/or hardware are identified.
The CVE website boasts a catalog of more than 230,000 cybersecurity vulnerabilities, its complete vetting process, reporting instructions, terminology, and a list of work groups. MITRE offers the opportunity for companies to join others in learning about cybersecurity vulnerabilities through working groups that focus on education, communication, and improving CVE protocols. The seven main groups are Automation, CNA Coordination, Outreach and Communications, Quality, Strategic Planning, Tactical, and Vulnerability Conference and Events. The Automation Working Group is focused on identifying and advancing proposals for the collaborative design, development, and deployment of automated capabilities that support the efficient management of the CVE Program.
To aid businesses in understanding what to do in the event of a data breach, the FTC created a guide that includes an action plan and links to organizations to help report the incident.
It is important to notify those potentially impacted if a data breach occurs. The Federal Trade Commission recommends a business meeting with an outside legal team to aid in compliance with all applicable state and federal laws. Alerting the police and the FBI immediately is crucial to allow the authorities the best opportunity to catch those responsible. A company also must notify clients, vendors, suppliers, other business clients, and employees that the breach may have impacted. Notify credit bureaus if Social Security numbers were involved. Businesses are legally required to report the theft of electronic personal health information to the Secretary of the U.S. Department of Health and Human Services.
To aid businesses in understanding what to do in the event of a data breach, the FTC created a guide that includes an action plan and links to organizations to help report the incident.
Academia should embed practical cybersecurity training into curriculum to ensure all students, regardless of professional goals , acquire hands-on skills and knowledge relevant to real-world challenges.
As educational institutions increasingly rely on digital technologies for teaching, learning, and administrative purposes, cybersecurity has become a paramount concern. Not only must academic institutions prioritize safeguarding their own digital assets, but they also play a crucial role in preparing the next generation of cybersecurity professionals. Here are three key recommendations for academia to ensure both their own protection against cyberthreats and the development of skilled cybersecurity professionals:
Colleges and universities are just as likely to be victimized by cyberattacks as other institutions. According to a report from Sophos that surveyed 400 schools from around the world, 80% of lower education institutions and 79% of higher education institutions were hit with at least one ransomware attack in the first quarter of 2023, up from 56% and 64%, respectively, from 2022.
Educational institutions should establish and maintain robust cybersecurity measures to safeguard their networks, systems, and sensitive data. This includes deploying firewalls, intrusion detection systems, and antivirus software, as well as implementing strong access controls and encryption protocols. Regular security audits and vulnerability assessments can help identify and address potential weaknesses in the IT infrastructure. Additionally, investing in employee training and awareness programs can empower staff to recognize and respond effectively to cybersecurity threats such as phishing attacks and malware infections. Additionally, difficulties arise as students participate in more remote learning opportunities. Academia can help by hosting cybersecurity classes for students and their parents or guardians that teach safety precautions.
Academia should embed practical cybersecurity training into curriculum to ensure all students, regardless of professional goals, acquire handson skills and knowledge relevant to real-world challenges. Learning the best cybersecurity measures is no longer optional. Electronic device use, cloud storage, Internet of Things, AI, and online services such as shopping and banking have been integrated into nearly every aspect of life. Basic cybersecurity training should be a mandatory class in lower education and required for incoming students on every college and university campus. Students will learn the needed skills to protect their personal information from being lost or stolen.
Additionally, there is a demand for more cybersecurity experts in the workforce. According to a document released by the federal government's National Institute of Standards and Technology (NIST) in June of 2023, more than 1.1 million people were employed in the field, and there were more than 630,000 job openings, with 83% of corporate boards looking to add to their IT staff. The report also stated there was a 3.4 million shortage of professionals globally.
Several colleges and universities offer expedited post-graduate degree programs and specialty certifications to fill the ever-growing need for cybersecurity experts. Partnering with industry stakeholders to provide internship opportunities and engage students in cybersecurity research projects further enhances their practical learning experiences and prepares them for careers in the field.
Promote a culture of cybersecurity awareness among students, faculty, and staff through ongoing education and communication initiatives. Regularly disseminate information about emerging cyber threats, best practices for data protection, and the importance of maintaining strong password hygiene. Encourage active participation in cybersecurity awareness campaigns, workshops, and simulations to reinforce security principles and instill a sense of collective responsibility for safeguarding
There is a demand for more cybersecurity experts in the workforce, with a 3.4 million shortage of professionals globally.
Information systems
Security systems
Information technology
Cyber defense
Ethics, law & policy
Data communications & networking
Digital/computer forensics
Government leaders and policymakers play a pivotal role in shaping the cybersecurity landscape and ensuring the resilience of economies and national security in the face of cyber threats.
As governments worldwide embrace the transformative potential of Industry 4.0 and advanced manufacturing, they must also address the growing cybersecurity challenges inherent in these technological advancements. The convergence of digital technologies with traditional manufacturing processes introduces new vulnerabilities and risks that necessitate proactive strategies and policies to protect critical infrastructure and sensitive data. Government leaders and policymakers play a pivotal role in shaping the cybersecurity landscape and ensuring the resilience of economies and national security in the face of cyber threats. Here are four key recommendations for government leaders and policymakers to strengthen cybersecurity in the context of Industry 4.0:
Government leaders should collaborate with industry stakeholders to develop and implement robust regulatory frameworks that set clear cybersecurity standards and requirements for manufacturers and critical infrastructure operators. These regulations should encompass areas such as data protection, network security, incident reporting, and supply chain risk management. By establishing minimum cybersecurity standards, governments can incentivize organizations to prioritize cybersecurity investments and compliance while providing a baseline for accountability and enforcement. Regular updates and assessments of regulatory frameworks are essential to address emerging threats and technological advancements effectively.
"Shields up!" This warning posted on the Cybersecurity and Infrastructure Security Agency (CISA) website cautions that a cyberattack is a real possibility that can cost a person or company a great deal of money and the loss of critical data and personal information.
The United States created the agency to protect the census, elections, 5G networks, and the grid against foreign interference and hacker attacks.
Beyond providing cybersecurity for all levels of government agencies, CISA partners with the private sector to help manage risk through partnerships to create safety measures to fight against cyberattacks. The agency’s collaborations extend to international partners as well by promoting “collaborative information sharing, cybersecurity best practices, and partnership models across the globe.”
Promote collaboration and information sharing between government agencies, industry associations, academia, and private sector entities to enhance cybersecurity resilience across the manufacturing ecosystem. Establish public-private partnerships that facilitate the exchange of threat intelligence, best practices, and technical expertise to detect, prevent, and respond to cyber threats effectively. Government-led initiatives such as cybersecurity centers of excellence, industry consortia, and joint research and development programs can catalyze innovation and collective action in addressing cybersecurity challenges. By fostering a collaborative ecosystem, governments can leverage the strengths of diverse stakeholders to bolster national cybersecurity defenses and promote economic competitiveness.
Joint Cyber Defense Collective (JCDC) encourages public (local, state, federal) and private entities to join together to defend cyberspace by leveraging authorities granted by Congress in the 2021 National Defense Authorization Act.
According to the CISA website, the JCDC has three goals:
• Establish enduring capabilities for persistent collaboration in which participants continuously exchange, enrich, and act on cybersecurity information with the necessary agility to stay ahead of our adversaries.
• To develop and jointly execute proactive cyber defense plans to reduce the most significant risks before they manifest.
• Enable true co-equal partnership between government and the private sector, including through joint enrichment and development of timely cybersecurity advisories and alerts to benefit the broader communit y.
Allocate resources to cybersecurity education and workforce development initiatives to cultivate a skilled talent pool capable of addressing the evolving cyber threat landscape. Develop educational programs, training courses, and certification pathways tailored to the needs of industry sectors, including advanced manufacturing and critical infrastructure. Support research and innovation in cybersecurity through grants, scholarships, and public-private partnerships to advance the development of cutting-edge technologies and strategies. Additionally, incentivize industry participation in apprenticeship programs, internships, and workforce training initiatives to bridge the cybersecurity skills gap and foster a pipeline of talent for the public and private sectors.
Address the global nature of cyber threats by enhancing collaboration and enforcement mechanisms at international, national, and state levels. Governments should prioritize diplomatic engagements and multilateral initiatives to foster cooperation among allies and partners in combating cybercrime. The United States has taken significant steps in this direction, exemplified by hosting conferences and forums with international stakeholders to coordinate responses to cyber threats, particularly ransomware attacks.
To reinforce timely and consistent collaboration across law enforcement, national security authorities, cybersecurity agencies, and financial intelligence units, governments must overcome barriers such as differing legal frameworks and resource disparities. At the national and state levels, policymakers should review and strengthen penalties for cybercrimes to ensure they are commensurate with the harm inflicted on victims. Business leaders should actively engage with lawmakers to advocate for legislation that establishes appropriate punishments for cybercriminals, serving as a deterrent against future attacks. By bolstering enforcement efforts across international, national, and state jurisdictions, governments can enhance the collective resilience of societies against cyber threats and safeguard critical infrastructure and digital economies.
Cybersecurity Collaboration in Government: Emphasizing joint efforts, organizations aim to fortify defenses against cyber threats, utilizing resources such as vulnerability databases, collaborative defense collectives, and international partnerships to enhance cybersecurity resilience and enforcement. 1 2 3 4 5 6 7
Evolution of Cyber Threats: The landscape of cybersecurity has evolved significantly over the past decade due to rapid advancements in AI and IoT technologies. Attack vectors now include sophisticated AI mimicry techniques, posing significant challenges for traditional security measures like firewalls and antivirus software.
Human Factor in Cybersecurity: Despite technological advancements, human error remains a significant vulnerability in cybersecurity, contributing to over 80% of breaches. Comprehensive cybersecurity training is essential, encompassing basics like password hygiene, phishing awareness, and protocols for handling sensitive data.
Integration of Cybersecurity in Manufacturing: Manufacturing faces unique cybersecurity challenges due to reliance on interconnected technologies and complex supply chains. Prioritizing digital asset protection, implementing continuous monitoring, and establishing data exchange agreements are crucial steps to mitigate risks.
Regulatory Guidance and Standards: Adherence to industry standards and regulations such as ISO 27001 and GDPR can provide essential frameworks for cybersecurity management. Guidance from organizations like NIST offers practical measures to safeguard information integrity in industrial control systems.
Continuous Adaptation and Vigilance: Cybersecurity is an ongoing process requiring proactive measures, regular updates, and staying informed about evolving threats. Businesses must prioritize cybersecurity across all operations to mitigate the potentially catastrophic consequences of cyber attacks.
Education Sector Cybersecurity Imperatives: As cyber threats escalate in educational institutions, the U.S. Department of Education emphasizes resilience efforts mirroring industry strategies, advocating for enhanced risk management, awareness training for students and parents, fortified campus computer security, and addressing workforce shortages in cybersecurity professions.
s the world becomes increasingly connected and more datadriven, businesses at all levels are dealing with new challenges related to cybersecurity. However, cybersecurity poses unique challenges for small manufacturers—our core clients at Automation Alley. We often hear about their limited resources, lack of IT support, legacy system constraints and dependencies on third-party suppliers. But another key factor is that there is a lack of cybersecurity awareness among small manufacturers. Many underestimate their susceptibility to cyber threats or may not fully comprehend the potential impact of a cyberattack on their operations.
There are important steps small manufacturers can take to keep their businesses protected. First and foremost, it’s critical to educate employees about cybersecurity best practices, including recognizing phishing attempts, creating strong passwords, and identifying potential security threats. Next, small manufacturers can implement basic security measures. Install antivirus software, enable firewalls, and regularly update software and firmware to mitigate known vulnerabilities. They can also conduct risk assessments to identify and prioritize cybersecurity risks specific to their organizations, considering factors such as data sensitivity, potential impact, and likelihood of exploitation. Finally, small manufacturers can establish a response plan outlining procedures for responding to cybersecurity incidents, including steps for containment, investigation, and recovery.
Automation Alley's partnership with Oakland University and the Cybersecurity Center underscores our commitment to addressing the growing need for cybersecurity education and workforce development, ensuring that the next generation of cyber leaders is well-equipped to tackle the evolving challenges of the digital age.
Through industry partnerships, we can facilitate curriculum development, knowledge sharing, mentorship, and internship opportunities for aspiring cyber professionals.
Through industry partnerships, we can facilitate curriculum development, knowledge sharing, mentorship, and internship opportunities for aspiring cyber professionals.
Phishing Attacks: Employees may inadvertently fall victim to phishing emails, leading to unauthorized access to sensitive data or network compromise.
Weak Password Management: Weak or default passwords on critical systems pose a significant risk of unauthorized access.
Lack of Secure Network Infrastructure: Inadequately secured networks can be easily breached, allowing attackers to steal proprietary information or disrupt operations.
Insufficient Data Protection: Inadequate data encryption and backup procedures leave small manufacturers vulnerable to data breaches and ransomware attacks.
Automation Alley is a nonprofit technology business association and Digital Transformation Insight Center focused on driving the growth and success of businesses in Michigan and beyond through innovation and automation. With a global outlook and a regional focus, we foster a vibrant community of innovators, entrepreneurs, and business leaders through opportunities for collaboration and learning. Our programs and services help businesses develop the skills and expertise needed to effectively jumpstart or accelerate digital transformation. By bringing together industry, academia, and government, we aim to create a dynamic ecosystem that drives innovation and growth across Michigan.
At Automation Alley, our mission is to help businesses thrive in the rapidly changing digital economy by equipping them with the knowledge, insights, and tools to develop a software-first mindset that leverages the power of automation, AI, and other cognitive technologies. We believe that by working together, we can build a stronger, more innovative, and more competitive economy for the future.
Wealth, prosperity and equality through technology.
Publication Credits
Editorial: Nicole Kampe, Dennis Burck, Joseph Gray
Graphic Design: Laura Gearhart
Photography: Sean Healey
Fortinet - Top 20 Most Common Types of Cybersecurity Attacks
https://www.fortinet.com/resources/cyberglossary/types-of-cyber-attacks
Comparitech - Ransomware attacks on the manufacturing industry cost the world economy $46bn in downtime alone
https://www.comparitech.com/blog/information-security/ransomwaremanufacturing-companies/
LinkedIn - Why Human Error Is Your Company’s Biggest Cybersecurity Threat https://www.linkedin.com/pulse/why-human-error-your-companys-biggestcybersecurity-threatand-aa86f/
Plastics, Machinery & Manufacturing - Manufacturers often hit with ransomware demands, and many pay the price https://www.plasticsmachinerymanufacturing.com/manufacturing/ article/53070752/manufacturers-often-hit-with-ransomware-demands-andmany-pay-the-price
CNN - Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’
https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/ index.html
Norton - 115 cybersecurity statistics + trends to know in 2024 https://us.norton.com/blog/emerging-threats/cybersecurity-statistics
World Economic Forum - How advanced manufacturing can improve supply chain resilience and cybersecurity
https://www.weforum.org/agenda/2024/01/advanced-manufacturing-improvesupply-chain-resilience-cybersecurity/
Manufacturers Alliance - Advancing Digital Transformation in a Time of Unprecedented Cybersecurity Risk https://www.manufacturersalliance.org/TimeOfCyberRisk
Harvard Business Review - Human Error Drives Most Cyber Incidents. Could AI Help? https://hbr.org/2023/05/human-error-drives-most-cyber-incidents-could-ai-help
SRM Solutions - Cyber shame: how to avoid the stigma of being a victim https://www.srm-solutions.com/blog/cyber-shame-victim/
Security Magazine - Over half of business owners admit to concealing a data breach https://www.securitymagazine.com/articles/96205-over-half-of-businessowners-admit-to-concealing-a-data-breach
Verizon - 2024 Data Breach Investigations Report https://www.verizon.com/business/resources/reports/dbir/
Coveware - New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying
https://www.coveware.com/blog/2024/1/25/new-ransomware-reportingrequirements-kick-in-as-victims-increasingly-avoid-paying Cyberint - The Weak Link: Recent Supply Chain Attacks Examined https://cyberint.com/blog/research/recent-supply-chain-attacks-examined/
European Union - General Data Protection Regulation https://gdpr-info.eu/
NIST - Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector https://csrc.nist.gov/pubs/sp/1800/10/final
NIST - News https://www.nist.gov/news-events/news
NIST - Cybersecurity Workforce Demand https://www.nist.gov/system/files/documents/2023/06/05/NICE%20FactSheet_ Workforce%20Demand_Final_20211202.pdf
NIST - CVE and NVD Program https://nvd.nist.gov/general/cve-process
CVE - Working Groups https://www.cve.org/ProgramOrganization/WorkingGroups
Federal Trade Commission - Data Breach Response Guide https://www.ftc.gov/business-guidance/resources/data-breach-response-guidebusiness
CISA - Partnerships and Collaboration https://www.cisa.gov/topics/partnerships-and-collaboration
CISA - Joint Cyber Defense Collaborative https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defensecollaborative
The White House - Joint Statement of the Ministers and Representatives from the Counter Ransomware Initiative Meeting October 2021 https://www.whitehouse.gov/briefing-room/statements-releases/2021/10/14/ joint-statement-of-the-ministers-and-representatives-from-the-counterransomware-initiative-meeting-october-2021/
Automation Alley – Cybersecurity Center https://www.automationalley.com/cyber-security-center
This content is based upon work supported by the Department of Energy Office of Cybersecurity, Energy Security, and Emergency Response (CESER) under Award Number(s) DE-CR0000023.
This content was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.