Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • IIoT & Cloud

How to secure Industry 4.0 in a highly connected world

  • David Nosibor
  • June 22, 2022
Wires plugged into a network
Image courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

As we head into the Industry 4.0 era — where connected Internet of Things (IoT) devices and automation will reshape industries — our world is already highly connected. According to Statista, there are more than 10 billion connected IoT devices, and that number will increase by well over a billion new connections each year, exceeding 25 billion in 2030. Much of this growth will come from industrial connectivity and automation products, which improve energy efficiency, operating productivity and safety at-scale, while also reducing costs and unnecessary downtime.

Yet, as we’ve witnessed over the past two years, increased connectivity creates increased risks. As networks of connected smart devices exchange critical data, they also open numerous vulnerabilities for exploitation by hackers. Given the inherent complexity of industrial-scale automated systems and the fact that malicious actors need only find a single vulnerability to access an entire network, it’s clear that organizations are facing an incredibly tough challenge. This challenge will only grow as IoT devices become ubiquitous in the Industry 4.0 era.

In February 2022, the Cybersecurity and Infrastructure Security Agency (CISA) published an alert acknowledging a yearlong uptick in sophisticated ransomware incidents targeting critical infrastructure organizations across the globe. Only days later, the FBI and Secret Service warned that the resurging BlackByte ransomware gang had successfully compromised multiple U.S. and foreign organizations. These attacks included “at least three critical infrastructure sectors,” ranging from food and agriculture to financial institutions and government facilities. Unfortunately, mitigating the security issues that enable these attacks is easier in theory than in practice.

Complexity is security’s greatest enemy. Increased digitization of organizations and industries without adequate advance consideration of security risks has created insecure interconnections. In many cases, organizations have proved unable to maintain acceptable levels of security and, in some cases, exposed critical infrastructure elements to the internet for the first time. Since infrastructure failures can be catastrophic, cutting off food, water, electricity and oil supplies, these elements became desirable targets for profit-hungry cybercriminals. In fully connected ecosystems, including those that Industry 4.0 organizations are building, attacks on these sectors can spread to customers and supply chains, giving bad actors even greater leverage to demand payments.

At my company, UL, we believe that hardening security requires a proactive, tactical approach to both risk management and security, building protections upfront in the product development process. Moreover, meeting legislative and industry compliance requirements should be part of every company’s comprehensive product security program. This approach to reducing cybersecurity risks is known as security by design. This strategy enhances trust for all stakeholders across the product’s entire lifecycle and is implemented in several steps.

  1. Treat cybersecurity as a shared responsibility. Securing data and assets in the Industry 4.0 era isn’t just one person or organization’s job. It requires a variety of players with differing roles and priorities, including asset owners, system integrators, maintenance managers and manufacturers of components and finished products. Given that cybersecurity can be compromised anywhere from the deepest chip level to a supply chain partner’s information technology (IT) team, collaboration is crucial to ensure security across all these different roles and interdependencies.
  2. Meet the standards. Considering the global breadth and technical depth of today’s products, organizations must meet national and international regulatory requirements and industry-specific standards and security frameworks.
  3. Test regularly. Given the dynamic regulatory landscape, products and systems need to have security built in and must regularly test and verify their cybersecurity capabilities against established standards. As many organizations face challenges in supporting ongoing security assurance, working with a trusted expert for assessment, testing and certification is advisable.

As attackers become more malicious in targeting industries through connected devices, organizations can no longer afford solely reactive approaches to cybersecurity. Sustainable and strong cybersecurity postures now depend on holistic approaches to governance and processes, starting with security by design and continuing with ongoing testing to meet evolving industry and regulatory standards.

Original content can be found at International Society of Automation.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

David Nosibor

As the platforms solutions lead and head of UL’s SafeCyber project, David oversees digital platform development and the management, implementation and experimentation on new solutions and business models for UL’s Identity Management and Security division. He has addressed corporate innovation and digital transformation for more than a decade.

Related Topics
  • CFE Content
  • Featured
Previous Article
Courtesy: Brett Sayles
  • Networks

Managing external connections to your operational technology (OT) environment

  • Miriam Lorbert
  • June 21, 2022
Read More
Next Article
Researchers discuss cyber-physical threat response
  • Threats & Vulnerabilities

Protecting the power grid through cyber-physical threat response

  • Kala McCain
  • June 24, 2022
Read More
You May Also Like
Courtesy: Brett Sayles
Read More

Webcast: Addressing Cybersecurity Challenges in Industry 4.0

Courtesy: CFE Media
Read More

Increasing smart factory cybersecurity using a trusted execution environment

Courtesy of CFE Media and Technology
Read More

Three risks to consider before taking your business’s accounting to the cloud

Courtesy: Brett Sayles
Read More

Technique offers faster security for non-volatile memory tech

Read More

How industrial control systems can be secure in the cloud

Image of IT/OT convergence on a control panel
Read More

New concepts to reduce the risk of ransomware in IIoT environments

Courtesy: CFE Media and Technology
Read More

How to mitigate cloud security threats

Read More

IoT security: The threat before us

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT