The interconnected nature of Industry 4.0–driven operations and the pace of digital transformation mean that cyberattacks can have far more extensive effects than ever before, and manufacturers and their supply networks may not be prepared for the risks.
For cyber risk to be adequately addressed in the age of Industry 4.0, cybersecurity strategies should be secure, vigilant, and resilient, as well as fully integrated into organizational and information technology strategy from the start.
A new study conducted by Deloitte confirms what many supply chain managers have long suspected: Cyber breaches are on the rise for major companies.
According to Deloitte, the U.S. manufacturing sector is “woefully unprepared” for the cyber threats associated with new connected technology.
In the study “Industry 4.0 and cyber risk: Security in an age of connected production,” one-third of all manufacturers sampled admitted to not having performed any cyber risk assessments of the industrial connected devices operating on factory floors.
René Waslo, a cyber risk principal with Deloitte, says that in the age of “Industry 4.0,” we’re only beginning to understand the power that connected devices will have over our lives.
“The financial services and life sciences sectors are probably the most refined in their understanding on how to protect the attack surface,” she says, “but other industries must quickly come up to speed.”
The new Deloitte study outlines the strategies that businesses must take to build cybersecurity efforts into their larger business plan and untimely protect their operations and their customers.
“Even in an era when companies may anticipate less regulatory oversight, the incentives for protecting brand by fully identifying threat vectors is obvious,” she adds.
Key insights on some of the most significant cyber challenges manufacturers must address include:
Finally, Deloitte believes new technologies like blockchain have the potential to help mitigate current cybersecurity risks by streamlining the flow of goods and information.
The process of establishing a historical record for currency is best known in the example of bitcoin, but other organizations are exploring ways to use this new tool to determine the flow of goods from production line through layers of purchasers.
Creating a historical ledger that is shared by a community establishes trust and visibility, providing protection for buyers and sellers by certifying a good’s authenticity, enabling the tracking of goods movements for logistical purposes, and categorizing products more specifically than by lots or batches when handling recalls or defects.
In the absence of this level of assurance of product authenticity, manufacturers may want to perform testing and certification of products to ensure adequate security before incorporating them into their environment or products.
Progression of cyber and physical threats for each industrial revolution