Cyber Magazine December 2021 | Page 109

TECHNOLOGY & AI
“ Raising awareness around cyber security , especially with top-level management , and cultivating talent and knowledge is worth the investment , businesses need to be thinking about this in the long-term ,” says Kirichenko . “ Businesses need to address the complexity and the risks involved in large supply chains . This requires holistic management of security across the chain and end-to-end security is a prerequisite for automated manufacturing . Businesses should regularly conduct risk assessments to identify potential cyber risks ,” she adds .
The future Cyber risks are increasing in manufacturing due to evolving technology and connectivity , and the attacks are becoming more sophisticated and severe . Therefore , manufacturing businesses need to make cyber security one of their priorities .
At a legislative level , regulators all over the world recognise the importance of cyber security as well as challenges around fragmentation of security standards across jurisdictions and industries . In the EU , there is a trend towards more unified security standards in the future , so EU countries may experience more and more regulation ( both general and sectoral ) around cyber security requirements and standards both on the manufacturing process and the product side . The EU cyber security strategy aims to stem the growing cyber security threats . The strategy is built on three main pillars : ( i ) resilience , technological sovereignty and leadership ; ( ii ) building operational capacity to prevent , deter and respond , and ( iii ) advancing a global and open cyber space through increased cooperation . The European Commission wants to integrate cyber security into every element of the supply chain and increase the level of cyber resilience of critical sectors .
Golan concludes : “ In essence , efficiencies and competitive edge will continue driving manufacturers to open up even more to the internet . Cyber is a business enabler and thus manufacturers will have to accommodate these changes while lowering the risks ( old and new ) and limiting the impact of cyberattacks if those were to occur .
“ Investment needs to be made to understand what a company protects , why it ’ s protecting it , who can access it , and how one accesses it . This needs to be determined and then monitored .” cybermagazine . com 109