Cybersecurity in manufacturing: How much is needed?

The cybersecurity situation for manufacturing is changing as the scale of attacks on the manufacturing sector and proportional loss to businesses has demonstrated the necessity of secure integrated control systems.


In your day-to-day routine, how focused are you on topics of cybersecurity? Do you follow exploits published by SANS, ICS-CERT, etc and relish in unique zero-day findings? Or, do you passively hear of hacks on the news and think, "I'm glad that wasn't my company."

For most of us, the answer would be the latter. However, the scale of attacks on the manufacturing sector and proportional loss to businesses in recent years has demonstrated the necessity of secure integrated control systems (ICSs).

The constantly shifting threat landscape can be daunting to follow—and it shows—in fact, the 2016 Vormetric Data Threat Report states that, "64% of IT execs think achieving basic compliance will stop most breaches." With the increasing nation-state threat, breaches are becoming more sophisticated and creating advanced persistent threats (APTs) with new levels of potency.

The "script-kiddies" of yesterday, taking advantage of single exploits, have grown up to become a highly trained, educated, and government-sponsored team of professionals. This team is dedicated to stealing a target's intellectual property (IP) and/or using that company's weaknesses to damage an entire industry. The scale is massive, and the threat is real.

The cybersecurity situation for manufacturing is changing as the scale of attacks on the manufacturing sector and proportional loss to businesses has demonstrated the necessity of secure integrated control systems. Courtesy: MESA InternationalAmidst the growing and changing attacks on the cyber front, many of the fundamentals have not changed. It is still true that most exploited vulnerabilities—99% in fact, according to Verizon's 2015 Data Breach Investigations Report (DIBR) —came over a year after that exploit had been discovered and patched. The importance of patching will continue to be critical to a secure infrastructure.

The cybersecurity threat landscape

A coming of age of the cybersecurity threat landscape can be shown not only through the scale of attacks, but also through attackers' focus, complexity, and funding. The situation is changing and the sophistication of these attacks, such as the one that hit Saudi Aramco, is evolving in ways that hadn't been anticipated.

One of the key points of the Saudi Aramco breach was the company's ability to quickly disconnect its systems (physically) from each other and the Internet. Financial and business systems went down and nobody got paid. However, manufacturing operations such as legacy oil manufacturing, continued to function.

What happens when these manufacturing systems inevitably become a connected integrated computer system (ICS) through business drivers for key performance indicator (KPI) monitoring, scheduling, resourcing, Industrial Internet of Things (IIoT), or other drivers? What happens to the oil company whose manufacturing infrastructure is wiped by an attack of this scale? What happens to a global manufacturing company that can no longer produce any product?

That is the question many companies and organizations devoted to cybersecurity are looking to answer. And some of the best solutions can come from those who work in the trenches and see what is happening on a day-to-day basis.

Chris Hamilton is a senior technical consultant, manufactuing IT/OT, Grantek Systems Integration. He is also a MESA cybersecurity working group member. Courtesy: MESA InternationalChris Hamilton is a senior technical consultant, manufactuing IT/OT, Grantek Systems Integration. He is also a MESA cybersecurity working group member. This article originally appeared on MESA International's blog. MESA International is a CFE Media content partner. Edited by Chris Vavra, production editor, CFE Media,

ONLINE extra

See additional stories about cybersecurity linked below.


Barth, Bradley. "Survey 64 Percent of IT Execs Think Achieving Basic Compliance Will Stop Most Breaches." SC Magazine. SC Magazine, 22 Jan. 2016. Web. 28 Jan. 2016.


"2015 Data Breach Investigations Report (DBIR)." Verizon Enterprise Solutions. N.p., n.d. Web. 28 Jan. 2016.

Rashid, Fahmida Y. "Inside The Aftermath Of The Saudi Aramco Breach." Dark Reading. N.p., n.d. Web. 28 Jan. 2016.

Hulett, Marguerite. "Cybersecurity: Changing Threat Landscape."

Top Plant
The Top Plant program honors outstanding manufacturing facilities in North America.
Product of the Year
The Product of the Year program recognizes products newly released in the manufacturing industries.
System Integrator of the Year
Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
September 2018
2018 Engineering Leaders under 40, Women in Engineering, Six ways to reduce waste in manufacturing, and Four robot implementation challenges.
GAMS preview, 2018 Mid-Year Report, EAM and Safety
June 2018
2018 Lubrication Guide, Motor and maintenance management, Control system migration
August 2018
SCADA standardization, capital expenditures, data-driven drilling and execution
June 2018
Machine learning, produced water benefits, programming cavity pumps
April 2018
ROVs, rigs, and the real time; wellsite valve manifolds; AI on a chip; analytics use for pipelines
Spring 2018
Burners for heat-treating furnaces, CHP, dryers, gas humidification, and more
August 2018
Choosing an automation controller, Lean manufacturing
September 2018
Effective process analytics; Four reasons why LTE networks are not IIoT ready

Annual Salary Survey

After two years of economic concerns, manufacturing leaders once again have homed in on the single biggest issue facing their operations:

It's the workers—or more specifically, the lack of workers.

The 2017 Plant Engineering Salary Survey looks at not just what plant managers make, but what they think. As they look across their plants today, plant managers say they don’t have the operational depth to take on the new technologies and new challenges of global manufacturing.

Read more: 2017 Salary Survey

The Maintenance and Reliability Coach's blog
Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
One Voice for Manufacturing
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Maintenance and Reliability Professionals Blog
The Society for Maintenance and Reliability Professionals an organization devoted...
Machine Safety
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
Research Analyst Blog
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Marshall on Maintenance
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
Lachance on CMMS
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
Material Handling
This digital report explains how everything from conveyors and robots to automatic picking systems and digital orders have evolved to keep pace with the speed of change in the supply chain.
Electrical Safety Update
This digital report explains how plant engineers need to take greater care when it comes to electrical safety incidents on the plant floor.
IIoT: Machines, Equipment, & Asset Management
Articles in this digital report highlight technologies that enable Industrial Internet of Things, IIoT-related products and strategies.
Randy Steele
Maintenance Manager; California Oils Corp.
Matthew J. Woo, PE, RCDD, LEED AP BD+C
Associate, Electrical Engineering; Wood Harbinger
Randy Oliver
Control Systems Engineer; Robert Bosch Corp.
Data Centers: Impacts of Climate and Cooling Technology
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
Safety First: Arc Flash 101
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
Critical Power: Hospital Electrical Systems
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
Design of Safe and Reliable Hydraulic Systems for Subsea Applications
This eGuide explains how the operation of hydraulic systems for subsea applications requires the user to consider additional aspects because of the unique conditions that apply to the setting
click me