The State of Cyber Defense: Manufacturing Cyber Resilience highlights the unique challenges the manufacturing industry faces and the key ways the industry can become more cyber resilient.
Kroll’s new report maps out the cybersecurity threat landscape the manufacturing sector currently operates in, looking at three key areas:
Detection and Response | Cyber Threat Intelligence | Offensive Security (OffSec) |
---|---|---|
The cyber maturity of manufacturing organizations’ detection and response capabilities using data analyzed from 1,000 global cybersecurity programs. | Kroll’s frontline threat intelligence from over 3,000 incidents a year details the threats the manufacturing sector faces and how threat actors infiltrate their networks. | Kroll experts detail the key considerations for the manufacturing sector based on pen testing their networks, including how hackers find vulnerabilities and what the industry can do to protect itself. |
Manufacturing Organizations Might Be More Mature than Most
The manufacturing industry is more likely than the average organization to have more mature threat detection and response capabilities.
Indeed, 8% of manufacturing industries surveyed employ the most mature capabilities compared to only 5% on average.
While this is encouraging, it is also worth noting that 25% of manufacturing respondents only employ the most basic security capabilities, such as cybersecurity monitoring.
Threat Detection and Response Capabilities Used by the Manufacturing Industry
The Biggest Concerns for the Manufacturing Industry
Manufacturing organizations appear to be most concerned about ransomware, followed by data leakage and phishing attacks, all more so than average.
Given the scale of the ransomware threat over the last five years, it is no surprise to see it is the threat that most concerns manufacturing respondents. Manufacturing is known to be one of the biggest targets for ransomware operators.
Threat Types of Most Concern to the Manufacturing Indsutry
The Threats the Manufacturing Industry Faces
The manufacturing industry appears to be most concerned with ransomware; however, it is not in fact the most common threat type for the industry. Kroll’s Cyber Threat Intelligence team found that email compromise is the most common threat type, accounting for nearly half of Kroll incidents in the manufacturing industry.
Small Teams, Small Ecosystems
Manufacturing organizations are more inclined to outsource their cybersecurity, which enables them to manage a smaller ecosystem of security platforms with a smaller team of trusted IT security professionals.
Across all industries, the average security team size is 25. In manufacturing, it is just 19.
There is a logical correlation between the size of a security team and the number of security tools it uses. A larger team can deploy and manage more platforms. In manufacturing, the most common response to the number of security platforms in use was four to five. Across all industries, the most common response was 10–12.
Number of Security Personnel
Number of Cybersecurity Platforms Used for Monitoring Alerts
Stay Ahead with Kroll
Cyber and Data Resilience
Kroll merges elite security and data risk expertise with frontline intelligence from thousands of incident response, regulatory compliance, financial crime and due diligence engagements to make our clients more cyber resilient.
Kroll Responder MDR
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Cyber Risk Retainer
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Penetration Testing Services
Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.
Red Team Security Services
Red team security services from Kroll go beyond traditional penetration testing, leveraging our frontline threat intelligence and the adversarial mindset used by threat actors to push the limits of your information security controls.
Ransomware Preparedness Assessment
Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.
24x7 Incident Response
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.