Return to overview
8 min read

Cybersecurity for Manufacturing: What Are the Challenges?

8 min read
January 26, 2025
By: Eye Security
cybersecurity for manufacturing - solving challenges
By: Eye Security
26 January 2025

Manufacturing companies form the very foundation of the global economy. Multiple manufacturing segments are classified as critical infrastructure as they are foundational to other sectors. A strong manufacturing base is an overall indication of a country’s economic strength. Still, recent data reveals that manufacturers suffer from low levels of cyber maturity. Further, they are facing an unprecedented number of incidents, causing 1 in 4 industrial organisations to shut down in the previous year. What makes manufacturing uniquely vulnerable and what are the roadblocks to building cyber resilience in the sector? In what follows, we unpack some of the challenges. 

A recent report by Palo Alto Networks, “The State of OT Security: A Comprehensive Guide to Trends, Risks, and Cyber Resilience”, reveals that within the past year, 1 in 4 manufacturers had to shut down their industrial operations in the aftermath of a cyber attack. According to the report, more than 70% of industrial manufacturers had experienced a cyber incident in the previous year. 

Recent research by The World Economic Forum reveals that 1 in 4 of all global cyber attacks over the past three years were against manufacturers. Apart from industrial manufacturing, this includes automotive, aerospace and defence, hardware and electronics, consumer packaged goods, transportation equipment manufacturing, and many others.  

Only in 2023, manufacturers saw about 25% of all security incidents whereby IT was the main attack vector, with 72% of attacks originating there. Of these, malwaremostly ransomwaremade up the majority. The recent IBM X Force’s 2024 Threat Intelligence Report speaks of a 266% increase in infostealing malware as threat actors are increasingly seeking innovative ways to harvest email, social media, and banking credentials.  

For more information on trends and challenges, read The Cybersecurity Handbook for Mid-sized Manufacturers 2025:

cybersecurity for manufacturing

 Download the handbook

 

According to the IBM Cost of a Data Breach Report 2024, the impact of a successful attack can reach $4.73m per attack for industrial manufacturers. If the trend continues, the projected global impact will be $10.5tn by 2025.  

What makes manufacturers vulnerable to cyber attacks? 

Manufacturers operate within complex ecosystems comprising multiple sites, sprawling supply chains, OT and IT systems, as well as various suppliers, contractors, vendors, and partners. Digital transformation and Industry 4.0 have introduced even greater complexities to the sector. Increased connectivity, the need for high data availability, plus the need to collaborate across departments, along the supply chain, and between sites have made manufacturers attractive targets for global cyber criminals.  

A disruption anywhere within this complex setup may trigger ripple effects affecting the global economy. Manufacturers’ low tolerance for downtime and supply chain disruptions also make them especially likely to pay ransom in the event of a ransomware attack. 

"Consider vulnerabilities in the digital supply chain as a business risk affecting all underlying processes."
Alan Lucas
CISO, Home Fashion Group
Shield
"Consider vulnerabilities in the digital supply chain as a business risk affecting all underlying processes."
Alan Lucas
CISO, Home Fashion Group
Shield

Yet for many manufacturing companies, cyber resilience is not a priority yet. The World Economic Forum recommends embedding cybersecurity into the overall company strategy and driving cyber resilience by design. This means integrating cybersecurity into each aspect of an organisation. People, assets, and processes should all be aligned. 

"Always approach IT security from a holistic perspective and let it be a fixed item on the board's agenda."
Gerben Rochat
IT Director, VB Groep
Shield
"Always approach IT security from a holistic perspective and let it be a fixed item on the board's agenda."
Gerben Rochat
IT Director, VB Groep
Shield

 But cybersecurity is not confined to internal organisational change. To build true cyber resilience, manufacturers should invest in managing the complex ecosystems within which they operate. This includes security awareness initiatives that extend to key stakeholders, establishing trusted partnerships, and a sustained effort to manage third-party risk.  

 What are the top challenges to manufacturers? A recent white paper by the World Economic Forum identifies three types of cybersecurity challenges for companies in the manufacturing sector: technical, organisational, and regulatory. 

Organisational challenges rank as the top obstacle  

For many stakeholders, the key roadblock to establishing cyber resilience is the gap between enterprise and industrial environments. This involves managing different mindsets across departments and functions, as well as being aware of the different goal setting within individual teams.  

Different priorities in IT and OT teams 

With the increased confluence between IT and operational technology (OT) within manufacturing organisations, stakeholders are often confronted with different ways of approaching cybersecurity. Apart from this being purely a mindset issue, gaps in understanding priorities translate into incomplete strategies, lack of unified governance, and bottlenecks in cross-functional collaboration 

"Know your IT assets inside out: if you don't know what you have, you can't protect it. Do a regular review of your hardware, software and data, IT and OT, to minimise security risks."
Lucas Vousten
Partner, Joanknecht
Shield
"Know your IT assets inside out: if you don't know what you have, you can't protect it. Do a regular review of your hardware, software and data, IT and OT, to minimise security risks."
Lucas Vousten
Partner, Joanknecht
Shield

Added to this is the lack of formal IT/OT consolidation strategy. Every so often, this means that a robust and unified cybersecurity strategy cannot be implemented across the entire organisation. Discrete measures are not backed by a strategy, and cybersecurity know-how may oftentimes remain stuck in silos.  

Unclear responsibilities and lack of internal know-how dampen the success of cybersecurity strategies  

Even at large manufacturing companies, responsibilities within IT departments may not be clear. Every so often, we have a situation wherein an IT manager must navigate several different types of responsibilities, with cybersecurity being just one out of many areas with no true ownership in place. Best practices such as the segregation of duties often get ignored as IT professionals juggle between a variety of tasks.

"Cybersecurity is about staying in the game, not winning. Accept asymmetry: attackers only need to be right once, defenders always. Focus on continuous improvement as a team."
Dimitri Van Zantvliet
CISO, NS Nederlandse Spoorwegen
Shield
"Cybersecurity is about staying in the game, not winning. Accept asymmetry: attackers only need to be right once, defenders always. Focus on continuous improvement as a team."
Dimitri Van Zantvliet
CISO, NS Nederlandse Spoorwegen
Shield

Lack of dedicated cybersecurity expertise and internal know-how are a roadblock. Like other sectors, manufacturing is struggling to find and retain talent. The talent shortage is especially severe because of the unique technical expertise required in the sector. Companies are finding it difficult to capture talent with expertise in both manufacturing and cybersecurity.  

 Lack of a comprehensive, company-wide cybersecurity governance framework 

Because of the complex and multilayered structure of manufacturing companies, cybersecurity governance is often fragmented. For many, decision-making is localised at the level of the individual manufacturing site. There are no company-wide policies in place that can be followed by all in the event of a cyber attack or any other type of a major IT security incident  

Also, cybersecurity awareness programmes may not be endorsed across the entire organisation but remain local initiatives. To be effective, security awareness trainings must be offered across all operational sites and made available for all company functions.

"Provide continuous training and awareness that keeps your IT professionals alert to changes at all times."
Wybe Aarts
ICT Manager, Amphia Ziekenhuis Breda
Shield
"Provide continuous training and awareness that keeps your IT professionals alert to changes at all times."
Wybe Aarts
ICT Manager, Amphia Ziekenhuis Breda
Shield

Ultimately, cybersecurity measures should be addressed with the same sense of urgency as questions of employee, workplace, and equipment safety. Keeping company information safe and remaining vigilant should not be dissimilar to wearing protective gear or turning off broadcasting devices around sensitive areas. 

Cybersecurity measures should be treated in ways similar to established employee safety practices and should be endorsed across the entire organisation, without exception.   

Technical challenges: Increased connectivity in Industry 4.0 contexts, heterogeneous devices, and legacy systems   

Complete visibility into all company assets plus a unified framework for the management and control of IT systems and operational technology (OT) are the top prerequisites for a robust cybersecurity strategy. This is where manufacturing companies are struggling. Despite the rise of digitalisation initiatives, the state of heightened connectivity does not necessarily translate into enhanced security measures.  

High device visibility and connectivity introduced by state-of-the-art technologies 

For many manufacturers, legacy equipment coexists with multiple other connected assets. The increased convergence of IT and OT has created environments that enable immediate insight into every asset—from machines on the shop floor to advanced machine learning algorithms in the cloud. Yet these environments often remain vulnerable to cybercriminals.  

New technologies come with unexpected complexities and introduce unknown risks. The increased adoption of industrial Internet of Things (IIoT) products with the possibility to roll out ML algorithms developed in the cloud directly on edge devices offer unique opportunities for manufacturers—both in terms of increased operational efficiency and faster insight generation. Yet, they also mean greater attack surfaces and introduce new attack vectors.  

Legacy industrial control systems 

Even more alarming are legacy industrial control systems and OT with only partial visibility, limited support and no robust access management. Due to the high replacement costs, many of these systems remain in use. They cannot, however, adapt to contemporary cybersecurity standards. Legacy systems therefore pose a vulnerability.  

Increased reliance on open-source technology and third-party software products 

Many manufacturing processes and key applications involve the use of third-party software that has the mission of increasing operational efficiency and quality assurance standards. Such software products hold the promise of increased interoperability between systems and assets. They deliver critical capabilities that help manufacturers gain a competitive edge. Yet this high connectivity, again, calls for extra vigilance and a focused effort to improve the security posture.  

Further, a large portion of the available solutions involve open-source software, making it even more difficult to control and verify security standards. What do the experts recommend?

"Prioritise the security of tools that are widely used, process confidential information and interface with the outside world. [...] Consider, for example, email. Billions of emails are sent every day but this technology is insecure by default."
Nadine Hoogerwerf
CISO, Zivver
Shield
"Prioritise the security of tools that are widely used, process confidential information and interface with the outside world. [...] Consider, for example, email. Billions of emails are sent every day but this technology is insecure by default."
Nadine Hoogerwerf
CISO, Zivver
Shield

Complex regulatory challenges within the EU 

Manufacturing organisations are subject to multiple regulations and industry standards about data protection and cybersecurity. A decentralised organisational setup and highly fragmented, regional regulatory requirements are making it difficult for manufacturers to maintain a unified strategy.  

The Cyber Resilience Act (CRA) 

At the EU level, emerging complex regulations such as the Cyber Resilience Act (CRA) are discussing the introduction of mandatory cybersecurity measures for companies manufacturing hardware and software products that contain a digital component. The CRA entered into force on December 10, 2024 and is to encompass the entire lifecycles of such products. Compliant products will bear theCE marking. 

With the CRA, the EU aims to address the inadequate cybersecurity levels in products and the lack of consistent security updates for software. The goal is to make it easier to identify which hardware and software products have cybersecurity features in place. For manufacturers, these cybersecurity measures are mandatory, and will have impact on product planning, design, development, and maintenance. Certain products of critical relevance will undergo additional third-party assessment before they can enter the EU market.   

"European legislation around cyber resilience is getting tougher. [...] The time of non-commitment is over."
Harry Van Der Plas
CISO, Management Projects
Shield
"European legislation around cyber resilience is getting tougher. [...] The time of non-commitment is over."
Harry Van Der Plas
CISO, Management Projects
Shield

The CRA is based on the EU Cybersecurity Strategy (2020) and the EU Security Union Strategy. It supplements theNIS2 Directive. Manufacturing companies under the CRA have until December 11, 2027 to meet their obligations.  

The updated Network and Information Security (NIS2) Directive 

NIS2 and CER additionally classify certain manufacturing industries as “essential entities”. To mitigate the risks and impact of incidents for the recipients of their services, these manufacturers must adopt a focused approach to managing their cybersecurity posture.  

The NIS2 directive is the EU-wide legislation of cybersecurity and aims to achieve a high common level of cybersecurity standards across the EU. The NIS2 Directive came into force in 2023 to modernise the existing cybersecurity framework, considering the evolving threat landscape and the high level of digitalisation within Member States.  

"Remaining proactive in enhancing cyber security is vital to maintaining competitiveness. This is not only about complying with laws and regulations, but about ensuring that your business is cyber resilient [...]."
Auke Huistra
Managing Director, Applied Risk
Shield
"Remaining proactive in enhancing cyber security is vital to maintaining competitiveness. This is not only about complying with laws and regulations, but about ensuring that your business is cyber resilient [...]."
Auke Huistra
Managing Director, Applied Risk
Shield

To ensure higher levels of cyber resilience and improved incident response capacities, NIS2 expanded to new sectors and entities. The aim is to establish a culture of security across sectors vital for the economy whereby companies identified as “essential” or “important” (such as manufacturing) are required to adhere to NIS2. These companies must take a specific set of security measures and will have to comply with the notification requirements under the Directive.  

For more information, see our article “NIS2: How the New EU Cyber Law Protects Your Business” and visit our NIS2 resource center 

The Critical Entities Resilience (CER) Directive 

TheCritical Entities Resilience Directiveentered into force on January 16, 2023. The CER Directive covers eleven sectors and defines critical entities that provide essential societal services to support the economy, preserve the environment, and ensure public health and safety. For these critical entities, the EC has proposed a non-exhaustive list of essential services crucial for the maintenance of a functioning society, broadly conceived. These critical entities will be subject to heightened cybersecurity requirements.  

Of these, of relevance here is the “Production, processing and distribution of food sector” that includes manufacturers specialising in large-scale industrial food production and processing, food supply chain services and food wholesale distribution services.  

Conclusion and outlook 

From ransomware to vulnerabilities in legacy systems and supply chain complexities, the risks to manufacturers are real. To build resilience, companies in the sector are advised to adopt a systematic approach and focus on practical, actionable steps. This includes creating cybersecurity governance frameworks, improving collaboration between IT and OT departments, and ensuring employees receive cyber awareness training.  

In 2025, compliance with regulations such as the Cyber Resilience Act and NIS2 will become increasingly relevant. These laws set clear requirements for cybersecurity practices, making it essential for manufacturers to integrate these standards into their operations early.  

Investing in robust endpoint protection and incident response capabilities can provide an added layer of defence. Managing third-party risk and securing partnerships with trusted cybersecurity providers are important steps to reducing exposure. 

Get in touch to find out how we can help you improve your security posture.

Let's talk

Curious to know how we can help?

Get in touch
GET IN TOUCH
Share this article.