Securing Manufacturing Summit

Securing the smart (and not so smart) factory

24th April, 2025 • Online

Cybersecurity is not just about downtime, it’s the key to staying ahead of competitors and staying within key supply chain ecosystems
 

Cybersecurity is also the foundation of business competitiveness

Over the past decade, the manufacturing sector has undergone rapid digital transformation. While these advances drive growth and efficiency, they also expose the sector to cyber threats.

Numerous pieces of research globally, including research from the World Economic Forum, have shown how many manufacturing firms have been affected by a security incident (60% of UK manufacturers for example). And those same pieces of research have also, sadly, shown that manufacturing remains one of the industries least prepared for the impact of cyber-attacks.

According to one recent study, 80% of companies have critical vulnerabilities, and more than two-thirds had at least one vulnerability from the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) Catalog, which details flaws that have been exploited in the wild. Approximately 30% have critical vulnerabilities in web applications – often the entry point for cyberthreat actors.

Poor patch management practices are a problem across the industry, as are data leaks and issues with SSL and TLS. And this is before we get to the expanded digital footprint caused by the rise of smart and connected manufacturing, which brings operational technology (OT) and industrial control systems (ICS) into TCP/IP networks at least periodically giving hackers access to them via standard business networks.

The effects of all this are clear: manufacturing is up there with healthcare and financial service as a target; it is a leading recipient of sophisticated ransomware, DDoS and BEC attacks; in fact, ransomware that encrypts data on IT networks is now a significant issue in OT security. Part of the reason for this is the sector’s low tolerance for downtime – firms are likely to pay up so they can resume operations quickly. And of course, attacks on IT/OT systems at third-party suppliers can then be weaponised against downstream IT/OT systems.

Cybersecurity is also a problem for manufacturers in another way: because they have historically been poor at cyber-defence, and have known it, manufacturers have tended to slow the adoption of new, smart, connected operational technologies. This in turn affects their competitiveness. To keep up with their peers, manufacturers need to invest in new technology, and so they also need to invest in the solutions that secure that technology.

A failure to improve their security will not only increase risks and decrease competitiveness, it will start to exclude the laggards from the supply chains of security-minded firms in the extended supply chains that now exist between manufacturing and other sectors. Businesses and regulators are now focusing on the disruptions that can be caused to critical economic and infrastructural players by their reliance on insecure third parties. Manufacturers need to make sure they respond.

So, what are the solutions?

Manufacturers must make cybersecurity and resilience a business priority. This means cultural change, better cybersecurity governance and acceptance of the right budget and resources.

They must drive cybersecurity by design. This means integrating cyber resilience into every aspect of processes and systems. A risk-based approach must be used to incorporate cyber resilience into the development of new products, processes, systems and technologies.

They must also develop a better understanding of technical solutions and security design paradigms. Is Zero Trust the answer? What does layered security in an IT/OT environment look like? How do you deal with the issue of false positives? What kinds of solutions are not dependent on online updating? And how can firms stop advanced threats from cross-propagating business and OT systems?

 

The e-Crime & Cybersecurity Manufacturing Summit will take place online and will look at how cybersecurity teams are tackling this new world.
Join our real-life case studies and in-depth technical sessions from the security and privacy teams behind some of the world’s most admired brands.

  • Transitioning OT to the Cloud?

    • OT traditionally was localized in particular sites and air-gapped from IT systems.
    • But connectivity with broader corporate networks and the need to manage technology more centrally (especially during COVID) has seen companies looking at managed services in the Cloud for OT.
    • Is this a way forward?
  • Achieving visibility across ecosystems

    • From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape, its connection and data flows and dependencies is a huge challenge.
    • Can you help with asset tracking and endpoint visibility? And what about anomaly detection after that?
  • Pen testing for OT / SCADA

    • Testing is key to identifying and fixing vulnerabilities before they're exploited. 
    • Regulations like NERC CIP require utilities to assess and mitigate risk. 
    • Testing checks OT security controls are functioning properly and shows regulators an organization's commitment to security.Can you help?
  • OT and the regulations

    • DORA, NIS2 and other regulations put more responsibility for resilience on firms deemed important or critical.
    • Many have focused on IT networks but the regulations include all resilience and so OT environments matter. 
    • What does this new emphasis from regulators mean practically for OT security?
  • Why zero trust, isolation and segmentation are key

    • There has been a shift in recent attacks away form the theft of data – now threat actors are concerned with interrupting all operation activity.
    • It is now critical that business functions are separated, and that internet access to OT networks is limited.
    • Can security teams keep up with sophisticated foes? 
  • Defending against the latest ransomware variants

    • Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes
    • The threat and the actors are constantly evolving, and that evolution is forcing the hand of the government and causing havoc in the insurance market
    • What can CISOs do to better defend against ransomware?

Who attends

Job titles

Group Chief Information Security Officer
OT Security Expert
MEA Cybersecurity Officer
Chief Information Security Officer (CISO)
Senior Threat Intelligence Analyst
Information Security Program Manager
Cyber Security Architect
Chief Compliance and Business Ethics Officer
Head of Cyber Insurance Management
Information Security Governance, Risk and Compliance Lead
CISO
Service Support
Head of Cyber Programme Delivery
Director, Information Security Leader DACH
IT Security Operations Senior Analyst
CISO
Cyber Security im Lieferantennetzwerk
Head of Information Security
Information Security Manager
Penetration tester / Red Teamer
Group IT Security Manager
Manager IT Infrastructure & Operations
Group Director of Information Security
Head Of Information Technology
Solution Lead, Network & Security
Head of Industrial Cybersecurity
Global Cybersecurity Leader
Head of Cybersecurity and Telematics
Information Security Officer EMEA
Cyber Risk Manager
IT Security Manager
IT Project Manager
Data Protection Officer
Cyber Threat Intelligence
Sr.Cloud Network Security Engineer
Global Security Operations Coordinator
Cyber Threat Intel (CTI) Analyst
CISO
Head of Security Engineering & Operations
Cyber Security Specialist
Chief Product Security Officer
Cyber Security Architect
Data Protection Officer
CISO
Threat Intelligence Lead
Cyber Security Architect
Travel Security & Intelligence
Information Security Specialist
Head of Governance, Risk & Compliance in Corporate Security
Senior Project Manager Cyber Security
Cloud & Security Architect
Cloud Security
Global Cyber Programme Leader
Head of IT
Security Awareness Manager
Cyber Threat Intelligence
CISO
Security Awareness and Training
Directrice cyber défense
Principal Controls Engineer
Group CISO
Senior Cyber Security Professional - OT
IT Security Manager

Companies

Hill & Smith PLC
Airbus Defence and Space
Schneider Electric
Ahlstrom
Signify
Trivium Packaging
Fiskars Group
Saint-Gobain Group
Airbus Defence and Space
pladis Global
Renesas Electronics Corporation
Alfa Laval
Natura &Co
Procter & Gamble
Amcor
Kistler Group
BMW Group
Victorinox
Satair
Airbus Defence and Space
Oxford Instruments
Remeha
Senior Plc
Lenze Swiss AG
Meyer Turku
Siemens
Schneider Electric
Tevva Hydrogen Electric Trucks
Essilor International
Fiskars Group
Sanad Group
BMW Group
Imperial Brands Plc
Signify
3M
Signify
Signify
Siemens
Aptiv Plc
Airbus Defence and Space
Canon Production Printing
Airbus Defence and Space
Vorwerk Group
SCA Forest Products AB
Schneider Electric
Airbus Defence and Space
Signify
Meyer Turku
Signify
Natura &Co
Yokogawa Engineering
3M
Natura &Co
GF Casting Solutions
Signify
Signify
La Farga
Signify
Plastic Omnium
Coopervision
Klöckner & Co SE
Siemens
BSH

Employee size

1000-1999
10,000+
10,000+
5000-9999
10,000+
5000-9999
5000-9999
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
2000-2999
10,000+
1000-1999
3000-4999
10,000+
1000-1999
100-499
5000-9999
2000-2999
3000-4999
10,000+
10,000+
100-499
10,000+
5000-9999
100-499
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
10,000+
1000-1999
10,000+
10,000+
3000-4999
10,000+
10,000+
10,000+
3000-4999
10,000+
10,000+
100-499
10,000+
10,000+
100-499
10,000+
10,000+
100-499
10,000+
10,000+
10,000+
5000-9999
10,000+
10,000+