
OT Cybersecurity & Manufacturing
According to the United Kingdom’s Engineering Employers' Federation (EEF), 48% of manufacturers have at some point been subject to a cybersecurity incident, and half of those organizations suffered financial loss or a disruption to their business.
​
More than 33% manufacturers report that they are not able to demonstrate good enough cyber security practices, which is a worrying statistic considering that it is becoming a vital requirement written within contractual agreements for manufacturers to have effective cyber security processes in place for their customers.
​
A study conducted by the Ponemon Institute found 70% of all organizations said their security risk increased significantly in 2017 alone. About 230,000 new malware samples are discovered daily and that number is expected to increase significantly over time. In addition to this, the average consolidated cost of a single data breach incident rose to $3.86 million last year, a massive increase of about 6 percent from the year before.
​
According to a recent survey by the Alert Logic cybersecurity firm, about half of all manufacturers say that they’ve suffered from some type of cyber incident, whereas 24 percent of them indicated they were luckily in a position that their existing cybersecurity processes prevented any type of appreciable impact. All told, roughly 400 manufacturers were attacked every day during 2016, amounting to about $3 billion in combined losses.
Industrial Control Systems (ICS) play an integral role in manufacturing operations and play a growing risk from cybersecurity threats. The goal of any strategic cybersecurity goal is to protect critical assets and to maintain what we call a KTLO ‘Keep the Lights On.’ ThreatScope provides a flexible and cost-effective framework to enhance and bolster cybersecurity at the ICS level.
​
ThreatScope’s prescription is to understand the organization and ICS environment; analyze the existing technology; and how best to apply and maximize the current controls to operations while creating cybersecurity awareness and due diligent monitoring.
ThreatScope 8-step baseline for ICS Security Controls
Identification Of Risk
Communications
Monitoring
Risk Monitoring
Customized
Security Controls
Overall Company
Risk Appetite
ICS Network
Architecture
Critical Asset
Inventory
Physical Security
Controls
The NIST Cybersecurity Approach
​
Reputational and traditional is what ThreatScope is all about. Whether its smaller companies which manufacture polymers and adhesive products or bigger firms that deal in automotive, ThreatScope customizes its assessment approach using the National Institute of Standardized Framework (NIST). ThreatScope takes the methodology of NIST 8183 (Manufacturing profiles) in which a quantitative measure can be tested for qualified security and determines the most effective and time-efficient to apply cost-aware controls, process and procedures.



