Trends and Challenges in the Manufacturing Profile

uh overall trends and what are the challenges so to explain that i’m going to hand it over to uh prayer who will share with us some insights important thoughts around what are what do we see as current trends and challenges uh surprised uh happy to hear from you hey thank you very important points that you mentioned about the pillars of the NIST framework right i think that is where the the resource attention should go and that is where we are lacking currently in terms of if we see how the threat landscape is evolving actually it is um it is factored in the fact that uh many of the manufacturing entities out there have not really geared up you know their response mechanisms uh to factor in the kind of evolution evolutionary pressures that are out there which are working to make these hackers uh develop much uh you know much much what it’s a more important versions or variants of the malware out there to beat these three systems down and take down to take out data uh take out your confidential information and take out systems which are out there very recently them incidentally uh as recently as the thanksgiving week and right we saw expert in attacks on manufacturers right again there are a lot of these episodes which are tied in with either geopolitical events either with holidays or some kind of you know distraction that might be on the horizon or potential distraction that might be uh you know out there so when when we look at the trends that are happening obviously the attacks are on the rise and these attacks uh have definitely got an origin in the kind of challenges that manufacturers are facing in you know to improve and evolve uh their response mechanisms and also their strategies to sort of box in these cyber attacks and sort of you know take them away from their core systems and what they have in their ot and other infrastructures that we’re seeing so the governance mechanism is is what where the key challenges are emerging from because uh the structures and the NIST frameworks that freedom you mentioned are all geared towards id so ot is something that has been neglected for a very long period of time and this has got to do with various reasons but mainly what this has led to is that the mechanism the governance structures have not evolved to keep up with the kind of threat landscape changes that we’ve seen the last couple of decades then again we have seen that though there is a lot of attention coming in from the compliance side especially as far as the critical infrastructure is concerned but then again there are a lot of voluntary mandates that have been presented to you know various entities including critical infrastructure operators and manufacturers as well so these are early days for these frameworks to uh sort of be utilized and so for them to mature and settle in into the you know operational processes and what have you as far as the manufacturers are concerned we are going in that direction but we are not going fast enough so that has been that is becoming a challenge again enhancing the security levels and efficacy of existing OT security mechanics is very important this again is an outcome of this low evolution that is happening because all the mechanisms that we have are all geared towards id uh ot does require or rather he’s getting some attention but then again we can do with more attention more resources more planning more strategizing and to also operate with a large you know a lot of visibility so that we are very clear as to what is happening at various levels out there and what kind of breach tactics are these hackers and other actors out there playing with to create these challenges for us rolling out a compliance program again institutional response mechanisms have really lagged uh in in the kind of as i said they are not aligned to the forces which are playing out there so these are the forces which are putting not just an evolutionary pressure but they are also putting an economic pressure on manufacturers to sort of evolve themselves by that i mean that at one end we are seeing manufacturers sort of working towards putting these structures in place on the other we are also seeing that the hackers are staying a step ahead of these mechanisms and sort of creating these breaches and uh sort of you know other challenges security challenges for manufacturers at various points in time uh so you know everything takes a step back once this cyber attack uh takes place right there are a lot of revenue losses there is loss in production there is loss in capacity uh there will be reputational challenges that come in overall it creates a situation where the entire roadmap of a manufacturer gets disrupted and that has been the biggest outcome of a lack of a compliance program that runs across an enterprise system and infrastructure protection strategies again these have not kept up with it with what with the kind of evolution we’ve seen inside the space as for malware as far as malware developers are concerned things are moving but as i said they are not moving faster we need to do it a lot more we need to have much more um easy to adopt frameworks we need to also have some level of flexibility as far as institutions are concerned so that they can move much faster they can uh you know incorporate these frameworks and mechanisms much more easy easily and they can also uh sort of you know to what is to all these evolutionary forces that are operating you know around. Visit Compliance Kits

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top