Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

Securing Industry 4.0

As we head into the Industry 4.0 era—where connected Internet of Things (IoT) devices and automation will reshape industries—our world is already highly connected. According to Statista, there are already more than 10 billion connected IoT devices and that number will increase by well over a billion new connections each year, exceeding 25 billion in 2030. Much of this growth will come from industrial connectivity and automation products, which improve energy efficiency, operating productivity, and safety at-scale, while also reducing costs and unnecessary downtime.

Yet, as we’ve witnessed over the past two years, increased connectivity creates increased risks. As networks of connected smart devices exchange critical data, they also open numerous vulnerabilities for exploitation by hackers. Given the inherent complexity of industrial-scale automated systems and the fact that malicious actors need only find a single vulnerability to access an entire network, it’s clear that organizations are facing an incredibly tough challenge. This challenge will only grow as IoT devices become ubiquitous in the Industry 4.0 era.

In February 2022, the Cybersecurity and Infrastructure Security Agency (CISA) published an alert acknowledging a year-long uptick in sophisticated ransomware incidents targeting critical infrastructure organizations across the globe. Only days later, the FBI and Secret Service warned that the resurging BlackByte ransomware gang successfully compromised multiple U.S. and foreign organizations. These attacks included “at least three critical infrastructure sectors” ranging from food and agriculture to financial institutions and government facilities. Unfortunately, mitigating the security issues that enable these attacks is easier in theory than in practice.

Complexity is security’s greatest enemy. Increased digitization of organizations and industries without adequate advance consideration of security risks has created insecure interconnections. In many cases, organizations have proved unable to maintain acceptable levels of security and, in some cases, exposed critical infrastructure elements to the internet for the first time. Since infrastructure failures can be catastrophic, cutting off food, water, electricity and oil supplies, these elements became desirable targets for profit-hungry cybercriminals. In fully connected ecosystems, including those that Industry 4.0 organizations are building, attacks on these sectors can spread to customers and supply chains, giving bad actors even greater leverage to demand payments.

At my company, UL, we believe that hardening security requires a proactive, tactical approach to both risk management and security, building protections upfront in the product development process. Moreover, meeting legislative and industry compliance requirements should be part of every company’s comprehensive product security program. This approach to reducing cybersecurity risks is known as security by design. This strategy enhances trust for all stakeholders across the product’s entire lifecycle and is implemented in several steps.

  1. Treat cybersecurity as a shared responsibility. Securing data and assets in the Industry 4.0 era isn’t just one person or organization’s job. It requires a variety of players with differing roles and priorities, including asset owners, system integrators, maintenance managers and manufacturers of components and finished products. Given that cybersecurity can be compromised anywhere from the deepest chip level to a supply chain partner’s information technology (IT) team, collaboration is crucial to ensure security across all these different roles and interdependencies.
  2. Meet the standards. Considering the global breadth and technical depth of today’s products, organizations must meet national and international regulatory requirements and industry-specific standards and security frameworks.
  3. Test regularly. Given the dynamic regulatory landscape, products and systems need to have security built-in and must regularly test and verify their cybersecurity capabilities against established standards. As many organizations face challenges in supporting ongoing security assurance, working with a trusted expert for assessment, testing, and certification is advisable.

As attackers become more malicious in targeting industries through connected devices, organizations can no longer afford solely reactive approaches to cybersecurity. Sustainable and strong cybersecurity postures now depend on holistic approaches to governance and processes, starting with security by design and continuing with ongoing testing to meet evolving industry and regulatory standards.

David Nosibor
David Nosibor
As the platforms solutions lead and head of UL’s SafeCyber project, David oversees digital platform development and the management, implementation and experimentation on new solutions and business models for UL’s Identity Management and Security division. He has addressed corporate innovation and digital transformation for more than a decade. Before joining UL, David was the growth lead at Rainmaking Innovation in Singapore, a corporate innovation consulting firm, and served as the head of Digital Innovation at Mazars in Asia Pacific, an international audit, tax and advisory firm.

Related Posts

Should ISA/IEC 62443 Security Level 2 Be the Minimum for COTS Components?

A recent white paper published by the ISA Security Compliance Institute (ISCI) and its ISASecure certific...
Liz Neiman Apr 23, 2024 5:18:27 PM

How to Secure Machine Learning Data

Data security is paramount in machine learning, where knowledge drives innovation and decision-making. Th...
Zac Amos Mar 12, 2024 11:10:47 AM

Fortifying Your Security Arsenal: A Strategic Approach to Safeguarding OT Security Assets from Adversarial Threats

Introduction Despite investing significant budgets and resources in security products and services. The c...
Mohannad AlRasan Mar 5, 2024 9:17:57 AM