Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

96% of Manufacturers Plan to Invest in Cybersecurity Platforms

By Jordyn Alger, Managing Editor
Manufacturing
Simon Kadula via Unsplash
August 19, 2025

A report from Rockwell Automation reveals that cybersecurity is increasingly becoming a business matter in manufacturing, with 96% of respondents stating they plan to invest in cybersecurity platforms (or have already done so). This may be in part due to the fact that cyber threats rank among the most serious external concerns at 30%, outpaced only by inflation/economic growth at 34%. 

Key findings from the report include: 

  • A majority of cyber and IT professionals (61%) are planning the adoption of AI and machine learning (ML) in the next year, which surpasses general manufacturing.
  • 38% of manufacturers intend to utilize data gathered from current sources to drive security measures. 
  • Nearly half (48%) of all cyber professionals reported that securing converging architecture is key to ensuring positive outcomes over the next 5 years. 

Security Leaders Weigh In

Mr. Satish Swargam, Principal Security Consultant at Black Duck:

The State of Smart Manufacturing report from Rockwell Automation emphasizes the significance of AI/ML in smart manufacturing and recognizes related cybersecurity challenges. The disruption of digital transformation in this market sector shows the increasing demand for skilled cybersecurity professionals who are adept in identifying cybersecurity risks and applying mitigation controls to address the challenges AI/ML poses in smart manufacturing.

Cybersecurity assessments that include AI governance are like brakes that should be perceived as not slowing one down but instead helping to reach one’s destination by avoiding accidents. There are lots of capabilities that should be considered when employing and maturing the AI / ML strategic programs. AI/ML will be used to improve quality and cybersecurity in the forthcoming months. Since the data will be used in LLMs to streamline operations and enhance decision-making capabilities, Shadow AI will become a major concern in smart manufacturing as well.

Trey Ford, Chief Strategy and Trust Officer at Bugcrowd:

Manufacturing placing cybersecurity as a priority over the next five years is a great thing to hear as this space is ripe for modernization and disruption.

The cybersecurity community is excited to see a fresh take on OT operating architectures, not a patchwork of marketing buzzwords added to the old-world air-gapped deployment strategy — we can do better. The OT manufacturer that announces a resilient offering that removes the need for air-gapped networks will set a tone in the marketplace - this is a segment that is still operating in architectural patterns from the last century.

Cybersecurity is a proxy indicator of excellence in design, build, and operations — bringing the OT space into the modern era will raise the performance, telemetry, and resilience of the manufacturing industry. I hope to see OT designers integrating both secure by design principles, and partnership with the research community in the design and testing phase — not just in the marketing slicks and customer deployments as they have in the past.

The introduction of AI will be very similar to how computers revolutionized process control systems (PCS) in the ICS/SCADA universe around the turn of the century, improving safety, tightening production tolerances, and increasing yields and margin capture. AI will provide far more accessible management understanding, visibility, and troubleshooting that historically required the experience and perspective of more seasoned engineers and operators.

J Stephen Kowski, Field CTO at SlashNext Email Security+:

Cyber is basically tied with inflation as a board-level risk now, which tracks with what I’ve seen after a decade in manufacturing IT/OT — customers, regulators, and insurers are all turning up the pressure, so security choices are really business choices. With IT/OT blending, the attack surface explodes; no surprise nearly two-thirds of security pros plan to add AI/ML in the next year, and almost half are zeroing in on securing converged architectures to keep plants running safely.

The practical path is to turn existing telemetry into outcomes: use the data already in place to detect evasive phishing and malware, stop credential theft and BEC in real time, and automate response across email, web, mobile, and collaboration apps — while proving compliance and cutting mean time to remediate. Given talent gaps, tools that deliver high detection efficacy out of the box with lightweight deployment and API integrations can help teams move fast without ballooning cost or headcount.

Derek Manky, Chief Security Strategist & Global Vice President of Threat Intelligence with Fortinet’s FortiGuard Labs:

OT cyber threats have evolved dramatically as attackers increasingly target industrial environments with more sophisticated techniques. In fact, the recent Global Threat Landscape Report found that the OT sector remains one of the top targets for attackers.

One of the most significant shifts has been the increasing convergence of IT and OT environments, which expands the attack surface and makes traditional security measures insufficient. Threat actors are capitalizing on this shift by leveraging new attack methods that were previously impractical to use against air gapped OT systems and employing reconnaissance-as-a-service to map out OT networks before deploying malicious payloads. 

One of the biggest challenges organizations face in incident response is the upsurge in AI-powered threats that increase the volume and sophistication, making attacks harder to detect and contain. Real-time threat intelligence is essential for detecting and responding to cyber threats before they impact industrial operations. By continuously analyzing threat data, organizations can identify attacker tactics, techniques, and procedures (TTPs) early in the attack lifecycle, allowing for proactive defense. 

To make threat intelligence actionable, organizations should: 

  • Automate detection and response by integrating AI and machine learning tools that analyze anomalies in real time. 
  • Correlate OT and IT threat intelligence to create a unified security posture across both environments. 
  • Implement security orchestration, automation, and response (SOAR) platforms to enable faster mitigation of detected threats. 
  • Conduct continuous security testing and red teaming to refine defenses based on emerging threats. 

A well-implemented threat intelligence program ensures that security teams not only understand the evolving threat landscape but also have the tools to act on it swiftly and effectively. 

The future of security in manufacturing will be driven by technologies that enable faster detection, response, and adaptation to evolving threats. Key trends include: 

  • AI-driven threat detection that continuously learns and adapts to new attack patterns. 
  • Automated security orchestration (SOAR) to streamline incident response and reduce manual workload. 
  • Continuous Threat Exposure Management (CTEM) to identify and mitigate risks before they become exploitable. 
  • Industry-wide intelligence sharing initiatives, such as MITRE ATT&CK for ICS, to improve collective defense strategies. 
  • Zero Trust security frameworks tailored for OT environments, ensuring strict access controls and network segmentation. 

By adopting these technologies, organizations can move from a reactive to a proactive security posture, significantly reducing the risk of cyberattacks impacting industrial operations. 

KEYWORDS: artificial intelligence (AI) business continuity planning manufacturing security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Man standing in front of window

    CISOs respond: 49% of CISOs plan to leave role without industry action

    See More
  • White blocks in a circle with one red block

    96% Worry Shorter SSL/TLS Certificate Lifespans Will Impact Business

    See More
  • Dark figure coding on computer

    19 platforms used by government agencies have vulnerabilities

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing