Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity NewsTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Five benefits of industrial cybersecurity implementation

By Randall Richard
industrial factory

Image from Pixabay

June 21, 2022

Implementing cybersecurity systems in a factory or critical infrastructure facility can take several months or even years.

A survey from Kaspersky asked more than 300 industrial organizations to determine the benefits of cybersecurity practices in their facilities. The survey identified five advantages to cybersecurity systems in industrial spaces.

1. Increased cybersecurity skills within the team

The most common benefit organizations mentioned when implementing an operational technology (OT) security project (61%) was a boost of cybersecurity skills within an organization’s team. 

Preparation for implementation includes network analysis, threat modeling, analysis of approaches to protection and many other tasks that offer experience and knowledge to the involved specialists. IT practitioners then must learn how to set up and use the solution, using reporting and analytics to help get the required data on the latest threats.

These practical skills are of high value to specialists. Industry players have confirmed that the demand for OT/ICS security skills and specific expertise has been on the rise for the last several years. Due to the skills gap, 66% of survey respondents have faced significant OT security staffing challenges. 

2. Network and infrastructure optimization

Optimizing networks and infrastructure takes second place with a 58% response rate. Preparations to deploy an OT security solution allow for a critical look at existing infrastructure. This can be a good opportunity to not only become aware of security gaps, but to also reconsider network configurations and equipment used.

Some companies also need to revamp their automation systems so that the cybersecurity solutions are compatible and do not cause disruptions or shutdowns in the production process. Four out of five organizations (81%) have faced the problem of compatibility at least once.

3. Unlocking opportunities for digitalization and IoT use

With a 55% response rate, this benefit is relevant to organizations looking into OT digital transformation. Industrial Internet of Things (IoT) introduces a wide range of security risks and challenges across devices, platforms and operating systems, communications and even the systems to which they’re connected.

4. Pre-implementation security audit helps identify and fix existing security gaps

This previously unknown benefit was confirmed by 52% of industrial organizations. A cybersecurity audit helps give a comprehensive view of the existing IT and OT infrastructure and identify weaknesses as well as possible entry points for a cyberattack. Experts recommend conducting one regularly. 

If the organization performs the audit as part of its OT security solution implementation, it should help ensure that all necessary controllers, SCADA servers and operator workstations are well-protected and that the security solution is configured correctly. It can also reveal any gaps that should be covered with additional measures, such as vulnerable OT equipment or a lack of network segmentation.

5. Establishing processes and boosting management skills 

The final key benefits uncovered have a strong correlation: establishing processes (44%) and boosting management skills (40%). This seems like a logical outcome, as any big project offers people the experience of team and process coordination, giving team members the opportunity to reveal strong skills while improving weaker ones. 

Implementing an OT protection solution involves many parties, such as cybersecurity specialists, OT engineers and operators, external service providers as well as non-IT personnel, such as procurement and even top-level management. In fact, in 55% of organizations, senior executives and board members are involved in the approvals and budgeting of OT security initiatives. These team crossovers can hinder the approvals process and slow down the whole project. So, project leads need to show perseverance and ingenuity to get things done. This presents a good opportunity to improve soft skills. 

For more information on the report, click here.

KEYWORDS: auditing cyber security initiatives factory security industrial Internet of Things (IoT) operational resilience

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Randall Richard is Head of Enterprise Sales for Kaspersky North America.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • technology-network-cyber-freepik.jpg

    Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

    See More
  • implementing PAM

    Five key benefits of privileged access management

    See More
  • 5 Minutes with Kelley

    Agentic AI: Benefits, Risks and Best Practices for Implementation

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing