Manufacturers Likely Cybersecurity Targets, Say Experts: Tips & Strategies for Fortifying CPG IT Systems
This is especially important within the supply chain. Since suppliers have access to an organization’s systems and data that are critical to operations, companies should continuously look within the supply chain to test for risk, says Steve Muszak, partner and distribution market leader of cybersecurity services at IBM Consulting.
“CPGs should focus more on operational technology (OT),” adds Muszak who says manufacturing companies are especially at risk as they are the No. 1 industry targeted by attackers. “These are soft targets for an attacker and hit at the heart of many CPG’s businesses.”
Ransomware attackers heavily rely on the availability of OT environments, according to Charlie Lewis, partner at McKinsey & Company. Should CPG manufacturers get hit, they are more likely to shut down their OT environments and pay ransoms to restore operations due to weak OT network segmentation and identity and access management (IAM) programs.
Some supply chain attack techniques include brute-force attacks, the exploitation of software and configuration vulnerability, social engineering, malware infection, counterfeiting, and physical attacks, according to the World Economic Forum.
Also read: Learn more about how IT breaches can impact CPG supply chain operations.
Fortifying IT Systems
Several base capabilities are recommended to strengthen security and reduce risk, particularly among complex IT and OT networks. Among them are IT asset management, lifecycle management, IAM, vulnerability management, and third-party risk, says Lewis.
It’s the foundational capabilities that are key, says Lewis. “CPGs, like many other companies with complex IT and OT networks, face a variety of risks that can have outside business impact, such as disruption of production operations or leakage of sensitive IP, and require a set of minimum controls to reduce those risks.”
While IT asset management is not always a cyber capability, he says, it’s important that enterprises know their assets, their criticality, owner version, etc., so there can be remediation and restoration following an attack. Within lifecycle management, attackers typically look to exploit systems no longer maintained, and so keeping up with regular updates limits the likelihood of an attack, says Lewis.
Additionally, Lewis recommends:
- Using various aspects of the IAM capability, specifically multi-factor authentication to reduce inappropriate access and user access reviews to ensure the right people have access. Those who no longer need it should be removed.
- Addressing vulnerabilities across the tech stack within service-level agreements. Based on criticality, this naturally reduces risks and can tie into broader IT asset management programs.
- Knowing where critical business processes rely on third parties, how resilient those third parties are, and if there is a concentration of risk across the environment.
“Gaining buy-in for these investments often involves demonstrating the potential risks and the tangible benefits of improved security posture, such as reduced downtime and protection of sensitive consumer data,” says Ranjan.
Another effective method is convincing the C-suite to test leadership in crisis across communications, legal, and IT through simulation programs.
“When the leadership of an organization can understand and feel what this is like firsthand and the implications to their business, buy-in quickly follows,” said Muszak.