Skip to content
Securing Industry 4.0: 2022 Cyber Risk in Smart Manufacturing Operations
Cybersecurity Baseline
25%
*
Based on what you know of peer manufacturing companies, how would you assess your enterprise's current cybersecurity posture?
(Required.)
Superior
– We are far ahead of many of our peers
Above Average
– We are at least slightly ahead of the herd
Average
– Right on par with peer enterprises
Below Average
– We lag behind a bit
*
What do you see as the greatest cybersecurity threats to your OT/manufacturing environments today? (select all that apply)
(Required.)
Nation-state adversaries seeking intellectual property via theft, often via phishing
Cybercrime gangs seeking to disrupt our operations via ransomware and other cyberthreats
Hacktivists seeking to disrupt our operations for ideological reasons
Insiders who maliciously or inadvertently do harm
Legacy technology that is not up for the demands of digital transformation
Lack of personnel/skills to ensure cybersecurity
Employees/partners/customers who lack sufficient cybersecurity awareness
Other (please specify)
*
To what degree do you consider your enterprise to be a "smart manufacturing" company today?
(Required.)
Well on the Way
– We have introduced automation, begun our cloud migration and refreshed IT/OT technology where necessary, and we are streamlining our manufacturing and engagement with customers and partners. We are ahead of many of our peers.
Just Getting Started
– These are early days in our journey, and we are still assessing our current environment, creating a transformation road map and identifying the tools and skills needed to take us to the next level. We are in the pack among our peers.
Not Quite
– We are inhibited by legacy technology and lack of human and financial resources, and the greater attack surface and threat landscape are intimidating. We are laggards among our peers.
*
Wherever you are on the road to smart manufacturing, where do you perceive your enterprise to be most vulnerable today?
(Required.)
Legacy OT
Supply chain/third-party risk
IoT devices
IIoT devices
Shadow IT/cloud
Human factor – insider risk
Other (please specify)