Experts propose five managerial action items that should form a part of an efficient and effective industrial automation security program
India's industrial automation (IA) market is worth approximately $11 billion in 2023 and is projected to grow at a CAGR of roughly 14 percent from 2022 to 2027 to $23 billion in 2027. Key players in this industry include manufacturers producing (closed-circuit) TVs, mobile electronics, air-conditioners, automotive and aviation vehicles, energy products (gas, diesel, petrochemicals), and healthcare solutions. Some of the major brands (in both the private and public sectors) representing these players and serving the Indian IA market include General Electric, Reliance Industries, Rockwell Automation, Siemens India, Honeywell Automation, ABB India, BHEL, Mitsubishi Electric, Larsen and Toubro, and Titan Engineering.
The core technology (significantly different from the traditional information technology (IT) in general non-IA enterprises) behind the functioning of the IA market is (AI/ML-driven) intra-organisation IoT and operational technology (OT) embedded Industrial IoT (IIoT) networks. Such smart networks, along with associated software and mobile applications, help each organisation:
This broadened cyber-vulnerability space causes the bad actors to exploit IIoT cyber-security loopholes at a faster rate when compared to the rate at which the defenders are getting more knowledgeable and better at identifying and plugging these holes in a timely fashion. To drive home this point, according to Dragos – a market leader in IT/OT and critical infrastructure security consultancy, the ransomware attacks against the IA sector in the US (and is equally applicable to the Indian IA sector) increased by approximately 86 percent from 2022 to 2023. One of the main reasons for this increasing gap is that around 80 percent of investigated vulnerabilities lie deep within IIoT networks, with more than 82 percent of IoT/OT industries, anywhere around the globe, including India, having limited to no visibility within the IIoT environment. This limited visibility is often because of insufficient investments by an IA enterprise in IA cyber-security in the dimensions of people (e.g., human-in-the-loop), process (e.g., software supply chain issues), technology (e.g., lack of security by design), and governance (e.g., compliance).
[This article has been published with permission from IIM Calcutta. www.iimcal.ac.in Views expressed are personal.]