The Target on Your Back: Cybersecurity and Privacy in a Digital Manufacturing World​

Top Takeaways

Manufacturing is the hardest hit sector when it comes to cyber incidents

The average cost of a breach is $10.2 million and the disruption to operations up and down the value chain can take longer to recover than most industries. In terms of why, the attack surface is large and growing; every level of the technology stack can be vulnerable.

Operate with vulnerability in mind

There is consensus that it’s impossible — or nearly so — to design a system that cannot be compromised. This is in no small part due to the fundamental imbalance in cybersecurity. Defense is defending everything, whereas offense is finding just one vulnerability to attack. There is no 100% solution and threat actors are always one step ahead. One out of six breaches is AI-enabled or partially AI-enabled. However, companies that utilize AI can see a 20% reduction in the total cost to respond to a cyber event.​

Plan ahead, and plan on a clear day

Lower the stress level and make better and more effective decisions when an incident occurs. This includes getting you vendors in line — digital forensics, incident response, PR, attorneys. Contracting takes longer that you think, and cybersecurity companies are busy — many don’t even have the bandwidth to handle an incident unless there’s a retainer already in place.​

Have a playbook and the right toolset

Make sure you have the skills, capabilities, and funds to implement the chosen framework. It’s critical to know who your experts are ahead of time. Make sure they are fully empowered to have whatever resources they need. You also need to know your data — what data is being stored and accessed, and how this works up and down the supply chain. ​

Keep exploring expert insights.

Go Deeper

Go Deeper

Manufacturing is the hardest hit sector when it comes to cyber incidents

Candid Conversation: Why Manufactures Are Targets and How to Prepare Now for a Cyber Incident​

Operate with vulnerability in mind

Tech Isn’t Necessarily the Weakest Link — People Might Be

How AI Agents Complicate Cyber Defense and Attack Surface Risks

Cybersecurity Evolution: From IT Niche to Enterprise Core​

Plan ahead, and plan on a clear day

A Shift For the Better: Cybersecurity Gets Board-Level Backing and Resources​

Have a playbook and the right toolset

Cybersecurity as Risk Ranking: Likelihood, Consequence, and Mitigation​

Heat Maps and Buy-In: How the C-Suite Drives Cybersecurity Priorities​

Manufacturing accounted for more security incidents than any other sector.
Source: Verizon 2025 Data Breach Investigations Report​.​

Download the slides from this session

Download Slides

View the recommended reading

Recommended Reading

Stay Up-to-Date on the Latest Innovations

Stay in Touch