This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].
The manufacturing and industrial sectors have evolved with the introduction of technologies over the past many decades. Progress in improving processes, techniques, output, quality, and efficiencies have been gained with new technology as they emerge, and the end result can be positive and fortuitous for organizations. With the rapid movement towards a modern-day manufacturing environment, new and connected technologies that employ greater cyber connectedness continue to grow, but at the same time, can introduce cybersecurity risks.
Provided to the reader will include three main content areas :
1) A historical background of the evolutionary Industry 1.0 through Industry 4.0 progress
2) The United States and Internationally available frameworks that can be approached to secure the manufacturing sector
3) A top 10 list of practical elements that can rapidly be approached to secure manufacturing systems from cyber threats as well as a look to the future.
The manufacturing and industrial sectors have evolved with the introduction of technologies over the past many decades. Progress in improving processes, techniques, output, quality, and efficiencies have been gained with new technology as they emerge, and the end result can be positive and fortuitous for organizations. With the rapid movement towards a modern-day manufacturing environment, new and connected technologies that employ greater cyber connectedness continue to grow, but at the same time, can introduce cybersecurity risks.
Provided to the reader will include three main content areas :
1) A historical background of the evolutionary Industry 1.0 through Industry 4.0 progress
2) The United States and Internationally available frameworks that can be approached to secure the manufacturing sector
3) A top 10 list of practical elements that can rapidly be approached to secure manufacturing systems from cyber threats as well as a look to the future.
Download this Resource
Prefer to access this resource without an account? Download it now.
Best For:
- cybersecurity professionals
- cloud security practitioners





