Q1 2024 Cyber Threat Landscape Report: Insider Threat & Phishing Evolve Under AI Auspices
by Laurie Iacono, Keith Wojcieszek, George Glass
Wed, Jul 31, 2024
The State of Cyber Defense: Manufacturing Cyber Resilience highlights the unique challenges the manufacturing industry faces and the key ways the industry can become more cyber resilient.
Kroll’s new report maps out the cybersecurity threat landscape the manufacturing sector currently operates in, looking at three key areas:
Detection and Response | Cyber Threat Intelligence | Offensive Security (OffSec) |
---|---|---|
The cyber maturity of manufacturing organizations’ detection and response capabilities using data analyzed from 1,000 global cybersecurity programs. | Kroll’s frontline threat intelligence from over 3,000 incidents a year details the threats the manufacturing sector faces and how threat actors infiltrate their networks. | Kroll experts detail the key considerations for the manufacturing sector based on pen testing their networks, including how hackers find vulnerabilities and what the industry can do to protect itself. |
Despite increased AI-generated content, major democratic concerns have not materialized. Discover insights on what we have learned about GenAI and elections past the midpoint of the year of the election.
The manufacturing industry is more likely than the average organization to have more mature threat detection and response capabilities.
Indeed, 8% of manufacturing industries surveyed employ the most mature capabilities compared to only 5% on average.
While this is encouraging, it is also worth noting that 25% of manufacturing respondents only employ the most basic security capabilities, such as cybersecurity monitoring.
Manufacturing organizations appear to be most concerned about ransomware, followed by data leakage and phishing attacks, all more so than average.
Given the scale of the ransomware threat over the last five years, it is no surprise to see it is the threat that most concerns manufacturing respondents. Manufacturing is known to be one of the biggest targets for ransomware operators.
The manufacturing industry appears to be most concerned with ransomware; however, it is not in fact the most common threat type for the industry. Kroll’s Cyber Threat Intelligence team found that email compromise is the most common threat type, accounting for nearly half of Kroll incidents in the manufacturing industry.
Manufacturing organizations are more inclined to outsource their cybersecurity, which enables them to manage a smaller ecosystem of security platforms with a smaller team of trusted IT security professionals.
Across all industries, the average security team size is 25. In manufacturing, it is just 19.
There is a logical correlation between the size of a security team and the number of security tools it uses. A larger team can deploy and manage more platforms. In manufacturing, the most common response to the number of security platforms in use was four to five. Across all industries, the most common response was 10–12.
The full report also covers:
How to overcome challenges stemming from discrepancies between perceived and actual maturity
Further insights into the cyber maturity of manufacturing organizations
What the manufacturing sector needs to prioritize in its cybersecurity strategy
The number of data breaches experienced by the industry in the past year
Key considerations learned from Kroll’s cyber penetration experts
How the breadth of the industry and reliance on the supply chain create weakness for the sector
How organizations can begin to progress their detection and response maturity
For access to the full results, complete the form to download the report.
Incident response, digital forensics, breach notification, security strategy, managed security services, discovery solutions, security transformation.
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Threat intelligence are fueled by frontline incident response intel and elite analysts to effectively hunt and respond to threats.
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.
Red team security services from Kroll go beyond traditional penetration testing, leveraging our frontline threat intelligence and the adversarial mindset used by threat actors to push the limits of your information security controls.
Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
by Laurie Iacono, Keith Wojcieszek, George Glass
by Rafael De Lima, Michael Cowley
by Marc Brawner, Mark Nicholls