Manufacturing Firms Suffer From Under-Performing Cyber Security Providers

Three quarters (75%) of manufacturing organisations admitted their cyber security provider is either underperforming and they’re looking to make changes (27%), or that there’s room for improvement (48%), according to new research by threat detection firm, e2e-assure.

Having a solid cyber security defence strategy is vital for manufacturing organisations, with e2e-assure's study finding the vast majority of Manufacturing organisations (78%) have experienced a cyber attack. Despite this, less than 1 in 5 (19%) would describe themselves as “resilient.”

The research findings highlight the urgent need for a shift in providers’ service offerings with  five key themes or cyber defence becoming apparent:

  • Providers will need to prove their value.
  • Security teams will relinquish more control to trusted providers.
  • Contracts will need to be more commercially flexible.
  • Service and tooling flexibility is a priority for organisations.
  • Quality cyber defence needs to become more accessible to organisations of all sizes

Outsourcing security operations is currently the most popular solution for manufacturing organisations (54%), compared with a hybrid approach (24%) or managing everything in-house (22%).

This is unique in comparison to other sectors e2e-assure surveyed as part of its study, such as Financial Services (45% outsourced vs 40% hybrid vs 12% in house), Healthcare (41% outsourced vs 40% hybrid vs 16% in house) and Professional Services (40% outsourced vs 38% hybrid vs 17% fully in house).  

However, the considerable majority (63%) of CISOs in the Manufacturing sector are either unconfident that threat intelligence is being used as it has had no measurable positive impact (48%), or they know that threat intelligence has not been implemented to detect threats within their environment (15%). Most respondents also said they don’t have flexible contracts (53%), transparent pricing (54%) and real-time visibility of dashboards (56%). In fact, around half (49%) don’t even feel they have client-centric delivery teams who care.  

When asked about their top frustration, CISOs said their providers had been escalating too many false positives (35%). Further pain points included the need to bolt on new services (34%), closely followed by the provider not being proactive (27%) and poor SLA Response Times (26%).  

Clearly, providers are unable to provide the clarity, speed and flexibility required for an industry adapting to innovations like smart manufacturing, and the risks that come with it.

It comes as little surprise then, that when asked “When next procuring cyber security operations what will you be looking for?” the majority (53%) said they’ll be either bringing operations back in house (around a third, 31%), or will be taking a hybrid approach (21%). To fill the gaps where their current providers are falling short, a further 29% said they’ll now be seeking specialist expertise in specific areas.

The CEO of e2e-assure, Rob Demain, commented “Our study sets out to unveil the observations from CISOs and cyber security decision makers as to how their cyber security providers are performing, as criminals deploy increasingly advanced extortion techniques."  

According the the research, most manufacturing organisations current choose to outsource their cyber security operations, but with three quarters saying that they’re underperforming, it’s clear that there is a need for a critical shift to ensure cyber defence providers are meeting the needs of organisations in 2024. 

Providers are on the edge of a huge, missed opportunity in the manufacturing sector. Closer collaboration and a better understanding of the customer’s environment is required to build trust.   

e2e- assure

Image:  Unsplash

You Might Also Read: 

Navigating User Experience, Performance & Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI-Driven Cyber Security Is Booming
HackerOne Leads AI-Driven Innovation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.