_________________________________________________________________________________________________________
Webinar patched or secured with standard IT controls. Operational technology includes the hardware and software that monitors and controls physical infrastructure, as well as the associated electronic components including video surveillance, access control, fire alarm, life safety, and business and critical communications infrastructure. This creates significant potential entry points for malicious actors.
In some instances- such as in chemical production- security breaches could have severe physical safety consequences, in addition to the potential for disruption and financial losses. External factors, like supply chain vulnerabilities and third-party risks, also represent significant threats. As one speaker noted, a manufacturer may not be the primary target, but rather a conduit for attacks on downstream consumers. The SolarWinds incident was cited as a pertinent example of such supply chain compromise.
Common vulnerabilities observed include the persistent use of default or weak passwords, hard-coded credentials, exposed APIs, and unmanaged firmware updates. Attackers, increasingly leveraging AI and advanced toolsets, view manufacturing sites as attractive targets due not necessarily to sensitive data, but for their critical
manufacturing-today. com 39