Manufacturing Today Issue - 237 June 2025 | Page 42

________________________________________________________________________________________________________________________
to keep pace with accelerating attack timelines. AI is particularly useful for detecting anomalies in network traffic. While automated response is promising, caution is warranted due to the potential for physical consequences if systems are abruptly impacted.
Physical security, though, remains the indispensable first line of defense. If an attacker gains physical access to critical infrastructure like the Distributed Control System( DCS) location or network closets, many network security controls can be bypassed. Maintaining robust physical access controls, encouraging a culture of vigilance( e. g., challenging unknown individuals), and performing lifecycle management on physical security devices( like access badges) are vital steps.
Practical recommendations for improvement
Practitioners seeking to enhance security should start by aligning initiatives with the broader business strategy, understanding both leadership priorities and operational realities. Identifying and protecting assets critical to core business processes is paramount. Fundamental security hygiene, such as network segmentation and securing remote access, must be prioritized.
Specific actionable advice included eliminating default credentials and hardening firmware and operating systems on devices. Conducting penetration tests using a reputable provider, was highlighted as a powerful method to demonstrate potential impacts and gain stakeholder attention.
42