Plant & Works Engineering Magazine October/November 2025

Industrial Security Special Focus October/November 2025 www.pwemag.co.uk Plant & Works Engineering | 37 network traffic or find anomalies that may indicate a cyberattack. But without the right training and continuous monitoring by dedicated teams, these same systems could be manipulated in an attack to disrupt operations. Businesses exploring industrial AI must seek auditable systems that algin with cyber security best practices like zero trust architectures and restricted access control. 3. Supply chain resilience Cyber SecureOT 2025 was a showcase for the importance of protecting OT systems at the level of an individual business. However, with a connected supply chain, it becomes the responsibility of every industrial business to protect against cyber-threat. Failure to do so could have a major impact on end customers, as well as the UK’s growth and competitiveness. While cyber resilience can seem daunting, it can be simplified through upgrading without migrating. Enhanced asset performance, energy efficiency, business agility, end-to-end connectivity, and most importantly cyber resilience can be unlocked together through supported modernisation. The EU’s NIS 2 Directive and Cyber Resilience Act (CRA) has rightly raised the bar for security standards across the board. The CRA provides industry with a clear regulatory structure to drive consistency and set a high bar for security practices. However, it also demands a shift in how products are designed, developed, deployed, and maintained. This may pose a challenge for organisations with limited resources or who are just starting out. Working with an accredited training provider and dedicated partner will ensure OT teams are at the top of the cyber security game. Data visibility sits at the heart of cyber resilience. Without it, businesses will be flying blind in their efforts to detect, mitigate, and recover from threats. Access to data in real time across multiple assets and locations is essential for teams to detect and address anomalies such as unauthorised access attempts. Furthermore, analysing historic data will provide insight into potential vulnerabilities, highlighting where cyber-attacks could happen and how to mitigate risks before they happen. Despite all the best efforts to secure a system and protect the data crown jewels, we sometimes have to accept that an attacker may gain access. This may result from system complexity, oversight, human error or a simple misconfiguration. In these circumstances, rapid recovery to a known good state is paramount. At NCSC’s CyberUK event in May, one key takeaway was to focus less on attack prevention and more on impact reduction. It’s a matter of when (not if) something untoward will happen, whether that’s a cyber incident, misconfiguration or simply device failure. Skills for a shared responsibility The world of industrial cyber security is advancing fast, creating a complex task for operators everywhere in the supply chain. Cyber security is everyone’s responsibility, whether you are a solutions provider, an end user, or play a role in the supply chain. There is not a single job role that won’t be affected by cyber security in one capacity or another. For further information please visit: https://www.solutionspt.com Grow your reach with connections from our qualified global database machines&factories E-campaign | List Rental | Lease | Lead Generation Damien Oxlee T: +44 (0)1732 370342 E: damien.oxlee@dfamedia.co.uk

RkJQdWJsaXNoZXIy MjQ0NzM=