Risk management in the industrial Internet era: Industry 4.0 and network security

In 2009, malware controlled centrifuges at a nuclear enrichment plant, causing all centrifuges to go out of control. The malware, also known as Stuxnet, invades independent network systems through flash drives and automatically spreads across production networks. Through the Stuxnet incident, we saw the possibility of using cyber attacks as weapons to destroy networked physical factories. The war is clearly unbalanced: Enterprises must protect numerous technologies, and attackers only need to find one weakest link.

But it is very important that enterprises not only need to pay attention to external threats, but also pay attention to real but often ignored cyber risks. These risks are increasingly caused by enterprises in the process of innovation, transformation and modernization. Caused by the increasing application of intelligent Internet technology. Otherwise, the strategic business decisions made by the enterprise may lead to such risks, and the enterprise should manage and reduce such emerging risks.

In the era of Industry 4.0, the interconnectivity between intelligent machines continues to increase, and risk factors also increase. Industry 4.0 opens an era of interconnectivity, smart manufacturing, responsive supply networks, and customized products and services. With the help of intelligent and automated technologies, Industry 4.0 aims to combine the digital world with physical operations to promote the development of smart factories and advanced manufacturing. However, in the process of improving the digital capabilities of the entire manufacturing and supply chain process and promoting the revolutionary change of connected devices, all enterprises are caught off guard by the new cyber risks. Developing comprehensive strategic approaches to cyber risks is critical to the manufacturing value chain because these approaches combine key drivers of Industry 4.0: operational technology and information technology.

With the advent of the Industry 4.0 era, threats have increased dramatically, and companies should consider and resolve new risks. In short, developing a cyber risk strategy with security, vigilance and resilience in the Industry 4.0 era will face different challenges. When supply chains, factories, consumers, and business operations become networked, the risks posed by cyber threats will reach unprecedented breadth and depth.

It may be too late to think about how to address cyber risks until near the end of the strategy process. As you begin developing your connected Industry 4.0 plans, consider cybersecurity as an integral part of strategy, design and operations.

This article will study the cyber risks faced by each of the three major aspects of modern networked digital supply networks, smart factories and networked devices. 3 In the era of Industry 4.0, we will explore actionable countermeasures for operations and information security leaders to anticipate and effectively respond to cyber risks throughout the entire production lifecycle (Figure 1)—from digital supply networks to smart factories to connected objects. , while proactively integrating cybersecurity into corporate strategies.

Digital Manufacturing Enterprises and Industry 4.0

Industry 4.0 technology allows digital manufacturing enterprises and digital supply networks to integrate digital information from different sources and sources to promote manufacturing and distribution behaviors.

The integration of information technology and operational technology is marked by the shift to physical-digital-physical networking. Industry 4.0 combines the Internet of Things and related physical and digital technologies, including data analytics, additive manufacturing, robotics, high-performance computers, artificial intelligence, cognitive technologies, advanced materials, and augmented reality to improve the production life cycle and achieve digitalization operations.

The concept of Industry 4.0 integrates and extends the scope of the Internet of Things in the context of the physical world. To a certain extent, only manufacturing and supply chain/supply network processes will experience physical-digital and digital-physical processes. across (Figure 2). The leap from digital back to physical—from connected digital technologies to the process of creating physical items—is the essence of Industry 4.0, which underpins digital manufacturing enterprises and digital supply networks.

Even as we explore the ways in which information creates value, it is important to understand value creation from the perspective of the manufacturing value chain. Across the entire manufacturing and distribution value network, integrating information and operational technologies through Industry 4.0 applications may achieve certain business results.

Evolving Supply Chain and Cyber ??Risks

The supply chain regarding the entry of materials into the production process and the outbound distribution of semi-finished/finished products is very important to any manufacturing company. In addition, supply chains are closely linked to consumer demand. Many global companies use demand forecasts to determine the quantities of raw materials required, production line requirements, and distribution channel loads. As analytics tools have also become more advanced, businesses are now able to leverage data and analytics tools to understand and predict consumer purchasing patterns.

By introducing intelligent and interconnected platforms and devices to the entire ecosystem, Industry 4.0 technology is expected to promote the further development of the traditional linear supply chain structure and form a digital supply network that can obtain useful data from the value chain, ultimately Improve management, speed up the circulation of raw materials and commodities, improve resource utilization, and make supplies more reasonable to meet consumer needs.

Despite these benefits that Industry 4.0 can bring, the increased interconnectivity of digital supply networks will create network vulnerabilities. To prevent major risks from occurring, network vulnerabilities should be properly planned and detailed at every stage from design to operations.

Cyber ??Risks of Sharing Data in Digital Supply Networks

As digital supply networks develop, there will be future demands for raw materials based on buyer demand for available supplies. Or a new supply network for real-time dynamic pricing of goods. 5 Since only when all participants in the supply network open up data sharing, it is possible to form a responsive and flexible network, and it is difficult to ensure the transparency of some data while ensuring the security of other information. Therefore, it is not easy to form a new supply network.

As a result, businesses may seek to prevent information from being accessed by unauthorized network users. In addition, they may need to implement unified security measures for all supporting processes, such as supplier acceptance, information sharing and system access. Not only do companies have exclusive rights to these processes, they also serve as access points to other internal information. This may put additional pressure on third-party risk management. When analyzing cyber risks in connected digital supply networks, we found that increasing supply chain interconnectivity has the greatest impact on data sharing and supplier processing (Figure 3).

In order to deal with the growing cyber risks, we will discuss the above two major areas and response strategies one by one.

Data sharing: More stakeholders will have more channels to obtain data

Companies will need to consider what data can be shared and how to protect private ownership or contain privacy Risk systems and underlying data. For example, some suppliers in a digital supply network may be competitors in other areas and therefore be unwilling to disclose certain types of data, such as pricing or patent information. In addition, Suppliers may be subject to certain laws and regulations that limit the types of information that can be shared. Therefore, releasing only part of the data could allow someone with bad intentions to obtain additional information.

Businesses should use appropriate technologies, such as network segmentation and intermediary systems, to collect, protect and provide information. In addition, companies should apply technologies such as trusted platform modules or hardware security modules in future production devices to provide strong cryptographic logic support, hardware authorization and authentication (i.e., identifying unauthorized changes to the device).

Combining this approach with strong access controls, data and processes for mission-critical operational technologies can be secured at application points and endpoints.

Other industries, such as financial services, can provide examples of information protection when some data must be disclosed or when the data is very sensitive. Currently, enterprises are beginning to apply tools such as encryption and tagging to data at rest and in transit to ensure communication security in the event that data is intercepted or the system is compromised. However, with the gradual improvement of interconnectivity, financial services companies have realized that data privacy and confidentiality risks cannot be solved only from the perspective of security, but should be combined with other technologies such as data governance.

In fact, enterprises should conduct risk assessments of their environments, including enterprises, digital supply networks, industry control systems, and connected products, and develop or update cyber risk strategies based on the assessment results. Taken together, all of the above methods can identify areas where more advanced preventive measures should be implemented as connectivity continues to increase.

Supplier Processing: Supplier Acceptance and Payment in the Wider Market

As the supplier system becomes more complex with the addition of new partners, expansion of the core supplier group will be possible Disrupt the current supplier acceptance process. As a result, governance, risk and compliance software that tracks third-party acceptance and risk needs to be faster and more autonomously responsive. In addition, information security and risk management teams using these applications will need to develop new policies to ensure that they are not affected by fake suppliers, internationally sanctioned suppliers, and distributors of substandard products. There are many similar experiences in the consumer market. eBay and Amazon have experienced incidents of counterfeit and shoddy goods and fake storefronts.

Blockchain technology has been considered to help address the above concerns and cope with possible changes to payment processes. Although Bitcoin is the classic case for establishing monetary history, other businesses are still exploring how to use this new tool to determine the flow of goods from the production line to buyers at all levels. 7. Create a group *** history account book can build trust and transparency, protect buyers and sellers by verifying the authenticity of goods, track the logistics status of goods, and replace batch sorting with detailed product classification when processing returns and exchanges. If product authenticity cannot be guaranteed, the manufacturer may conduct product testing and identification before introducing the product to ensure adequate safety.

Trust is the connecting factor between data sharing and vendor processing. When enterprises engage in information or commodity transactions, they need to continuously update their risk management measures to ensure authenticity and security; strengthen monitoring capabilities and network security operations to maintain vigilance; and protect such processes when trust verification cannot be implemented.

In this process, digital supply network members can refer to cyber risk management methods from other industries. The automated trading models used by some financial and energy companies have many similarities to responsive and flexible digital supply networks. It contains competitive intellectual property and vital resources that businesses rely on, all of which, like digital supply networks, are vulnerable to attack once deployed to the cloud or connected to third parties. The financial services industry is aware of the risks faced by both internal and external algorithms. Therefore, to combat insider risks, both explicit (corporate espionage, sabotage, etc.) and unintended risks (complacency, ignorance, etc.), software coding and insider threat programs must be more secure and vigilant.

In fact, vigilance is very important for monitoring: as manufacturers gradually apply Industry 4.0 technologies to production processes outside the digital supply network, cyber risks will only grow exponentially.

New cyber risks in the era of smart production

With the continuous improvement of interconnectivity, digital supply networks will face new risks, and smart manufacturing cannot avoid them. Not only will the number and variety of risks increase, they may even grow exponentially. Not long ago, the U.S. Department of Homeland Security published the "Strategic Principles for Security of the Internet of Things" and "Security Principles for Life-Critical Embedded Systems", emphasizing that attention should be paid to current issues and to check whether manufacturers have directly or indirectly introduced and related information during the production process. Risks associated with life-critical embedded systems.

"Life-critical embedded systems" broadly refers to almost any networked device, whether it is a device in a shop floor automation system or a device controlled remotely by a third-party contract manufacturer, and should be considered for risks – even though some equipment has little to do with the production process.

Considering the growing risks and the rapid expansion of threat areas, the manufacturing industry in the Industry 4.0 era must completely change its view of security.

Networked production brings new cyber challenges

As production systems become more interconnected, the cyber threats faced by digital supply networks continue to grow and expand.

It is not difficult to imagine that improper or arbitrary use of temporary production lines may cause economic losses, poor product quality, and even endanger worker safety. Additionally, connected factories will be less able to withstand the consequences of a shutdown or other attack. There is evidence that manufacturers are still not prepared to deal with the cyber risks that their connected smart systems can pose: A 2016 study by Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI) found that one-third of manufacturers were not prepared for the cyber risks on their factory floors Any cyber risk assessment has been done on the industrial control systems used.

What is certain is that since entering the era of mechanized production, risks have always accompanied manufacturers, and with the advancement of technology, cyber risks have continued to increase and physical threats have increased. But Industry 4.0 brings cyber risk to its biggest leap yet. Please see Figure 4 for details of each stage.

From an operational perspective, engineers can deploy unmanned sites in a modern industrial control system environment while maintaining high efficiency and implementing resource control. To do this, they use a range of networked systems, such as enterprise resource planning, manufacturing execution, monitoring and data collection systems. These networked systems can often optimize processes and make business simpler and more efficient. Moreover, as the system continues to be upgraded, the degree of automation and autonomy of the system will continue to increase (Figure 5).

From a security perspective, given the increasing interconnectivity and use of commercial off-the-shelf products in industrial control systems, a large number of exposure points will be potentially compromised. Unlike the general IT industry that focuses on information itself, industrial control system security focuses more on industrial processes. Therefore, as with traditional cyber risks, the main goal of smart factories is to ensure the availability and integrity of physical processes rather than the confidentiality of information.

However, it is worth noting that although the basic elements of network attacks have not changed, the methods of implementing attacks have become more and more advanced (Figure 5). In fact, as the Internet of Things in the Industry 4.0 era becomes increasingly high and gradually expands from the digital realm to the physical world, cyberattacks will likely have a broader and more profound impact on production, consumers, manufacturers, and the products themselves (Figure 6 ).

Combining information technology and operational technology:

When digitalization meets physical manufacturers must consider digital processes and the machines and items that will be affected when implementing Industry 4.0 technologies, which we often call It is the combination of information technology and operational technology. For companies that include information technology and operational technology in their industrial or manufacturing processes, when we explore the factors driving focused operations and development efforts, a variety of strategic initiatives, operational values, and corresponding cybersecurity measures can be identified (Figure 7).

First, manufacturers are often influenced by the following three strategic plans:

Health and Safety: Employee and environmental safety are important to any site. With the development of technology, smart security equipment will be upgraded in the future.

Resilience and efficiency of production and processes: It is important to ensure continuous production at all times. In practice, money is lost once a plant is shut down, but restoring critical processes may result in even greater losses given the time it takes to rebuild and restart.

Detect and proactively resolve issues: Corporate brand and reputation play an increasingly important role in global business markets. In actual work, factory failures or production problems have a great impact on corporate reputation. Therefore, measures should be taken to improve the environment and protect the corporate brand and reputation.

Second, enterprises need to uphold different operational value concepts in daily business activities:

System operability, reliability and integrity: In order to reduce ownership costs, To slow down parts replacement, sites should purchase interoperable systems that support multiple vendors and software versions.

Efficiency and Cost Avoidance: Sites are always under pressure to reduce operating costs. In the future, companies may increase investment in spot equipment to enhance the flexibility of remote site diagnosis and engineering construction.

Regulation and Compliance: Different regulatory agencies have different security and cybersecurity requirements for industrial control system environments. In the future, companies may need to invest more to change the environment and ensure the reliability of processes.

In the era of Industry 4.0, cyber risks no longer exist not only in the supply network and manufacturing industry, but also in the products themselves. As products become increasingly interconnected—both between products and even between products and manufacturers and supply networks—companies should understand that cyber risks do not end once a product is sold.

Risks involve physical items

It is expected that by 2020, more than 20 billion IoT devices will be deployed around the world. 15 Many of these devices may be installed in manufacturing equipment and production lines, while many others are expected to enter the B2B or B2C market for consumers to purchase and use.

Research results from Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI) in 2016 show that nearly half of manufacturers use mobile application software in networked products, and three-quarters of manufacturers use Wi-Fi. The Fi network carries data between connected products. 16 The Internet of Things based on the above network approaches usually creates many loopholes. IoT device manufacturers should consider how to apply more robust and secure software development methods to current IoT development to address the significant cyber risks that devices often encounter.

While this is challenging, it turns out that businesses cannot expect consumers themselves to update security settings, take effective security countermeasures, update device-side firmware, or change default device passwords.

For example, in October 2016, an Internet of Things distributed denial-of-service attack caused by Mirai malware showed that attackers could exploit these weaknesses to successfully carry out attacks. In this attack, the virus infected consumer IoT devices such as connected cameras and TVs, turning them into botnets, and continuously impacted the servers until they crashed, eventually paralyzing some of the most popular websites in the United States for most of the day. . 17 Researchers found that devices compromised by distributed denial-of-service attacks mostly used default passwords provided by vendors and did not receive required security patches or upgrades. 18 It should be noted that the passwords provided by some vendors are hard-coded into the device firmware, and the vendors do not inform users how to change the password.

Current industrial production equipment often lacks advanced security technology and infrastructure. Once the perimeter protection is breached, it is difficult to detect and respond to such attacks.

Risk goes hand in hand with production

As production facilities are increasingly integrated with IoT devices, it is important to consider the impact these devices have on manufacturing, production, and enterprise networks. Security risks are becoming increasingly important. Security impacts of compromised IoT devices include production shutdowns, damage to equipment or facilities such as catastrophic equipment failure, and in extreme cases, loss of life. Furthermore, potential monetary losses are not limited to production downtime and incident rectification, but may also include fines, legal costs, and lost revenue due to brand damage (which may last for months or even years, well beyond the actual duration of the incident). Listed below are some of the current ways to secure connected items, but as items and corresponding risks proliferate, these methods may not be enough.

Traditional Vulnerability Management

Vulnerability management programs can effectively reduce vulnerabilities through scanning and patching, but often still have multiple attack surfaces. The attack surface can be an open TCP/IP or UDP port or an unprotected technology. Although no vulnerabilities have been discovered yet, attackers may be able to discover new vulnerabilities in the future.

Reduce the attack surface

Simply put, reducing the attack surface means reducing or eliminating attacks. You can design, build and deploy solidified devices that only include basic services from IoT device manufacturers. Then started working on it. Security ownership should not be solely owned by the IoT device manufacturer or user; it should be shared equally with both.

The Renewal Paradox

Another challenge facing production facilities is known as the “renewal paradox.” Many industrial production networks are rarely updated and upgraded because downtime and upgrades are expensive for manufacturers. For some continuous processing facilities, closures and downtime will result in the loss of expensive production raw materials.

Many connected devices are likely to be around for ten to twenty years, making the renewal paradox even more serious. It is simply unrealistic to think that a device will operate securely throughout its life cycle without applying any software patches. 20 For production and manufacturing facilities, maximizing production asset utilization while minimizing downtime is critical. It is the responsibility of IoT device manufacturers to produce more secure, hardened IoT devices that have a minimal attack surface and plan for the most secure settings utilizing default "open" or insecure security configurations.

The challenges faced by connected devices in manufacturing facilities often apply to IoT-based consumer products as well. Smart systems evolve quickly and can make consumer items more vulnerable to cyber threats. For one item, the threat may be trivial, but if it involves a large number of connected devices, the impact will be significant - the Mirai virus attack is an example. In combating threats, asset management and technology strategies will be more important than ever.

Talent Gap

A 2016 study by Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI) showed that 75% of executives surveyed believe they lack the skills to effectively implement and maintain secure networking Skilled talent resources for the production ecosystem. 21 As attacks continue to grow in sophistication and sophistication, it will become increasingly difficult to find highly skilled cybersecurity personnel to design and implement cybersecurity solutions that are secure, alert, and resilient.

Cyber ??threats are constantly changing and technology is becoming more complex. Advanced malware equipped with zero-day exploits can automatically find vulnerable devices and spread with little human involvement, potentially defeating IT/OPS security personnel who have already been compromised. This trend is disturbing and IoT device manufacturers need to produce more secure curing devices.

Multi-pronged approach to protect equipment

In industrial applications, it undertakes some very important and sensitive tasks - including controlling power generation and distribution, water purification, chemical production and purification IoT devices in industries, manufacturing, and automated assembly lines are often the most vulnerable to cyberattacks. As human intervention continues to decrease in production facilities, protecting only at the gateway or network perimeter is no longer useful (Figure 8).

Consider cybersecurity from the beginning of the design process

Manufacturers may feel increasingly responsible for deploying hardened, near-military-grade connected devices. Many IoT device manufacturers have stated that they need to adopt a secure coding approach that involves planning and design, and employ leading cybersecurity measures throughout the hardware and software development lifecycle. 22 This secure software development life cycle adds security gateways (used to evaluate whether security controls are effective) throughout the development process, adopts leading security measures, and uses secure software code and software libraries to produce secure devices with certain functions. By leveraging the security measures of the secure software development lifecycle, many vulnerabilities discovered in IoT product security assessments can be addressed during the design process. But if possible, applying security patches at the end of the traditional development life cycle is often more laborious and costly.

Protecting data from the network device side

The large amount of information generated by IoT devices is very important to Industry 4.0 manufacturers. Industry 4.0-based technologies such as advanced analytics and machine learning can process and analyze this information and make critical decisions in real-time or near real-time based on computational analysis results. This sensitive information is not limited to sensor and process information, but also includes manufacturers’ intellectual property or data related to privacy regulations.

In fact, a survey by Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI) found that nearly 70% of manufacturers use networked products to transmit personal information, but nearly 55% of manufacturers encrypt the transmitted information.

Production of curing equipment requires reliable security measures, and the security of sensitive data also needs to be protected during the entire data life cycle. Therefore, IoT device manufacturers need to develop a protection plan that not only securely stores all device, local and cloud-stored data, but also quickly identifies and reports any conditions or activities that may compromise the security of this data.

Protecting cloud data storage and data in motion often requires enhanced encryption, artificial intelligence, and machine learning solutions to create powerful, responsive threat intelligence, intrusion detection, and intrusion prevention solutions.

As more and more IoT devices come online, the potential threat surface and the risk to compromised devices will increase. These attack surfaces may not be large enough to create a critical vulnerability now, but they could easily become so just months or years later. Therefore, patches must be used when devices are connected to the Internet. The responsibility for ensuring device security should not lie solely with consumers or deployers of connected devices, but rather with device manufacturers who are best suited to implement the most effective security measures.

Applying Artificial Intelligence to Detect Threats

In August 2016, the U.S. Defense Advanced Research Projects Agency held a Cyber ??Super Challenge, and the top seven teams competed in this competition. Their respective artificial intelligence platforms were submitted in the “Whole Machine” hacking competition. Launched in 2013, the Cyber ??Super Challenge aims to find an artificial intelligence cybersecurity platform or technology that can scan networks, identify software vulnerabilities and apply patches without human intervention. The U.S. Defense Advanced Research Projects Agency hopes to use artificial intelligence platforms to greatly shorten the time it takes humans to identify vulnerabilities and develop software security patches in real-time or near real-time, thereby reducing the risk of cyber attacks.

Truly alert threat detection capabilities may require harnessing the power of artificial intelligence to find the needle in the haystack. As IoT devices generate massive amounts of data, current signature-based threat detection techniques may be pushed to their limits by recollecting data streams and implementing stateful packet inspection. While these signature-based detection techniques can cope with rising traffic, their ability to detect signature database activity is still limited.

In the era of Industry 4.0, by combining attack surface reduction, secure software development life cycle, data protection, security and hardening device hardware and firmware, and machine learning, and with the help of artificial intelligence to respond to threats in real time, we can achieve a secure It is crucial to develop equipment in a way that ensures safety, vigilance and resilience. Failure to address security risks, such as Stuxnet and Mirai malware exploits, and the inability to produce hardened, secure IoT devices could lead to a situation in which critical infrastructure and manufacturing industries will regularly suffer severe attack.

Remain resilient when attacks are unavoidable

Appropriate use of the security and vigilance of highly solidified target devices can effectively deter most attackers. However, it is important to note that while organizations can reduce the risk of cyberattacks, no organization can completely avoid cyberattacks. Resilience starts with accepting that one day your business will be attacked by a cyberattack, and then proceeding with caution.

The process of developing resilience consists of three stages: preparation, response, and recovery.

Prepare. Companies should be prepared to respond effectively to all aspects of an incident and clearly define roles, responsibilities and behaviors. Careful preparations such as crisis simulations, incident drills and war games can help companies understand the differences and take effective remedial measures should a real incident occur.

Response. Management's response should be carefully planned and communicated effectively throughout the company. Implementing an ineffective response will magnify the impact of an incident, prolong production downtime, reduce revenue, and damage a business's reputation. These effects will last far longer than the actual duration of the accident.

Restore.

Businesses should carefully plan and implement the measures needed to resume normal operations and limit the impact on their business. Lessons learned from the postmortem should be used to develop subsequent incident response plans. Resilient businesses should be able to quickly restore operations and safety while minimizing the impact of an incident. When it comes to preparing for an attack, understanding what to do if you're attacked, and quickly mitigating the impact of an attack, organizations should be fully prepared to respond, plan carefully, and execute fully.

The bits (0s and 1s) that propelled dot-com companies to what they are today have transformed the entire value chain of manufacturing, from supply networks to smart factories to connected items. As the application of networked technologies continues to become more popular, cyber risks may increase and change, and they may also behave differently at different stages of the value chain and for each enterprise. Each business should adapt to the industrial ecosystem in a way that best meets its needs.

Enterprises cannot just use a simple solution or product or patch to solve the cyber risks and threats brought by Industry 4.0. Today, connected technologies power critical business processes, but as these processes become more interconnected, they may become more susceptible to vulnerabilities. As a result, enterprises need to rethink their business continuity, disaster recovery and response plans to adapt to an increasingly complex and pervasive network environment.

Regulations and industry standards are often reactive, and "compliance" often means minimum security requirements. Businesses face a particular challenge - current technologies are not fully secure, as attackers only need to find a single weakest point to gain access to corporate systems. This challenge is likely to escalate: increasing interconnectivity and collection, processing and real-time analytics will introduce a large number of connected devices and data that need to be protected.

Businesses need to adopt a security, vigilance and resilience approach to understanding risks and neutralizing threats:

Security. Take a prudent, risk-based approach to clarify what is safe information and how to keep it secure. Is your company’s intellectual property safe? Is your company's supply chain or industrial control system environment vulnerable to attack?

Vigilance. Continuously monitor systems, networks, equipment, people, and the environment for possible threats. Real-time threat intelligence and artificial intelligence are needed to understand dangerous behavior and quickly identify threats posed by the introduction of large numbers of connected devices.

Resilience. Accidents can happen at any time. How will your company respond? How long will it take to resume normal operations? How will your company quickly eliminate the impact of the incident?

As enterprises pay more and more attention to the business value brought by Industry 4.0, enterprises will need to propose cyber risk solutions that are safe, vigilant and resilient more than ever.

Report producer: Deloitte China

To obtain the pdf version of this report, please log in to the official website of Foresight Think Tank or click on the link: "Link"