Podcast: 5 cybersecurity action steps manufacturing executives need to take now

Podcast: 5 cybersecurity action steps manufacturing executives need to take now

May 21, 2024
In this episode of Great Question: A Manufacturing Podcast, Frank Balonis from Kiteworks explores cybersecurity issues that threaten the factory floor.

Frank Balonis is Chief Information Security Officer and Senior VP of Operations and Support at Kiteworks. Frank has been in IT support and services for more than 20 years. In his current position, Frank is responsible for technical support, customer success, and corporate IT. Additionally, Frank oversees corporate security and compliance, and works closely with the company’s product and engineering teams. Frank is a veteran of the United States Navy, in addition to being a Certified Information Systems Security Professional (CISSP). Frank recently spoke with Smart Industry managing editor Scott Achelpohl about the types and objectives of cyberattacks in the manufacturing sector and best practices to improve cyber resilience.

Below is an excerpt from the podcast:

SI: In your article for Smart Industry in April, “Navigating red-alert security challenges in manufacturing,” you named five urgent cybersecurity action steps that manufacturing executives and their CSIOs and CIOs should take. They are 1) conduct cybersecurity assessments, 2) implement multi-factor authentication, 3) establish incident response plans, 4) educate and train employees, and 5) enhance supply chain security. Can you tell us what goes into each of these steps to make them successful?

FB: I sure can, Scott. First off, starting with conducting your first cybersecurity assessment, it can be a daunting task. So make sure you have the right understanding of the framework and its intent is in mind. These are crucial factors in doing your first assessment or doing an assessment. Seeking assistance from third parties that can provide guidance and understanding is a great way to start. They're invaluable in saving time and resources and completing the assessment in a timely fashion. It also helps you move on to the beginning stages of continuous monitoring improvements from that point on.

For multi-factor authentication, you need to start with a really good identity management system. These types of services allow for multiple forms of multiple-factor authentication and provide the flexibility needed not only for the individual and the service, but also the systems and the time they're being accessed. Having this flexibility makes things secure, but also easily accessible without interrupting work that has to be completed.

About the Author

Scott Achelpohl

Scott Achelpohl is the managing editor of Smart Industry. He has spent stints in business-to-business journalism covering U.S. trucking and transportation for FleetOwner, a sister website and magazine of SI’s at Endeavor Business Media, and branches of the U.S. military for Navy League of the United States. He's a graduate of the University of Kansas and the William Allen White School of Journalism with many years of media experience inside and outside B2B journalism.

Sponsored Recommendations

Enclosure Climate Control: Achieving the Ideal Temperature

March 28, 2024
There are several factors to consider when optimizing the climate inside your electrical enclosure. Download this white paper to learn more.

Find the ideal enclosure cooling solution for your application

March 28, 2024
Use the Climate Control Quickfinder tool to find the ideal climate control solution for your application in just three easy steps.

Smart Cooling Solutions: Reduce Your Energy Consumption with Advanced Technology from Rittal

March 28, 2024
Wall extension cooling units for external or internal mounting in doors and walls using standardized mounting cut-outs. Cooling output 0.3 – 5.8 kW. Also available in energy-efficient...

Arc Flash Prevention: What You Need to Know

March 28, 2024
Download to learn: how an arc flash forms and common causes, safety recommendations to help prevent arc flash exposure (including the use of lockout tagout and energy isolating...