Featured Image

Ransom and Then Some: A Cybersecurity Forecast for Manufacturing Technology

Sep 10, 2021

At AMT’s 2021 MFG Meeting and MTForecast Conference, Nov. 2-5, in Denver, Colorado, Richard Mason, president & CSO of Critical Infrastructure, will share his thoughts and recommendations about cybersecurity in the manufacturing world.

A former member of the Secret Service’s New York Electronic Crimes Task Force, and a 20+ year veteran of technology titans AT&T, Lucent Technologies’ Bell Labs, and Honeywell International, Mason is an expert in the fields of cybersecurity, physical security, and enterprise resilience.

We asked him several questions about security to preview his presentation in November.

What is your overall cyber security forecast for Manufacturing Technology?

Mason: According to CrowdStrike’s 2021 Global Threat Report, manufacturing is a close second for the most targeted sector for ransomware-related data extortion, falling slightly behind industrials and engineering and ahead of the technology sector. These top three sectors will continue to be targeted due to their willingness to pay, the sensitivity of the manufacturing process to disruption, their relative immaturity of controls, and the potential supply chain security impact to downstream customers, networks, and data. And in response to this elevated threat, manufacturing companies can expect much greater scrutiny from government regulators, insurance underwriters, and their customers.

Where is the manufacturing industry particularly vulnerable in terms of cybersecurity threats?

Mason: I often hear from small to medium enterprises that they think they are off the radar of cyber criminals, that “there are bigger fish to fry.” But bait fish are used to catch trophy fish and enough bait fish can certainly make a meal. If your business is making money, has valuable data, or can be a steppingstone to a target that has more money and valuable data, then you are officially in-scope.

What are best practices for getting started with cybersecurity?

Mason: There are great (free) resources out there from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS/CISA) such as stopransomware.gov; the Cyber Readiness Institute’s program; and AMT’s member guidance on adopting the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) is sound advice.

One best practice for getting started involves performing a cybersecurity maturity assessment using a trusted framework such as the NIST CSF. With a maturity assessment, a profile, and a plan (MAPP), you can start to answer fundamental cybersecurity questions: Where am I? Where am I going? Do I have the resources I need to get there? Is there a better or faster path? Are we there yet? A more targeted and lighter-weight approach would be a free ransomware readiness assessment to focus more exclusively on the controls that are related to ransomware.

Before you begin building out a cybersecurity program, I also recommend performing a tabletop exercise with key stakeholders. For example, it is possible that you already have a cybersecurity insurance policy — one that entitles you to certain incident response services and expenses, possibly even ransom payments. You will want to pressure test those processes with your insurance company, your legal counsel, IT, senior management, and law enforcement outreach services. If you are going to have ethical and legal debates on paying ransoms, determine what your maximum acceptable downtime is, how to communicate effectively with customers and authorities, or test whether your backups can actually be restored — do that before an incident, not during one.

For senior management, I’d advocate remembering PEMDAS (patching, encryption, monitoring, disaster response/recovery, asset inventory, and strong identity) to facilitate a deeper conversation on cyber security with your team. To better prepare your business for what’s ahead, register to attend AMT’s 2021 MFG Meeting and MTForecast Conference, Nov. 2-5, 2021, in Denver, Colorado. At this unique event, tailored to the manufacturing technology industry, you’ll hear more insight on cybersecurity and gain a deeper understanding of economic, market, and technology trends to help you build a robust business strategy.

PicturePicture
Author
Benjamin Moses
Senior Director, Technology
Recent technology News
Gaming PCs offer top-tier hardware, customization, and maximized performance for far less money than a comparable prebuilt workstation. Dubbed the "Digital Twingine," AMT's new rig will tackle digital twin modeling, CAD/CAM, and the Nvidia Omniverse.
Confused by CMMC 2.0? This guide makes sense of the rules, shows how it impacts your shop floor, and helps you turn cybersecurity compliance into a competitive edge in the DoD supply chain.
Change is happening faster than ever. With it comes opportunities – as well as potentially insurmountable challenges to the status quo.
OpenUSD and USD refer to the same core technology, with OpenUSD emphasizing the framework's open-source nature.
Apple, like Thomas Edison, has essentially created a business model in which they take the ideas of others (like almost every iteration of the light bulb), take credit, and get away with it.
Similar News
undefined
Intelligence
By Kristin Bartschi | Sep 17, 2025

The Federal Reserve cut the federal funds rate for the first time this year to a target range of 4% to 4.25%. Additionally, GDP growth projections increased to 1.6%, while unemployment and inflation expectations remained at 4.5% and 3%, respectively.

5 min
undefined
Advocacy
By Amber Thomas | Sep 09, 2025

The Commerce Department added 407 product categories of steel and aluminum derivatives to items subject to 50% tariffs. Even if your finished machining center’s normal duty rate is modest, Section 232 will add 50% on the metal content.

6 min
undefined
Technology
By Bonnie Gurney | Sep 15, 2025

The foundations for a stronger business climate, the latest advances in manufacturing technology, and the accelerated growth of industrial AI, automation, additive, software, and digital technologies are converging to build excitement for IMTS 2026.

7 min