Industrial Cyber Security: Cyber security in manufacturing

Productivity rises when machines and systems go digital and get connected. So does the likelihood of cyber attacks. No wonder, then, that new products have to satisfy ever more stringent cyber security requirements. Long-term business success hinges on companies’ ability to guard against cyber threats. This is not just about complying with new regulations such as the EU Cyber Resilience Act (CRA), EU NIS 2 and the Delegated Act of the Radio Equipment Directive (RED); it is also about protecting the resilience of your and your customers’ networks. Let us accompany you on this journey. Opt for a pragmatic solution that suits your needs and is tailored to match your risks.

Challenges

EU regulations in detail

Our services

Illustration showing cyber security risks for manufacturers and operators as well as requirements of the new regulations CRA, NIS2 and RED.

Connected systems – a challenge for cyber security in Industry 4.0

Espionage, sabotage, extortion, and even physical damage – cyber crime comes in many guises. Attacks can shut down entire production lines or render digital products unusable on a wide scale – with serious financial consequences and reputational damage. Many companies have recognized these risks, but believe themselves in a false sense of security, as the cyber security experts at the Aachen-based Fraunhofer Institute for Production Technology IPT show.

The EU updated its regulations and issued new directives to keep the mounting threat at bay and minimize risk. Three directives are particularly relevant for operators and manufacturers in the industrial sector: NIS 2 is to be transposed into national law as early as October of 2024. The Radio Equipment Directive (RED) is already in force. However, the RED Delegated Act has adopted new requirements that will become mandatory from August 2025. The Cyber Resilience Act (CRA) passed in October 2024 will become binding from 2027.

The infographic on the EU Cyber Resilience Act, NIS 2 and RED shows who is affected, for which products and sectors the directives are relevant and what penalties may be imposed.

EU regulations CRA and NIS 2 in detail

Designing and integrating CRA-compliant cyber security systems

NIS 2 – cyber security for hardened IT/OT operations

RED: Cyber security for connected radio devices

Do you have a specific idea or project in mind?

Then be sure to get in touch. We will be happy to put our expertise in cyber security for production and Industry 4.0 to work for you.

Our cyber security services for your production – set up to tackle challenges in an efficient, pragmatic way

We consider your individual requirements, technical constraints and legacy processes – from cyber security strategy consulting, process and methodology consulting to cyber security risk assessment, concepts, software development and testing. Of course, we always take current regulations such as UNECE r155/156, EU CRA, NIS2, RED, ISO/SAE 21434, IEC 62443, TS 50701 into account.

Infographic showing ITK Engineering's consulting services in cyber security: from strategy consulting to process & methodology consulting.

Infographic about ITK Engineering's services in the field of cyber security engineering: from risk assessment to concept consulting, software development and testing.

Benefits

Icon Industry 4.0

Cross-industry expertise

Icon technical employee in front of his laptop

Comprehensive ICE 62443-compliant security

Icon algorithm

Foundation for your digitalized manufacturing

Unsolved challenges? We look forward to your inquiry.

Portrait Sebastian Schrimpf, ITK Engineering

Industry – Industrial Solutions

Sebastian Schrimpf

You might be also interested in this