{"id":54337,"date":"2025-06-30T15:46:52","date_gmt":"2025-06-30T14:46:52","guid":{"rendered":"https:\/\/manufacturing-today.com\/?p=54337"},"modified":"2025-07-01T16:30:19","modified_gmt":"2025-07-01T15:30:19","slug":"navigating-the-complexities-of-manufacturing-security-in-a-connected-world","status":"publish","type":"post","link":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/","title":{"rendered":"Navigating the complexities of manufacturing security in a connected world\u00a0"},"content":{"rendered":"<p><span data-contrast=\"auto\">Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology security threat landscape, driven in part by the sector\u2019s drive towards greater connectivity. This was a key message from a recent webinar hosted by Manufacturing Today, which brought together experts from the industry to dissect the growing security challenge and explore potential solutions.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The webinar featured insights from Kathy Olsen, Global Director of Information Security at Packsize International; Tammy Klattz, Chief Information Security Officer at Trinseo; and Jim Cooper, Director Technology and Cyber Security and Tyler Brown, Product Manager from Pavion, a global security partner and the webinar\u2019s sponsor.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-54339\" src=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg\" alt=\"digital representation of global communication and cybersecurity\" width=\"425\" height=\"300\" srcset=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg 425w, https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1-300x212.jpg 300w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/>The evolving threat landscape<\/strong><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">While essential for optimizing operations and enabling data-driven decision-making by bringing operational technology data into the enterprise, the industry\u2019s hunger for connectivity often involves integrating legacy systems never designed with modern security protocols in mind. These assets, built primarily for resilience, speed, and accuracy, often can\u2019t be easily patched or secured with standard IT controls. Operational technology includes the hardware and software that monitors and controls physical infrastructure, as well as the associated electronic components including video surveillance, access control, fire alarm, life safety, and business and critical communications infrastructure. This creates significant potential entry points for malicious actors.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In some instances &#8211; such as in chemical production &#8211; security breaches could have severe physical safety consequences, in addition to the potential for disruption and financial losses. External factors, like supply chain vulnerabilities and third-party risks, also represent significant threats. As one speaker noted, a manufacturer may not be the primary target, but rather a conduit for attacks on downstream consumers. The SolarWinds incident was cited as a pertinent example of such supply chain compromise.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Common vulnerabilities observed include the persistent use of default or weak passwords, hard-coded credentials, exposed APIs, and unmanaged firmware updates. Attackers, increasingly leveraging AI and advanced toolsets, view manufacturing sites as attractive targets due not necessarily to sensitive data, but for their critical operational nature. The primary objective is often a ransomware attack, as operational availability is paramount for production.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong>Bridging the communication gap\u00a0<\/strong><\/h3>\n<p><span data-contrast=\"auto\">Effectively communicating the need for security investments to both operational staff and senior leadership is a significant hurdle, webinar participants agreed. On the factory floor, the priority is production and system availability, leading to staff perception of security measures as a hindrance among staff. It is critical to explain the \u2018why\u2019 behind security requirements and acknowledge the importance of availability in this context.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Conversely, discussions with senior leadership and the board must be framed in terms of business risk. This involves detailing potential consequences, assessing likelihood, and using relatable industry examples of past incidents and their tangible impacts, including significant financial loss from outages and secondary damage to reputation and brand.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Regulations, while adding complexity, can also serve to underscore the necessity of security investments, particularly as reporting requirements increase. As one speaker advised, demonstrating understanding of the operational context and site specifics is vital for building trust and fostering a culture of reporting similar to existing safety protocols.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong>Strategies for detection, prevention, and response<\/strong><span data-ccp-props=\"{}\"> <img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-54340\" src=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-2.jpg\" alt=\"a central, glowing cloud icon\" width=\"425\" height=\"300\" srcset=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-2.jpg 425w, https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-2-300x212.jpg 300w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><\/span><\/h3>\n<p><span data-contrast=\"auto\">Addressing these threats requires a layered approach. Foundational IT controls like email gateways and VPNs remain important, particularly as devices may traverse between IT and OT environments. In the OT space, agentless solutions are necessary, often involving monitoring network traffic flows using taps to detect anomalous behavior, with AI playing an increasing role in this analysis. Network segmentation is critical to limit lateral movement within the network. Secure remote access protocols and rigorous vetting of third-party vendor devices are also essential safeguards. Fundamentally, limiting unnecessary internet access from OT environments is a key control.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Recognizing that breaches are increasingly likely necessitates a strong focus on detection, containment, and rapid recovery. Practicing response capabilities through tabletop exercises involving stakeholders and operational staff can help ensure plans are realistic and effective in a real-world scenario. Integrators, like Pavion can provide valuable assistance by conducting risk and security assessments to ensure your infrastructure is protected.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong>Addressing integration complexities<\/strong><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Implementing advanced security measures is complicated by the inherent challenges of integrating disparate systems. Different protocols and data formats require middleware or translators. Manufacturers may expose data in varied ways, requiring significant effort to achieve data normalization. Partnering with an industry leading integrator, like Pavion, can play a key role in navigating these complexities securely, requiring a \u2018cyber-forward\u2019 mindset to consider potential data manipulation risks. Beyond technical hurdles, human error, omissions, and failing to consider edge cases (\u2018layer eight problems\u2019) are frequent contributors to integration issues. Managing security controls across potentially thousands of devices adds significant logistical burden.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong>AI, automation, and physical security\u00a0<\/strong><\/h3>\n<p><span data-contrast=\"auto\">Given that attackers are leveraging AI and automation, defenders must do the same to keep pace with accelerating attack timelines. AI is particularly useful for detecting anomalies in network traffic. While automated response is promising, caution is warranted due to the potential for physical consequences if systems are abruptly impacted.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Physical security, though, remains the indispensable first line of defense. If an attacker gains physical access to critical infrastructure like the Distributed Control System (DCS) location or network closets, many network security controls can be bypassed. Maintaining robust physical access controls, encouraging a culture of vigilance (e.g., challenging unknown individuals), and performing lifecycle management on physical security devices (like access badges) are vital steps.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong>Practical recommendations for improvement<\/strong><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Practitioners seeking to enhance security should start by aligning initiatives with the broader business strategy, understanding both leadership priorities and operational realities. Identifying and protecting assets critical to core business processes is paramount. Fundamental security hygiene, such as network segmentation and securing remote access, must be prioritized.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Specific actionable advice included eliminating default credentials and hardening firmware and operating systems on devices. Conducting penetration tests using a reputable provider, was highlighted as a powerful method to demonstrate potential impacts and gain stakeholder attention.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Borrowing from lean principles, a continuous improvement approach was recommended: use assessments to establish a baseline, identify high-impact, low-effort improvements, implement them, and measure progress to demonstrate quick wins. Engaging with industry peers provides valuable shared insights.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, implementing standard deployment guidelines for vendors and system integrators working on manufacturing equipment can help embed security best practices incrementally, focusing on making small, consistent improvements rather than attempting disruptive, large-scale overhauls.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong>Partner content<\/strong><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Thank you to our sponsor, Pavion, who specializes in delivering comprehensive fire, physical security, monitoring, and integration solutions tailored specifically to high-performance manufacturing environments. It understands the complexity of securing mission-critical infrastructure while supporting speed to market, uptime, and operational resilience.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For over 50 years, Pavion has been at the forefront of fire, security, and integration solutions, helping data centers mitigate threats and ensure business continuity. It is located in 23 countries and 70 locations in the USA and its experience spans:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>AI-Driven Video Surveillance<\/strong>: Advanced analytics detect, deter, and respond to potential threats in real time<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>Advanced Access Control<\/strong>: Multi-layer authentication, biometric security, and compliance-driven access management<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>Fire &amp; Life Safety Systems<\/strong>: NFPA, UL, and ISO-compliant solutions that ensure uninterrupted operations<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>Advanced Proactive Video Monitoring<\/strong>: Continuously monitoring, proactively identifying and minimizing cyber security risks<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>Integration with IT &amp; Cybersecurity<\/strong>: Unified security solutions that bridge physical and digital threat management<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Read more about Pavion&#8217;s capabilities <a href=\"https:\/\/manufacturing-today.com\/news\/discover-pavions-integrated-systems-designed-to-fortify-and-unify-blending-fire-safety-and-security-with-critical-communications-and-intelligent-connectivity\/\">here<\/a><\/strong><\/p>\n<p><span data-contrast=\"auto\">Contact Pavion at <a href=\"mailto:inquiries@pavion\">inquiries@pavion<\/a>.com to schedule a site and risk assessment to keep you systems and facility safe and secure.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology security threat landscape, driven<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[685,2],"tags":[127,576,3730,3731,3732],"class_list":["post-54337","post","type-post","status-publish","format-standard","hentry","category-technology","category-features","tag-cyber-security","tag-technology","tag-3730","tag-webinar","tag-pavion"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Navigating the complexities of manufacturing security in a connected world\u00a0<\/title>\n<meta name=\"description\" content=\"Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the complexities of manufacturing security in a connected world\u00a0\" \/>\n<meta property=\"og:description\" content=\"Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Manufacturing Today\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-30T14:46:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-01T15:30:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg\" \/>\n<meta name=\"author\" content=\"Iain\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Iain\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/\"},\"author\":{\"name\":\"Iain\",\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632\"},\"headline\":\"Navigating the complexities of manufacturing security in a connected world\u00a0\",\"datePublished\":\"2025-06-30T14:46:52+00:00\",\"dateModified\":\"2025-07-01T15:30:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/\"},\"wordCount\":1235,\"image\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg\",\"keywords\":[\"Cyber security\",\"Technology\",\"237\",\"Webinar\",\"Pavion\"],\"articleSection\":[\"Technology\",\"Features\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/\",\"url\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/\",\"name\":\"Navigating the complexities of manufacturing security in a connected world\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/manufacturing-today.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg\",\"datePublished\":\"2025-06-30T14:46:52+00:00\",\"dateModified\":\"2025-07-01T15:30:19+00:00\",\"author\":{\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632\"},\"description\":\"Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology....\",\"breadcrumb\":{\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage\",\"url\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg\",\"contentUrl\":\"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg\",\"width\":425,\"height\":300,\"caption\":\"digital representation of global communication and cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/manufacturing-today.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the complexities of manufacturing security in a connected world\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/manufacturing-today.com\/#website\",\"url\":\"https:\/\/manufacturing-today.com\/\",\"name\":\"Manufacturing Today\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/manufacturing-today.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632\",\"name\":\"Iain\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/manufacturing-today.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g\",\"caption\":\"Iain\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating the complexities of manufacturing security in a connected world\u00a0","description":"Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/","og_locale":"en_GB","og_type":"article","og_title":"Navigating the complexities of manufacturing security in a connected world\u00a0","og_description":"Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology....","og_url":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/","og_site_name":"Manufacturing Today","article_published_time":"2025-06-30T14:46:52+00:00","article_modified_time":"2025-07-01T15:30:19+00:00","og_image":[{"url":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg","type":"","width":"","height":""}],"author":"Iain","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Iain","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#article","isPartOf":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/"},"author":{"name":"Iain","@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632"},"headline":"Navigating the complexities of manufacturing security in a connected world\u00a0","datePublished":"2025-06-30T14:46:52+00:00","dateModified":"2025-07-01T15:30:19+00:00","mainEntityOfPage":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/"},"wordCount":1235,"image":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg","keywords":["Cyber security","Technology","237","Webinar","Pavion"],"articleSection":["Technology","Features"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/","url":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/","name":"Navigating the complexities of manufacturing security in a connected world\u00a0","isPartOf":{"@id":"https:\/\/manufacturing-today.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage"},"image":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg","datePublished":"2025-06-30T14:46:52+00:00","dateModified":"2025-07-01T15:30:19+00:00","author":{"@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632"},"description":"Corporations in the manufacturing sector are grappling with a sophisticated and pervasive cyber and operational technology....","breadcrumb":{"@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#primaryimage","url":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg","contentUrl":"https:\/\/manufacturing-today.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Pavion-Webinar-237-Body-image-1.jpg","width":425,"height":300,"caption":"digital representation of global communication and cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/manufacturing-today.com\/news\/navigating-the-complexities-of-manufacturing-security-in-a-connected-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/manufacturing-today.com\/"},{"@type":"ListItem","position":2,"name":"Navigating the complexities of manufacturing security in a connected world\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/manufacturing-today.com\/#website","url":"https:\/\/manufacturing-today.com\/","name":"Manufacturing Today","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/manufacturing-today.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/d501df2825596e02dd4afdd3a921a632","name":"Iain","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/manufacturing-today.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4ddfd6f521e90a9e910545b62122a2e535cd13ea6e7c6e0edaf2080a3ee77b6?s=96&d=mm&r=g","caption":"Iain"}}]}},"_links":{"self":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts\/54337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/comments?post=54337"}],"version-history":[{"count":2,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts\/54337\/revisions"}],"predecessor-version":[{"id":54373,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/posts\/54337\/revisions\/54373"}],"wp:attachment":[{"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/media?parent=54337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/categories?post=54337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/manufacturing-today.com\/wp-json\/wp\/v2\/tags?post=54337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}