Cybersecurity

How energy and manufacturing can stay ahead of cyber threats and protect their tech

Energy and manufacturing firms face rising OT cyber threats.

Energy and manufacturing firms face rising OT cyber threats. Image: REUTERS/Priyanshu Singh

Leo Simonovich
Vice-President; Global Head, Industrial Cyber and Digital Security, Siemens Energy
Filipe Beato
Manager, Cyber Resilience, Centre for Cybersecurity, World Economic Forum
This article is part of: Annual Meeting of the New Champions
  • Operational technology (OT) environments in the energy and manufacturing sectors are often outdated, poorly segmented and generally perceived as insecure.
  • Limited internal resources and scarce cybersecurity expertise mean companies are increasingly relying on outsourcing to strengthen OT security.
  • The rapid adoption of artificial intelligence is not only increasing energy demand but also intensifying cybersecurity risks.

Cybersecurity has become a critical capability for the energy and manufacturing sectors, especially as rising cyber threats coincide with a surge in energy demand driven by artificial intelligence (AI).

These industries are racing to secure their operational technology (OT) environments – the hardware and software systems that control physical equipment and industrial processes – which are often outdated, resource-constrained and increasingly targeted by sophisticated attackers.

To meet these challenges, many businesses are turning to technology and outsourcing to help bolster OT security with limited resources.

However, cybersecurity requires constant change amid a constant tug-of-war: attackers innovate and defenders respond with new controls, patches (vulnerability or bug fixes) and technologies to gain or maintain the upper hand.

The rapid evolution of technologies such as AI adds another layer of complexity by providing both sides of the cyber battle with new tools while requiring new investments in digital infrastructure, including the energy systems that power data centres.

In this dynamic landscape, understanding how peers across the energy and manufacturing sectors are approaching OT security in practice can help leaders make more informed, risk-aware decisions about where to invest next.

With digital systems integrated into OT workflows, companies that fail to secure their OT environments risk disruption.

A new report from Siemens Energy and the Ponemon Institute surveys the focus of these industries on OT. For oil and gas, water and electrical utilities, petrochemicals, and manufacturing, cyber threats are frequent, vulnerabilities are common and cyber expertise is scarce.

The self-assessment of OT cybersecurity practitioners reveals that these drivers are driving investment toward technology-based solutions and OT security outsourcing.

Operational Technology is vulnerable

OT cyber defences are vulnerable and businesses know it. The survey revealed:

  • 77% of companies reported a successful cyberattack compromised confidential data or caused disruptions to OT in the previous 12 months.
  • 62% of successful attacks took more than one month to discover and the average recovery time was seven months.
  • 24% of detected attacks required halts to OT workflows.
  • 50% of companies rated their own defences poorly and could prevent little more than accidental or unintentional misuse.
  • Majorities reported that their OT networks were not properly segmented and used devices or software with known vulnerabilities.
  • 52% stated that they believed their companies were likely or very likely to suffer a successful attack on OT in the upcoming year.
  • 46% said a successful attack is likely or very likely to cause a plant shutdown.

The apparent vulnerability matters because it puts at risk the economic advantages of ongoing digitization in energy and manufacturing.

With digital systems integrated into OT workflows, companies that fail to secure their OT environments risk disruption.

Have you read?

Threats to OT may be underestimated

The confidential survey implies that the scale of cyber threats significantly exceeds official data.

Cyber incidents reported to regulators comprise only the set of incidents that are both detected and reported to the government, either voluntarily or as a requirement.

Two big categories are missing in the numbers: attacks that successfully evade detection and attacks so unsuccessful they are blocked or fail before meeting thresholds that would merit or require reporting to officials.

When asked, businesses estimated that 41% of all attacks in the OT environment go undetected. Out of the detected attacks, just 16% required reports to regulators.

Together, these data points and a little algebra imply that the actual number of cyberattacks is about 10 times higher than what is being reported to regulators.

Maturing cybersecurity would ideally shift these numbers – more attacks would be detected and prevented before meeting thresholds requiring reports to regulators or the public.

As power-hungry AI drives fresh investment in new infrastructure, technology solutions and managed services offer a promising path to deploy and sustain effective defences in ever-changing OT environments.

Companies are investing in innovation

Companies are turning to technology innovation as the answer to rising global threats. The ongoing tension between OT scarcity and cybersecurity expertise, combined with the continuous effort required to deploy and maintain mature OT security, drives this investment.

OT cybersecurity requires continuous effort. Cyber threats continue to evolve, assets in need of protection change over time and regulatory requirements have tightened in many markets.

Relatively small teams require solutions that enable the deployment and maintenance of OT security capabilities capable of detecting and deterring persistent threats backed by nation-states.

These drivers produce a clear industry consensus about the top priorities for investment. When asked to select the most important technologies for OT cybersecurity, more than a third of all responses converged on the same four innovations:

  • Patch or vulnerability monitoring.
  • Managed anti-virus.
  • Backup and restore solutions (on-premises and cloud-based).
  • Managed detection services.

Each of these is a technology solution that automates, streamlines or outsources recurring tasks that require cybersecurity and OT expertise.

The survey shows that, in relation to OT security solutions, 45% of companies are already outsourcing, while another 26 percent are considering it as an option. Further, 52% of companies plan to invest in one or more technologies within 12 months, while 27% are already using relevant technologies.

Overall, the survey reveals an industry that is vulnerable to cyber threats yet is striving to mature its cybersecurity.

As power-hungry AI drives fresh investment in new infrastructure, technology solutions and managed services offer a promising path to deploy and sustain effective defences in ever-changing OT environments.

Loading...
Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Stay up to date:

Cybersecurity

Related topics:
CybersecurityManufacturing and Value ChainsEnergy Transition
Share:
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
World Economic Forum logo

Forum Stories newsletter

Bringing you weekly curated insights and analysis on the global issues that matter.

Subscribe today

Why every company now needs a Chief Geopolitical Officer

William Dixon

July 16, 2025

Why humans are the weakest link, and other cybersecurity news

About us

Engage with us

  • Sign in
  • Partner with us
  • Become a member
  • Sign up for our press releases
  • Subscribe to our newsletters
  • Contact us

Quick links

Language editions

Privacy Policy & Terms of Service

Sitemap

© 2025 World Economic Forum