Enhancing Cyber Resilience Strategies in Global Manufacturing with the FAIR Methodology Client Snapshot Profile This client is a global manufacturer of diverse industrial and automotive parts. Client Situation A holistic security governance and compliance program, inclusive of data privacy, was needed to define and advance the client’s cybersecurity posture. Uncertainty as to which threats posed the most risk and which assets to prioritise made this a challenge, which was even more pronounced in the Operational Technology (OT) space. Work Performed To begin prioritising cybersecurity gaps in the OT environment, Protiviti conducted 30+ triage risk and 20 total quantitative assessments on business-critical assets using insights from on-the-ground manufacturing site visits. Protiviti established risk scenarios, led a quantitative risk assessment pilot, and performed five future state control implementation analyses to prioritise allocation of limited cybersecurity funding. Outcome/Benefits With a FAIR program in place, the client now has a comprehensive understanding of its risk landscape, including critical assets and dependencies, a thorough list of potential cyber threats, and improved understanding of risk tolerance, which support using cybersecurity budget to address the most critical risk areas first. We also helped prioritise which product lines and components at each location would reduce risk today, and which could be deferred to effectively distribute upfront investment. With the evolution of publicly reported ransomware events and the significant losses incurred by manufacturing organisations that are unable to operate for days, or even weeks at a time, many manufacturing organisations have renewed interest in how resilient their continuing operations are in the face of cybersecurity threats. In the last year, organisations have faced several hundred million dollar reported losses and resulting supply chain issues have received growing publicity from single ransomware events. This provides a clear business case for investing in cybersecurity controls, but in operational technology (OT) environments it can be difficult to understand where funding would be most impactful.This global organisation, which manufactures highly specialised technologies for the automotive industry, recognised it lacked a clear understanding of its most critical enterprise-level risks across multiple areas, including which threats posed the most risk to the company’s OT environments. As a result, this lack of visibility and disparate OT security practices caused challenges for the organisation’s decision-making and funding decisions. A Factor Analysis of Information Risk (FAIR) quantification program was the best solution to effectively prioritise potential cybersecurity investments, but the company had limited risk quantification expertise. Protiviti brought a holistic approach to the organisation’s cybersecurity compliance challenges and developed a FAIR program to complement a broader approach to address product security, data privacy, and manufacturing technology risk across a single cybersecurity roadmap.Starting with a FAIR analysisThe client initially selected Protiviti to perform a FAIR analysis at two of its international manufacturing locations. This involved:Establishing a high-level risk register to quickly assess risks across these locations, establishing a common language and process for OT risk management.Developing a comparative analysis to effectively triage risk scenarios based on level of criticality to identify top risk scenarios for additional analysis.Identifying and assessing the most critical organisational risks and identifying the business impact in financial terms.Developing risk clarity reporting to identify and optimise risk treatment opportunities.Ten cyber risk scenarios were quantified using the FAIR methodology to model the potential annualised loss exposure (ALE) should a scenario materialise. Additionally, the team identified 18 actionable observations, each prioritised quantitatively, to strengthen OT security controls, including:Site governance: Core IT support processes and activities were handled in an ad-hoc and unstructured manner resulting in a lack of clearly defined roles and responsibilities for core security and privacy functions including asset and configuration management, patch and vulnerability management, and disaster recovery.Production device inventories: Asset and component inventories were not consistently maintained and were updated on an inconsistent or ad hoc basis.Production device configuration management: Production devices were not always consistently configured and maintained using industry-leading practices. For example, the team could externally access the Internet via production line devices.Production device patch management and hardening: There was no formalised, comprehensive patch and vulnerability management program supporting manufacturing site technology. Devices were patched manually and often fell out of security compliance.Access to production systems: A lack of secure user accounts and access management within both manufacturing sites, including a lack of user access reviews, consistent provisioning and deprovisioning processes, and the sharing of accounts between users.These observations were analysed in aggregate but were also looked at specific to individual product lines or locations. Rather than target a single risk with an organisation-wide program, this allowed the client to better invest cybersecurity resources in the areas where they would make the most difference. Ten cyber risks were analysed using FAIR to model the potential annualised loss exposure of realistic OT cyber threats. Analysing risk scenariosCombining site-level data gathered through onsite visits with the quantitative analysis using the FAIR methodology, the team identified and scoped risk scenarios that reflected the client’s risk landscape and controls. The most likely risk scenarios for this client included:Ransomware: Ransomware accounted for four of the top five overall scenarios. Factors impacting the overall ranking of these scenarios include the historical frequency of similar events within the client’s environment, vulnerability of the systems supporting each product line (i.e., OS or software version), revenue derived from each product line, headcount supporting each product line and average wage of those supporting the line, response efforts required to remediate the incident, and potential chargebacks or canceled purchase orders with regards to lack of availability.Denial-of-service: Factors impacting the overall ranking of these scenarios included the historical frequency of similar events within the company’s environment, production line network dependency, and the current network architecture of each manufacturing site in scope.Environmental outage: Environmental scenarios are often “long tail” risks, as they are extremely unlikely to materialise, but the potential magnitude could be substantial.Forms of loss, including primary productivity, secondary fines and judgments, primary response, and primary replacement values.For each set of risk scenarios, site level threat and asset data were analysed to quantify and prioritise risks and direct cyber controls investments to the most critical risk areas.Ready to tackle risks head-onDue to our comprehensive risk analysis, the client repositioned its risk management strategy globally. Throughout the scope of this three-month project, we:Established comprehensive risk landscape clarity for the client, including a detailed asset library, thorough list of potential threats, and related outcomes.Effectively used the results of risk assessments to support the client’s drive to establish an overall risk management program.Evaluated recommendations for operational technology security improvements and prioritised each based on the expected future state risk reduction.Operationalised the FAIR program for the client so that the program is now self-sufficient and repeatable. Impact by the Numbers: 30+Triage risk assessments completed 20Quantitative risk assessments completed 5Future state controlimplementation analysis completed Topics Cybersecurity and Privacy Risk Management and Regulatory Compliance Industries Manufacturing and Distribution We recommend these resources Pro Document Consent Cybersecurity Consulting Our strategic and technical subject matter experts fully understand your cybersecurity needs. We set out to assess, develop, implement, and manage end-to-end next-generation solutions tailored to your specific needs. We share your commitment to protecting your data and optimising your business and cyber resiliency. Pro Briefcase Cyber Risk Quantification Cyber risk quantification builds upon the qualitative nature of cyber risk assessments and models risk in business terms, which ultimately leads to more informed decision making. Pro Building office FAIR Institute The FAIR Institute is a non-profit organisation dedicated to advancing the discipline of measuring and managing information risk. Its Factor Analysis of Information Risk (FAIR) has emerged as the international standard model for understanding, analysing, and quantifying information risk in financial terms.