Food Engineering logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Food Engineering logo
  • NEWS
    • Latest Headlines
    • Manufacturing News
    • People & Industry News
    • Plant Openings
    • Recalls
    • Regulatory Watch
    • Supplier News
  • PRODUCTS
    • New Plant Products
    • New Retail Products
  • TOPICS
    • Alternative Protein
    • Automation
    • Cannabis
    • Cleaning | Sanitation
    • Fabulous Food Plants
    • Food Safety
    • Maintenance Strategies
    • OEE
    • Packaging
    • Sustainability
    • More
  • EXCLUSIVES
    • Plant Construction Survey
    • Plant of the Year
    • Sustainable Plant of the Year
    • State of Food Manufacturing
    • Top 100 Food & Beverage Companies
  • MEDIA
    • Podcasts
    • Videos
    • Webinars
    • White Papers
  • FOOD MASTER
  • EVENTS
    • Food Automation & Manufacturing Symposium and Expo
    • Industry Events
  • RESOURCES
    • Newsletter
    • Custom Content & Marketing Services
    • FE Store
    • Government Links
    • Industry Associations
    • Market Research
    • Classified Ads
  • EMAGAZINE
    • eMagazine
    • Archive Issue
    • Advertise
  • SIGN UP!
Automation

How to Communicate OT Cybersecurity Risk and Investment to Food and Beverage Leadership

Executives and boards are slow to adopt new OT cybersecurity tools, and the issue is complex for non-security plant professionals. To solve this issue, security leaders need to explain the risks and impacts for increased investment.

By Grant Gerke
Digital lock on data
Photo courtesy: Getty Images / MF3d
August 12, 2025

In the second half of 2024, there was a 202% increase in overall phishing messages compared to 2023, according to SlashNext’s 2024 Phishing Intelligence Report. Why is this important for food manufacturers? Many companies’ OT devices are connected to corporate IT networks, and attackers can gain access to the plant floor via these increased phishing attacks.

FOOD ENGINEERING also revealed that inadequate authorization was another top threat for food manufacturers, via Infosec’s OT Top Security Threat for 2024 report. The report says the threat is “inadequate authentication and authorization, inadequate or nonexistent authentication and authorization control measures that can allow unauthorized individuals to gain access to OT systems.”

Cybersecurity threats are coming from many angles, and many food manufacturers are still using legacy security approaches. This article will discuss how more investments can be made for OT network security and how to convince boards to provide more support and investment.

Communicating Risk and Impacts to the Board

Food manufacturers’ OT networks are vulnerable in 2025, but many manufacturing boards and executives have been told corporate enterprise networks are secure. However, enterprise IT networks are not OT networks. For boards, the right risk profile for OT networks needs to be established and identified.

So is this happening?

Automation

Explore More Automation

In a recent FOOD ENGINEERING webinar on cybersecurity, Patrick O’Brien, assistant director of engineering at exida, polled attendees and found that only 33% have had an OT cybersecurity risk assessment and 11% have OT-focused policy and procedures. At the same time, IT-focused cybersecurity risk assessments came in at 55%.

“This means some companies are doing IT risk assessments but not employing OT risk assessments,” O’Brien says. OT network cybersecurity investment is moving slowly due to many issues, such as a lack of precise requirements from chief information systems officers (CISOs) or leadership by executive management.

Another challenge is identifying risk as it relates to production, volume and uptime. “The key to getting buy-in from CFOs and CEOs for OT security projects is highly dependent on the CISO’s ability to translate the real cybersecurity risks to operational risks that the board already has identified,” says Grant Geyer, chief strategy officer at Claroty. Claroty is a supplier of cyber-physical systems protection and asset visibility services.

CISOs and security leaders need to speak the board’s language and avoid discussing the numerous cyber vulnerabilities that can happen. The focus should be on overall risk against key performance indicators (KPIs), benchmarks and business metrics.

“The more that a CISO can demonstrate an appreciation of the broader context and speak the language that the audit committee cares about, the stronger the chance that an OT security initiative will speak the love language of CEOs and CFOs and will resonate,” Geyer adds.

“At a board level, we need to have a very simple conversation about what risks do we want to accept and the ones we want to mitigate,” notes Robert M. Lee, founder and CEO at Dragos, Inc., during a recent webinar on OT cybersecurity investments.

During the webinar, Lee discusses how CISOs can paint a broad brush when it comes to security technology requirements, which can lead to confusion for board members. Lee says what can emerge is a “piecemeal strategy or a peanut butter spread of what capabilities, which can also lead to board-driven metrics or standards that don’t mean anything at the OT level.”

Boards are driven by their peers. “The reality of what a board is doing partly is benchmarking its peers, totally appropriate, and scenario planning,” Lee says.

In a 2024 FOOD ENGINEERING article, Alexandre Peixoto, cybersecurity business director at Emerson, talked about recent OT investments in food and beverage, and specifically, investing in Managed Detection and Response (MDR) technology. Peixoto divides customers into two camps when it comes to cybersecurity approaches: cyber-for-protection and cyber-for-convenience.

Cyber-for-protection includes traditional defense-in-depth approaches between IT and OT networks. “For these customers, the most important consideration for cybersecurity is to defend their control systems against a potential cyberattack, which could lead to an OT process upset,” Peixoto says.

According to Peixoto, cyber-for-convenience customers are employing defense-in-depth strategies but also trying new technologies such as MDR in OT environments and are open to zero-trust security framework strategies.

At the board level, Lee believes new security investments can be won with the proper framing. “Boards want to hear about capabilities that can be delivered and how we are trying to reduce risk with operations,” Lee says.

The risk at the OT level is many low-level connected devices, such as fieldbuses, programmable logic controllers (PLCs) and industrial networking equipment. Adding security patches at the OT level helps when identified and MDR tools can help in this area.

According to Dragos’ 2025 OT/ICS Cybersecurity Report, interest in identifying attacks against low-level equipment and networking keeps increasing among manufacturers. The report suggests that most fieldbuses are insecure by design and can include these networking protocols: Modbus/TCP, CODESYS and CIP.

The report says these layered networking protocols pose a substantial risk and there is a general lack of detection mechanisms for attacks in this area. The report describes the layered networking risk as “turducken” protocols, and the company plans to address this issue by offering greater visibility for detecting attacks and identifying potential misconfigurations.

The report cites that “to protect fieldbus equipment, the Industrial Control System (ICS) community awareness must change. A common assumption is that field devices, and especially instruments and actuators, are insecure-by-design. What is not well-considered by owners is the accessibility of this equipment.”

As systems become more connected in the food and beverage segment, these risks will keep growing. Security leaders need to be clear with board members about risk and the impact on operations and production.

“As OT assets tend to be unpatched and even obsolescent, the new imperative is to remove entire classes of risk through securing user-to-machine, machine-to-machine, and cloud-to-machine communications,” Geyer says. “Security and risk leaders need to adjust to this new imperative to enable the business to execute on their Industry 4.0 ambitions responsibly.”

KEYWORDS: cybersecurity investments operational technology OT

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Grant gerke

Grant Gerke is a digital manufacturing contributing writer in the food, beverage and packaging industries, with more than 15 years of experience writing about system software, ingredient trends, packaging material and equipment developments, automation technology and workforce trends. Other work includes coverage of electrification in multiple industries.  

Recommended Content

JOIN TODAY
to unlock your recommendations.

Already have an account? Sign In

  • 2025 Top 100 Food and Beverage Companies

    FOOD ENGINEERING’s 2025 Top 100 Food and Beverage Companies

    While sales were largely down under dynamic economic and...
    Top 100 Food & Beverage Companies
    By: Alyse Thompson-Richards
  • Bottling machine

    How Optical and X-Ray Inspection Supports Bottling Safety and Quality

    By transitioning from legacy single-technology systems to...
    Food Safety
    By: Dan McKee
  • Bread baking in oven

    The State of Food Manufacturing in 2025

    Food and beverage manufacturers are investing in...
    State of Food Manufacturing
    By: Alyse Thompson-Richards
Manage My Account
  • eMagazine
  • Newsletter
  • Online Registration
  • Manage My Preferences
  • Customer Service

More Videos

Popular Stories

The Campbell's Company logo

Campbell’s Terminates Exec Over Alleged Disparaging Comments

Frito-Lay logo

PepsiCo to Close Two Florida Facilities

alternative protein products

Alternative Protein in 2025: Key Trends and Technologies

State of Maufacturing 2025

Events

June 17, 2025

Refrigerated & Frozen Foods’ State of the Cold Chain

On Demand Kelley Rodriguez, Editor in Chief of Refrigerated & Frozen Foods, will be joined in this 60-minute webinar by industry experts to help unpack the latest research.

July 23, 2025

Decarbonizing Process Heat: What You Should Know and Next Steps

On Demand Driven by climate goals, business risk, client interest, and resilience considerations, food and beverage companies are increasingly turning their attention to decarbonizing their production processes.

View All Submit An Event

Products

Recent Advances in Ready-to-Eat Food Technology

Recent Advances in Ready-to-Eat Food Technology

See More Products

CHECK OUT OUR NEW ESSENTIAL TOPICS

Alternative ProteinAutomationCleaning/SanitationFabulous Food Plants

Food SafetyMaintenance StrategiesOEE

PackagingSustainability

Related Articles

  • Cybersecurity

    Cyber Insurance Drives Increased Security

    See More
  • Food manufacturing data

    Digital KPIs Emerge but Are Brands Finding Accurate Data?

    See More
  • Don't let ransomware shut you down!

    Industrial control systems risk shutdowns and other dangerous outcomes due to cybersecurity attacks

    See More

Related Products

See More Products
  • food crime.jpg

    Food Crime: An Introduction to Deviance in the Food Industry

  • GlobalData_logo_blue_header.png

    USA: Food & Grocery - Market Shares, Summary & Forecasts to 2023

  • download.jpg

    Recent Advances in Ready-to-Eat Food Technology

See More Products
×

Elevate your expertise in food engineering with unparalleled insights and connections.

Get the latest industry updates tailored your way.

JOIN TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Food Master
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing