HomeAutomotive

Mitigating security risks in the automotive industrial Internet of Things


Almost 90 percent of automotive companies implement IIoT in plants and assembly lines without fully evaluating risks or preparing responses.¹

Download the full reportDownload infographic #1Download infographic #2

Security for connected and autonomous vehicles gets all the attention. But companies need to focus on fundamentals – the industrial systems used for manufacturing automobiles and their increasingly high-tech components. As manufacturing equipment and processes become more intelligent and automated through the implementation of IIoT technologies, these companies run the risk of cyberattacks.

While IIoT implementations can vastly improve operational efficiencies, they also expose potential new attack surfaces and security targets if not properly protected. Virtually anything can become vulnerable to cyberattacks, from high-value assets or services, critical workloads in the cloud, process control systems in cyber-physical systems, to critical business and operational data.

Cyber incursions can be led by cyber hackers, competing companies, countries engaged in corporate espionage or even disgruntled employees. They can be damaging on multiple fronts, including:

• Exposure of sensitive/confidential/critical data

• Damage to an organization’s reputation and loss of public confidence

• Production disruptions resulting from sabotage

• Extensive equipment damage

• Violation of regulatory requirements

• Potential for environmental harm

• Injury or loss of life

Automotive companies need improved cybersecurity capabilities that are contextual, cognitive and adaptive, allowing them to continuously identify, mitigate and prevent risk.

Our research has identified a group of top performers who lead the way in securing their IIoT environments. While these top performers have a ways to go before truly protecting their environments, they do have a significantly better grasp of what’s needed than their peers.

We review three areas where top performers differentiate in securing their IIoT environments. This report also outlines nine essential cybersecurity practices that these top performers embrace.

¹ Based on an IBM Institute for Business Value (IBV) survey


How can IBM help you?

Securing smart devices on the plant floor

Build a smarter business with IBM Services


Bookmark this Report  



Download the study infographic


How does your IIoT cybersecurity capability maturity compare with the averages for your industry? Find out here.


Meet the Authors:

Giuseppe Serio

Connect with author:


, IBM Global Solution Leader for Cybersecurity,
Lisa-Giane Fisher

Connect with author:


, Benchmarking Leader, Middle East and Africa, IBM Institute for Business Value,
Ben Stanley

Connect with author:


, Automotive Research Lead, IBM Institute for Business Value

Related reports
Designing for privacy in connected cars requires participation of all entities that may process car data before vehicles are delivered.
Tokens are a versatile new form of value that can facilitate seamless transactions within a given usage domain such as commerce.
Automotive leaders must combine the creative skills of a startup with traditional strengths to innovate and scale.
As 2025 approaches, consumers are more involved, vehicles are more intelligent and other industries are joining the ecosystem.