Michael Borgers
67642ba8f7203d316ca2e33e Dreamstime M 79501604

Crystal Ball 2025: Now’s the time to strengthen your company’s cybersecurity compliance

Dec. 20, 2024
CMMC for defense contractors, TISAX for automotive suppliers, and other rules and standards make the new year all about reinforcing network defenses among IT and OT personnel.

A note from Scott Achelpohl, managing editor, Smart Industry:

Welcome to the Crystal Ball Report for 2025, which will appear in this web space the rest of December and into January as a series of contributed pieces from esteemed experts in manufacturing technology.

We've invited these thought leaders to look into their "crystal balls" and tell us what's ahead (with an emphasis on data, AI, and cybersecuritywhich will be a particular focus of Smart Industry's in the new year).

So please enjoy the series and, from all of us at SI, have a happy and safe holiday season.


 

Delaying compliance may leave contractors struggling to keep up as CMMC requirements become non-negotiable. Given the time-intensive nature of CMMC preparation—up to 28 months for some—early action can be a decisive advantage.

See also: Why communication is as vital as technical skills for manufacturing cybersecurity teams

Contractors without certification won’t qualify for new contracts or contract renewals, and misrepresentation can trigger severe penalties under the False Claims Act. The fines are significant and may include the loss of current and future contracts. Notably, whistleblowers can receive a percentage of the penalties and damages, making this a critical area for honest reporting.

Automotive sector: TISAX sets the standard

By 2025, the Trusted Information Security Assessment Exchange (TISAX) will continue to solidify its position as the cybersecurity standard for automotive cybersecurity with more suppliers requiring mandatory third-party audits. Since 2017, TISAX has been the go-to cybersecurity standard across the automotive supply chain. TISAX has set specific security requirements for suppliers, and the ENX Association oversees verifying certifications.

See also: Automakers use AI to manage their supply chain ecosystem

For new suppliers looking to work with automakers, meeting TISAX standards is often expected from day one. A security gap anywhere in the supply chain could put entire networks at risk.

Many new suppliers start with a risk assessment to pinpoint any security gaps, then work with third-party experts familiar with TISAX to help close those gaps and make the certification process smoother. TISAX certification lets automotive suppliers show they meet high-security standards, which strengthens their credibility.

Cyber insurance: Requirements are rising

In 2025, manufacturers will likely see even tighter requirements as insurers demand stronger evidence of security measures. Companies without these protections may find premiums going up, and in some cases, coverage even being denied.

Recovering from a data breach is costly, so insurers are looking for companies to put protections in place that help keep risks low. This shift is leading more manufacturers to establish formal security controls to help them qualify for cyber insurance and boost their overall security.

See also: Optimizing your OT/IT cybersecurity strategy for an Industry 4.0 world

Not too long ago, cyber insurance requirements were simple. But now, insurers want to see companies using better controls like multifactor authentication, advanced endpoint protection, and a robust incident response plan. We foresee insurers continuing to raise requirements for security measures.

Without these practices in place, businesses will find it harder to get insurance coverage or will struggle to afford comprehensive coverage. This trend toward documented technical protections, policies, and plans is set to continue, as insurers seek assurance of comprehensive, formalized security measures.

Moving from self-certification to third-party verification

In 2025, more industries will insist on independent verification, leaving self-certifications behind. In the past, companies could simply say they were compliant, but this approach would often miss critical gaps. Now, more industries want companies to get independent verification to make sure their cybersecurity practices hold up.

More manufacturers will find that third-party verification not only supports compliance but also signals credibility, an increasingly valuable asset as clients and partners prioritize verified security.

See also: Crucial role of cybersecurity protection for PLCs

For manufacturers, this level of assurance has become more important as clients start to rely on verified security practices over self-reported ones. For many manufacturers, third-party assessments will become not only a compliance measure but also a competitive advantage in attracting new business.

New compliance standards in contracts

In the coming year, manufacturers can expect a rise in client-specific security standards within service contracts, making compliance a core requirement. This trend means manufacturers are often required to meet a range of client-specific security standards.

See also: How to choose security for your OT operations

For companies that haven’t yet formalized a compliance program, these contract requirements are often the push they need to get one in place. Compliance will become a make-or-break requirement in manufacturing contracts.

While firewalls, multifactor authentication, and endpoint protection are all critical, real compliance requires more than just technology and spans the entire operation.

It takes a companywide approach, beginning with leadership buy-in, where employees understand security, policies are kept up-to-date, and regular audits are conducted to catch any weak points. We anticipate that formal governance, risk, and compliance (GRC) programs will become common, especially among small and midsize manufacturers, who will need these strategies to meet contract standards.

See also: Cybersecurity report shows threats to OT skyrocketing

While there is investment involved in improving and maintaining security controls, this will net more in preventing or otherwise reducing the impact of an attack.

By embracing GRC programs and adapting to these new contractual standards, manufacturers can turn compliance from a cost into a strategic investment, positioning themselves as preferred partners in a security-conscious industry.

By preparing for these changes, manufacturers can use 2025 not just to meet compliance standards but to stand out as leaders in resilience, trust, and cybersecurity.

About the Author

Joe Anderson

Joe Anderson is senior cybersecurity analyst at Blue Ash, Ohio-based TechSolve, which is part of Ohio Manufacturing Extension Partnership and the MEP National Network. Anderson helps small manufacturers identify security risks and meet compliance objectives and holds cybersecurity certifications such as CISSP, PNPT, CompTIA Security+, C|EH, ECSA, CMMC-RP, and Microsoft Certified Systems Engineer: Security. He has served in several roles in risk identification and management, incident response, cybersecurity consulting, and compliance.