drj logo

"*" indicates required fields

Name*
Region*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
DRJ Fall 2025 Dallas Show
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2025
    • DRJ Spring 2025
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DEI
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

20 Percent of Companies Fail to Conduct Cybersecurity Audits

by Jon Seals | December 11, 2024 | | 0 comments

Building Cybersecurity Awareness: Empowering Workforces to Tackle Cyberattacks and Threats

DUESSELDORF – 40 percent of industrial companies in Germany provide regular cybersecurity education and training for their employees, while 27 percent include cybersecurity rules and procedures in their employee handbooks and company policies. “That may sound substantial, but it ultimately shows that a large part of the industry is still not doing enough to protect itself from hackers,” says Jan Wendenburg, CEO of the Duesseldorf-based cybersecurity specialist ONEKEY. This insight comes from the ‘OT+IoT Cybersecurity Report 2024’ by ONEKEY, which concludes that the German economy continues to underestimate the risk of hacker attacks targeting machines, industrial control systems (Operational Technology, OT), and the Internet of Things (IoT).

According to the report, only 11 percent of the industry systematically trains employees to recognize threats from cybercriminals. “For instance, if a production line or packaging robot isn’t functioning properly, the machine operator should also consider the possibility of a hacker attack,” explains Jan Wendenburg. “Without proper training, this critical thinking won’t happen, and the presence of hackers is often only discovered after significant damage has already occurred.”

More Than a Third of Companies Uncertain About Cyber Resilience Checks

62 percent of the industrial companies surveyed conduct regular cybersecurity audits. Among these, 24 percent rely on external assessments, 18 percent conduct internal assessments, and 20 percent use a hybrid approach that combines internal and external audits.

“For more than a third of the industry, it seems unclear whether or to what extent a regular or even occasional audit of resilience to hacker attacks is carried out,” says Jan Wendenburg, surprised at the current approach to one of the greatest threats of our time. Almost a fifth (19 per cent) of respondents admit that they do not conduct any cyber security audits, either internally or externally.

The statistics of the Federal Criminal Police Office (BKA) list almost 135,000 officially reported cases of cybercrime last year and assume that 90 per cent of these are unreported. “That would correspond to more than 4,000 attacks a day,” warns the ONEKEY CEO. The German Federal Office for Information Security (BSI) wrote in its status report last year: “The threat from cybercrime is higher than ever before.”

Despite the threat situation, less than half of companies (46 per cent) are satisfied with the measures they have taken to protect themselves against cyber criminals, according to the survey. “It’s high time to act,” warns Jan Wendenburg. He explains: “A first step is to subject the software in all connected devices to a thorough check and uncover any vulnerabilities.”

Leveraging a Product Cybersecurity & Compliance Platform for Effective Audits

To address this, ONEKEY operates a Product Cybersecurity & Compliance Platform (PCCP) that thoroughly analyzes the software in industrial control systems and networked devices to identify security vulnerabilities. “Such an audit not only documents the current status but also provides specific recommendations for necessary improvements,” explains Jan Wendenburg. He adds, “From 2027, anyone launching a networked electronic product with known exploitable vulnerabilities on the EU market could face fines of up to EUR 15 million. Therefore, documenting security is crucial not only from a technical standpoint but also from a legal and financial perspective.”

In the first half of 2024 alone, the US National Institute of Standards and Technology (NIST) published around 15,000 “Common Vulnerabilities and Exposures” (CVEs for short), i.e. security gaps and vulnerabilities in software. “The challenge is huge,” says Jan Wendenburg, and explains: “This makes it all the more urgent to swiftly implement the measures necessary to improve cybersecurity in line with legal requirements. Audits and employee training play a key role in this. We recommend including this in the list of good intentions for 2025 – and then implementing them.”

ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of an automated Product Cybersecurity & Compliance Platform (PCCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life. 

Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access. Proactively audit software supply chains with integrated software bill of materials (SBOM) generation. “Digital Cyber Twins” enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle. 

The patent-pending, integrated Compliance Wizard™ already covers the EU Cyber Resilience Act (CRA) and requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others.

The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation.

Leading international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform and ONEKEY Cybersecurity Experts.

Contact us: ONEKEY GmbH,
Kaiserswerther Str. 45, 40477 Duesseldorf, Germany,
Sara Fortmann, e-mail: sara.fortmann@onekey.com,
website: https://onekey.com

Related Content

  1. Disaster Recovery Journal
    The State of Business Continuity Preparedness 2018
  2. Disaster Recovery Journal
    The State of Business Continuity Preparedness 2018
  3. Disaster Recovery Journal
    Comparison of Companies – Contingency Plans Enacted After Hurricane Hugo and Andrew

Recent Posts

Flexential Secures Strategic Real Estate Control in Atlanta with Acquisition of Two Facilities

May 12, 2025

King Street-Backed Colovore Closes $925 Million Facility with Blackstone for AI Data Center Platform

May 12, 2025

ColorTokens and Nozomi Networks Join Forces to Deliver Unmatched OT and IoT Security Through Zero Trust Microsegmentation

May 9, 2025

The Overconfidence Trap: Why Most People Think Online Privacy Isn’t Their Problem

May 9, 2025

Flexential’s 2025 State of AI Infrastructure Report Reveals Growing Pressure Over AI Implementation

May 8, 2025

Multimodal AI at a Crossroads: Report Reveals CSEM Risks

May 8, 2025

Archives

  • May 2025 (26)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2025

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2025 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy