drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Fall 2026 Call for Presentations
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee

Industry Expert: Increased Investment in Industrial Cybersecurity Essential for 2025

by Jon Seals | March 6, 2025 | | 0 comments

Jan Wendenburg, CEO of ONEKEY: ‘Industry must ensure that the software in connected devices, machines, and systems is up to date to defend against hackers.’

DUESSELDORF, Germany – “The German economy should invest more in industrial cybersecurity in 2025,” said Jan Wendenburg, CEO of Duesseldorf-based cybersecurity company ONEKEY. He refers to a study from last year (“OT+ IoT Cybersecurity Report 2024”), which highlights the industry’s need for improvement in this area. The acronym OT stands for Operational Technology, and IoT refers to the Internet of Things.

“Connected devices, machines and systems used in Industry 4.0, smart factories, smart buildings, critical infrastructure, logistics, energy supply, healthcare, and many other sectors need to be better protected against cyberattacks,” advised Jan Wendenburg. The problem is that many of these connected systems still rely on outdated software that is not sufficiently protected against cyber threats.

Software in Devices, Machinery, and Systems Should Be Regularly Updated

“The software used in machine controls and other components should be continuously updated by manufacturers to close newly discovered security gaps,” said the CEO of ONEKEY. He cites typical examples such as manufacturing robots, CNC machines, conveyors, packaging machines, production equipment, building automation systems, and heating and cooling systems, which, in some cases, rely on outdated software, making them targets for hackers. The study “OT+ IoT Cybersecurity Report,” which surveyed over 300 industrial companies, provides data on this issue.

Jan Wendenburg advises the industry to conduct thorough security checks when procuring connected devices and machines to assess how well the new acquisitions are protected against cyberattacks. According to a survey, only 29 percent of companies carry out such checks. An additional 30 percent admit to relying on superficial tests or spot checks. More than a quarter (26 percent) of respondents could not provide an answer to this question. “The unreported number of outdated software in manufacturing companies appears to be significantly high,” Wendenburg said. Only 28 percent of the surveyed companies have specific compliance requirements for the security of industrial control systems or devices in the Industrial Internet of Things sector.

Firmware Should Be Systematically Tested for Cyber Resilience

Firmware, the software embedded in digital control systems, connected devices, machines, and equipment, should be systematically tested for cyber resilience, advises Jan Wendenburg, CEO of ONEKEY. However, according to a report, less than a third (31 percent) of companies regularly conduct security checks on the software integrated into connected devices to identify and close vulnerabilities, thereby reducing potential entry points for hackers. Nearly half (47 percent) only perform occasional firmware tests or skip them entirely.

A Complete Software Bill of Materials is the Exception

Jan Wendenburg recommends having a complete Software Bill of Materials (SBOM) that provides a comprehensive overview of all used programs. However, the study reveals that only about a quarter (24 percent) of industrial companies have a complete SBOM. The majority of companies (51 percent) either lack an SBOM entirely or have an incomplete one. “Companies should address the gaps and weaknesses in their software assets immediately,” Wendenburg advised. He added, “Even a single outdated program in a machine can give hackers access to the company’s network.”

The CEO of ONEKEY gave an example from manufacturing industry: “Cybercriminals can remotely manipulate the internal configuration of a CNC machine through unprotected firmware, potentially damaging both the machine and the workpieces. The machine could be irreparably damaged, and an entire production batch could be ruined.” Additionally, hackers can exploit firmware vulnerabilities to gain access to the corporate network and launch a ransomware attack, where critical business data is encrypted and only released after a ransom is paid.

Supplier Assessment Should Be Strengthened

According to the ONEKEY report, the lack of visibility into software components in machinery and equipment can be attributed to the fact that only a few industrial companies conduct thorough checks of the embedded software from their device suppliers and third-party vendors. Just over a third (34 percent) use questionnaires from industry associations to assess the cybersecurity of their suppliers. 31 percent rely on standardized assessments and certifications. More than a tenth (11 percent) report having no established procedure to ensure that the equipment, machines, and systems purchased for operations are adequately protected against cyberattacks. “Every industrial company should gain a clear insight into the cyber risks with a complete Software Bill of Materials – from production and logistics to building automation.”

Responsibility Lies with Manufacturers and Users

Jan Wendenburg emphasizes that the responsibility for outdated machine software lies with both manufacturers and users. He points to the EU’s Cyber Resilience Act (CRA), which will prohibit the sale of connected devices with known vulnerabilities in the European Union starting December 11, 2027. Additionally, the CRA requires manufacturers to monitor firmware even after delivery and provide updated versions promptly when new security vulnerabilities are discovered.

Current practices fall far behind the required standards, as shown by the “OT + IoT Cybersecurity Report” by ONEKEY. Currently, only 28 percent of companies meet the regulation that will be mandatory starting in 2027, providing regular software updates for connected devices and machines delivered to customers. Thirty percent apply updates only sporadically, while 17 percent do not apply them at all.

“Manufacturers should align their software development with the upcoming regulatory requirements,” advised Jan Wendenburg. He added, “It is also recommended that the industry requires its suppliers to guarantee and prove the cyber resilience of their products.”

Visit ONEKEY at Embedded World 2025
Learn more about ONEKEY’s solutions for OT and IoT security at Embedded World 2025. ONEKEY will be exhibiting at booth 5-376 in Hall 5. For more information, visit the website: https://www.onekey.com…dworld2025

ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life. 

Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access. Proactively audit software supply chains with integrated software bill of materials (SBOM) generation. “Digital Cyber Twins” enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle. 

The patent-pending, integrated Compliance Wizard™ already covers the EU Cyber Resilience Act (CRA) and requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others.

The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation.

Leading international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform (OCP) and ONEKEY Cybersecurity Experts.

Contact us: ONEKEY GmbH,
Kaiserswerther Str. 45, 40477 Duesseldorf, Germany,
Sara Fortmann, e-mail: sara.fortmann@onekey.com,
website: https://onekey.com

Related Content

  1. Integration of Cybersecurity into Physical Security Realm
  2. Disaster Recovery Journal
    Automated Disaster Recovery Plan Auditing
  3. Quantifying Cybersecurity Risk in Alumni CRM Systems
    Quantifying Cybersecurity Risk in Alumni CRM Systems

Recent Posts

Ransomware Attacks on Automotive and Smart Mobility More Than Doubled in 2025, According to New Research by Upstream Security

February 18, 2026

Keeper Security Brings Native Google Cloud Support to KeeperPAM for Unified, Multi-Cloud Privileged Access Management

February 18, 2026

AppSec Reality Check: 76% of Security Professionals Lack the Production Insight Needed to Secure Modern Applications

February 18, 2026

Pathlock Announces Integration with ServiceNow to Embed Risk-Aware Access Governance into Enterprise Workflows

February 18, 2026

New Open-Source SOC Grader Solves the MDR ‘Mean Time to Detect Poor Quality’ Problem

February 18, 2026

Virtana Unveils System-Aware MCP Server, Advancing Industry Shift from Fragmented Application Monitoring to End-to-End Enterprise AI Operations

February 18, 2026

Archives

  • February 2026 (52)
  • January 2026 (61)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Spring 2026 | The Future Runs on Resilience

    Leave your details below for a chance to win a free pass to DRJ Spring 2026 | The Future Runs on Resilience. The winner will be announced on March 6. Join us for DRJ's 74th Conference!
    Enter Now